www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/words-to-avoid.es.html philosoph...


From: GNUN
Subject: www philosophy/words-to-avoid.es.html philosoph...
Date: Mon, 26 Apr 2021 08:04:41 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/04/26 08:04:40

Modified files:
        philosophy     : words-to-avoid.es.html 
        philosophy/po  : open-source-misses-the-point.ar-diff.html 
                         open-source-misses-the-point.ar.po 
                         open-source-misses-the-point.bg.po 
                         open-source-misses-the-point.de-diff.html 
                         open-source-misses-the-point.de.po 
                         open-source-misses-the-point.el.po 
                         open-source-misses-the-point.es.po 
                         open-source-misses-the-point.fa.po 
                         open-source-misses-the-point.fr.po 
                         open-source-misses-the-point.hr-diff.html 
                         open-source-misses-the-point.hr.po 
                         open-source-misses-the-point.it-diff.html 
                         open-source-misses-the-point.it.po 
                         open-source-misses-the-point.ja.po 
                         open-source-misses-the-point.lt-diff.html 
                         open-source-misses-the-point.lt.po 
                         open-source-misses-the-point.ml.po 
                         open-source-misses-the-point.nl-diff.html 
                         open-source-misses-the-point.nl.po 
                         open-source-misses-the-point.pl.po 
                         open-source-misses-the-point.pot 
                         open-source-misses-the-point.pt-br.po 
                         open-source-misses-the-point.ro-diff.html 
                         open-source-misses-the-point.ro.po 
                         open-source-misses-the-point.ru.po 
                         open-source-misses-the-point.sq.po 
                         open-source-misses-the-point.ta.po 
                         open-source-misses-the-point.tr.po 
                         open-source-misses-the-point.uk-diff.html 
                         open-source-misses-the-point.uk.po 
                         open-source-misses-the-point.zh-cn.po 
                         words-to-avoid.es-en.html words-to-avoid.es.po 
        proprietary    : proprietary.pt-br.html 
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-manipulation.es.po 
                         proprietary-manipulation.fr.po 
                         proprietary-manipulation.pot 
                         proprietary-manipulation.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br-diff.html 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.tr.po proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.es.html?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ar-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ar.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.bg.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.de-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.de.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.el.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.es.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.fa.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.hr-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.hr.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.it-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.it.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ja.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.lt-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.lt.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ml.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.nl-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.nl.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.pl.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.pt-br.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ro-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ro.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ru.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.sq.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ta.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.tr.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.uk-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.uk.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.zh-cn.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.es-en.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.es.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.pt-br.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.434&r2=1.435
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.536&r2=1.537
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.es.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pot?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.ru.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.390&r2=1.391
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.627&r2=1.628
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.402&r2=1.403
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.264&r2=1.265
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.384&r2=1.385
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.323&r2=1.324
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.708&r2=1.709
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.435&r2=1.436
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.476&r2=1.477
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.408&r2=1.409
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.498&r2=1.499
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.241&r2=1.242
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.377&r2=1.378
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.640&r2=1.641
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.306&r2=1.307

Patches:
Index: philosophy/words-to-avoid.es.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.es.html,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- philosophy/words-to-avoid.es.html   3 Mar 2021 10:29:21 -0000       1.156
+++ philosophy/words-to-avoid.es.html   26 Apr 2021 12:04:22 -0000      1.157
@@ -594,7 +594,7 @@
 alimentación» de internet.
 </p>
 
-<p>Véase también la <a href="http://www.salon.com/2000/06/14/love_7/";>carta
+<p>Véase también la <a href="https://www.salon.com/2000/06/14/love_7/";>carta
 abierta de Courtney Love a Steve Case</a> y buscar por «<cite>content
 provider</cite>» en esa página. Lamentablemente, la señorita Love no se ha
 dado cuenta de que la expresión «propiedad intelectual» también es <a
@@ -1457,7 +1457,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/03/03 10:29:21 $
+$Date: 2021/04/26 12:04:22 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/open-source-misses-the-point.ar-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ar-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/po/open-source-misses-the-point.ar-diff.html     6 Oct 2020 
08:42:14 -0000       1.29
+++ philosophy/po/open-source-misses-the-point.ar-diff.html     26 Apr 2021 
12:04:24 -0000      1.30
@@ -140,7 +140,7 @@
 (including many Android devices) come</strong></del></span> <span 
class="inserted"><ins><em>when a program's source code carries a weak license, 
one
 without copyleft, its executables can carry additional nonfree
 conditions.  &lt;a href="https://code.visualstudio.com/License/"&gt;Microsoft
-does this</em></ins></span> with <span class="removed"><del><strong>executable 
programs that</strong></del></span> <span class="inserted"><ins><em>Visual 
Studio,&lt;/a&gt; for example.&lt;/p&gt;
+does this</em></ins></span> with <span class="removed"><del><strong>executable 
programs that</strong></del></span> <span class="inserted"><ins><em>Visual 
Studio Code,&lt;/a&gt; for example.&lt;/p&gt;
 
 &lt;p&gt;If these executables fully</em></ins></span> correspond to <span 
class="removed"><del><strong>free software</strong></del></span> <span 
class="inserted"><ins><em>the released sources, they
 qualify as open</em></ins></span> source <span 
class="removed"><del><strong>code,</strong></del></span> but <span 
class="removed"><del><strong>the devices do</strong></del></span> not <span 
class="removed"><del><strong>allow</strong></del></span> <span 
class="inserted"><ins><em>as free software.  However, in that
@@ -508,7 +508,7 @@
 of this article.&lt;/p&gt;
 <span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;Copyright &copy; 2007, 2010, <span 
class="removed"><del><strong>2012</strong></del></span> <span 
class="inserted"><ins><em>2012, 2015, 2016, 2019, 2020</em></ins></span> 
Richard Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2007, 2010, <span 
class="removed"><del><strong>2012</strong></del></span> <span 
class="inserted"><ins><em>2012, 2015, 2016, 2019, 2020, 2021</em></ins></span> 
Richard Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
@@ -521,7 +521,7 @@
 
 <span class="inserted"><ins><em>&lt;p 
class="unprintable"&gt;Updated:</em></ins></span>
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/06 08:42:14 $
+$Date: 2021/04/26 12:04:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/open-source-misses-the-point.ar.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ar.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- philosophy/po/open-source-misses-the-point.ar.po    6 Oct 2020 08:42:14 
-0000       1.78
+++ philosophy/po/open-source-misses-the-point.ar.po    26 Apr 2021 12:04:25 
-0000      1.79
@@ -10,7 +10,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2014-09-27 17:26+0100\n"
 "Last-Translator: Rafik E. Younan <rafik.younan@phoenixegypt.com>\n"
 "Language-Team: Arabic <www-ar-translators@gnu.org>\n"
@@ -323,7 +323,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -1029,12 +1029,13 @@
 "href=\"/server/standards/README.translations.html\">دليل الترجم
Ø©</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2007, 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright &copy; 2007, 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020,
+# | 2021+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2007, 2010, 2012 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "Copyright &copy; 2007, 2010, 2012 مريتشارد ستولمن"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.bg.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.bg.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- philosophy/po/open-source-misses-the-point.bg.po    6 Oct 2020 08:42:14 
-0000       1.54
+++ philosophy/po/open-source-misses-the-point.bg.po    26 Apr 2021 12:04:26 
-0000      1.55
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2009-10-28 14:55+0200\n"
 "Last-Translator: Yavor Doganov <yavor@gnu.org>\n"
 "Language-Team: Bulgarian <dict@fsa-bg.org>\n"
@@ -347,7 +347,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -1107,12 +1107,13 @@
 "подаването на преводи на тази статия."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2007-] {+2007, 2010, 2012, 2015, 2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright &copy; [-2007-] {+2007, 2010, 2012, 2015, 2016, 2019, 2020,
+# | 2021+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2007 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "Copyright &copy; 2007 Ричард Столман"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.de-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.de-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/open-source-misses-the-point.de-diff.html     6 Oct 2020 
08:42:14 -0000       1.5
+++ philosophy/po/open-source-misses-the-point.de-diff.html     26 Apr 2021 
12:04:26 -0000      1.6
@@ -137,7 +137,7 @@
 &lt;p&gt;Second, when a program's source code carries a weak license, one
 without copyleft, its executables can carry additional nonfree
 conditions.  &lt;a href="https://code.visualstudio.com/License/"&gt;Microsoft
-does this with Visual Studio,&lt;/a&gt; for example.&lt;/p&gt;
+does this with Visual <span 
class="removed"><del><strong>Studio,&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Studio Code,&lt;/a&gt;</em></ins></span> for 
example.&lt;/p&gt;
 
 &lt;p&gt;If these executables fully correspond to the released sources, they
 qualify as open source but not as free software.  However, in that
@@ -495,7 +495,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, 2016, <span 
class="removed"><del><strong>2019</strong></del></span> <span 
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, 2016, <span 
class="removed"><del><strong>2019</strong></del></span> <span 
class="inserted"><ins><em>2019, 2020, 2021</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -505,7 +505,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/06 08:42:14 $
+$Date: 2021/04/26 12:04:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/open-source-misses-the-point.de.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.de.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- philosophy/po/open-source-misses-the-point.de.po    6 Oct 2020 08:42:14 
-0000       1.108
+++ philosophy/po/open-source-misses-the-point.de.po    26 Apr 2021 12:04:26 
-0000      1.109
@@ -9,7 +9,7 @@
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
 "Report-Msgid-Bugs-To: webmasters@gnu.org\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2019-11-20 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -285,11 +285,21 @@
 "nur wenige Programme diese Lizenzen."
 
 #. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions.  <a
+# | href=\"https://code.visualstudio.com/License/\";>Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "Zweitens, wenn der Quellcode eines Programms eine schwache Lizenz aufweist, "
 "eine ohne Copyleft, können seine ausführbaren Dateien zusätzliche unfreie "
@@ -1061,12 +1071,13 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2007, 2010, 2012, 2015, 2016, [-2019-] {+2019, 2020+}
-# | Richard Stallman
+# | Copyright &copy; 2007, 2010, 2012, 2015, 2016, [-2019-] {+2019, 2020,
+# | 2021+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Copyright &copy; 2007, 2010, 2012<ins>, 2014</ins>, 2015, 2016, 2019 Richard "
 "Stallman."

Index: philosophy/po/open-source-misses-the-point.el.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.el.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- philosophy/po/open-source-misses-the-point.el.po    6 Oct 2020 08:42:15 
-0000       1.21
+++ philosophy/po/open-source-misses-the-point.el.po    26 Apr 2021 12:04:26 
-0000      1.22
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: web-translators <web-translators@gnu.org>\n"
@@ -409,7 +409,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -1380,12 +1380,13 @@
 "\"/server/standards/README.translations.html\">Μεταφράσεις 
ΔΙΑΒΑΣΕΜΕ</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; {+2007,+} 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright &copy; {+2007,+} 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020,
+# | 2021+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2010, 2012 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "Copyright &copy; 2007 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.es.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- philosophy/po/open-source-misses-the-point.es.po    10 Mar 2021 12:01:36 
-0000      1.119
+++ philosophy/po/open-source-misses-the-point.es.po    26 Apr 2021 12:04:26 
-0000      1.120
@@ -10,7 +10,7 @@
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -18,6 +18,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -288,11 +289,21 @@
 "son muy pocos los programas que llevan tales licencias."
 
 #. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions.  <a
+# | href=\"https://code.visualstudio.com/License/\";>Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "En segundo lugar, cuando el código fuente de un programa tiene una licencia "
 "débil, una licencia sin copyleft, sus ejecutables pueden tener condiciones "
@@ -1078,8 +1089,14 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, [-2020-] {+2020,
+# | 2021+} Richard Stallman
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 

Index: philosophy/po/open-source-misses-the-point.fa.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.fa.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- philosophy/po/open-source-misses-the-point.fa.po    6 Oct 2020 08:42:15 
-0000       1.63
+++ philosophy/po/open-source-misses-the-point.fa.po    26 Apr 2021 12:04:26 
-0000      1.64
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2011-01-16 23:22+0330\n"
 "Last-Translator: Mahyar Moghimi <mahyar.moqimi@gmail.com>\n"
 "Language-Team: Persian <www-fa-general@list.gnu.org>\n"
@@ -288,7 +288,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -977,7 +977,8 @@
 #, fuzzy
 #| msgid "Copyright &copy; 2007, 2010, 2012 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "<span dir=\"ltr\">Copyright &copy; 2007, 2010 Richard Stallman</span>"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- philosophy/po/open-source-misses-the-point.fr.po    7 Dec 2020 14:04:43 
-0000       1.110
+++ philosophy/po/open-source-misses-the-point.fr.po    26 Apr 2021 12:04:26 
-0000      1.111
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-12-07 12:06+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -280,11 +281,21 @@
 "programmes utilisant ces licences sont rares."
 
 #. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions.  <a
+# | href=\"https://code.visualstudio.com/License/\";>Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "De plus, lorsque le code source d'un programme a une licence faible, sans "
 "copyleft, des conditions supplémentaires non libres peuvent être ajoutées 
à "
@@ -1052,8 +1063,14 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, [-2020-] {+2020,
+# | 2021+} Richard Stallman
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 

Index: philosophy/po/open-source-misses-the-point.hr-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.hr-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- philosophy/po/open-source-misses-the-point.hr-diff.html     6 Oct 2020 
08:42:15 -0000       1.20
+++ philosophy/po/open-source-misses-the-point.hr-diff.html     26 Apr 2021 
12:04:27 -0000      1.21
@@ -143,7 +143,7 @@
 (including many Android devices) come</strong></del></span> <span 
class="inserted"><ins><em>when a program's source code carries a weak license, 
one
 without copyleft, its executables can carry additional nonfree
 conditions.  &lt;a href="https://code.visualstudio.com/License/"&gt;Microsoft
-does this</em></ins></span> with <span class="removed"><del><strong>executable 
programs that</strong></del></span> <span class="inserted"><ins><em>Visual 
Studio,&lt;/a&gt; for example.&lt;/p&gt;
+does this</em></ins></span> with <span class="removed"><del><strong>executable 
programs that</strong></del></span> <span class="inserted"><ins><em>Visual 
Studio Code,&lt;/a&gt; for example.&lt;/p&gt;
 
 &lt;p&gt;If these executables fully</em></ins></span> correspond to <span 
class="removed"><del><strong>free software</strong></del></span> <span 
class="inserted"><ins><em>the released sources, they
 qualify as open</em></ins></span> source <span 
class="removed"><del><strong>code,</strong></del></span> but <span 
class="removed"><del><strong>the devices do</strong></del></span> not <span 
class="removed"><del><strong>allow</strong></del></span> <span 
class="inserted"><ins><em>as free software.  However, in that
@@ -511,7 +511,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; 2007, 2010, <span 
class="removed"><del><strong>2012</strong></del></span> <span 
class="inserted"><ins><em>2012, 2015, 2016, 2019, 2020</em></ins></span> 
Richard Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2007, 2010, <span 
class="removed"><del><strong>2012</strong></del></span> <span 
class="inserted"><ins><em>2012, 2015, 2016, 2019, 2020, 2021</em></ins></span> 
Richard Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
@@ -522,7 +522,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/open-source-misses-the-point.hr.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.hr.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- philosophy/po/open-source-misses-the-point.hr.po    6 Oct 2020 08:42:15 
-0000       1.38
+++ philosophy/po/open-source-misses-the-point.hr.po    26 Apr 2021 12:04:27 
-0000      1.39
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2014-02-06 22:11+0100\n"
 "Last-Translator: Martina Bebek <martinaporec@gmail.com>\n"
 "Language-Team: GNU Croatian Translation Team <www-hr-lista@gnu.org>\n"
@@ -344,7 +344,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -1107,12 +1107,13 @@
 "prijevode</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2007, 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright &copy; 2007, 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020,
+# | 2021+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2007, 2010, 2012 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "Copyright &copy; 2007, 2010, 2012 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.it-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.it-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/open-source-misses-the-point.it-diff.html     6 Oct 2020 
08:42:15 -0000       1.5
+++ philosophy/po/open-source-misses-the-point.it-diff.html     26 Apr 2021 
12:04:27 -0000      1.6
@@ -142,7 +142,7 @@
 &lt;p&gt;Second, <span class="inserted"><ins><em>when a program's source code 
carries a weak license, one
 without copyleft, its executables can carry additional nonfree
 conditions.  &lt;a href="https://code.visualstudio.com/License/"&gt;Microsoft
-does this with Visual Studio,&lt;/a&gt; for example.&lt;/p&gt;
+does this with Visual Studio Code,&lt;/a&gt; for example.&lt;/p&gt;
 
 &lt;p&gt;If these executables fully correspond to the released sources, they
 qualify as open source but not as free software.  However, in that
@@ -504,7 +504,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2019, 2020, 2021</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -514,7 +514,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/open-source-misses-the-point.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.it.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- philosophy/po/open-source-misses-the-point.it.po    6 Oct 2020 08:42:15 
-0000       1.80
+++ philosophy/po/open-source-misses-the-point.it.po    26 Apr 2021 12:04:27 
-0000      1.81
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2016-07-30 17:23+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian\n"
@@ -336,7 +336,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -1125,12 +1125,13 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright &copy; 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020,
+# | 2021+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2007, 2010, 2012, 2015, 2016 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "Copyright &copy; 2007, 2010, 2012, 2015, 2016 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ja.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- philosophy/po/open-source-misses-the-point.ja.po    6 Oct 2020 08:42:15 
-0000       1.80
+++ philosophy/po/open-source-misses-the-point.ja.po    26 Apr 2021 12:04:27 
-0000      1.81
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-01-18 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -255,11 +256,17 @@
 "なライセンスは、ほんの少数のプログラム
にしか使われていません。"
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "第二に、あるプログラム
のソースコードが弱いライセンスでコピーレフトではないも"
 "のをもってる時、その実行形式は追加
の不自由な条件をもつことがあります。たとえ"
@@ -965,8 +972,12 @@
 "README.translations.html\">翻訳 README</a>をご覧ください。"
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 

Index: philosophy/po/open-source-misses-the-point.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.lt-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- philosophy/po/open-source-misses-the-point.lt-diff.html     6 Oct 2020 
08:42:15 -0000       1.11
+++ philosophy/po/open-source-misses-the-point.lt-diff.html     26 Apr 2021 
12:04:27 -0000      1.12
@@ -142,7 +142,7 @@
 &lt;p&gt;Second, <span class="inserted"><ins><em>when a program's source code 
carries a weak license, one
 without copyleft, its executables can carry additional nonfree
 conditions.  &lt;a href="https://code.visualstudio.com/License/"&gt;Microsoft
-does this with Visual Studio,&lt;/a&gt; for example.&lt;/p&gt;
+does this with Visual Studio Code,&lt;/a&gt; for example.&lt;/p&gt;
 
 &lt;p&gt;If these executables fully correspond to the released sources, they
 qualify as open source but not as free software.  However, in that
@@ -504,7 +504,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2019, 2020, 2021</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -514,7 +514,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/open-source-misses-the-point.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.lt.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- philosophy/po/open-source-misses-the-point.lt.po    6 Oct 2020 08:42:15 
-0000       1.21
+++ philosophy/po/open-source-misses-the-point.lt.po    26 Apr 2021 12:04:27 
-0000      1.22
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2016-01-15 02:06+0200\n"
 "Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
 "Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -341,7 +341,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -1131,12 +1131,13 @@
 "PERSKAITYKITEMANE</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright &copy; 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020,
+# | 2021+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2007, 2010, 2012, 2015, 2016 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "Copyright &copy; 2007, 2010, 2012, 2015, 2016 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.ml.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ml.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- philosophy/po/open-source-misses-the-point.ml.po    2 Feb 2021 16:32:06 
-0000       1.69
+++ philosophy/po/open-source-misses-the-point.ml.po    26 Apr 2021 12:04:27 
-0000      1.70
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html 1\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-09-05 17:42+0200\n"
 "Last-Translator: Aiswarya Kaitheri Kandoth <aiswaryakk29@gmail.com>\n"
 "Language-Team: Malayalam <www-ml-gnu-malayalam-project-public@gnu.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8-bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: nplurals=2; plural=n != 1;\n"
 "X-Generator: Lokalize 19.04.0\n"
 
@@ -263,11 +264,21 @@
 "മാത്രമേ അത്തരം 
സമ്മതപത്രങ്ങൾ 
ഉപയോഗിക്കുന്നുള്ളു."
 
 #. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions.  <a
+# | href=\"https://code.visualstudio.com/License/\";>Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "രണ്ടാമതായി, ഒരു 
പ്രോഗ്രാമിൻ്റെ സോഴ്സ് കോഡ് 
ദുർബലമായ ഒരു സമ്മതപത്രം 
ഉള്ളതാണെങ്കിൽ, "
 "കോപ്പിലെഫ്റ്റ് ഇല്ലാത്ത 
ഒന്നു്, അതിൻ്റെ 
എക്സിക്യൂട്ടബിളുകൾ 
സ്വതന്ത്രമല്ലാത്ത നിബന്ധനകൾ 
കൂടി "
@@ -983,8 +994,14 @@
 "README.translations.html\">Translations README</a> നോക്കുക."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, [-2020-] {+2020,
+# | 2021+} Richard Stallman
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 
റിച്ചാര്‍ഡ് സ്റ്റാള്‍മാന്‍"
 

Index: philosophy/po/open-source-misses-the-point.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.nl-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- philosophy/po/open-source-misses-the-point.nl-diff.html     6 Oct 2020 
08:42:15 -0000       1.33
+++ philosophy/po/open-source-misses-the-point.nl-diff.html     26 Apr 2021 
12:04:27 -0000      1.34
@@ -142,7 +142,7 @@
 &lt;p&gt;Second, <span class="inserted"><ins><em>when a program's source code 
carries a weak license, one
 without copyleft, its executables can carry additional nonfree
 conditions.  &lt;a href="https://code.visualstudio.com/License/"&gt;Microsoft
-does this with Visual Studio,&lt;/a&gt; for example.&lt;/p&gt;
+does this with Visual Studio Code,&lt;/a&gt; for example.&lt;/p&gt;
 
 &lt;p&gt;If these executables fully correspond to the released sources, they
 qualify as open source but not as free software.  However, in that
@@ -504,7 +504,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2019, 2020, 2021</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -514,7 +514,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/open-source-misses-the-point.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.nl.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- philosophy/po/open-source-misses-the-point.nl.po    6 Oct 2020 08:42:15 
-0000       1.51
+++ philosophy/po/open-source-misses-the-point.nl.po    26 Apr 2021 12:04:28 
-0000      1.52
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Justin van Steijn <justin50@live.nl>\n"
 "Language-Team: Dutch\n"
@@ -324,7 +324,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -1074,12 +1074,13 @@
 "voor informatie over het onderhoud van vertalingen op deze website."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright &copy; 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020,
+# | 2021+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2007, 2010, 2012, 2015, 2016 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "Copyright &copy; 2007, 2010, 2012, 2015, 2016 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.pl.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.pl.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- philosophy/po/open-source-misses-the-point.pl.po    1 Dec 2020 21:31:02 
-0000       1.79
+++ philosophy/po/open-source-misses-the-point.pl.po    26 Apr 2021 12:04:28 
-0000      1.80
@@ -8,7 +8,7 @@
 msgstr ""
 "Project-Id-Version: Why Open Source misses the point of Free Software\n"
 "Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-12-01 14:01-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: nplurals=3; plural=(n==1 ? 0 : n%10>=2 && n%10<=4 && (n%100<10 "
 "|| n%100>=20) ? 1 : 2);\n"
 "X-Generator: Virtaal 0.7.1\n"
@@ -287,11 +288,21 @@
 "programów wykorzystuje takie licencje."
 
 #. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions.  <a
+# | href=\"https://code.visualstudio.com/License/\";>Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "Po&nbsp;drugie, gdy kod źródłowy danego programu ma słabą licencję, 
taką "
 "bez&nbsp;copyleft, pliki wykonywalne mogą zawierać dodatkowe niewolne "
@@ -1060,8 +1071,14 @@
 "tłumaczeń</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, [-2020-] {+2020,
+# | 2021+} Richard Stallman
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 

Index: philosophy/po/open-source-misses-the-point.pot
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- philosophy/po/open-source-misses-the-point.pot      6 Oct 2020 08:42:15 
-0000       1.49
+++ philosophy/po/open-source-misses-the-point.pot      26 Apr 2021 12:04:28 
-0000      1.50
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -173,7 +173,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a "
 "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
-"Visual Studio,</a> for example."
+"Visual Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -637,7 +637,9 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard 
Stallman"
+msgid ""
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.pt-br.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- philosophy/po/open-source-misses-the-point.pt-br.po 20 Apr 2021 07:13:31 
-0000      1.53
+++ philosophy/po/open-source-misses-the-point.pt-br.po 26 Apr 2021 12:04:28 
-0000      1.54
@@ -10,7 +10,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-01-07 14:59-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -18,6 +18,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -268,11 +269,17 @@
 "privativamente. Por sorte, poucos programas usam tais licenças."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "Em segundo lugar, quando o código-fonte de um programa carrega uma licença "
 "fraca, uma sem copyleft, seus executáveis podem conter condições 
adicionais "
@@ -999,8 +1006,12 @@
 "envio de traduções das páginas deste site."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 

Index: philosophy/po/open-source-misses-the-point.ro-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ro-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/open-source-misses-the-point.ro-diff.html     6 Oct 2020 
08:42:15 -0000       1.2
+++ philosophy/po/open-source-misses-the-point.ro-diff.html     26 Apr 2021 
12:04:28 -0000      1.3
@@ -137,7 +137,7 @@
 &lt;p&gt;Second, when a program's source code carries a weak license, one
 without copyleft, its executables can carry additional nonfree
 conditions.  &lt;a href="https://code.visualstudio.com/License/"&gt;Microsoft
-does this with Visual Studio,&lt;/a&gt; for example.&lt;/p&gt;
+does this with Visual <span 
class="removed"><del><strong>Studio,&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Studio Code,&lt;/a&gt;</em></ins></span> for 
example.&lt;/p&gt;
 
 &lt;p&gt;If these executables fully correspond to the released sources, they
 qualify as open source but not as free software.  However, in that
@@ -495,7 +495,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, 2016, <span 
class="removed"><del><strong>2019</strong></del></span> <span 
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, 2016, <span 
class="removed"><del><strong>2019</strong></del></span> <span 
class="inserted"><ins><em>2019, 2020, 2021</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -505,7 +505,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/open-source-misses-the-point.ro.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ro.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- philosophy/po/open-source-misses-the-point.ro.po    6 Oct 2020 08:42:15 
-0000       1.48
+++ philosophy/po/open-source-misses-the-point.ro.po    26 Apr 2021 12:04:28 
-0000      1.49
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2019-06-04 20:13+0200\n"
 "Last-Translator: Denis Cherean <denis.cherean@gmail.com>\n"
 "Language-Team: Romanian <web-translators-ro@gnu.org>\n"
@@ -281,11 +281,21 @@
 "de licențe."
 
 #. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions.  <a
+# | href=\"https://code.visualstudio.com/License/\";>Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "În al doilea rând, când codul sursă al unui program poartă o licență 
slabă, "
 "fără copyleft (metodă prin care un program sau o lucrare devine liber/"
@@ -1016,12 +1026,13 @@
 "html\">ghidul de traduceri</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; 2007, 2010, 2012, 2015, 2016, [-2019-] {+2019, 2020+}
-# | Richard Stallman
+# | Copyright &copy; 2007, 2010, 2012, 2015, 2016, [-2019-] {+2019, 2020,
+# | 2021+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ru.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- philosophy/po/open-source-misses-the-point.ru.po    6 Oct 2020 08:42:15 
-0000       1.108
+++ philosophy/po/open-source-misses-the-point.ru.po    26 Apr 2021 12:04:28 
-0000      1.109
@@ -10,7 +10,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-01-07 17:17+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -18,6 +18,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 
 # type: Content of: <title>
 #. type: Content of: <title>
@@ -288,11 +289,21 @@
 "мало."
 
 #. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions.  <a
+# | href=\"https://code.visualstudio.com/License/\";>Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "Во-вторых, когда исходный текст программы 
несет слабую лицензию, т.е. "
 "лицензию без авторского лева, ее 
исполняемые файлы могут нести "
@@ -1087,8 +1098,14 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
+# | Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, [-2020-] {+2020,
+# | 2021+} Richard Stallman
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Copyright &copy; 2007, 2010, 2012, 2013, 2015, 2016, 2019, 2020 Richard "
 "Stallman <br /> Copyright &copy; 2008 jeder (translation) <br /> Copyright "

Index: philosophy/po/open-source-misses-the-point.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.sq.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- philosophy/po/open-source-misses-the-point.sq.po    6 Oct 2020 08:42:15 
-0000       1.81
+++ philosophy/po/open-source-misses-the-point.sq.po    26 Apr 2021 12:04:28 
-0000      1.82
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-02-01 10:59+0200\n"
 "Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
 "Language-Team: \n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "X-Generator: Poedit 2.2\n"
 
 #. type: Content of: <title>
@@ -269,11 +270,17 @@
 "tilla përdoren nga pak programe."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "Së dyti, kur kodi burim i një programi ka një licencë të dobët, një pa 
"
 "<em>copyleft</em>, të ekzekutueshmit e tij mund të bartin kushte jo të 
lira "
@@ -1022,8 +1029,12 @@
 "standards/README.translations.html\">README për përkthimet</a>."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Të drejta kopjimi &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard "
 "Stallman"

Index: philosophy/po/open-source-misses-the-point.ta.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ta.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- philosophy/po/open-source-misses-the-point.ta.po    6 Oct 2020 08:42:15 
-0000       1.8
+++ philosophy/po/open-source-misses-the-point.ta.po    26 Apr 2021 12:04:28 
-0000      1.9
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: web-translators <web-translators@gnu.org>\n"
@@ -392,7 +392,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -1364,12 +1364,13 @@
 "கோப்பைக்</a> காணவும்."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2007-] {+2007, 2010, 2012, 2015, 2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright &copy; [-2007-] {+2007, 2010, 2012, 2015, 2016, 2019, 2020,
+# | 2021+} Richard Stallman
 #, fuzzy
 #| msgid "Copyright &copy; 2007 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "Copyright &copy; 2007 Richard Stallman (ரிச்சர்ட் 
ஸ்டால்மேன்)"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.tr.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- philosophy/po/open-source-misses-the-point.tr.po    6 Oct 2020 08:42:15 
-0000       1.55
+++ philosophy/po/open-source-misses-the-point.tr.po    26 Apr 2021 12:04:28 
-0000      1.56
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-08-22 07:58+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: nplurals=1; plural=0;\n"
 "X-Generator: Poedit 2.3\n"
 
@@ -263,11 +264,17 @@
 "vermez. Neyse ki birkaç program bu tür lisansları kullanmaktadır."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "İkincisi bir programın kaynak kodu copyleft olmadan zayıf bir lisans "
 "taşıdığında çalıştırılabilir dosyaları ek özgür olmayan 
koşullar "
@@ -991,8 +998,12 @@
 "\">çalışma&nbsp;sayfamızı</a> ziyaret edebilirsiniz."
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 

Index: philosophy/po/open-source-misses-the-point.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.uk-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/open-source-misses-the-point.uk-diff.html     6 Oct 2020 
08:42:15 -0000       1.6
+++ philosophy/po/open-source-misses-the-point.uk-diff.html     26 Apr 2021 
12:04:29 -0000      1.7
@@ -142,7 +142,7 @@
 &lt;p&gt;Second, <span class="inserted"><ins><em>when a program's source code 
carries a weak license, one
 without copyleft, its executables can carry additional nonfree
 conditions.  &lt;a href="https://code.visualstudio.com/License/"&gt;Microsoft
-does this with Visual Studio,&lt;/a&gt; for example.&lt;/p&gt;
+does this with Visual Studio Code,&lt;/a&gt; for example.&lt;/p&gt;
 
 &lt;p&gt;If these executables fully correspond to the released sources, they
 qualify as open source but not as free software.  However, in that
@@ -504,7 +504,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2007, 2010, 2012, 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2019, 2020, 2021</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -514,7 +514,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/open-source-misses-the-point.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.uk.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- philosophy/po/open-source-misses-the-point.uk.po    6 Oct 2020 08:42:15 
-0000       1.46
+++ philosophy/po/open-source-misses-the-point.uk.po    26 Apr 2021 12:04:29 
-0000      1.47
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2016-08-04 07:30+0200\n"
 "Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
 "Language-Team: Ukrainian <>\n"
@@ -299,7 +299,7 @@
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -1060,7 +1060,8 @@
 #, fuzzy
 #| msgid "Copyright &copy; 2007, 2010, 2012, 2015, 2016 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr "Copyright &copy; 2007, 2010, 2012, 2015, 2016 Річард 
Столмен"
 
 #. type: Content of: <div><p>

Index: philosophy/po/open-source-misses-the-point.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.zh-cn.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- philosophy/po/open-source-misses-the-point.zh-cn.po 6 Oct 2020 08:42:15 
-0000       1.65
+++ philosophy/po/open-source-misses-the-point.zh-cn.po 26 Apr 2021 12:04:29 
-0000      1.66
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: 1.0\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-01-23 17:17+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -231,11 +232,17 @@
 "是,很少软件会使用这些许可证。"
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions.  <a "
+#| "href=\"https://code.visualstudio.com/License/\";>Microsoft does this with "
+#| "Visual Studio,</a> for example."
 msgid ""
 "Second, when a program's source code carries a weak license, one without "
 "copyleft, its executables can carry additional nonfree conditions.  <a href="
 "\"https://code.visualstudio.com/License/\";>Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
 msgstr ""
 "其次,当一个程序的源代码使用的是弱许可证,而非 
copyleft,那么其可执行文件就能"
 "够附加额外的非自由条款。例如,<a 
href=\"https://code.visualstudio.com/";
@@ -874,8 +881,12 @@
 "翻译须知</a>。"
 
 #. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 msgid ""
-"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
 msgstr ""
 "Copyright &copy; 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
 

Index: philosophy/po/words-to-avoid.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.es-en.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- philosophy/po/words-to-avoid.es-en.html     3 Mar 2021 10:29:21 -0000       
1.100
+++ philosophy/po/words-to-avoid.es-en.html     26 Apr 2021 12:04:29 -0000      
1.101
@@ -529,7 +529,7 @@
 &ldquo;tubes&rdquo; of the internet.
 </p>
 
-<p>See also <a href="http://www.salon.com/2000/06/14/love_7/";>Courtney
+<p>See also <a href="https://www.salon.com/2000/06/14/love_7/";>Courtney
 Love's open letter to Steve Case</a> and search for &ldquo;content
 provider&rdquo; in that page.  Alas, Ms. Love is unaware that the term
 &ldquo;intellectual property&rdquo; is
@@ -1430,7 +1430,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/03/03 10:29:21 $
+$Date: 2021/04/26 12:04:29 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/words-to-avoid.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.es.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- philosophy/po/words-to-avoid.es.po  26 Apr 2021 11:46:22 -0000      1.270
+++ philosophy/po/words-to-avoid.es.po  26 Apr 2021 12:04:29 -0000      1.271
@@ -1151,11 +1151,6 @@
 "alimentación» de internet."
 
 # type: Content of: <p>
-# | See also <a href=\"http{+s+}://www.salon.com/2000/06/14/love_7/\">Courtney
-# | Love's open letter to Steve Case</a> and search for &ldquo;content
-# | provider&rdquo; in that page.  Alas, Ms. Love is unaware that the term
-# | &ldquo;intellectual property&rdquo; is also <a
-# | href=\"#IntellectualProperty\"> biased and confusing</a>.
 #. type: Content of: <p>
 msgid ""
 "See also <a href=\"https://www.salon.com/2000/06/14/love_7/\";>Courtney "

Index: proprietary/proprietary.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.pt-br.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary/proprietary.pt-br.html  23 Apr 2021 10:29:19 -0000      1.96
+++ proprietary/proprietary.pt-br.html  26 Apr 2021 12:04:30 -0000      1.97
@@ -3,7 +3,7 @@
  https://www.gnu.org/proprietary/po/proprietary.pt-br.po</a>'
  --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary.html"
  --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary.pt-br-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2021-02-22" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary.en.html" -->
+ --><!--#set var="OUTDATED_SINCE" value="2021-02-22" -->
 
 <!--#include virtual="/server/html5-header.pt-br.html" -->
 <!-- Parent-Version: 1.95 -->
@@ -360,7 +360,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/04/23 10:29:19 $
+$Date: 2021/04/26 12:04:30 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/de.po        18 Apr 2021 08:31:18 -0000      1.306
+++ proprietary/po/de.po        26 Apr 2021 12:04:30 -0000      1.307
@@ -12438,6 +12438,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.434
retrieving revision 1.435
diff -u -b -r1.434 -r1.435
--- proprietary/po/es.po        18 Apr 2021 08:31:18 -0000      1.434
+++ proprietary/po/es.po        26 Apr 2021 12:04:30 -0000      1.435
@@ -13200,6 +13200,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.536
retrieving revision 1.537
diff -u -b -r1.536 -r1.537
--- proprietary/po/fr.po        18 Apr 2021 09:16:44 -0000      1.536
+++ proprietary/po/fr.po        26 Apr 2021 12:04:31 -0000      1.537
@@ -11166,6 +11166,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/it.po        18 Apr 2021 08:31:18 -0000      1.306
+++ proprietary/po/it.po        26 Apr 2021 12:04:31 -0000      1.307
@@ -11552,6 +11552,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- proprietary/po/ja.po        18 Apr 2021 08:31:18 -0000      1.314
+++ proprietary/po/ja.po        26 Apr 2021 12:04:31 -0000      1.315
@@ -9171,6 +9171,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- proprietary/po/nl.po        18 Apr 2021 08:31:18 -0000      1.307
+++ proprietary/po/nl.po        26 Apr 2021 12:04:31 -0000      1.308
@@ -8354,6 +8354,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/pl.po        18 Apr 2021 08:31:18 -0000      1.306
+++ proprietary/po/pl.po        26 Apr 2021 12:04:31 -0000      1.307
@@ -7774,6 +7774,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary/po/pot  18 Apr 2021 08:31:19 -0000      1.305
+++ proprietary/po/pot  26 Apr 2021 12:04:33 -0000      1.306
@@ -7374,6 +7374,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/proprietary-manipulation.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.es.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-manipulation.es.po       12 Apr 2021 10:33:22 
-0000      1.23
+++ proprietary/po/proprietary-manipulation.es.po       26 Apr 2021 12:04:33 
-0000      1.24
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-04-11 12:56+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2021-04-12 12:06+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -118,6 +119,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/proprietary-manipulation.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-manipulation.fr.po       12 Apr 2021 09:50:40 
-0000      1.21
+++ proprietary/po/proprietary-manipulation.fr.po       26 Apr 2021 12:04:34 
-0000      1.22
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-04-11 12:56+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2021-04-12 11:45+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
@@ -112,6 +113,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/proprietary-manipulation.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.pot,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-manipulation.pot 11 Apr 2021 13:04:32 -0000      
1.13
+++ proprietary/po/proprietary-manipulation.pot 26 Apr 2021 12:04:34 -0000      
1.14
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-04-11 12:56+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -94,6 +94,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a "
+"href=\"https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/\";>WeddingWire
 "
+"app saves people's wedding photos forever and hands over data to others</a>, "
+"and gives people no control over their personal information/data. The app "
+"also sometimes shows old photos and memories to the user without user having "
+"control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a "
 
"href=\"https://www.theguardian.com/technology/2021/feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\";>
 "

Index: proprietary/po/proprietary-manipulation.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.ru.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-manipulation.ru.po       12 Apr 2021 08:04:25 
-0000      1.18
+++ proprietary/po/proprietary-manipulation.ru.po       26 Apr 2021 12:04:34 
-0000      1.19
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-11 12:56+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
@@ -113,6 +114,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary/po/proprietary-surveillance.de-diff.html        15 Apr 2021 
19:01:22 -0000      1.180
+++ proprietary/po/proprietary-surveillance.de-diff.html        26 Apr 2021 
12:04:34 -0000      1.181
@@ -1251,7 +1251,8 @@
     honestly identify the information it collects on users, instead of
     hiding it in an obscurely</em></ins></span> worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to <span class="removed"><del><strong>truly 
protect</strong></del></span> <span class="inserted"><ins><em>truly protect 
people's privacy, we must prevent Google
+    &lt;p&gt;However, to <span class="removed"><del><strong>truly protect 
people's privacy, we must prevent Google
+and other companies from getting this personal information 
in</strong></del></span> <span class="inserted"><ins><em>truly protect people's 
privacy, we must prevent Google
     and other companies from getting this personal information in the
     first place!&lt;/p&gt;
   &lt;/li&gt;
@@ -2020,7 +2021,7 @@
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing</em></ins></span> people's <span 
class="removed"><del><strong>privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>conversations to 
serve them with targeted
+    it may be analyzing people's conversations to serve them with targeted
     advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2040,147 +2041,133 @@
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in the first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Twitter.&lt;/p&gt;</em></ins></span>
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+  &lt;li id="M201511190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
+    unrelated to the app's functionality, was &lt;a
+    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
-    to <span class="removed"><del><strong>completely 
stop</strong></del></span> <span class="inserted"><ins><em>say &ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
-    legitimate, but</em></ins></span> is
-    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span> <span class="inserted"><ins><em>that valid? 
Software developers have no right</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
-    when it's actually</strong></del></span>
-    <span class="inserted"><ins><em>analyze what users are</em></ins></span> 
doing <span class="removed"><del><strong>something else.  Such a thing would be 
almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>or how.  &ldquo;Analytics&rdquo; tools
+    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
+    legitimate, but is that valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More</em></ins></span> than 73% <span 
class="inserted"><ins><em>and 47%</em></ins></span> of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for</em></ins></span> Android 
<span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>and iOS
-    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over</em></ins></span>
-    personal, behavioral and location information&lt;/a&gt; of their users 
<span class="removed"><del><strong>with</strong></del></span> <span 
class="inserted"><ins><em>to</em></ins></span>
-    third parties.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;More than 73% and 47%</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, for Android and iOS
+    respectively</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over
+    personal, behavioral</em></ins></span> and location <span 
class="removed"><del><strong>tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>information&lt;/a&gt; of their 
users</em></ins></span> to <span class="removed"><del><strong>completely 
stop</strong></del></span>
+    <span class="inserted"><ins><em>third parties.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+  &lt;li id="M201508210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
     based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting</em></ins></span>
-    to <span class="inserted"><ins><em>realize that it is nasty.&lt;/p&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
+    to realize that it is nasty.&lt;/p&gt;
 
-    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>tracking.</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
     twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude of the proprietary software industry
+    users better&lt;/a&gt;&mdash;never mind whether they want 
that.</em></ins></span> This is
+    <span class="removed"><del><strong>yet another</strong></del></span> <span 
class="inserted"><ins><em>a
+    typical</em></ins></span> example of <span 
class="removed"><del><strong>nonfree software pretending to 
obey</strong></del></span> the <span class="removed"><del><strong>user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201506264"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study</em></ins></span> in <span 
class="inserted"><ins><em>2015&lt;/a&gt; found that 90% of</em></ins></span> 
the <span class="removed"><del><strong>500 most popular</strong></del></span> 
<span class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span 
class="inserted"><ins><em>proprietary</em></ins></span>
-    Android <span 
class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>apps contained recognizable tracking libraries. 
For the paid
-    proprietary apps, it was only 60%.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The article <span class="removed"><del><strong>should not have 
described these</strong></del></span> <span 
class="inserted"><ins><em>confusingly describes gratis</em></ins></span> apps as
-  <span 
class="removed"><del><strong>&ldquo;free&rdquo;&mdash;they</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;free&rdquo;, but most of 
them</em></ins></span> are not <span class="removed"><del><strong>free 
software.  The clear way to say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>in fact &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement</em></ins></span> for 
<span class="removed"><del><strong>granted</strong></del></span> that <span 
class="removed"><del><strong>the usual analytics tools are
-  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>word</em></ins></span>
-    is <span class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly 
always</em></ins></span> that <span class="removed"><del><strong>valid?  
Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>will fit perfectly.&lt;/p&gt;</em></ins></span>
+    A study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis 
proprietary
+    Android apps contained recognizable tracking libraries. For the paid
+    proprietary apps, it was only 60%.&lt;/p&gt;
+
+    &lt;p&gt;The article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most</em></ins></span> of <span 
class="inserted"><ins><em>them are not in fact &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also 
uses</em></ins></span> the <span class="removed"><del><strong>most 
popular</strong></del></span>
+    <span class="inserted"><ins><em>ugly word &ldquo;monetize&rdquo;. A good 
replacement for that word
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+  &lt;li id="M201505060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Gratis</em></ins></span> Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+    &lt;p&gt;Gratis</em></ins></span> Android apps <span 
class="inserted"><ins><em>(but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect to 100 &lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
+    and <span class="removed"><del><strong>location information&lt;/a&gt; of 
their users with third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on the 
average.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This</em></ins></span> 
is <span class="removed"><del><strong>present</strong></del></span> in <span 
class="removed"><del><strong>some Android devices when they are sold.
-      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>addition</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data</strong></del></span>
-    <span class="inserted"><ins><em>the snooping done by the phone company, 
and perhaps by the OS in
-    the phone.&lt;/p&gt;
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</em></ins></span> to
+    the <span class="removed"><del><strong>app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found</strong></del></span> <span class="inserted"><ins><em>snooping done by 
the phone company, and perhaps by the OS</em></ins></span> in
+    the <span class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>phone.&lt;/p&gt;
 
     &lt;p&gt;Don't be distracted by the question of whether the app developers
-    get users</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>say &ldquo;I agree&rdquo;. That is no excuse 
for
-    malware.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    get users</em></ins></span> to say
+  <span class="removed"><del><strong>&ldquo;zero 
price&rdquo;</strong></del></span> <span class="inserted"><ins><em>&ldquo;I 
agree&rdquo;. That</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>no excuse</em></ins></span> for <span 
class="removed"><del><strong>granted that</strong></del></span>
+    <span class="inserted"><ins><em>malware.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
+  &lt;li id="M201411260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.</em></ins></span>  &lt;a 
<span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and optional&lt;/a&gt;. 
Not</em></ins></span>
-    as <span class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span> <span class="inserted"><ins><em>bad as 
what</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>others do.&lt;/p&gt;</em></ins></span>
+    report which other apps</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but</strong></del></span> <span class="inserted"><ins><em>user 
has installed.  &lt;a
+    
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</em></ins></span>
+    is <span class="removed"><del><strong>that valid?  Software developers 
have no right to
+  analyze what users are</strong></del></span> doing <span 
class="removed"><del><strong>or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> <span class="inserted"><ins><em>this in a 
way</em></ins></span> that <span class="removed"><del><strong>snoop are
+  just</strong></del></span> <span class="inserted"><ins><em>at least is 
visible and optional&lt;/a&gt;. Not</em></ins></span>
+    as <span class="removed"><del><strong>wrong</strong></del></span> <span 
class="inserted"><ins><em>bad</em></ins></span> as <span 
class="removed"><del><strong>any</strong></del></span> <span 
class="inserted"><ins><em>what the others do.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnMobiles</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
+  &lt;li id="M201401150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
@@ -2190,122 +2177,79 @@
 
   &lt;li id="M201312270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The nonfree Snapchat app's 
principal purpose is</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>restrict the
-    use of data</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>user's computer, but</em></ins></span> it <span 
class="inserted"><ins><em>does surveillance too:</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries</em></ins></span> to <span class="removed"><del><strong>study how 
iOS cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's list of other people's phone
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
+    use of data on the user's computer, but it does surveillance too: &lt;a
+    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries to get the user's list of</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people's phone
     numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi and Bluetooth the
-      obvious way</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a
- <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple</strong></del></span>
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
+      on</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation,</em></ins></span> for <span 
class="removed"><del><strong>you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to</strong></del></span> use <span 
class="inserted"><ins><em>by companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The FTC criticized this app because</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
-      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>asked</em></ins></span> the <span 
class="removed"><del><strong>phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
+    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of</strong></del></span> <span class="inserted"><ins><em>user to
-    approve sending</em></ins></span> personal data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
+    &lt;p&gt;The FTC criticized this app because it asked</em></ins></span> 
the <span class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
+      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send</strong></del></span>
+    <span class="inserted"><ins><em>approve sending</em></ins></span> personal 
data to <span class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> app <span 
class="removed"><del><strong>on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>developer but did not ask
-    about sending it to other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>weakness 
of</em></ins></span>
-    the <span class="removed"><del><strong>server records these numbers for at 
least 30
-        days.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving</strong></del></span>
-    <span class="inserted"><ins><em>surveillance: why should</em></ins></span> 
a <span class="removed"><del><strong>valid email address and receiving the code 
Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>flashlight 
app send any information</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>anyone? A free software flashlight app 
would not.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span> 
<span class="inserted"><ins><em>the app developer but did not ask
+    about sending it</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>system.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of 
the</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;FTC says</em></ins></span> most <span 
class="removed"><del><strong>popular iOS</strong></del></span> <span 
class="inserted"><ins><em>mobile</em></ins></span> apps <span 
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span> 
&lt;a <span class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all the photos and
-      videos they make.&lt;/p&gt;
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>weakness of
+    the reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span>
+    <span class="inserted"><ins><em>surveillance: why should a flashlight app 
send any information to
+    anyone? A free software flashlight app would not.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  &lt;li id="M201212100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;FTC says most mobile apps for 
children don't respect privacy: &lt;a
+    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on 
Mobiles&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-&lt;ul class="blurbs"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>say 
whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-      information&lt;/a&gt; as accessed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop</em></ins></span>
-    on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-      startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>calls&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That almost certainly</em></ins></span> means
-      <span class="removed"><del><strong>&ldquo;please don't ask 
where.&rdquo;&lt;/p&gt;
+    &lt;p&gt;Skype refuses to say whether it can &lt;a
+    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
+    on calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> it <span class="removed"><del><strong>still counts as 
a</strong></del></span> <span class="inserted"><ins><em>can do so.&lt;/p&gt;
+    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307110"&gt;
@@ -2317,175 +2261,160 @@
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202010221"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft is imposing its</em></ins></span>
-    surveillance <span class="removed"><del><strong>functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>on the game</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Minecraft by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span>
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make 
it</strong></del></span> <span class="inserted"><ins><em>game of Minecraft 
by</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
-    every player</em></ins></span> to <span class="removed"><del><strong>get 
at them, but NSA can access any of</strong></del></span> <span 
class="inserted"><ins><em>open an account on Microsoft's network&lt;/a&gt;. 
Microsoft
+    every player</em></ins></span> to <span class="removed"><del><strong>study 
how iOS cr...apps spy</strong></del></span> <span 
class="inserted"><ins><em>open an account</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;, because this
+      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>Microsoft's network&lt;/a&gt;. Microsoft
     has bought the game and will merge all accounts into its network,
-    which will give</em></ins></span> them <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>access to people's data.&lt;/p&gt;
+    which will give them access to people's data.&lt;/p&gt;
 
-    &lt;p&gt;Minecraft players</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest"&gt;can 
play Minetest&lt;/a&gt;
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
     instead. The essential advantage of Minetest is that it is free
-    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>&lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>user's computer 
freedom. As a bonus,
-    it offers more options.&lt;/p&gt;
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201908210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
-    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen to</em></ins></span> the <span 
class="removed"><del><strong>iThing is,</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Morally, we see no difference between having human workers 
listen</em></ins></span> and <span class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>having speech-recognition systems listen.  
Both intrude on privacy.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Microsoft recorded users of Xboxes</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth the
+      obvious way</strong></del></span> <span 
class="inserted"><ins><em>had</em></ins></span> &lt;a
+ <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn them off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean</strong></del></span> <span 
class="inserted"><ins><em>the recordings&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201806240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Red Shell</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> a <span 
class="removed"><del><strong>feature for web sites to track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but 
it</strong></del></span> <span class="inserted"><ins><em>spyware 
that</em></ins></span>
-    is <span class="removed"><del><strong>still true</strong></del></span> 
<span class="inserted"><ins><em>found</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Morally, we see</em></ins></span> no <span 
class="removed"><del><strong>way to use it without</strong></del></span> <span 
class="inserted"><ins><em>difference between</em></ins></span> having <span 
class="removed"><del><strong>your fingerprints
+      taken. Users would have no way to tell whether the phone is 
snooping</strong></del></span> <span class="inserted"><ins><em>human workers 
listen and
+    having speech-recognition systems listen.  Both intrude</em></ins></span> 
on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>privacy.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>many proprietary games. It</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some</strong></del></span>
+  &lt;li id="M201806240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Red Shell is a spyware that
+    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks</em></ins></span> data <span class="removed"><del><strong>from 
iPhones for the state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>massive
+    &lt;p&gt;ArenaNet surreptitiously installed</em></ins></span> a <span 
class="removed"><del><strong>server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>spyware
+    program along with an update to</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers</strong></del></span> 
<span class="inserted"><ins><em>massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to</em></ins></span> snoop on all <span class="removed"><del><strong>the 
data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711070"&gt;
+  &lt;li id="M201711070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</strong></del></span> <span class="inserted"><ins><em>a certain gaming 
keyboard</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>at least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
     information to China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular Android 
apps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many &lt;a
-    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users and report to the
+    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+    video game consoles snoop on their users and report</em></ins></span> to 
<span class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving</strong></del></span> <span class="inserted"><ins><em>the
     internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>a computer,</em></ins></span> and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow</strong></del></span> <span class="inserted"><ins><em>you can't 
trust</em></ins></span> a <span class="removed"><del><strong>user's movements 
around</strong></del></span> <span class="inserted"><ins><em>computer 
with</em></ins></span>
-    a <span class="removed"><del><strong>physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree operating system.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A game console is</em></ins></span> a <span 
class="removed"><del><strong>valid email address</strong></del></span> <span 
class="inserted"><ins><em>computer,</em></ins></span> and <span 
class="removed"><del><strong>receiving the code Apple
+      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google &lt;a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS apps</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span>
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range</em></ins></span> of data <span 
class="inserted"><ins><em>about their users and their users'
+    collect a wide range</em></ins></span> of <span 
class="inserted"><ins><em>data about</em></ins></span> their users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos</strong></del></span> and
+      <span class="removed"><del><strong>videos</strong></del></span> <span 
class="inserted"><ins><em>their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
-    collected by various cr&hellip;apps and sites made by different
+    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks that merge the data
+    collected by various cr&hellip;apps</em></ins></span> and <span 
class="removed"><del><strong>video you take,</strong></del></span> <span 
class="inserted"><ins><em>sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;They use this data to manipulate people to buy 
things,</em></ins></span> and <span class="removed"><del><strong>keeps them 
up</strong></del></span> <span class="inserted"><ins><em>hunt for
+    &ldquo;whales&rdquo; who can be led</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>spend 
a lot of money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>manipulate people</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,
-      &lt;a 
href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span> 
<span class="inserted"><ins><em>buy things, and hunt for
-    &ldquo;whales&rdquo; who</em></ins></span> can <span 
class="removed"><del><strong>take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span> 
<span class="inserted"><ins><em>be led</em></ins></span> to <span 
class="removed"><del><strong>turn the phones
-      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>spend a lot of money. They also
-    use a back door</em></ins></span> to <span 
class="inserted"><ins><em>manipulate</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>game play for 
specific players.&lt;/p&gt;
-
-    &lt;p&gt;While</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
+    &lt;p&gt;While the article describes gratis games, games that cost money
     can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Angry Birds &lt;a
-    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> the <span 
class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span class="inserted"><ins><em>NSA takes 
advantage</em></ins></span>
-    to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies, and the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information</em></ins></span> on 
<span class="removed"><del><strong>24 Sep 2015.) The iCloud feature 
is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by the
+      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Samsung phones come with</strong></del></span> <span 
class="inserted"><ins><em>spy through it too&lt;/a&gt;.  Here's information 
on</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
+    &lt;p&gt;There</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -2497,23 +2426,21 @@
   &lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that <span 
class="removed"><del><strong>users can't 
delete&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer</em></ins></span> and 
<span class="removed"><del><strong>they send so much data that their 
transmission is</strong></del></span> <span 
class="inserted"><ins><em>sniffs</em></ins></span> a
-      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
-      requested by the user, clearly must constitute 
spying</strong></del></span>
-    <span class="inserted"><ins><em>good deal</em></ins></span> of <span 
class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data&lt;/a&gt;, including lots of activities 
which
-    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Blizzard Warden</em></ins></span> is a <span 
class="removed"><del><strong>way to</strong></del></span> <span 
class="inserted"><ins><em>hidden
+    &ldquo;cheating-prevention&rdquo; program that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on</em></ins></span> a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>gamer's computer and sniffs a
+    good deal</em></ins></span> of <span class="removed"><del><strong>this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span> <span 
class="inserted"><ins><em>personal data&lt;/a&gt;, including 
lots</em></ins></span> of <span class="removed"><del><strong>many 
celebrities&lt;/a&gt;. They needed</strong></del></span> <span 
class="inserted"><ins><em>activities which
+    have nothing</em></ins></span> to <span class="removed"><del><strong>break 
Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>do with 
cheating.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -2527,204 +2454,208 @@
   &lt;li id="M202101050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most Internet connected devices</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that</strong></del></span> <span 
class="inserted"><ins><em>Mozilla's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
+    &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
+    
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed to snoop on users&lt;/a&gt; even if they meet
+    designed</em></ins></span> to <span class="removed"><del><strong>get at 
them, but NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>snoop on users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design of</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span> <span class="inserted"><ins><em>program 
running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
-    the <span class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and 
<span class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>exploited by crackers as
-    well&lt;/a&gt;.&lt;/p&gt;
+    design</em></ins></span> of <span class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> the <span 
class="inserted"><ins><em>program running on some of these 
devices</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
+    the <span class="removed"><del><strong>iThing is,
+      and get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201708280"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;There is also a feature for web 
sites</strong></del></span> <span class="inserted"><ins><em>user 
susceptible</em></ins></span> to <span class="removed"><del><strong>track 
users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span> <span class="inserted"><ins><em>be snooped 
and exploited</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it
+      is still true in iOS 7.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers as
+    well&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop</em></ins></span> on
-      <span class="removed"><del><strong>remote command and users cannot stop 
them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
 
-    &lt;p&gt;Don't be a sucker&mdash;reject</em></ins></span> all <span 
class="removed"><del><strong>new portable phones
-      to have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people</em></ins></span> that <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>use them&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>the 
stings.&lt;/p&gt;
+    &lt;p&gt;Don't</em></ins></span> be
+      <span class="removed"><del><strong>turned 
off.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>to restrict</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too:</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
can,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see 
you</em></ins></span> on <span class="removed"><del><strong>users even more 
than users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that 
was</em></ins></span>
-before <span class="inserted"><ins><em>Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to 
me</em></ins></span> and <span class="removed"><del><strong>regularly 
does,</strong></del></span>
+<span class="inserted"><ins><em>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202010282"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;TV manufacturers are turning to produce only
-    &ldquo;Smart&rdquo; TV sets (which include spyware) that &lt;a
-    href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's now very
+    &ldquo;Smart&rdquo; TV sets (which include spyware) that</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's
 now very
     hard to find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It appears that those manufacturers business model is not to 
produce
-    TV</em></ins></span> and <span class="removed"><del><strong>after 
going</strong></del></span> <span class="inserted"><ins><em>sell them for 
money, but to collect your personal data and
-    (possibly) hand over them</em></ins></span> to <span 
class="removed"><del><strong>a movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>others 
for benefit.&lt;/p&gt;</em></ins></span>
+    TV and sell them for money, but to collect your personal</em></ins></span> 
data <span class="removed"><del><strong>from iPhones</strong></del></span> 
<span class="inserted"><ins><em>and
+    (possibly) hand over them to others</em></ins></span> for <span 
class="inserted"><ins><em>benefit.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered driving 
apps can</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202006250"&gt;
+  &lt;li id="M202006250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers are able to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop</em></ins></span>
-    every <span 
class="removed"><del><strong>move&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>second of what the user is watching&lt;/a&gt;. 
This is illegal due to
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user is watching&lt;/a&gt;. This is illegal due 
to
     the Video Privacy Protection Act of 1988, but they're circumventing
     it through EULAs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO,</em></ins></span> and <span class="removed"><del><strong>email 
addresses&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>this 
data is sold to third parties. This is</em></ins></span> in <span 
class="removed"><del><strong>user's address
-      book</strong></del></span> <span class="inserted"><ins><em>return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in the own words 
of</em></ins></span> the <span class="inserted"><ins><em>company's
+    CTO, and this</em></ins></span> data <span class="removed"><del><strong>in 
an iThing,
+      or it</strong></del></span> is <span 
class="removed"><del><strong>totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>sold</em></ins></span> to <span 
class="removed"><del><strong>exist</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return</em></ins></span> 
for <span class="removed"><del><strong>no
+      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;better service&rdquo; (meaning more 
intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note 
that</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> this <span 
class="removed"><del><strong>article misuses the words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>spying 
acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
+    &lt;p&gt;What</em></ins></span> is <span class="removed"><del><strong>the
+      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
   
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens</strong></del></span> <span 
class="inserted"><ins><em>him,
-    is that it is opt-in in newer models. But since the Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that</em></ins></span> all <span 
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span 
class="removed"><del><strong>time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter), the easiest way to make sure it isn't spying</em></ins></span> on 
<span class="removed"><del><strong>what people are 
listening</strong></del></span> <span class="inserted"><ins><em>you 
is</em></ins></span>
-    to <span class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>disconnect</em></ins></span> it <span 
class="removed"><del><strong>may
-    be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
-    advertisements.&lt;/p&gt;
-       &lt;/li&gt;
 
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>get your own router (which can
-    be an old computer running completely free software), and set up a
-    firewall</em></ins></span> to <span class="removed"><del><strong>do lots 
of surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>block connections</em></ins></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>supposed to make this spying acceptable, according to 
him,
+    is that it is opt-in</em></ins></span> in <span 
class="removed"><del><strong>Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking</strong></del></span> <span 
class="inserted"><ins><em>newer models. But since the Vizio</em></ins></span> 
software <span class="removed"><del><strong>in popular Android 
apps</strong></del></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span>
+    <span class="inserted"><ins><em>nonfree, we don't know what is actually 
happening behind the scenes,</em></ins></span>
+    and
+      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around</strong></del></span> <span 
class="inserted"><ins><em>there is no guarantee that all future updates will 
leave the
+    settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own</em></ins></span> a <span 
class="removed"><del><strong>physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Android tracks location</strong></del></span> <span 
class="inserted"><ins><em>Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV,</em></ins></span> for <span 
class="removed"><del><strong>Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when</strong></del></span> <span class="inserted"><ins><em>that
+    matter),</em></ins></span> the <span class="removed"><del><strong>phone 
has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
+      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span> 
<span class="inserted"><ins><em>easiest way</em></ins></span> to <span 
class="removed"><del><strong>turn the phones</strong></del></span> <span 
class="inserted"><ins><em>make sure it isn't spying</em></ins></span> on <span 
class="removed"><del><strong>and off, listen</strong></del></span> <span 
class="inserted"><ins><em>you is</em></ins></span>
+    to <span class="removed"><del><strong>the microphone, retrieve 
geo-location data</strong></del></span> <span 
class="inserted"><ins><em>disconnect it</em></ins></span> from the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location</strong></del></span> <span 
class="inserted"><ins><em>Internet,</em></ins></span> and <span 
class="removed"><del><strong>web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>use a terrestrial antenna
+    instead. Unfortunately, this is not always possible. Another option,
+    if you are technically oriented, is to get your own router (which can
+    be an old computer running completely free software),</em></ins></span> 
and <span class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>set up a
+    firewall to block connections to Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
+  &lt;li id="M201804010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give 
Verizon</strong></del></span> <span class="inserted"><ins><em>install a 
surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>article for</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It
-    is too bad</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
-   they use its search engine.&lt;/p&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span> the <span 
class="inserted"><ins><em>article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix</em></ins></span> 
app <span class="removed"><del><strong>is</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span> 
<span class="inserted"><ins><em>article for the facts it presents. 
It</em></ins></span>
+    is <span class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>too bad that the article finishes by advocating the
+    moral weakness of surrendering</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span> 
and
-    <span class="inserted"><ins><em>cable&lt;/a&gt;. Even if</em></ins></span> 
the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>image is coming 
from</em></ins></span> the <span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>user's own 
computer,</em></ins></span>
-    the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>TV reports what it is. The 
existence</em></ins></span> of <span class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they send so much data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</em></ins></span> that <span 
class="removed"><del><strong>their transmission</strong></del></span> is <span 
class="removed"><del><strong>a
+      substantial expense for users.  Said transmission,</strong></del></span> 
<span class="inserted"><ins><em>viewed on them, and</em></ins></span> not <span 
class="removed"><del><strong>wanted or
+      requested by</strong></del></span> <span class="inserted"><ins><em>just 
broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span class="inserted"><ins><em>image is coming 
from the user's own computer,
+    the TV reports what it is. The existence</em></ins></span> of <span 
class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to</strong></del></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>a way to disable</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>way to 
disable the
-    surveillance, even if it were</em></ins></span> not <span 
class="removed"><del><strong>only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data</strong></del></span> <span 
class="inserted"><ins><em>hidden as it was</em></ins></span> in <span 
class="inserted"><ins><em>these TVs,
-    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was</em></ins></span> in <span class="removed"><del><strong>Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us</strong></del></span> 
<span class="inserted"><ins><em>these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some web</em></ins></span> and <span class="inserted"><ins><em>TV 
advertisements play inaudible
-    sounds to be picked up by proprietary malware running
-    on other devices</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it</strong></del></span> <span 
class="inserted"><ins><em>range so as to determine that they
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to be picked up</em></ins></span> by <span 
class="removed"><del><strong>a paywall)
+      reports</strong></del></span> <span 
class="inserted"><ins><em>proprietary malware running
+    on other devices in range so as to determine</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI</strong></del></span> <span class="inserted"><ins><em>they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers</em></ins></span> can
-  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>correlate ads with Web activity, and 
other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>remotely activate the GPS</strong></del></span> 
<span class="inserted"><ins><em>correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2732,92 +2663,123 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their &lt;a
+    manufacturers</em></ins></span> in <span 
class="removed"><del><strong>Android
+      phones</strong></del></span> <span class="inserted"><ins><em>spying on 
their users: their &lt;a
     
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span>
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here</strong></del></span>
     <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn this off, but having it enabled by default
-    is an injustice already.&lt;/p&gt;
+    &lt;p&gt;It is possible to turn this off, but having it enabled by 
default</em></ins></span>
+    is
+      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an injustice already.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511020"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable 
phones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Tivo's alliance</em></ins></span> with <span 
class="removed"><del><strong>GPS will send their GPS location on
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
 
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for</strong></del></span> <span class="inserted"><ins><em>company
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose 
is</strong></del></span> <span class="inserted"><ins><em>Viacom adds 2.3 
million households</em></ins></span>
+    to <span class="removed"><del><strong>restrict</strong></del></span> the 
<span class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>600 millions social media profiles</em></ins></span> 
the <span class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined</em></ins></span> surveillance <span 
class="removed"><del><strong>is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>by default.&lt;/p&gt;</em></ins></span>
+    users</em></ins></span> to <span class="removed"><del><strong>get the 
user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>new combined surveillance by 
default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The moviepass app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>dis-service spy on users even more than users
+      expected. It</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going to</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;</em></ins></span>
+    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
+    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop</strong></del></span>
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops</em></ins></span> on what <span class="removed"><del><strong>radio 
and TV</strong></del></span> programs 
-      <span class="removed"><del><strong>are playing nearby&lt;/a&gt;.  
Also</strong></del></span> <span class="inserted"><ins><em>people watch, and 
even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
+    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note that this article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>even 
what they wanted</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Facebook's app listens all the time,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs 
snoop</em></ins></span> on what
-    users <span class="removed"><del><strong>post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when 
first sold.&lt;/p&gt;</em></ins></span>
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
+  &lt;li id="M201502090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you to share</strong></del></span>
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>picture you take according</strong></del></span> 
<span class="inserted"><ins><em>internet</em></ins></span> to <span 
class="removed"><del><strong>who
-      is in the frame.&lt;/p&gt;
+    transmits users' voice</em></ins></span> on <span 
class="removed"><del><strong>what people are listening</strong></del></span> 
<span class="inserted"><ins><em>the internet</em></ins></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span class="inserted"><ins><em>another 
company, Nuance&lt;/a&gt;.
+    Nuance can save</em></ins></span> it <span class="removed"><del><strong>may
+    be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>and would then have</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
+    advertisements.&lt;/p&gt;
+       &lt;/li&gt;
 
-      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
-    Nuance can save it and would then have</em></ins></span> to <span 
class="removed"><del><strong>require online access</strong></del></span> <span 
class="inserted"><ins><em>give it</em></ins></span> to <span 
class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>US or some
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>give it</em></ins></span> to <span 
class="removed"><del><strong>do lots of surveillance, 
judging</strong></del></span> <span class="inserted"><ins><em>the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not</em></ins></span> to be
-      <span class="removed"><del><strong>sent across</strong></del></span> 
<span class="inserted"><ins><em>trusted unless it is done by free
+    &lt;p&gt;Speech recognition is not to be trusted unless it is 
done</em></ins></span> by <span class="inserted"><ins><em>free
     software in your own computer.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</em></ins></span>
+    data <span class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>containing sensitive information will be transmitted 
to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2826,93 +2788,114 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span class="removed"><del><strong>wire 
to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    snooping all</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201409290"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</em></ins></span>
+    on <span class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
+    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give Verizon the same
+   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get</em></ins></span> 
users' <span class="removed"><del><strong>pictures</strong></del></span> <span 
class="inserted"><ins><em>formal
-    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>private
-      anymore, even</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
-    And what happens</em></ins></span> if <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>declines consent? 
Probably the TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the
+    user must explicitly opt-in</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products to get users' formal
+    consent</em></ins></span> before <span 
class="inserted"><ins><em>collecting personal data are totally inadequate.
+    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent to tracking,</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
     user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>some
-      are starting</strong></del></span> <span class="inserted"><ins><em>the 
switch</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
-    no effect&lt;/a&gt;.  (The fact</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span> the <span 
class="removed"><del><strong>&lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>transmission reports</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>404 error
-    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report 
which</strong></del></span> <span class="inserted"><ins><em>server could save 
that data anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse, it &lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on</em></ins></span> other
-    <span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the <span 
class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
-    product could spy</em></ins></span> this <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
-
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+    reports what the</em></ins></span> user <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>watches, and the switch</em></ins></span> to <span 
class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in</strong></del></span> <span 
class="inserted"><ins><em>404 error
+    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>phone, and in</strong></del></span> server <span 
class="removed"><del><strong>accounts,</strong></del></span> <span 
class="inserted"><ins><em>could save that data anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on</em></ins></span> the user's <span 
class="removed"><del><strong>consent&rdquo;
+        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
+        surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201212170"&gt;
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>patch to stop this, but any
+    product could spy this way.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found</em></ins></span> a way <span 
class="removed"><del><strong>that at least is visible</strong></del></span> 
<span class="inserted"><ins><em>to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
-    and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>use its camera to 
watch</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
+    Crackers found a way to break security</em></ins></span> on <span 
class="removed"><del><strong>various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app
+      &lt;a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>a 
&ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
+    and <span class="removed"><del><strong>suggests you</strong></del></span> 
<span class="inserted"><ins><em>use its camera</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>watch</em></ins></span> the <span 
class="removed"><del><strong>picture you take according 
to</strong></del></span> <span 
class="inserted"><ins><em>people</em></ins></span> who
+      <span class="removed"><del><strong>is in the frame.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across the wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures</strong></del></span> 
are <span class="removed"><del><strong>private
+      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>watching TV.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2924,302 +2907,217 @@
   &lt;li id="M201901100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save it
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send</em></ins></span> the <span class="removed"><del><strong>user didn't 
&ldquo;upload&rdquo; them</strong></del></span> <span 
class="inserted"><ins><em>video they capture</em></ins></span> to <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>video shows everyone 
that comes near, or merely
-    passes by,</em></ins></span> the <span class="removed"><del><strong>OS 
in</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
+    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based</strong></del></span> <span class="inserted"><ins><em>video 
shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent that
-    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon 
gets</em></ins></span> the <span class="removed"><del><strong>app developers get
-      users</strong></del></span>
-    <span class="inserted"><ins><em>video&mdash;Amazon expects 
society</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>surrender to.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>how Ring used</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span> <span class="inserted"><ins><em>let 
individual employees look
+    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>prevent</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+      &lt;p&gt;This article shows</strong></del></span>
+    <span class="inserted"><ins><em>secondary abuse, but the primary 
abuse&mdash;that Amazon gets</em></ins></span> the
+    <span class="inserted"><ins><em>video&mdash;Amazon expects society to 
surrender to.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
+  &lt;li id="M201810300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span class="removed"><del><strong>user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    give the manufacturer an unencrypted copy of everything</em></ins></span> 
they <span class="removed"><del><strong>present snooping 
as</strong></del></span>
+    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>videos. That's</em></ins></span> not
-      <span class="removed"><del><strong>ask about sending 
it</strong></del></span>
-    <span class="inserted"><ins><em>security for your home. Security means 
making sure they don't get</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
-      weakness</strong></del></span>
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example of
+      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
+      those</strong></del></span> <span class="inserted"><ins><em>videos. 
That's not
+    security for your home. Security means making sure</em></ins></span> they 
<span class="inserted"><ins><em>don't get to
+    see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
+    &lt;p&gt;Over 70 brands of network-connected surveillance 
cameras</em></ins></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
+    apps the user has
+    installed.</strong></del></span>
 
-  &lt;li id="M201511250"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
-    to <span class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span> <span class="inserted"><ins><em>using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-
-  &lt;li&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
+    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>way that at least is visible and
+    optional&lt;/a&gt;. Not</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    universal back door&lt;/a&gt;. If the product</em></ins></span> as <span 
class="removed"><del><strong>bad</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>what the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>a
     listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers to listen in on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;A computerized vibrator &lt;a
-    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
-    body), as well as the vibration frequency.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping</em></ins></span> on <span class="inserted"><ins><em>its 
users through</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in addition 
to</strong></del></span> <span class="inserted"><ins><em>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The app was reporting</em></ins></span> the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>temperature of</em></ins></span> the <span 
class="removed"><del><strong>phone company, and perhaps</strong></del></span> 
<span class="inserted"><ins><em>vibrator minute</em></ins></span> by <span 
class="removed"><del><strong>the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted</strong></del></span>
+    <span class="inserted"><ins><em>minute (thus, indirectly, whether it was 
surrounded</em></ins></span> by <span class="inserted"><ins><em>a person's
+    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    &lt;p&gt;Note</em></ins></span> the <span class="removed"><del><strong>app 
developers get</strong></del></span> <span class="inserted"><ins><em>totally 
inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which users could have checked
+    products, rather than free software which</em></ins></span> users <span 
class="removed"><del><strong>to say &ldquo;I agree&rdquo;. That is no excuse 
for malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about how people
-    used it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
+    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued</em></ins></span> for <span class="removed"><del><strong>use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>collecting lots of personal information about how 
people
+    used it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized this app 
because</strong></del></span> <span class="inserted"><ins><em>company's 
statement that</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>user to
+      approve sending personal</strong></del></span> data <span 
class="removed"><del><strong>to the app developer</strong></del></span> <span 
class="inserted"><ins><em>may be
+    true,</em></ins></span> but <span class="removed"><del><strong>did not
+      ask about sending</strong></del></span> it <span 
class="inserted"><ins><em>doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="removed"><del><strong>other companies.  
This shows</strong></del></span> <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the
+      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>data broker would have been able to figure out 
who</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
     
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
+    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>pay</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
-      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else and to transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
-      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is a back door, but that could be a
-      misunderstanding.  However, it is certainly surveillance, at
-      least.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
 
-&lt;!-- #SpywareAtLowLevel</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;&ldquo;CloudPets&rdquo; toys with 
microphones &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>make</strong></del></span> <span 
class="inserted"><ins><em>the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>these
-    conversations was unacceptable by itself.&lt;/p&gt;
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201612060"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The &ldquo;smart&rdquo; toys My 
Friend Cayla and i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-      &lt;p&gt;Specifically, it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
     company based in the U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>remotely control</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen</em></ins></span> in <span 
class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-
-&lt;!-- #SpywareOnTheRoad</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy</em></ins></span> on <span class="removed"><del><strong>its 
users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature of</strong></del></span> 
<span class="inserted"><ins><em>children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The 
Road&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -3228,312 +3126,366 @@
     
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202009270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many employers are using nonfree
     software, including videoconference software, to &lt;a
     
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that</em></ins></span> is <span 
class="inserted"><ins><em>in effect</em></ins></span> a <span 
class="inserted"><ins><em>malicious</em></ins></span>
-    surveillance <span 
class="removed"><del><strong>device.</strong></del></span> <span 
class="inserted"><ins><em>feature.&lt;/p&gt;
+    surveil and monitor staff working at home&lt;/a&gt;. If</em></ins></span> 
the <span class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly,</strong></del></span> <span 
class="inserted"><ins><em>program reports</em></ins></span>
+    whether <span class="removed"><del><strong>it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>you are 
&ldquo;active,&rdquo; that is in effect</em></ins></span> a <span 
class="removed"><del><strong>person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note the totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>malicious
+    surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202008030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Nest</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;</em></ins></span>
-    is <span class="inserted"><ins><em>taking over ADT&lt;/a&gt;. Google sent 
out a software
-    update to its speaker devices using their back door &lt;a
+    &lt;p&gt;Google Nest &lt;a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    is taking over ADT&lt;/a&gt;. Google sent out</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free</strong></del></span> software <span 
class="removed"><del><strong>which users could have
+      checked</strong></del></span>
+    <span class="inserted"><ins><em>update to its speaker devices using their 
back door &lt;a
     href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
-    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
-    that</em></ins></span> an <span 
class="removed"><del><strong>example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>alarm is happening. This means</em></ins></span> the 
<span class="removed"><del><strong>manufacturer, based on</strong></del></span> 
<span class="inserted"><ins><em>devices now listen for more
-    than just their wake words. Google says</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>software update was sent
-    out prematurely and on accident and Google was planning on disclosing
-    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+    listens for things like smoke alarms&lt;/a&gt;</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>then notifies your phone</em></ins></span>
+    that <span class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>an alarm is happening. This means</em></ins></span> 
the <span class="removed"><del><strong>vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;</strong></del></span>
 <span class="inserted"><ins><em>devices now listen for more
+    than just their wake words. Google says the software update was sent
+    out prematurely and on accident and Google</em></ins></span> was <span 
class="removed"><del><strong>sued</strong></del></span> <span 
class="inserted"><ins><em>planning on disclosing
+    this new feature and offering it to customers who pay</em></ins></span> 
for <span class="removed"><del><strong>collecting lots of personal information 
about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Bossware&rdquo; is malware</em></ins></span> that <span 
class="inserted"><ins><em>bosses &lt;a
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing</strong></del></span> <span 
class="inserted"><ins><em>bosses &lt;a
     
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing in their own computers&lt;/a&gt;, 
so</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span>
+    coerce workers into installing in their own computers&lt;/a&gt;, 
so</em></ins></span> the <span class="removed"><del><strong>data 
may</strong></del></span>
     <span class="inserted"><ins><em>bosses can spy on them.&lt;/p&gt;
 
-    &lt;p&gt;This shows why requiring the user's 
&ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>not
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
     an adequate basis for protecting digital privacy.  The boss can coerce
-    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>almost 
anything, even probable exposure
-    to contagious disease that can be fatal.  Software like this should
-    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>should be prosecuted for it.&lt;/p&gt;
+    most workers into consenting to almost anything, even probable exposure
+    to contagious disease that can</em></ins></span> be
+      <span class="removed"><del><strong>true, but it doesn't really matter. 
If</strong></del></span> <span class="inserted"><ins><em>fatal.  Software like 
this should
+    be illegal and bosses that demand</em></ins></span> it <span 
class="inserted"><ins><em>should be prosecuted for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201911190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability</em></ins></span> that <span 
class="inserted"><ins><em>enabled attackers to &lt;a
+    &lt;p&gt;Internet-tethered Amazon Ring</em></ins></span> had <span 
class="removed"><del><strong>sold the data to</strong></del></span>
+    a
+      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>security vulnerability that enabled attackers 
to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi 
password&lt;/a&gt;, and snoop on</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>household
+    access</em></ins></span> the <span class="removed"><del><strong>data 
broker</strong></del></span> <span class="inserted"><ins><em>user's wifi 
password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
-    out any significant</em></ins></span> surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>if the devices implemented proper
+    &lt;p&gt;Knowledge of the wifi password</em></ins></span> would <span 
class="removed"><del><strong>have been able</strong></del></span> <span 
class="inserted"><ins><em>not be sufficient</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>carry</em></ins></span>
+    out
+      <span class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>any significant surveillance if</em></ins></span> the 
<span class="removed"><del><strong>user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>devices implemented proper
     security, including encryption. But many devices with proprietary
     software lack this. Of course, they are also used by their
-    manufacturers for snooping.&lt;/p&gt;</em></ins></span>
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
+  &lt;li id="M201907210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even</em></ins></span>
-    when <span class="removed"><del><strong>the &ldquo;owner&rdquo; 
switches</strong></del></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>not supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
-    subcontractors discloses a thousand confidential voice recordings,
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' 
conversations</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
     &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
+    way to see or control what it records or sends.&lt;/p&gt;
 
-    &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
+    &lt;p&gt;Rather than trying to better control the use</em></ins></span> of 
<span class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings, Google
+    should not record or listen</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the person's voice.  It should only
+    get commands that the user wants to send to some Google 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201905061"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it</em></ins></span> to <span 
class="removed"><del><strong>the
+       manufacturer&lt;/a&gt;. Guess what?</strong></del></span> <span 
class="inserted"><ins><em>third-party companies. Thus,
+    even if users request deletion of their data from Amazon's 
servers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
+    the <span 
class="removed"><del><strong>data&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, where they 
can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>better 
control</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
-    should not record or listen to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Data</em></ins></span> collected by <span 
class="inserted"><ins><em>devices such as</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>Nest 
thermostat,</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span> 
and the <span class="removed"><del><strong>FBI could listen to these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>person's 
voice.  It should only
-    get commands that</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span> <span class="inserted"><ins><em>Sonos
+    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+
+&lt;!-- #SpywareOnSmartWatches</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201904240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Some of users' 
commands</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span> 
<span class="inserted"><ins><em>the Alexa service are</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>someone else</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google</em></ins></span> and 
<span class="removed"><del><strong>to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>Apple
+    voice assistants do similar things.&lt;/p&gt;</em></ins></span>
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
-    than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A <span class="removed"><del><strong>very cheap &ldquo;smart 
watch&rdquo; comes with an Android app
+      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but that could be a
+      misunderstanding.  However, it is certainly surveillance, at
+      least.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
-    it</em></ins></span> to <span class="removed"><del><strong>do 
because</strong></del></span> <span class="inserted"><ins><em>Amazon's servers, 
which store it indefinitely. Even
-    worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>system has no authentication 
when</strong></del></span> <span class="inserted"><ins><em>data remain on other 
servers&lt;/a&gt;, where they can be</em></ins></span> accessed <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>by
-    advertising companies and government agencies. In other words,
-    deleting the collected information doesn't cancel the wrong of
-    collecting it.&lt;/p&gt;
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>fraction of the Alexa service staff even has 
access</em></ins></span> to <span class="removed"><del><strong>place new items 
on top under each subsection --&gt;
 
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary on the 
servers</em></ins></span>
-    the <span class="removed"><del><strong>modem.  However, even if it asked 
for
-    authentication, you couldn't be confident that 
Nissan</strong></del></span> <span class="inserted"><ins><em>devices are 
tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon</em></ins></span> has <span 
class="removed"><del><strong>no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>a very precise picture of users' life
-    at home, not only</em></ins></span> in the <span 
class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,
-    in</em></ins></span> the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>future 
too?)&lt;/p&gt;
-  &lt;/li&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-  &lt;li id="M201904240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
-    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
-    voice assistants do similar things.&lt;/p&gt;
-
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
-    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location</em></ins></span> and <span class="removed"><del><strong>spyware 
via BIOS&lt;/a&gt; on Windows installs.
+Note that</strong></del></span> <span class="inserted"><ins><em>other personal 
data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>nonfree, and 
data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
-    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to know what happens to the recordings unless human 
eavesdroppers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201902080"&gt;
+  &lt;li id="M201902080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS:</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt; to</em></ins></span> make sure 
<span class="removed"><del><strong>to place new items on top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;The case of toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user</em></ins></span> is <span class="removed"><del><strong>not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>still
-    paying for the subscription,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+      &lt;p&gt;Specifically,</strong></del></span> <span 
class="inserted"><ins><em>the user is still
+    paying for the subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases, it spies on users, and involves totally unacceptable
-    restrictions</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>ink cartridges that would otherwise 
be</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201808120"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
-    and <span class="removed"><del><strong>c.&lt;/a&gt;). The company 
says</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn</em></ins></span> it <span class="removed"><del><strong>doesn't
-      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>into a listening device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And</em></ins></span> if <span 
class="inserted"><ins><em>some government such as China or</em></ins></span> 
the <span class="removed"><del><strong>state orders it</strong></del></span> 
<span class="inserted"><ins><em>US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>moral fiber 
to say no?&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt;</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtHome</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;A medical insurance company &lt;a
-    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops</em></ins></span> on 
<span class="removed"><del><strong>top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
 
-  &lt;li id="M201706204"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>do this.</em></ins></span> The <span 
class="removed"><del><strong>Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Lots</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Lots</em></ins></span> of 
&ldquo;smart&rdquo; products are designed &lt;a
-    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera,</strong></del></span> 
<span class="inserted"><ins><em>job would be much
+    easier for Amazon. And</em></ins></span> if <span 
class="removed"><del><strong>its manufacturer can communicate with it,
+      is a surveillance device. &lt;a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>some government such as China or</em></ins></span> 
the <span class="removed"><del><strong>manufacturer, based 
on</strong></del></span> <span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>product in</em></ins></span> that <span 
class="inserted"><ins><em>country,
+    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>device is tethered</strong></del></span> <span 
class="inserted"><ins><em>moral fiber to say no?&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A medical insurance company &lt;a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers</em></ins></span> a <span 
class="removed"><del><strong>server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush</em></ins></span> that 
<span class="inserted"><ins><em>snoops on its user by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>device gives the company
+      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Nest Cam</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>products are designed</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen to everyone in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
     a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
+    on you.  Even if it</em></ins></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>air-gapped,</em></ins></span> it <span 
class="inserted"><ins><em>could be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+  &lt;li id="M201407170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
+  &lt;li id="M201310260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</em></ins></span>
-    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>spy 
on their renters&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
@@ -3557,21 +3509,17 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>lot of security flaws. They &lt;a
+    privacy. In addition, they have a lot of security flaws. They &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people)</em></ins></span> to 
<span class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>access&lt;/a&gt; the watch.&lt;/p&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>child and spoof messages to and 
from</em></ins></span> the <span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>watch, possibly 
endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people</em></ins></span> can 
<span class="removed"><del><strong>contain JavaScript 
code,</strong></del></span> <span class="inserted"><ins><em>intercept 
communications between parent</em></ins></span> and <span 
class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes</strong></del></span>
 <span class="inserted"><ins><em>child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(Note that</em></ins></span> this <span 
class="removed"><del><strong>code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the word &ldquo;&lt;a
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>article 
misuses</em></ins></span> the
+      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -3579,85 +3527,81 @@
   &lt;li id="M201603020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="inserted"><ins><em>connects to an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says this</em></ins></span> is <span 
class="removed"><del><strong>viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence 
of</strong></del></span> a <span class="removed"><del><strong>way to
-    disable the surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>back door, but that 
could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>was in
-    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly 
surveillance,</em></ins></span> at <span class="removed"><del><strong>what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less 
all</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>watch is designed</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to</em></ins></span> report <span class="removed"><del><strong>was as of 
2014, but we don't expect this has got better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>its location</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>someone else and</em></ins></span> to <span 
class="removed"><del><strong>tracking, the TV</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
+    to <span class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span class="inserted"><ins><em>report its 
location</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>someone 
else and to transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M202008181"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M202008181"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;New Toyotas</em></ins></span> will
-      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;New Toyotas will &lt;a
     href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data</em></ins></span> to <span class="removed"><del><strong>report 
what
-      the user watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying</strong></del></span> <span class="inserted"><ins><em>AWS to help create 
custom insurance premiums&lt;/a&gt;
-    based</em></ins></span> on 
-      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span> <span class="inserted"><ins><em>driver 
behaviour.&lt;/p&gt;
-
-    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure 
you</em></ins></span> can <span 
class="removed"><del><strong>track</strong></del></span>
-    <span class="inserted"><ins><em>disconnect its cellular antenna and its 
GPS antenna.  If</em></ins></span> you 
-      <span class="removed"><del><strong>across devices.&lt;/p&gt;
+    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
+    based on driver behaviour.&lt;/p&gt;
  
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>want
-    GPS navigation, get a separate navigator which runs free software
+    &lt;p&gt;Before you buy</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;connected&rdquo; car, make sure you can
+    disconnect its cellular antenna and its GPS antenna.  If you want
+    GPS navigation, get a separate navigator</em></ins></span> which <span 
class="removed"><del><strong>allows
+  effectively
+  anyone</strong></del></span> <span class="inserted"><ins><em>runs free 
software
     and works with Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most modern cars now &lt;a
-    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having</strong></del></span> 
<span class="inserted"><ins><em>the manufacturer&lt;/a&gt;. For
-    the user, access to the data is nearly impossible, as</em></ins></span> it 
<span class="removed"><del><strong>enabled by default</strong></del></span> 
<span class="inserted"><ins><em>involves
-    cracking the car's computer, which</em></ins></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Most modern cars now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record</em></ins></span> and <span class="removed"><del><strong>make 
changes in</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> various
+  <span class="removed"><del><strong>settings&lt;/a&gt;.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>always hidden and running</em></ins></span> with 
<span class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span>
-    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>kinds of data</em></ins></span> to <span 
class="removed"><del><strong>do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
+    the <span class="removed"><del><strong>modem.  However, even if it asked 
for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>user, access to</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> is
+    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span class="inserted"><ins><em>nearly 
impossible, as</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
+    modem enables the phone company to track</strong></del></span> <span 
class="inserted"><ins><em>involves
+    cracking</em></ins></span> the car's <span 
class="removed"><del><strong>movements all
+    the time; it</strong></del></span> <span 
class="inserted"><ins><em>computer, which</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>always hidden and running with
+    proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
@@ -3665,472 +3609,520 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go</em></ins></span> to <span class="inserted"><ins><em>a 
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions 
social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span> 
with <span class="removed"><del><strong>online
-      social media participation, Tivo can now</strong></del></span>
-    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
+    when they go</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>a junkyard</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902011"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201902011"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
-    connected</em></ins></span> to <span class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
+    near-complete access</em></ins></span> to <span 
class="inserted"><ins><em>the internal</em></ins></span> car <span 
class="removed"><del><strong>manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this 
article,</strong></del></span> <span 
class="inserted"><ins><em>network&lt;/a&gt;. It</em></ins></span> is <span 
class="removed"><del><strong>not
+      really</strong></del></span> <span class="inserted"><ins><em>constantly
+    connected to the cellular phone network and sends Ford</em></ins></span> a 
<span class="removed"><del><strong>matter of proprietary surveillance. These 
systems are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>lot</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>data,
     including car location. This feature operates even when the ignition
-    key is removed, and users report that they can't disable it.&lt;/p&gt;
+    key is removed,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>users report that they can't disable it.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
-    connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the 
cellular modem, or wrapping the
-    antenna</em></ins></span> in
-      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>aluminum foil?&lt;/p&gt;
+    &lt;p&gt;If you own one of these cars, have you succeeded in 
breaking</em></ins></span> the <span class="removed"><del><strong>invasion 
isn't done by malware. The other
+      cases mentioned are done</strong></del></span>
+    <span class="inserted"><ins><em>connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> <span 
class="inserted"><ins><em>disconnecting</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>cellular modem, or wrapping</em></ins></span> the 
<span class="removed"><del><strong>company</strong></del></span>
+    <span class="inserted"><ins><em>antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
+    cars</em></ins></span> to <span class="removed"><del><strong>extract data 
remotely and
+      determine the car's location at any time. (See</strong></del></span> 
<span class="inserted"><ins><em>be equipped with a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      snooping all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
-    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform.&lt;/p&gt;
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect</em></ins></span> this <span 
class="removed"><del><strong>information, but if the state 
orders</strong></del></span> <span class="inserted"><ins><em>data&lt;/a&gt; as 
part of their own spying, then
+    forward</em></ins></span> it to <span class="removed"><del><strong>get the 
data
+      and hand it over,</strong></del></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201810230"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
-    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
-      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
-    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
-    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
-
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
-    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
-    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
 
-      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
-      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
 
-    &lt;p&gt;But if you really want</em></ins></span> to
-      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn 
this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>car's
-    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>the
-      transmission reports a 404 error really means nothing; the server
-      could save</strong></del></span> <span class="inserted"><ins><em>data, 
or</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>software
-    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>won't 
collect</em></ins></span> any <span class="removed"><del><strong>product
-      could spy this way.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; products are
+        designed</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+        listen to everyone</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt;</em></ins></span> in <span 
class="inserted"><ins><em>its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into</em></ins></span> the <span 
class="removed"><del><strong>house, all</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make 
sure</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not 
include</strong></del></span> <span class="inserted"><ins><em>car's
+    hardware cannot collect</em></ins></span> any <span 
class="removed"><del><strong>way</strong></del></span> of
+    <span class="removed"><del><strong>making a device</strong></del></span> 
that <span class="removed"><del><strong>can obey your voice commands without
+    potentially spying on you.  Even if it</strong></del></span> <span 
class="inserted"><ins><em>data, or that the software</em></ins></span>
+    is <span class="removed"><del><strong>air-gapped,</strong></del></span> 
<span class="inserted"><ins><em>free so we know</em></ins></span> it <span 
class="removed"><del><strong>could be
+    saving up records about you for later 
examination.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>won't collect any of that 
data.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;AI-powered driving apps can &lt;a
-    
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareInGames</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInGames"&gt;Spyware in Games&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;The driver for</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p id="car-spying"&gt;Computerized cars 
with nonfree software are &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
     
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-    snooping devices&lt;/a&gt;.&lt;/p&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span>
 
-  &lt;li id="M201602240"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>certain gaming keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span> <span class="inserted"><ins><em>built-in
-    cell phone modem which allows effectively anyone</em></ins></span> to 
<span class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about 
them</strong></del></span> <span class="inserted"><ins><em>make changes in 
various
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    cell phone modem which allows effectively anyone</em></ins></span> to 
<span class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</em></ins></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</strong></del></span> <span 
class="inserted"><ins><em>do because</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage to spy</strong></del></span> 
<span class="inserted"><ins><em>system has no authentication
-    when accessed</em></ins></span> through <span 
class="inserted"><ins><em>the modem.  However, even if</em></ins></span> it 
<span class="removed"><del><strong>too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>asked
-    for authentication, you couldn't be confident that Nissan
-    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and report</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything</strong></del></span> <span 
class="inserted"><ins><em>system has no authentication
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident</em></ins></span> that <span 
class="inserted"><ins><em>Nissan
+    has no access.  The software in the car</em></ins></span> is <span 
class="removed"><del><strong>viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even</strong></del></span> <span 
class="inserted"><ins><em>proprietary, &lt;a
+    href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
-    enables the phone company to track the car's movements all the time;
-    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even</em></ins></span> if <span class="inserted"><ins><em>no one 
connects to the car remotely, the cell phone modem
+    enables the phone company to track the car's movements 
all</em></ins></span> the <span 
class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>time;
+    it</em></ins></span> is <span class="removed"><del><strong>coming 
from</strong></del></span> <span class="inserted"><ins><em>possible to 
physically remove</em></ins></span> the <span 
class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>cell phone 
modem, though.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
-      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+  &lt;li id="M201306140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
-      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
-    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
-    information, but if the state orders it to get</em></ins></span> the data
-      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state can store it.&lt;/p&gt;
+    &lt;p&gt;Tesla cars allow</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The existence of a 
way</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>extract
+    data remotely and determine</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>car's location
+    at any time. (See Section 2, paragraphs b and c of</em></ins></span> the 
<span class="removed"><del><strong>surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't 
expect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't 
store</em></ins></span> this <span class="removed"><del><strong>has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens</strong></del></span>
+    <span class="inserted"><ins><em>information, but</em></ins></span> if 
<span class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>state orders it</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>data and hand it
+    over,</em></ins></span> the <span class="removed"><del><strong>user 
watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>state can store it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers</strong></del></span>
 
-  &lt;li id="M201303250"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201303250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
-    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
-      companies.&lt;/p&gt;
+    &lt;p id="records-drivers"&gt;Proprietary software</em></ins></span> in 
<span class="removed"><del><strong>spying on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that advertisers can track you 
+      across devices.&lt;/p&gt;
 
-      &lt;p&gt;They use this data to manipulate people</strong></del></span>
-    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
-
-    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
-      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
-    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door to manipulate the game play for specific players.&lt;/p&gt;
-
-      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>matter of proprietary surveillance. These systems
-    are an intolerable invasion of privacy, and should be replaced with
-    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>article describes gratis games, games that cost 
money 
-      can use</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done by malware. The
-    other cases mentioned are done by proprietary malware in</em></ins></span> 
the <span class="removed"><del><strong>same 
tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>car.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;It</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+    records information about drivers' movements&lt;/a&gt;, 
which</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>made
+    available</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance companies, and 
others.&lt;/p&gt;
+
+    &lt;p&gt;The case of toll-collection systems, mentioned 
in</em></ins></span> this <span class="removed"><del><strong>off, but having it 
enabled by default</strong></del></span> <span 
class="inserted"><ins><em>article,</em></ins></span>
+    is <span class="inserted"><ins><em>not really a matter of proprietary 
surveillance. These systems
+    are</em></ins></span> an <span class="removed"><del><strong>injustice 
already.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>intolerable invasion of privacy, and should be 
replaced</em></ins></span> with <span class="removed"><del><strong>Viacom adds 
2.3 million households to
+      the 600 millions social media profiles</strong></del></span>
+    <span class="inserted"><ins><em>anonymous payment systems, 
but</em></ins></span> the <span class="removed"><del><strong>company already
+      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't done by malware. The
+    other cases mentioned</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being 
watched</strong></del></span> <span 
class="inserted"><ins><em>done</em></ins></span> by
+      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>proprietary malware in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtRecreation 
--&gt;</strong></del></span>
-
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtRecreation"&gt;Spyware at 
Recreation&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVR"&gt;Virtual Reality&lt;/h4&gt;</em></ins></span>
-  &lt;span <span class="removed"><del><strong>class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareAtRecreation"&gt;#SpywareAtRecreation&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVR"&gt;Virtual Reality&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Users are suing Bose for</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Oculus headsets</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-       distributing a spyware app for its headphones&lt;/a&gt;.
-      Specifically, the app would record the names of the audio 
files</strong></del></span>
+    &lt;p&gt;Oculus headsets</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing 
all</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require</em></ins></span>
-    users <span class="removed"><del><strong>listen</strong></del></span> to 
<span class="removed"><del><strong>along with the headphone's unique serial 
number.
-    &lt;/p&gt;
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-      If the fine print of</strong></del></span> <span 
class="inserted"><ins><em>identify themselves to Facebook&lt;/a&gt;. This will 
give Facebook
-    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
+    users to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>identify 
themselves</em></ins></span> to <span class="removed"><del><strong>be
+      picked up by proprietary malware running on other devices in
+      range so as</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
+    free rein</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus 
users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and
+      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
+      even if</strong></del></span>
 
-  &lt;li id="M201612230"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates</em></ins></span> the <span class="removed"><del><strong>app said 
that users gave consent</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>this,
-      would that make it acceptable? No way! It should be flat out
-      &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-       illegal to design</strong></del></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>most intimate
-    surveillance ever. All it takes</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>make this 
potential real &lt;a
-    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    creates the potential for the most intimate
+    surveillance ever. All</em></ins></span> it <span 
class="removed"><del><strong>isn't a TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>takes to make this potential 
real</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      snooping all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
     software as malicious as many other programs listed in this
     page&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You can bet Facebook will implement the maximum possible
+    &lt;p&gt;You can bet Facebook will implement</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>maximum possible
     surveillance on Oculus Rift devices. The moral is, never trust a VR
     system with nonfree software in it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware</em></ins></span> on the <span 
class="removed"><del><strong>internet to another
+    company, Nuance&lt;/a&gt;.  Nuance can save it and would then have to
+      give</strong></del></span> <span class="inserted"><ins><em>Web&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;p&gt;In addition, many web sites spy on their visitors.  Web sites are not
-   programs, so it
-   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but the surveillance is an abuse all the same.&lt;/p&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;When</strong></del></span>
+   programs, so</em></ins></span> it
+   <span class="inserted"><ins><em>&lt;a 
href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense</em></ins></span> to <span class="removed"><del><strong>the 
US</strong></del></span> <span class="inserted"><ins><em>call them 
&ldquo;free&rdquo;</em></ins></span> or <span class="removed"><del><strong>some 
other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but the surveillance</em></ins></span> is <span 
class="removed"><del><strong>not to be trusted unless</strong></del></span> 
<span class="inserted"><ins><em>an abuse all the same.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201904210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of April 2019, it is &lt;a
-    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
-    longer possible to disable an
-    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
-    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    &lt;p&gt;As of April 2019,</em></ins></span> it is <span 
class="removed"><del><strong>done
+    by free software in your own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
+      that</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+      data containing sensitive information will be 
transmitted</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
+    longer possible</em></ins></span> to
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
     users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
-    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
-    going to be based on Chromium.&lt;/p&gt;
+    Opera, Microsoft Edge</em></ins></span> and <span 
class="inserted"><ins><em>also in</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>upcoming Microsoft Edge that is
+    going</em></ins></span> to <span class="removed"><del><strong>turn this 
off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>be based on Chromium.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901101"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    &lt;p&gt;Until 2015, any tweet</em></ins></span> that <span 
class="removed"><del><strong>the
+      transmission reports</strong></del></span> <span 
class="inserted"><ins><em>listed</em></ins></span> a <span 
class="removed"><del><strong>404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>geographical tag 
&lt;a
     
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    sent</em></ins></span> the <span class="removed"><del><strong>server
+      could save that data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it</strong></del></span> <span 
class="inserted"><ins><em>precise GPS location to Twitter's server&lt;/a&gt;. 
It still
     contains these GPS locations.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Storyful program &lt;a
-    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
-    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Storyful program</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies</em></ins></span>
+    on the <span class="removed"><del><strong>user's local 
network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said it had installed</strong></del></span> <span 
class="inserted"><ins><em>reporters that use it&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;When</em></ins></span> a page uses Disqus
-    for comments, <span class="removed"><del><strong>&lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the</strong></del></span>
 <span class="inserted"><ins><em>the</em></ins></span> proprietary Disqus 
software <span class="removed"><del><strong>loads</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads</em></ins></span>
-    a Facebook software package into the browser of every anonymous visitor
-    to the page, and makes the page's URL available to <span 
class="removed"><del><strong>Facebook&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;When</em></ins></span> a <span class="removed"><del><strong>patch 
to stop this, but any product
+      could spy this way.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Online</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>page uses Disqus
+    for comments, the proprietary Disqus software</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
+    a Facebook software package into the browser</em></ins></span> of <span 
class="removed"><del><strong>spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span> <span 
class="inserted"><ins><em>every anonymous visitor
+    to the page,</em></ins></span> and <span class="removed"><del><strong>even 
what they wanted</strong></del></span> <span class="inserted"><ins><em>makes 
the page's URL available</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201612064"&gt;
+&lt;!-- #SpywareInGames</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612064"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Online</em></ins></span> sales, with tracking and surveillance of 
customers, &lt;a
-    
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-    businesses to show different people different prices&lt;/a&gt;. Most of
-    the tracking is done by recording interactions with servers, but
-    proprietary software contributes.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInGames"&gt;Spyware in Games&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Online sales, with tracking and 
surveillance of customers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+    businesses</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
-      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span> <span 
class="inserted"><ins><em>show different people different prices&lt;/a&gt;. 
Most of
+    the tracking is done by recording interactions with servers, 
but</em></ins></span>
+    proprietary <span class="removed"><del><strong>GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software contributes.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
-      &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-      enable Facebook to track visitors</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-    Microsoft SkyDrive allows the NSA</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
-      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>directly examine users'
+    Microsoft SkyDrive allows</em></ins></span> the NSA <span 
class="removed"><del><strong>takes advantage</strong></del></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>directly examine users'
     data&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201210240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many</em></ins></span> web sites rat their visitors to advertising
-    networks that track users.  Of the top 1000 web sites, &lt;a
-    
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-    (as of 5/17/2012) fed their visitors third-party cookies, allowing
-    other sites to track them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Many web sites rat</em></ins></span> their <span 
class="removed"><del><strong>users and report</strong></del></span> <span 
class="inserted"><ins><em>visitors</em></ins></span> to <span 
class="inserted"><ins><em>advertising
+    networks that track users.  Of</em></ins></span> the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
+      a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps</strong></del></span> 
<span class="inserted"><ins><em>top 1000 web sites,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+    (as</em></ins></span> of <span class="removed"><del><strong>data 
about</strong></del></span> <span class="inserted"><ins><em>5/17/2012) 
fed</em></ins></span> their <span class="removed"><del><strong>users 
and</strong></del></span> <span class="inserted"><ins><em>visitors third-party 
cookies, allowing
+    other sites to track them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201208210"&gt;
+  &lt;li id="M201208210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many</em></ins></span> web sites report all their visitors
-    to Google by using the Google Analytics service, which &lt;a
+    &lt;p&gt;Many web sites report all</em></ins></span> their <span 
class="removed"><del><strong>users' 
+      friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+      collected</strong></del></span> <span class="inserted"><ins><em>visitors
+    to Google</em></ins></span> by <span class="removed"><del><strong>various 
cr&hellip;apps</strong></del></span> <span class="inserted"><ins><em>using the 
Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address and the page that was <span 
class="removed"><del><strong>visited.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>visited&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tells Google the IP address</em></ins></span> and <span 
class="inserted"><ins><em>the page that was visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201200000"&gt;
+  &lt;li id="M201200000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many</em></ins></span> web sites try to collect users' address 
books (the user's list
+    &lt;p&gt;Many web</em></ins></span> sites <span 
class="removed"><del><strong>made by different 
+      companies.&lt;/p&gt;
+
+      &lt;p&gt;They use this data to manipulate people</strong></del></span> 
<span class="inserted"><ins><em>try</em></ins></span> to <span 
class="removed"><del><strong>buy things, and hunt 
+      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>collect users' address books (the user's list
     of other people's phone numbers or email addresses).  This violates
     the privacy of those other people.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-      Microsoft SkyDrive allows the NSA</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
+  &lt;li id="M201110040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
     
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>track visitors to those pages&lt;/a&gt;&mdash;even 
users
-    that don't have Facebook accounts.&lt;/p&gt;</em></ins></span>
+    enable Facebook</em></ins></span> to <span 
class="removed"><del><strong>spend a lot of money. They 
+      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>track visitors</em></ins></span> to <span 
class="removed"><del><strong>manipulate the game play for specific 
players.&lt;/p&gt;
+
+      &lt;p&gt;While the article describes gratis games, 
games</strong></del></span> <span class="inserted"><ins><em>those 
pages&lt;/a&gt;&mdash;even users</em></ins></span>
+    that <span class="removed"><del><strong>cost money 
+      can use the same tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>don't have Facebook 
accounts.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+<span class="removed"><del><strong>&lt;!-- #SpywareAtRecreation 
--&gt;</strong></del></span>
 
 
-<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtRecreation"&gt;Spyware at 
Recreation&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;</em></ins></span>
+  &lt;span <span class="removed"><del><strong>class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareAtRecreation"&gt;#SpywareAtRecreation&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Users are suing Bose for</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201811270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites use JavaScript code &lt;a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection</strong></del></span> 
<span class="inserted"><ins><em>information that users have typed into a
-    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
+    &lt;p&gt;Many web sites use JavaScript code</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+       distributing a spyware app for its headphones&lt;/a&gt;.
+      Specifically, the app would record the names of the audio 
files</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    to snoop on information that</em></ins></span> users <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>have typed into a
+    form but not sent&lt;/a&gt;, in order</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>learn 
their identity. Some are &lt;a
     
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The chat facilities of some customer services use the same sort of
-    malware to &lt;a
+    &lt;p&gt;The <span class="removed"><del><strong>suit accuses that this was 
done without the users' consent.
+      If</strong></del></span> <span class="inserted"><ins><em>chat facilities 
of some customer services use</em></ins></span> the <span 
class="removed"><del><strong>fine print</strong></del></span> <span 
class="inserted"><ins><em>same sort</em></ins></span> of
+    <span class="inserted"><ins><em>malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
+    read what</em></ins></span> the <span class="removed"><del><strong>app 
said that users gave consent for this,
+      would that make</strong></del></span> <span 
class="inserted"><ins><em>user is typing before</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat 
out</strong></del></span> <span class="inserted"><ins><em>is 
posted&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;British Airways used &lt;a
-    
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site to give other companies personal data on
+    &lt;p&gt;British Airways used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+       illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
+    JavaScript on its web site</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>give other companies personal data on
     its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Spyware in JavaScript and Flash&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some JavaScript malware &lt;a
     
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
     swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711150"&gt;
+  &lt;li id="M201711150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some websites send
-    JavaScript code to collect all the user's input, &lt;a
+    JavaScript code to collect all</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>user's input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
-    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+    can then be used</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reproduce 
the whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
     code.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -4144,92 +4136,169 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Flash and JavaScript are used for &lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201003010"&gt;
+&lt;!-- #SpywareOnTheWeb</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201003010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Flash Player's &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Flash Player's &lt;a
     
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps</em></ins></span> web sites <span 
class="removed"><del><strong>use JavaScript code</strong></del></span> <span 
class="inserted"><ins><em>track visitors&lt;/a&gt;.&lt;/p&gt;
+    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the 
Web&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+&lt;p&gt;In addition, many web sites spy on their visitors.  Web sites are not
+   programs, so it
+   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but the surveillance</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201906220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome is an</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</strong></del></span>
+    &lt;p&gt;Google Chrome</em></ins></span> is an <span 
class="removed"><del><strong>abuse all the same.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;When a page uses Disqus for
+  comments,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the
+  proprietary Disqus software loads a Facebook software package into
+  the browser</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
-    instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
-    users' computers and report the sites they visit</em></ins></span> to 
<span class="removed"><del><strong>snoop on information 
that</strong></del></span> <span class="inserted"><ins><em>advertising and
-    data companies, first of all to Google. Moreover, if</em></ins></span> 
users have <span class="removed"><del><strong>typed into</strong></del></span> 
a <span class="removed"><del><strong>form but not
-    sent&lt;/a&gt;,</strong></del></span>
-    <span class="inserted"><ins><em>Gmail account, Chrome automatically logs 
them</em></ins></span> in <span 
class="removed"><del><strong>order</strong></del></span> to <span 
class="removed"><del><strong>learn</strong></del></span> <span 
class="inserted"><ins><em>the browser for
-    more convenient profiling. On Android, Chrome also 
reports</em></ins></span> their <span class="removed"><del><strong>identity. 
Some</strong></del></span>
-    <span class="inserted"><ins><em>location to Google.&lt;/p&gt;
-
-    &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
-    href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
-    with several changes to protect users' privacy.&lt;/p&gt;
+    instrument</em></ins></span> of <span class="removed"><del><strong>every 
anonymous visitor to the page,</strong></del></span> <span 
class="inserted"><ins><em>surveillance&lt;/a&gt;. It lets thousands of trackers 
invade
+    users' computers</em></ins></span> and <span 
class="removed"><del><strong>makes</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> the
+  <span class="removed"><del><strong>page's URL 
available</strong></del></span> <span class="inserted"><ins><em>sites they 
visit</em></ins></span> to <span 
class="removed"><del><strong>Facebook&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Online sales, with tracking</strong></del></span> <span 
class="inserted"><ins><em>advertising</em></ins></span> and <span 
class="removed"><del><strong>surveillance of customers, &lt;a 
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+      businesses to show different people different prices&lt;/a&gt;. 
Most</strong></del></span>
+    <span class="inserted"><ins><em>data companies, first</em></ins></span> of 
<span class="removed"><del><strong>the tracking is done by recording 
interactions with
+      servers, but proprietary software contributes.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201704131"&gt;
+  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
+      &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+      enable Facebook to track visitors</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> to <span 
class="removed"><del><strong>those 
pages&lt;/a&gt;&mdash;even</strong></del></span> <span 
class="inserted"><ins><em>Google. Moreover, if</em></ins></span> users <span 
class="removed"><del><strong>that don't</strong></del></span> have <span 
class="removed"><del><strong>Facebook accounts.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many web sites rat their visitors</strong></del></span> 
<span class="inserted"><ins><em>a
+    Gmail account, Chrome automatically logs them in</em></ins></span> to 
<span class="removed"><del><strong>advertising networks that track
+      users.  Of</strong></del></span> the <span 
class="removed"><del><strong>top 1000 web sites,</strong></del></span> <span 
class="inserted"><ins><em>browser for
+    more convenient profiling. On Android, Chrome also reports their
+    location to Google.&lt;/p&gt;
+
+    &lt;p&gt;The best way to escape surveillance is to switch 
to</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+      (as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a 
modified version</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing other
+      sites</strong></del></span> <span class="inserted"><ins><em>Firefox
+    with several changes</em></ins></span> to <span 
class="removed"><del><strong>track 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protect users' privacy.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many web sites report 
all their visitors to Google by using</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Low-priced Chromebooks for schools</em></ins></span> are &lt;a
-    <span 
class="removed"><del><strong>href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
     collecting far more data on students than is necessary, and store
     it indefinitely&lt;/a&gt;. Parents and students complain about the lack
-    of transparency on the part of both the educational services and the
-    schools, the difficulty of opting out of these services, and the lack
-    of proper privacy policies, among other things.&lt;/p&gt;
+    of transparency on</em></ins></span> the <span 
class="removed"><del><strong>Google Analytics service, which
+      &lt;a 
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+      tells Google</strong></del></span> <span class="inserted"><ins><em>part 
of both</em></ins></span> the <span class="removed"><del><strong>IP 
address</strong></del></span> <span class="inserted"><ins><em>educational 
services</em></ins></span> and the <span class="removed"><del><strong>page that 
was visited.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many web sites try to collect users' address books (the
+      user's list</strong></del></span>
+    <span class="inserted"><ins><em>schools, the difficulty</em></ins></span> 
of <span class="removed"><del><strong>other people's phone numbers or email 
addresses).
+      This violates</strong></del></span> <span 
class="inserted"><ins><em>opting out of these services, and</em></ins></span> 
the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>lack</em></ins></span>
+    of <span class="removed"><del><strong>those</strong></del></span> <span 
class="inserted"><ins><em>proper privacy policies, among</em></ins></span> 
other <span class="removed"><del><strong>people.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+      Microsoft SkyDrive allows</strong></del></span> <span 
class="inserted"><ins><em>things.&lt;/p&gt;
 
     &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
-    should realize that the software Google uses to spy on students is
+    should realize that</em></ins></span> the <span 
class="removed"><del><strong>NSA to directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>software Google uses</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Spyware in JavaScript and Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Some websites send JavaScript code</strong></del></span> <span 
class="inserted"><ins><em>students is
     nonfree, so they can't verify what it really does. The only remedy is
-    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
-    exclusively use free software&lt;/a&gt;</em></ins></span> for <span 
class="removed"><del><strong>this.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>both education and school
-    administration. If the school is run locally, parents and teachers
-    can mandate their representatives at the School Board to refuse the
-    budget unless the school initiates a switch to free software. If
-    education is run nation-wide, they need to persuade legislators
-    (e.g., through free software organizations, political parties,
-    etc.) to migrate the public schools to free software.&lt;/p&gt;
+    to persuade school officials</em></ins></span> to <span 
class="removed"><del><strong>collect all the user's
+    input,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and 
teachers</em></ins></span>
+    can <span class="removed"><del><strong>then
+        be used to reproduce</strong></del></span> <span 
class="inserted"><ins><em>mandate their representatives at</em></ins></span> 
the <span class="removed"><del><strong>whole session&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
+    code.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507280"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
-    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</strong></del></span>
 <span class="inserted"><ins><em>School Board</em></ins></span> to <span 
class="removed"><del><strong>snoop on information that users have typed 
into</strong></del></span> <span class="inserted"><ins><em>refuse the
+    budget unless the school initiates</em></ins></span> a <span 
class="removed"><del><strong>form but not
+    sent&lt;/a&gt;, in order</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>learn their identity. Some are &lt;a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash 
Player's</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
+  <span class="inserted"><ins><em>&lt;li id="M201507280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome includes a module that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+    &lt;p&gt;Google Chrome makes it easy for an extension to 
do</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
       cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on the user's browsing&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>JavaScript are also used for</strong></del></span> 
<span class="inserted"><ins><em>many of them do so.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome includes a module that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-    activates microphones</em></ins></span> and <span 
class="removed"><del><strong>JavaScript are also used for
-      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>transmits audio</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its 
servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its 
servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -4288,12 +4357,23 @@
     &lt;p&gt;While you're using a DJI drone</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202104060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over 
data</em></ins></span>
+    to <span class="removed"><del><strong>snoop on other people, 
DJI</strong></del></span> <span class="inserted"><ins><em>others&lt;/a&gt;, and 
gives people no control over their personal
+    information/data. The app also sometimes shows old photos and memories
+    to the user without user having control over this.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202102160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google &lt;a
     
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
-    over personal data of Indian protesters and activists</em></ins></span> to 
<span class="removed"><del><strong>snoop on other people, 
DJI</strong></del></span> <span class="inserted"><ins><em>Indian
+    over personal data of Indian protesters and activists to Indian
     police&lt;/a&gt; which led to their arrest. The cops requested the IP
     address and the location where a document was created and with that
     information, they identified protesters and activists.&lt;/p&gt;
@@ -4486,7 +4566,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/15 19:01:22 $
+$Date: 2021/04/26 12:04:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.390
retrieving revision 1.391
diff -u -b -r1.390 -r1.391
--- proprietary/po/proprietary-surveillance.de.po       15 Apr 2021 19:01:22 
-0000      1.390
+++ proprietary/po/proprietary-surveillance.de.po       26 Apr 2021 12:04:35 
-0000      1.391
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5819,6 +5819,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "

Index: proprietary/po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary/po/proprietary-surveillance.es.po       17 Apr 2021 10:01:12 
-0000      1.184
+++ proprietary/po/proprietary-surveillance.es.po       26 Apr 2021 12:04:35 
-0000      1.185
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2021-04-17 11:26+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -5298,6 +5299,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "

Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.627
retrieving revision 1.628
diff -u -b -r1.627 -r1.628
--- proprietary/po/proprietary-surveillance.fr.po       15 Apr 2021 20:01:15 
-0000      1.627
+++ proprietary/po/proprietary-surveillance.fr.po       26 Apr 2021 12:04:35 
-0000      1.628
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2021-04-15 22:00+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -5314,6 +5315,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary/po/proprietary-surveillance.it-diff.html        15 Apr 2021 
19:01:22 -0000      1.246
+++ proprietary/po/proprietary-surveillance.it-diff.html        26 Apr 2021 
12:04:36 -0000      1.247
@@ -632,10 +632,22 @@
     &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
-    sabotage method Lenovo used did not affect GNU/Linux; also, a
-    &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> the <span class="removed"><del><strong>paid 
proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
+    sabotage method Lenovo used did</em></ins></span> not <span 
class="removed"><del><strong>in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word</strong></del></span> <span class="inserted"><ins><em>affect 
GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span> <span 
class="inserted"><ins><em>not really clean since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its
     own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -643,7 +655,9 @@
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With</strong></del></span> <span 
class="inserted"><ins><em>Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -657,96 +671,205 @@
   &lt;li id="M202102200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The proprietary program Clubhouse
-    is malware and a privacy disaster. Clubhouse &lt;a
-    
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble"&gt;collects
-    people's personal data such as recordings of people's
+    &lt;p&gt;The</em></ins></span> proprietary <span 
class="removed"><del><strong>apps, one can only hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span> <span class="inserted"><ins><em>program Clubhouse
+    is malware and a privacy disaster. Clubhouse</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit 
users'</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble"&gt;collects
+    people's</em></ins></span> personal data <span 
class="removed"><del><strong>to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens</strong></del></span> <span class="inserted"><ins><em>such as 
recordings</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>people's
     conversations&lt;/a&gt;, and, as a secondary problem, does not encrypt 
them,
-    which shows a bad security part of the issue.&lt;/p&gt;
+    which shows a bad security part</em></ins></span> of <span 
class="removed"><del><strong>pairs that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>issue.&lt;/p&gt;
 
     &lt;p&gt;A user's unique Clubhouse ID number and chatroom ID are 
transmitted
-    in plaintext, and Agora (the company behind the app) would likely
-    have access to users' raw audio, potentially providing access to
-    the Chinese government.&lt;/p&gt;
+    in plaintext, and Agora (the company behind</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even with good security of data transmission, collecting personal
-    data of people is wrong and a violation of people's privacy 
rights.&lt;/p&gt;
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app) would likely
+    have access to users' raw audio, potentially providing access 
to</em></ins></span>
+    the <span 
class="removed"><del><strong>&ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Chinese government.&lt;/p&gt;
+
+    &lt;p&gt;Even with good security</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>data transmission, collecting personal
+    data of people</em></ins></span> is <span class="removed"><del><strong>not 
enough
+to legitimize actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.  Google should 
clearly</strong></del></span> <span 
class="inserted"><ins><em>wrong</em></ins></span> and <span 
class="removed"><del><strong>honestly identify the information it collects on 
users, instead</strong></del></span> <span class="inserted"><ins><em>a 
violation</em></ins></span> of <span class="removed"><del><strong>hiding it in 
an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect</strong></del></span> people's <span 
class="removed"><del><strong>privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>privacy 
rights.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202101080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202101080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
-    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users to hand over sensitive personal data&lt;/a&gt; to its parent
-    company. This increases Facebook's power over users, and further
+    &lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>2021, WhatsApp (one of Facebook's subsidiaries) 
is</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
+    its users</em></ins></span> to <span 
class="removed"><del><strong>completely stop the 
tracking.</strong></del></span> <span class="inserted"><ins><em>hand over 
sensitive personal data&lt;/a&gt; to its parent
+    company.</em></ins></span> This <span class="removed"><del><strong>is
+    yet another example</strong></del></span> <span 
class="inserted"><ins><em>increases Facebook's power over users, and further
     jeopardizes people's privacy and security.&lt;/p&gt;
 
-    &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
-    free software and will not collect your data.&lt;/p&gt;
+    &lt;p&gt;Instead</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with</strong></del></span> <span 
class="inserted"><ins><em>WhatsApp you can use &lt;a
+    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which 
is</em></ins></span>
+    free <span 
class="removed"><del><strong>software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software and will not collect your 
data.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202006260"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202006260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most apps are malware, but
-    Trump's campaign app, like Modi's campaign app, is &lt;a
-    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on users as well
-    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says that Biden's app has a less manipulative overall
-    approach, but that does not tell us whether it has functionalities we
-    consider malicious, such as sending data the user has not explicitly
-    asked to send.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Most</em></ins></span> apps <span class="inserted"><ins><em>are 
malware, but
+    Trump's campaign app, like Modi's campaign app, is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt; of their</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on</em></ins></span> 
users <span class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>as well
+    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The article <span 
class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>says that Biden's app has a less manipulative overall
+    approach, but that does</em></ins></span> not <span 
class="removed"><del><strong>have described these apps</strong></del></span> 
<span class="inserted"><ins><em>tell us whether it has functionalities we
+    consider malicious, such</em></ins></span> as
+  <span class="removed"><del><strong>&ldquo;free&rdquo;&mdash;they 
are</strong></del></span> <span class="inserted"><ins><em>sending data the user 
has</em></ins></span> not <span class="removed"><del><strong>free software.  
The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;li id="M201809121"&gt;
+  &lt;p&gt;The article takes for granted that the usual analytics tools are
+  legitimate, but is that valid?  Software developers have no 
right</strong></del></span> <span class="inserted"><ins><em>explicitly
+    asked</em></ins></span> to
+  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>send.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201809121"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
-    by Google, Twitter and three other companies are facing a lawsuit &lt;a
-    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
+    by Google, Twitter</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when 
they</strong></del></span> <span class="inserted"><ins><em>three other 
companies</em></ins></span> are <span class="removed"><del><strong>sold.
+      Some Motorola phones modify Android to</strong></del></span> <span 
class="inserted"><ins><em>facing a lawsuit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
     violating people's privacy by collecting their data from mobile games
-    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
+    and handing over these</em></ins></span> data to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201601110"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones is &lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software to make sure they can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;
+    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
+    the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201510050"&gt;
+
+&lt;!-- #SpywareOnMobiles</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;According to Edward Snowden, &lt;a
-    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
-    smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on and off, listen to the microphone,
-    retrieve geo-location data from the GPS, take photographs, read
-    text messages, read call, location and web browsing history, and
-    read the contact list. This malware is designed to disguise itself
-    from investigation.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;According</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
+    smartphones&lt;/a&gt; by sending hidden text messages</em></ins></span> 
which <span class="removed"><del><strong>would mean no way to use it without 
having your fingerprints
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>enable
+    them</em></ins></span> to <span class="removed"><del><strong>tell 
whether</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> the <span 
class="removed"><del><strong>phone is snooping</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>and off, listen</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them</strong></del></span> <span class="inserted"><ins><em>the 
microphone,
+    retrieve geo-location data</em></ins></span> from <span 
class="removed"><del><strong>there.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201311120"&gt;
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
+    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>web browsing history, and
+    read</em></ins></span> the <span class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>contact 
list. This malware is designed</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disguise itself
+    from investigation.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via
-    the universal back door that we know nearly all portable
-    phones have. It may involve exploiting various bugs.  There are &lt;a
-    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    detail here, it seems that this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>most popular iOS 
apps</strong></del></span> <span class="inserted"><ins><em>universal back door 
that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the 
phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
@@ -754,9 +877,21 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;
+    will send</em></ins></span> their <span class="inserted"><ins><em>GPS 
location on remote command, and</em></ins></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's 
servers</strong></del></span> <span class="inserted"><ins><em>cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require</em></ins></span> 
all <span class="removed"><del><strong>the photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>new portable phones</em></ins></span>
+    to <span class="removed"><del><strong>date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -770,9 +905,15 @@
   &lt;li id="M202009183"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook &lt;a
-    
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
+    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops</em></ins></span>
+    on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+      &lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
 <span class="inserted"><ins><em>Instagram&lt;/a&gt; users</em></ins></span> by 
<span class="inserted"><ins><em>surreptitously turning on</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is</strong></del></span> <span 
class="inserted"><ins><em>device's
     camera.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -780,18 +921,25 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made a practice of surreptitiously activating the Siri software to &lt;a
-    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    made</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>practice of surreptitiously activating the Siri 
software</em></ins></span> to &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
     record users' conversations when they had not activated Siri&lt;/a&gt;.
     This was not just occasional, it was systematic practice.&lt;/p&gt;
 
     &lt;p&gt;His job was to listen to these recordings, in a group that made
-    transcripts of them. He does not believes that Apple has ceased this
-    practice.&lt;/p&gt;
+    transcripts</em></ins></span> of <span class="inserted"><ins><em>them. He 
does not believes that Apple has ceased</em></ins></span> this
+    <span class="inserted"><ins><em>practice.&lt;/p&gt;
 
-    &lt;p&gt;The only reliable way to prevent this is, for the program that
-    controls access to the microphone to decide when the user has
-    &ldquo;activated&rdquo; any service, to be free software, and the
+    &lt;p&gt;The only reliable way</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>prevent this is, 
for the program that
+    controls access</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>the 
microphone</em></ins></span> to <span class="removed"><del><strong>get at them, 
but NSA can access</strong></del></span> <span class="inserted"><ins><em>decide 
when the user has
+    &ldquo;activated&rdquo;</em></ins></span> any <span 
class="removed"><del><strong>of them through</strong></del></span> <span 
class="inserted"><ins><em>service, to be free software, and the
     operating system under it free as well. This way, users could make
     sure Apple can't listen to them.&lt;/p&gt;
   &lt;/li&gt;
@@ -799,64 +947,108 @@
   &lt;li id="M201910131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Safari occasionally &lt;a
-    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
-    sends browsing data from Apple devices in China to the Tencent Safe
+    &lt;p&gt;Safari occasionally</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices</em></ins></span> in <span 
class="removed"><del><strong>iThings:</strong></del></span> <span 
class="inserted"><ins><em>China to</em></ins></span> the <span 
class="removed"><del><strong>&lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
     Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
     &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black list most certainly
+    with</em></ins></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span class="inserted"><ins><em>Chinese government, 
its Safe Browsing black list most certainly
     contains the websites of political opponents. By linking the requests
     originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+    dissenters in China</em></ins></span> and <span 
class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Hong Kong, 
thus endangering their lives.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201905280"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201905280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at night &lt;a
-    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment</em></ins></span> to 
<span class="removed"><del><strong>track users, which is</strong></del></span>
+    <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that 
are busy at night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>talks about iOS 6, but</strong></del></span> <span 
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
     Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
     Channel (owned by IBM), the crime-alert service Citizen, Yelp
-    and DoorDash. But it is likely that most nonfree apps contain
+    and DoorDash. But</em></ins></span> it is <span 
class="removed"><del><strong>still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span 
class="inserted"><ins><em>likely</em></ins></span> that <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>most nonfree apps contain
     trackers. Some of these send personally identifying data such as phone
     fingerprint, exact location, email address, phone number or even
     delivery address (in the case of DoorDash). Once this information
-    is collected by the company, there is no telling what it will be
-    used for.&lt;/p&gt;
+    is collected by the company, there is no telling what it 
will</em></ins></span> be
+      <span class="removed"><del><strong>turned 
off.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>used for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
can,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy</em></ins></span> on <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of</strong></del></span> iOS <span 
class="removed"><del><strong>seem to exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the <span 
class="inserted"><ins><em>obvious way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple proposes &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    &lt;p&gt;Apple proposes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="removed"><del><strong>turn the phones
+      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>use it without having your fingerprints taken. Users 
would have
+    no way</em></ins></span> to <span class="inserted"><ins><em>tell 
whether</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history, and read the contact list. This 
malware</strong></del></span> <span 
class="inserted"><ins><em>phone</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
@@ -864,58 +1056,117 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
-    them from there.&lt;/p&gt;
+    lots of personal data</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself</strong></del></span> 
<span class="inserted"><ins><em>Apple's servers&lt;/a&gt;.  Big Brother can get
+    them</em></ins></span> from <span 
class="removed"><del><strong>investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>there.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609280"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
+    &lt;p&gt;The iMessage app on iThings</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they send so much data that their transmission 
is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</em></ins></span>
+    a
+      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
+      requested by the user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> <span 
class="inserted"><ins><em>server every</em></ins></span> phone
+      <span class="removed"><del><strong>&lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>number that</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that
+      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
 <span class="inserted"><ins><em>user types into 
it&lt;/a&gt;;</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span>
+    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
-    and videos they make.&lt;/p&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span 
class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
+    and <span class="removed"><del><strong>microphone in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>videos they 
make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every 
photo</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is
+      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps them up to date on all your devices. Any edits you
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
+      remote command</strong></del></span> <span 
class="inserted"><ins><em>video you
+    take,</em></ins></span> and <span class="removed"><del><strong>users 
cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span> <span class="inserted"><ins><em>keeps them 
up</em></ins></span> to <span class="removed"><del><strong>have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>date on all your 
devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is <span class="removed"><del><strong>to 
restrict</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span>
+    <span class="inserted"><ins><em>startup</em></ins></span> of <span 
class="removed"><del><strong>data on the user's computer,</strong></del></span> 
<span class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; 
means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There is a way to
     &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
-    surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
-    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    iCloud&lt;/a&gt;,</em></ins></span> but <span 
class="inserted"><ins><em>it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>does</strong></del></span> <span 
class="inserted"><ins><em>still counts as a</em></ins></span>
+    surveillance
+      <span class="removed"><del><strong>too:</strong></del></span> <span 
class="inserted"><ins><em>functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    security</em></ins></span> to get <span class="removed"><del><strong>the 
user's list</strong></del></span> <span class="inserted"><ins><em>at them, but 
NSA can access any</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201409220"&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some</em></ins></span> data <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This may have improved with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
 
-    &lt;p&gt;This may have improved with &lt;a
-    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
-    iOS 8 security improvements&lt;/a&gt;; but &lt;a
-    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+   &lt;p&gt;Currently, the app is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
+    iOS 8 security improvements&lt;/a&gt;; but</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the
+    user must explicitly opt-in before the app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; 
piece</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
     not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -924,19 +1175,34 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>spyware</strong></del></span> <span 
class="inserted"><ins><em>iOS seem to exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  
Here</em></ins></span> is
+    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in</strong></del></span> <span 
class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get other info too.&lt;/p&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>phone, and in server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span> <span 
class="inserted"><ins><em>iThing is,</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span>
+    <span class="inserted"><ins><em>get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
@@ -944,36 +1210,59 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or it
-    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>NSA snoop 
on all</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>data in an iThing, or it</em></ins></span>
+    is <span class="removed"><del><strong>inadequate as a protection against 
massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>totally 
incompetent&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201308080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The iThing also &lt;a
-    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though that can be
-    turned off.&lt;/p&gt;
+    &lt;p&gt;The iThing also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201210170"&gt;
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>can be
+    turned off.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app
+      &lt;a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
+    &lt;p&gt;There is also a feature</em></ins></span> for <span 
class="removed"><del><strong>known faces&lt;/a&gt;,
+      and suggests you to share the picture you take 
according</strong></del></span> <span class="inserted"><ins><em>web 
sites</em></ins></span> to <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>track users, which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
-    still true in iOS 7.)&lt;/p&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but 
it</em></ins></span> is
+    <span class="inserted"><ins><em>still true</em></ins></span> in <span 
class="removed"><del><strong>the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201204280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Users cannot make an Apple ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
-    to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving the verification code Apple sends
-    to it.&lt;/p&gt;
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
+    to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
+    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends</em></ins></span>
+    to <span class="inserted"><ins><em>it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -989,58 +1278,95 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Baidu apps were &lt;a
     
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;
-    caught collecting sensitive personal data&lt;/a&gt; that can be used for
-    lifetime tracking of users, and putting them in danger. More than 1.4
+    caught collecting sensitive personal data&lt;/a&gt; that 
can</em></ins></span> be
+      <span class="removed"><del><strong>sent across the wire to Facebook's 
servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>used for
+    lifetime tracking</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if the user didn't 
&ldquo;upload&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>users, and putting</em></ins></span> them <span 
class="inserted"><ins><em>in danger. More than 1.4
     billion people worldwide are affected by these proprietary apps, and
     users' privacy is jeopardized by this surveillance tool. Data collected
-    by Baidu may be handed over to the Chinese government, possibly
-    putting Chinese people in danger.&lt;/p&gt;
+    by Baidu may be handed over</em></ins></span> to the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Chinese government, possibly
+    putting Chinese people in danger.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202010120"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202010120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Samsung is forcing its smartphone users in Hong Kong (and Macau) 
&lt;a
+    &lt;p&gt;Samsung</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware (DRM and snooping). 
In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded</strong></del></span> <span class="inserted"><ins><em>forcing 
its smartphone</em></ins></span> users <span 
class="removed"><del><strong>submit to increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>in 
Hong Kong (and Macau) &lt;a
     
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/"&gt;to
     use a public DNS in Mainland China&lt;/a&gt;, using software update 
released
-    in September 2020, which causes many unease and privacy concerns.&lt;/p&gt;
+    in September 2020, which causes many unease</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting to realize that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the</strong></del></span> <span 
class="inserted"><ins><em>privacy concerns.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202004300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Xiaomi phones &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
-    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
-    visiting a website, listening to a song.  They send device identifying
+    &lt;p&gt;Xiaomi phones</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+    many actions the user takes&lt;/a&gt;: starting an app, looking 
at</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>folder,
+    visiting a website, listening</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of the proprietary software industry towards
+      those</strong></del></span> <span class="inserted"><ins><em>song.  They 
send device identifying
     information too.&lt;/p&gt;
 
     &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
     other streaming dis-services make a dossier about each user, and &lt;a
-    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
-    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
+    
href="/malware/proprietary-surveillance.html#M201508210"&gt;</em></ins></span> 
they <span class="removed"><del><strong>have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out,</strong></del></span> <span class="inserted"><ins><em>make
+    users identify themselves to pay&lt;/a&gt;.  Out,</em></ins></span> out, 
damned Spotify!&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+    apps</strong></del></span>
 
-    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
-    but we condemn this no matter who does it.&lt;/p&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Forbes 
exonerates</em></ins></span> the <span class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>same wrongs when</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201812060"&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>culprits are not Chinese,
+    but we condemn this no matter who does it.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what</em></ins></span> the <span class="removed"><del><strong>snooping 
done by the</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
+    &lt;p&gt;An Android</em></ins></span> phone <span 
class="removed"><del><strong>company, and perhaps by the 
OS</strong></del></span> <span class="inserted"><ins><em>was observed to track 
location even while</em></ins></span>
+    in <span class="inserted"><ins><em>airplane mode. It didn't 
send</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
+    it saved up</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
@@ -1048,40 +1374,68 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the <span class="removed"><del><strong>app developers get
+      users to say &ldquo;I agree&rdquo;. That is</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>SIM 
card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611150"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it asked the user to
+      approve</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware</em></ins></span> sending <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>lots of</em></ins></span> data to <span 
class="removed"><del><strong>the app developer but did not
+      ask about sending it to other companies.  This shows the
+      weakness</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Play (a component of Android) &lt;a
+    &lt;p&gt;Google Play (a component</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example of nonfree software pretending to obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+    disable Google Play itself</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>completely stop the tracking.  This is
+    yet another example of nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
+      app</strong></del></span> <span class="inserted"><ins><em>pretending to 
obey the user,
+    when it's actually doing something else.  Such a thing</em></ins></span> 
would <span class="removed"><del><strong>not.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>be almost
+    unthinkable with free software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201507030"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they send so much data that their
-    transmission is a substantial expense for users.  Said transmission,
-    not wanted or requested by the user, clearly must constitute spying
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that</em></ins></span> users <span class="removed"><del><strong>identify 
themselves</strong></del></span> <span class="inserted"><ins><em>can't 
delete&lt;/a&gt;,</em></ins></span> and <span class="removed"><del><strong>then 
sends personal</strong></del></span> <span class="inserted"><ins><em>they send 
so much</em></ins></span> data <span class="removed"><del><strong>about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span> <span class="inserted"><ins><em>that their
+    transmission is a substantial expense</em></ins></span> for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>users.  Said transmission,
+    not wanted or requested by</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>user, clearly must constitute spying
     of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1089,17 +1443,38 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      Here's information</strong></del></span> <span 
class="inserted"><ins><em>any file</em></ins></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
 
-  &lt;li id="M201308010"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports that &lt;a
-    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us by</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based 
in</strong></del></span> <span class="inserted"><ins><em>paywall) reports that 
&lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span 
class="inserted"><ins><em>FBI</em></ins></span> can remotely <span 
class="removed"><del><strong>control</strong></del></span> <span 
class="inserted"><ins><em>activate</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>GPS and microphone</em></ins></span> in <span 
class="removed"><del><strong>on a child's speech,</strong></del></span> <span 
class="inserted"><ins><em>Android phones</em></ins></span>
+    and <span class="removed"><del><strong>even speak
+      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt; (presumably Windows laptops).  Here 
is &lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1110,111 +1485,198 @@
     sold.  Some Motorola phones, made when this company was owned
     by Google, use a modified version of Android that &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A Motorola phone &lt;a
-    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;A <span class="removed"><del><strong>computerized 
vibrator</strong></del></span> <span class="inserted"><ins><em>Motorola 
phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201302150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
-    legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>was reporting</strong></del></span> <span 
class="inserted"><ins><em>developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>temperature</strong></del></span> 
<span class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="inserted"><ins><em>users that install</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most</em></ins></span> users 
<span class="removed"><del><strong>could</strong></del></span> have
+      <span class="removed"><del><strong>checked</strong></del></span> <span 
class="inserted"><ins><em>stopped
+    reading the &ldquo;Terms</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>Conditions&rdquo;</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
+    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal</strong></del></span> 
information <span class="removed"><del><strong>about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+      true, but</strong></del></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span> 
<span class="inserted"><ins><em>collects on users, instead of
+    hiding</em></ins></span> it <span class="removed"><del><strong>had sold 
the data to a
+      data broker, the data broker would have been able</strong></del></span> 
<span class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>figure out
+      who the user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+    and other companies from getting</em></ins></span> this <span 
class="removed"><del><strong>lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>personal information in</em></ins></span> the 
<span class="removed"><del><strong>company has been ordered to pay a total of 
C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
 
-  &lt;li id="M201111170"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="removed"><del><strong>way to access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
+<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note that</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries, &lt;a
-    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span 
class="inserted"><ins><em>e-reader</em></ins></span> used <span 
class="removed"><del><strong>did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>by most US 
libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Spyware in many 
e-readers&mdash;not only the Kindle: &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
     report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInApplications"&gt;Spyware in 
Applications&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</strong></del></span>
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
-    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
+    &lt;p&gt;Microsoft's Office 365 suite enables employers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
     snoop on each employee&lt;/a&gt;. After
-    a public outburst, Microsoft stated that &lt;a
-    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
-    would remove this capability&lt;/a&gt;. Let's hope so.&lt;/p&gt;
+    a public outburst,</em></ins></span> Microsoft <span 
class="removed"><del><strong>changed Skype</strong></del></span> <span 
class="inserted"><ins><em>stated that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
+    would remove this capability&lt;/a&gt;. Let's hope 
so.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201912190"&gt;
+
+&lt;!-- #SpywareOnTheRoad</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201912190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some Avast and AVG extensions
-    for Firefox and Chrome were found to &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Some Avast and AVG extensions
+    for Firefox and Chrome were found</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
+    snoop</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection</strong></del></span> <span class="inserted"><ins><em>users' 
detailed browsing habits&lt;/a&gt;. Mozilla and Google
     removed the problematic extensions from their stores, but this shows
     once more how unsafe nonfree software can be. Tools that are supposed
     to protect a proprietary system are, instead, infecting it with
@@ -1223,59 +1685,111 @@
 
   &lt;li id="M201811020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Foundry's graphics software &lt;a
     
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
+    reports information to identify who is running 
it&lt;/a&gt;.</em></ins></span> The <span 
class="removed"><del><strong>Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera</strong></del></span> <span 
class="inserted"><ins><em>fact that this</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>used for repression of forbidden sharing
+    makes it</em></ins></span> even <span 
class="removed"><del><strong>when</strong></del></span> <span 
class="inserted"><ins><em>more vicious.&lt;/p&gt;
 
     &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it 
<span class="removed"><del><strong>to outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202102010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many cr&hellip;apps, developed by various
-    companies for various organizations, do &lt;a
-    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    companies for various organizations, do</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
     location tracking unknown to those companies and those
-    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
-    the tracking.&lt;/p&gt;
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that 
do</em></ins></span>
+    the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>tracking.&lt;/p&gt;
 
     &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
     proprietary software developers B1 &hellip; B50 into making platforms for
-    A to mistreat the end user.&lt;/p&gt;
+    A to mistreat</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>end user.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202003260"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202003260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    &lt;p&gt;The Apple iOS version</em></ins></span> of <span 
class="inserted"><ins><em>Zoom &lt;a
     
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
-    a Facebook account. According to the article, Zoom and Facebook
+    sending users'</em></ins></span> data to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the article, Zoom and Facebook
     don't even mention this surveillance on their privacy policy page,
     making this an obvious violation of people's privacy even in their
-    own terms.&lt;/p&gt;
+    own terms.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202003010"&gt;
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>id="M202003010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and &lt;a
+    estimates whether the user</em></ins></span> has <span 
class="removed"><del><strong>a built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>Covid-19</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
     tells the cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1291,46 +1805,69 @@
   &lt;li id="M201912220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
+    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to <span 
class="removed"><del><strong>do because</strong></del></span> <span 
class="inserted"><ins><em>be a &lt;a
     
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this, and that is a good
-    reason to use free software instead.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
-    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>government of</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could</em></ins></span> be <span 
class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>doing this, and</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>is a 
good
+    reason to use free</em></ins></span> software <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word 
&ldquo;free&rdquo;</em></ins></span> in
+    the <span class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span class="inserted"><ins><em>sense 
of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand to do this.  For the
-    employee, this is simply nonfree software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;
+    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt;</em></ins></span> if <span 
class="removed"><del><strong>no one connects to the car remotely, the cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>they 
install their own
+    software on</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>device.  Many 
employers demand</em></ins></span> to <span class="removed"><del><strong>track 
the car's movements all</strong></del></span> <span 
class="inserted"><ins><em>do this.  For</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span>
+    <span class="inserted"><ins><em>employee, this</em></ins></span> is <span 
class="removed"><del><strong>possible to physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201910130"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201910130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it &lt;a
-    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;, and the Android version was found to contain a
-    back-door allowing developers to run any code they wish in the users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at some workplaces.&lt;/p&gt;
+    the Great Nation&rdquo; app requires users to grant it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies,</strong></del></span> <span 
class="inserted"><ins><em>the phone's microphone, photos, text messages, 
contacts,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion of privacy,</strong></del></span>
+    <span class="inserted"><ins><em>internet 
history&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>Android version was found to contain a
+    back-door allowing developers to run any code they wish</em></ins></span> 
in the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>users'
+    phone, as &ldquo;superusers.&rdquo; Downloading</em></ins></span> and
+      <span class="removed"><del><strong>determine the car's 
location</strong></del></span> <span class="inserted"><ins><em>using this
+    app is mandatory</em></ins></span> at <span 
class="removed"><del><strong>any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;).</strong></del></span> <span 
class="inserted"><ins><em>some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;Note: The &lt;a
+    &lt;p&gt;Note:</em></ins></span> The <span 
class="removed"><del><strong>company says it doesn't
+      store this information,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
+    Washington Post version of the article&lt;/a&gt; (partly 
obfuscated,</em></ins></span> but <span 
class="removed"><del><strong>if</strong></del></span>
+    <span class="inserted"><ins><em>readable after copy-pasting in a text 
editor) includes a clarification
+    saying that</em></ins></span> the <span class="removed"><del><strong>state 
orders it to get</strong></del></span> <span class="inserted"><ins><em>tests 
were only performed on</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>Android version
+    of the app,</em></ins></span> and <span 
class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>that, according to Apple, &ldquo;this kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
@@ -1340,52 +1877,90 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Facebook app &lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order to use one of its
-    functionalities.&lt;/p&gt;
+    tracks users even when</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>is turned off&lt;/a&gt;, after tricking them
+    into giving</em></ins></span> the <span class="removed"><del><strong>state 
can store it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app broad permissions in order to use one of its
+    functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome</strong></del></span>
 
-  &lt;li id="M201909090"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Some nonfree period-tracking apps 
including MIA Fem and Maya &lt;a
     
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
+    send intimate details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Keeping track of who downloads a proprietary
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Keeping track of who downloads a 
proprietary
     program is a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded the list of all the 10,000 or more people
+    proprietary program for adjusting a certain telescopic rifle 
sight.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list</em></ins></span> of <span 
class="removed"><del><strong>data about</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With a free program there would not be a list of who has installed
-    it.&lt;/p&gt;
+    it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201907081"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
     bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
-    of the operating system, in order to gather as much private data as
+    of the operating system,</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</strong></del></span> <span 
class="inserted"><ins><em>order</em></ins></span> to <span 
class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You</strong></del></span> <span class="inserted"><ins><em>gather 
as much private data as
     they possibly can.&lt;/p&gt;
 
-    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;
+    &lt;p&gt;Thus, we</em></ins></span> can't <span 
class="removed"><del><strong>see out</strong></del></span> <span 
class="inserted"><ins><em>trust rules against spying.  What we can trust is
+    having control over</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>software we run.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    users' movements even when the user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
@@ -1395,12 +1970,12 @@
   &lt;li id="M201905300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app</em></ins></span> is <span 
class="removed"><del><strong>viewed</strong></del></span> <span 
class="inserted"><ins><em>secretly a &lt;a
     
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>them,</strong></del></span> <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
     programs.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1413,25 +1988,34 @@
     the event.&lt;/p&gt;
 
     &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
+    sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>not just broadcasts</strong></del></span> <span 
class="inserted"><ins><em>contact list,</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if</strong></del></span> 
<span class="inserted"><ins><em>has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring 
apps</em></ins></span> is <span class="removed"><del><strong>coming from the 
user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>TV reports 
what</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="removed"><del><strong>is. 
The existence of a way</strong></del></span> <span 
class="inserted"><ins><em>can easily be
+    traced back</em></ins></span> to
+    <span class="removed"><del><strong>disable</strong></del></span> the <span 
class="removed"><del><strong>surveillance,</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
 
     &lt;p&gt;This has harmful implications for women's rights to equal 
employment
     and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
-    spying on you is available from &lt;a
+    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>it were not hidden as it was in
+    these TVs,</strong></del></span> <span class="inserted"><ins><em>someone 
offers you a reward to do so. A
+    free-software app that</em></ins></span> does <span 
class="removed"><del><strong>not legitimize the surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More</strong></del></span> <span 
class="inserted"><ins><em>more</em></ins></span> or less <span 
class="removed"><del><strong>all &ldquo;smart&rdquo; TVs &lt;a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>the same thing without
+    spying</em></ins></span> on <span class="removed"><del><strong>their 
users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as</strong></del></span> <span 
class="inserted"><ins><em>you is available from &lt;a
     href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
     
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
@@ -1440,38 +2024,61 @@
   &lt;li id="M201904130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    &lt;p&gt;Google tracks the movements</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect 
this</strong></del></span> <span class="inserted"><ins><em>Android phones and 
iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
     saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in the phone</em></ins></span> has <span 
class="removed"><del><strong>got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> to 
<span class="removed"><del><strong>get users' formal
+      consent before collecting personal</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending
+    the location</em></ins></span> data <span class="removed"><del><strong>are 
totally inadequate.
+      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>huge number of &lt;a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
+    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>data, or pass it on to user-installed 
apps</em></ins></span> that <span class="removed"><del><strong>TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>have 
access</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span>
+    the <span class="removed"><del><strong>user watches 
&mdash;</strong></del></span> <span class="inserted"><ins><em>network 
but</em></ins></span> no <span 
class="removed"><del><strong>exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>direct 
access to the data. This results</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>massive
+    surveillance</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found</em></ins></span> 
that <span class="removed"><del><strong>advertisers</strong></del></span> <span 
class="inserted"><ins><em>19 of them &lt;a
     
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    send sensitive personal data to third parties&lt;/a&gt;, 
which</em></ins></span> can <span class="removed"><del><strong>track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>possible to turn this off, but 
having</strong></del></span> <span 
class="inserted"><ins><em>sought,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>buried in
+    lengthy terms of service that are difficult</em></ins></span> to
+      <span class="removed"><del><strong>the 600 millions social media 
profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
     &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1479,42 +2086,53 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
+    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
+    way</em></ins></span> and <span class="removed"><del><strong>TV 
advertisements play inaudible sounds</strong></del></span> <span 
class="inserted"><ins><em>released them, apparently not realizing that all the 
personal
+    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by proprietary malware running on other devices in
+      range so</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> as <span 
class="removed"><del><strong>to determine</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
+
+    &lt;p&gt;It shows</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
+      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>no 
one</em></ins></span> can
+      <span class="removed"><del><strong>correlate ads with Web activity, 
and</strong></del></span> <span class="inserted"><ins><em>trust a nonfree 
program, not even the
+    developers of</em></ins></span> other <span 
class="removed"><del><strong>&lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
 
-  &lt;li id="M201902140"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
     Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
     18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
+    Google's policies. But</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
+    that the policies of</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
     preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
+    their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201902060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
     recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1747,7 +2365,7 @@
   &lt;li id="M201705040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study found 234 Android apps</em></ins></span> that <span 
class="removed"><del><strong>90%</strong></del></span> <span 
class="inserted"><ins><em>track users by &lt;a
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
@@ -1756,10 +2374,9 @@
   &lt;li id="M201704260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Faceapp appears to do lots</em></ins></span> of <span 
class="inserted"><ins><em>surveillance, judging by &lt;a
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
-  proprietary</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
@@ -1781,8 +2398,7 @@
   &lt;li id="M201704074"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Pairs of</em></ins></span> Android apps <span 
class="removed"><del><strong>contained recognizable tracking libraries. For 
-  the paid</strong></del></span> <span class="inserted"><ins><em>can collude
+    &lt;p&gt;Pairs of Android apps can collude
     to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
@@ -1793,14 +2409,14 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in</em></ins></span> proprietary <span 
class="removed"><del><strong>apps,</strong></del></span> <span 
class="inserted"><ins><em>search app that</em></ins></span> it <span 
class="removed"><del><strong>was</strong></del></span> <span 
class="inserted"><ins><em>will&lt;/a&gt; pre-install
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
     on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
     &lt;p&gt;Currently, the app is &lt;a
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on</em></ins></span> only <span 
class="removed"><del><strong>60%.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>one phone&lt;/a&gt;, and the user must
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
@@ -1816,48 +2432,29 @@
 
   &lt;li id="M201611280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>article confusingly 
describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are not in fact</strong></del></span> <span 
class="inserted"><ins><em>Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Uber app tracks &lt;a
+    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo;</em></ins></span> for <span 
class="removed"><del><strong>that word</strong></del></span> <span 
class="inserted"><ins><em>surveillance</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>inadequate as a protection against
-    massive surveillance.&lt;/p&gt;</em></ins></span>
+    consent&rdquo; for surveillance is inadequate as a protection against
+    massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
+  &lt;li id="M201611160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234</strong></del></span> <span 
class="inserted"><ins><em>investigated the privacy and security of
-    283</em></ins></span> Android <span 
class="inserted"><ins><em>VPN</em></ins></span> apps <span 
class="inserted"><ins><em>concluded</em></ins></span> that <span 
class="removed"><del><strong>track users</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;in spite of the promises
-    for privacy, security, and anonymity given</em></ins></span> by
-       <span class="removed"><del><strong>&lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
 <span class="inserted"><ins><em>the majority of VPN
-    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>ultrasound from beacons placed in stores or 
played</strong></del></span> <span class="inserted"><ins><em>poor security
-    guarantees and abusive practices inflicted</em></ins></span> by <span 
class="removed"><del><strong>TV programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
+    &lt;p&gt;A &lt;a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
+    apps&mdash;millions of users may be unawarely subject to poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>VPN 
apps.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research 
paper,</em></ins></span>
-    of <span class="removed"><del><strong>Android</strong></del></span> <span 
class="inserted"><ins><em>some proprietary VPN</em></ins></span> apps <span 
class="removed"><del><strong>can collude</strong></del></span> <span 
class="inserted"><ins><em>that track users and infringe their
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
@@ -1867,13 +2464,11 @@
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full 
access</em></ins></span> to <span 
class="removed"><del><strong>transmit</strong></del></span> users' <span 
class="removed"><del><strong>personal
-       data</strong></del></span>
-      <span class="inserted"><ins><em>text messages.&lt;/dd&gt;
+      permissions upon installation, meaning it has full access to users'
+      text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="removed"><del><strong>servers. 
&lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens</strong></del></span> <span class="inserted"><ins><em>read logs
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
       for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
@@ -1883,22 +2478,19 @@
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>the JS injection is to display ads. Uses
+      users. The stated purpose of the JS injection is to display ads. Uses
       roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>this app have confirmed</em></ins></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-      <span class="inserted"><ins><em>the non-premium version of the app does 
JavaScript injection for
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
       tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;</em></ins></span>
+    &lt;/dl&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+  &lt;li id="M201609210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google's new voice messaging app &lt;a
@@ -1909,41 +2501,19 @@
   &lt;li id="M201606050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook's new Magic Photo</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    &lt;p&gt;Facebook's new Magic Photo app &lt;a
+    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you circulate</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>picture you take 
according to who</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span>
-    <span class="inserted"><ins><em>in the frame.&lt;/p&gt;
+    and suggests you circulate the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
-    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>require 
online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and Conditions&rdquo; that spell out
-what they</strong></del></span> <span 
class="inserted"><ins><em>pictures</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>likely to be
-    sent across</em></ins></span> the <span 
class="removed"><del><strong>information it collects on users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>wire</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's 
servers</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in the first
-place!&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which means the pictures are likely to be
+    sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the</strong></del></span> <span 
class="inserted"><ins><em>Facebook</em></ins></span> users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even</strong></del></span> <span 
class="inserted"><ins><em>pictures are private anymore,
-    even</em></ins></span> if <span class="removed"><del><strong>you disable 
Google Maps and location tracking, you must
-    disable Google Play itself to completely stop</strong></del></span> the 
<span class="removed"><del><strong>tracking.  This is
-    yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; 
them</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a thing 
would</strong></del></span> <span class="inserted"><ins><em>service.&lt;/p&gt;
+    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
@@ -1952,39 +2522,33 @@
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may</em></ins></span> be <span class="removed"><del><strong>almost
-    unthinkable</strong></del></span> <span 
class="inserted"><ins><em>analyzing people's conversations to serve 
them</em></ins></span> with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>targeted
-    advertisements.&lt;/p&gt;</em></ins></span>
+    it may be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
+  &lt;li id="M201604250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="inserted"><ins><em>data in</em></ins></span> the <span 
class="removed"><del><strong>most popular Android apps</strong></del></span> 
<span class="inserted"><ins><em>phone, and in server accounts,
+    spy on many sorts of data in the phone, and in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apps that include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio</em></ins></span> and 
<span class="removed"><del><strong>location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>TV programs
-    are playing nearby&lt;/a&gt;.  Also on what</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>post 
on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Apps that include &lt;a
+    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio and TV programs
+    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+  &lt;li id="M201511190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Cryptic</em></ins></span> communication,&rdquo;
+    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
     unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
     found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
@@ -1998,55 +2562,41 @@
     analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
+  &lt;li id="M201510300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, 
for</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100</strong></del></span> <span class="inserted"><ins><em>and 
iOS
-    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over
-    personal, behavioral</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>location information&lt;/a&gt; of their users to
-    third parties.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
+    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;hand 
over
+    personal, behavioral and location information&lt;/a&gt; of their users to
+    third parties.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+  &lt;li id="M201508210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span class="removed"><del><strong>present 
in</strong></del></span>
-    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it &lt;a
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
+    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, 
and</em></ins></span> some <span class="removed"><del><strong>Android devices 
when they</strong></del></span> are <span class="removed"><del><strong>sold.
-      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>starting</em></ins></span>
-    to <span class="inserted"><ins><em>realize that it is nasty.&lt;/p&gt;
-
-    &lt;p&gt;This article shows the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
+    to realize that it is nasty.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether they want that. This 
is</em></ins></span> a
-      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>typical example of the attitude of the 
proprietary software industry
+    &lt;p&gt;This article shows the &lt;a
+    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
+    typical example of the attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
+  &lt;li id="M201506264"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study in 2015&lt;/a&gt; found that 90% of</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top-ranked gratis proprietary
+    A study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis 
proprietary
     Android apps contained recognizable tracking libraries. For the paid
     proprietary apps, it was only 60%.&lt;/p&gt;
 
@@ -2054,88 +2604,29 @@
     &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnMobiles</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+  &lt;li id="M201505060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>100 &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs,</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection</strong></del></span> 
<span class="inserted"><ins><em>the average.&lt;/p&gt;
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Widely used &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the user&lt;/a&gt;. This is</em></ins></span> in 
<span class="removed"><del><strong>iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>addition</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span>
-    the <span class="removed"><del><strong>phone is</strong></del></span> 
snooping <span class="removed"><del><strong>on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every</strong></del></span> <span 
class="inserted"><ins><em>done by the</em></ins></span> phone <span 
class="removed"><del><strong>number that</strong></del></span> <span 
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>OS 
in</em></ins></span>
-    the <span class="removed"><del><strong>server records these numbers for at 
least 30
-        days.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>phone.&lt;/p&gt;
-
-    &lt;p&gt;Don't be distracted by</em></ins></span> the <span 
class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>question</em></ins></span> of <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of 
their</strong></del></span> <span class="inserted"><ins><em>app developers
-    get</em></ins></span> users <span class="removed"><del><strong>with third 
parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up</strong></del></span> to <span 
class="removed"><del><strong>date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
+    the phone.&lt;/p&gt;
 
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>say &ldquo;I 
agree&rdquo;. That</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>no excuse for
+    &lt;p&gt;Don't be distracted by the question of whether the app developers
+    get users to say &ldquo;I agree&rdquo;. That is no excuse for
     malware.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2143,84 +2634,41 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>user 
has installed.  &lt;a
-    
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</em></ins></span>
-    is <span class="inserted"><ins><em>doing this in</em></ins></span> a way 
<span class="removed"><del><strong>to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts</strong></del></span> <span class="inserted"><ins><em>that at least is 
visible and optional&lt;/a&gt;. Not
-    as bad</em></ins></span> as <span class="inserted"><ins><em>what the 
others do.&lt;/p&gt;
+    report which other apps the user has installed.  &lt;a
+    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
+    as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Simeji keyboard is</em></ins></span> a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
+    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
+    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is</em></ins></span> 
to <span class="removed"><del><strong>get at them, but NSA can access 
any</strong></del></span> <span class="inserted"><ins><em>restrict the
-    use</em></ins></span> of <span class="removed"><del><strong>them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> <span 
class="inserted"><ins><em>data on</em></ins></span> the <span 
class="inserted"><ins><em>user's computer, but it does surveillance 
too:</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
-      and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to</em></ins></span> get <span class="inserted"><ins><em>the 
user's list of</em></ins></span> other <span class="removed"><del><strong>info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people's 
phone
-    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
+    use of data on the user's computer, but it does surveillance too: &lt;a
+    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries to get the user's list of other people's phone
+    numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
+  &lt;li id="M201312060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but</strong></del></span> <span 
class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The FTC criticized this app because</em></ins></span> it
-      <span class="removed"><del><strong>is still true in iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>asked</em></ins></span> the <span 
class="inserted"><ins><em>user to
-    approve sending personal</em></ins></span> data <span 
class="removed"><del><strong>in an iThing,
-      or</strong></del></span> <span class="inserted"><ins><em>to the app 
developer but did not ask
-    about sending</em></ins></span> it <span class="removed"><del><strong>is 
totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> to 
<span class="removed"><del><strong>exist for no
-      possible purpose</strong></del></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>companies.  This shows 
the weakness of</em></ins></span>
-    the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
+    &lt;p&gt;The Brightest Flashlight app &lt;a
+    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The FTC criticized this app because it asked the user to
+    approve sending personal data to the app developer but did not ask
+    about sending it to other companies.  This shows the weakness of
+    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
@@ -2228,31 +2676,27 @@
   &lt;li id="M201212100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
+    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype refuses</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>say whether it can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
+    &lt;p&gt;Skype refuses to say whether it can &lt;a
+    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That almost certainly means it</em></ins></span> can <span 
class="removed"><del><strong>take over 
smartphones&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>do 
so.&lt;/p&gt;
+    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307110"&gt;
@@ -2277,26 +2721,25 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft is imposing its
-    surveillance on the game of Minecraft</em></ins></span> by <span 
class="removed"><del><strong>sending hidden text messages</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    surveillance on the game of Minecraft by &lt;a
     
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
     every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought the game and will merge all accounts into its 
network,</em></ins></span>
-    which <span class="removed"><del><strong>enable</strong></del></span> 
<span class="inserted"><ins><em>will give</em></ins></span> them <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>people's data.&lt;/p&gt;
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
 
     &lt;p&gt;Minecraft players &lt;a
     href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
     instead. The essential advantage of Minetest is that it is free
-    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>phones
-      on</strong></del></span> <span class="inserted"><ins><em>user's computer 
freedom. As a bonus,
+    software, meaning it respects the user's computer freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes</em></ins></span> and <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>had &lt;a
+    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
     
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers</em></ins></span> listen to the <span 
class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
+    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
@@ -2308,9 +2751,7 @@
     &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks</em></ins></span> data <span class="removed"><del><strong>from the
-      GPS, take photographs, read text messages, read call, 
location</strong></del></span> <span class="inserted"><ins><em>on users' 
computers</em></ins></span> and <span class="removed"><del><strong>web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sends it to third parties&lt;/a&gt;.&lt;/p&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
@@ -2336,68 +2777,54 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>report to</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span>
-    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
-
-    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>designed to
-      disguise itself from investigation.&lt;/p&gt;
-  &lt;/li&gt;
+    video game consoles snoop on their users and report to the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Samsung phones come</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a 
computer</em></ins></span> with
-    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
+    &lt;p&gt;A game console is a computer, and you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their</em></ins></span> users <span 
class="removed"><del><strong>can't delete&lt;/a&gt;,</strong></del></span> and 
<span class="inserted"><ins><em>their users'
+    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>send so much data</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks</em></ins></span> that 
<span class="removed"><del><strong>their transmission is</strong></del></span> 
<span class="inserted"><ins><em>merge the data
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend</em></ins></span> a
-      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span class="inserted"><ins><em>lot of money. 
They also
-    use a back door to manipulate the game play</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
-      requested by</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
-
-    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
+    &lt;p&gt;While the article describes gratis games, games that cost money
     can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies</em></ins></span> for <span class="removed"><del><strong>voice 
all</strong></del></span> <span class="inserted"><ins><em>companies, 
and</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>NSA takes advantage
+    &lt;p&gt;Angry Birds &lt;a
+    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies, and the NSA takes advantage
     to spy through it too&lt;/a&gt;.  Here's information on &lt;a
     
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
+  &lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Blizzard Warden is</em></ins></span> a <span 
class="removed"><del><strong>paywall)
-      reports</strong></del></span> <span class="inserted"><ins><em>hidden
-    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    &lt;p&gt;Blizzard Warden is a hidden
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
     spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
@@ -2422,53 +2849,33 @@
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
     designed to snoop on users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design of</em></ins></span> the <span class="removed"><del><strong>FBI can 
remotely activate</strong></del></span> <span class="inserted"><ins><em>program 
running on some of these devices &lt;a
-    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes</em></ins></span>
-    the <span class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and 
<span class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>exploited by crackers as
+    design of the program running on some of these devices &lt;a
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    the user susceptible to be snooped and exploited by crackers as
     well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The bad security</em></ins></span> in <span 
class="removed"><del><strong>Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop</em></ins></span> on
-      <span class="removed"><del><strong>remote command and users cannot stop 
them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be a sucker&mdash;reject</em></ins></span> all <span 
class="removed"><del><strong>new portable phones
-      to have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>the 
stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>to restrict</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too:</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries to get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me and
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
@@ -2482,7 +2889,7 @@
     href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's now very
     hard to find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> appears <span class="inserted"><ins><em>that 
those manufacturers business model is not to produce
+    &lt;p&gt;It appears that those manufacturers business model is not to 
produce
     TV and sell them for money, but to collect your personal data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
@@ -2490,78 +2897,50 @@
   &lt;li id="M202006250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers are able</em></ins></span> to <span 
class="removed"><del><strong>do lots of surveillance, judging 
by</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of what the user is watching&lt;/a&gt;. This is illegal 
due</em></ins></span> to <span class="removed"><del><strong>personal data 
in</strong></del></span>
-    the <span class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Video Privacy Protection Act of 1988, but they're 
circumventing
-    it through EULAs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
+  &lt;li id="M201901070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give 
Verizon</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>same
-   information about</strong></del></span> <span class="inserted"><ins><em>TV 
sees,&rdquo;&lt;/a&gt; in</em></ins></span> the <span 
class="removed"><del><strong>users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>own words of</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>company's
-    CTO, and this data</em></ins></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>the
-    user must explicitly</strong></del></span> <span 
class="inserted"><ins><em>slightly
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
+    CTO, and this data is sold to third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
     &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is</em></ins></span> opt-in <span 
class="removed"><del><strong>before</strong></del></span> <span 
class="inserted"><ins><em>in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>app takes effect. 
However,</strong></del></span> <span class="inserted"><ins><em>Vizio software is
-    nonfree, we don't know what is actually happening behind</em></ins></span> 
the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>scenes,
+    is that it is opt-in in newer models. But since the Vizio software is
+    nonfree, we don't know what is actually happening behind the scenes,
     and there is no guarantee that all future updates will leave the
     settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter), the easiest way to make sure it isn't spying on 
you</em></ins></span> is
-    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data</strong></del></span>
-    to <span class="inserted"><ins><em>disconnect it from the Internet, and 
use</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> <span class="inserted"><ins><em>terrestrial 
antenna
-    instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>only</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,
+    matter), the easiest way to make sure it isn't spying on you is
+    to disconnect it from the Internet, and use a terrestrial antenna
+    instead. Unfortunately, this is not always possible. Another option,
     if you are technically oriented, is to get your own router (which can
     be an old computer running completely free software), and set up a
     firewall to block connections to Vizio's servers. Or, as a last resort,
-    you</em></ins></span> can <span class="inserted"><ins><em>replace your TV 
with another model.&lt;/p&gt;
+    you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>article for the 
facts</em></ins></span> it <span class="removed"><del><strong>can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span> <span 
class="inserted"><ins><em>presents. It
+    &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix</em></ins></span> 
app <span class="removed"><del><strong>tracks</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2570,129 +2949,75 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them,</em></ins></span> and <span 
class="removed"><del><strong>after</strong></del></span> <span 
class="inserted"><ins><em>not just broadcasts and
-    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>image is 
coming from</em></ins></span> the user's <span 
class="removed"><del><strong>consent&rdquo;
-        for surveillance is inadequate as</strong></del></span> <span 
class="inserted"><ins><em>own computer,
-    the TV reports what it is. The existence of</em></ins></span> a <span 
class="removed"><del><strong>protection against massive</strong></del></span> 
<span class="inserted"><ins><em>way to disable the
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
     surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the</em></ins></span> surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
+    does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
+  &lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some web</em></ins></span> and TV <span 
class="removed"><del><strong>programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>advertisements play 
inaudible
-    sounds to be picked up by proprietary malware running</em></ins></span>
-    on <span class="removed"><del><strong>various sites 
-      such</strong></del></span> <span class="inserted"><ins><em>other devices 
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook, 
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that 
they
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to be picked up by proprietary malware running
+    on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web 
activity,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other &lt;a
+    your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
+  &lt;li id="M201511060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze</em></ins></span> your <span 
class="removed"><del><strong>mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>viewing 
habits in detail</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the 
picture</strong></del></span>
-    <span class="inserted"><ins><em>link them your IP address&lt;/a&gt; so 
that advertisers can track</em></ins></span> you <span 
class="removed"><del><strong>take according to who</strong></del></span>
-    <span class="inserted"><ins><em>across devices.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in the 
frame.&lt;/p&gt;
+    manufacturers in spying on their users: their &lt;a
+    
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers can track you
+    across devices.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures are 
likely</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>be
-      sent across the wire</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    &lt;p&gt;It is possible to turn this off, but having it enabled by default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
-    to <span class="removed"><del><strong>Facebook's servers and 
face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>600 millions social 
media profiles</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>company
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing 
all</em></ins></span>
-    users <span class="removed"><del><strong>submit</strong></del></span> to 
<span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>new 
combined surveillance by default.&lt;/p&gt;
+    information with online social media participation, Tivo can now &lt;a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people</em></ins></span> are <span 
class="removed"><del><strong>starting to realize that</strong></del></span> 
<span class="inserted"><ins><em>watching&lt;/a&gt;, even if</em></ins></span> 
it <span class="removed"><del><strong>is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>isn't</em></ins></span> a <span 
class="removed"><del><strong>typical example of
-      the attitude of the proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps the user has
-    installed.</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
+  &lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span> 
what <span class="removed"><del><strong>the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they wanted 
to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
+  &lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
-    used <span class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps</strong></del></span> <span 
class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to make its 
TVs</em></ins></span> snoop on <span class="inserted"><ins><em>what
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2702,51 +3027,41 @@
     &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
     transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> 
<span class="inserted"><ins><em>US or some
+    Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>in addition</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span> to
-      <span class="removed"><del><strong>the snooping</strong></del></span> 
<span class="inserted"><ins><em>be trusted unless it is</em></ins></span> done 
by <span class="removed"><del><strong>the phone company, and perhaps by the 
OS</strong></del></span> <span class="inserted"><ins><em>free
-    software</em></ins></span> in <span class="removed"><del><strong>the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>your own computer.&lt;/p&gt;
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of whether the app 
developers get
-      users</strong></del></span> <span 
class="inserted"><ins><em>transmitted</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. 
That</strong></del></span> <span class="inserted"><ins><em>third
+    data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
+  &lt;li id="M201409290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>FTC 
criticized</strong></del></span> <span class="inserted"><ins><em>report was as 
of 2014, but we don't expect</em></ins></span> this <span 
class="removed"><del><strong>app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>has got
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</em></ins></span> to
-      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>get users' formal
-    consent before collecting</em></ins></span> personal data <span 
class="inserted"><ins><em>are totally inadequate.
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+    consent before collecting personal data are totally inadequate.
     And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>app developer but did</strong></del></span> <span 
class="inserted"><ins><em>TV will</em></ins></span> not
-      <span class="removed"><del><strong>ask about 
sending</strong></del></span>
-    <span class="inserted"><ins><em>work.&rdquo;&lt;/p&gt;
+    say, &ldquo;Without your consent to tracking, the TV will not
+    work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
     user watches&mdash;no exceptions!&lt;/p&gt;
@@ -2765,14 +3080,12 @@
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This shows the
-      weakness</strong></del></span> <span class="inserted"><ins><em>stop 
this, but any
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212170"&gt;
@@ -2780,31 +3093,24 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>break security on</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; TV&lt;/a&gt;
-    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about 
them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
@@ -2813,36 +3119,29 @@
     &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
     at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
+  &lt;li id="M201810300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy of everything they
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>look at what's in the videos. That's not
+    manufacturers promise not to look at what's in the videos. That's not
     security for your home. Security means making sure they don't get to
-    see</em></ins></span> through <span class="removed"><del><strong>it 
too&lt;/a&gt;.
-      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>your camera.&lt;/p&gt;
+    see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2854,34 +3153,25 @@
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;</em></ins></span>
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>toys with</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
-      enable crackers</strong></del></span>
-    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech, and even speak</strong></del></span> <span 
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
-    into <span class="inserted"><ins><em>one.&lt;/p&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert it
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
@@ -2889,14 +3179,12 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
+  &lt;li id="M201703140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
@@ -2926,19 +3214,17 @@
     customers.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+  &lt;li id="M201702280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo;</em></ins></span> toys with microphones 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and <span class="removed"><del><strong>the 
FBI could listen to these conversations</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen to these
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2977,130 +3263,64 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;While you're using a DJI drone
     to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M202009270"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many employers are using nonfree
-    software, including videoconference software, to &lt;a
-    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
-    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
-    whether you are &ldquo;active,&rdquo; that is in effect a malicious
-    surveillance feature.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202008030"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Nest &lt;a
-    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
-    is taking over ADT&lt;/a&gt;. Google sent out a software
-    update to its speaker devices using their back door &lt;a
-    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
-    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
-    that an alarm is happening. This means the devices now listen for more
-    than just their wake words. Google says the software update was sent
-    out prematurely and on accident and Google</em></ins></span> was <span 
class="removed"><del><strong>unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span> <span 
class="inserted"><ins><em>planning</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>disclosing
-    this new feature</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>offering it</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>customers who 
pay for it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202006300"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;&ldquo;Bossware&rdquo; is malware 
that bosses</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
-    coerce workers into installing in their own computers&lt;/a&gt;, so the
-    bosses can spy</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note that</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
-
-    &lt;p&gt;This shows why requiring</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>user's &ldquo;consent&rdquo;</em></ins></span> 
is not <span class="removed"><del><strong>really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span class="inserted"><ins><em>an adequate basis for protecting digital 
privacy.  The boss can coerce
-    most workers into consenting</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it</strong></del></span> <span 
class="inserted"><ins><em>almost anything, even probable exposure
-    to contagious disease that</em></ins></span> can <span 
class="removed"><del><strong>collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>be fatal.  
Software like</em></ins></span> this <span class="removed"><del><strong>way, 
because they pass</strong></del></span> <span class="inserted"><ins><em>should
-    be illegal and bosses that demand</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>should be prosecuted for 
it.&lt;/p&gt;</em></ins></span>
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202009270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many employers are using nonfree
+    software, including videoconference software, to &lt;a
+    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
+    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
+    surveillance feature.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202008030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Nest &lt;a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    is taking over ADT&lt;/a&gt;. Google sent out a software
+    update to its speaker devices using their back door &lt;a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
+    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
+    that an alarm is happening. This means the devices now listen for more
+    than just their wake words. Google says the software update was sent
+    out prematurely and on accident and Google was planning on disclosing
+    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on them.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201911190"&gt;
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contagious disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201911190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Internet-tethered Amazon Ring had
-    a security vulnerability that enabled attackers to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
     access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
@@ -3108,234 +3328,101 @@
     out any significant surveillance if the devices implemented proper
     security, including encryption. But many devices with proprietary
     software lack this. Of course, they are also used by their
-    manufacturers</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
+    manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907210"&gt;
+  &lt;li id="M201907210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Google &ldquo;Assistant&rdquo; 
records users' conversations</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even</em></ins></span>
-    when <span class="removed"><del><strong>the &ldquo;owner&rdquo; 
switches</strong></del></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>not supposed to listen&lt;/a&gt;. Thus, when one of 
Google's
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
     subcontractors discloses a thousand confidential voice recordings,
     users were easily identified from these recordings.&lt;/p&gt;
 
     &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
-    way to see or control what</em></ins></span> it <span 
class="inserted"><ins><em>records or sends.&lt;/p&gt;
-
-    &lt;p&gt;Rather than trying</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>better 
control</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>use of recordings, Google
-    should not record or listen to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>person's 
voice.  It should only
-    get commands that</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span> <span 
class="inserted"><ins><em>user wants</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    way to see or control what it records or sends.&lt;/p&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>some Google service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201905061"&gt;
+  &lt;li id="M201905061"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Alexa collects</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>lot more information from users
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
     than is necessary for correct functioning (time, location,
-    recordings made without a legitimate prompt),</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sends
-    it</em></ins></span> to <span class="removed"><del><strong>do because the 
system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
     even if users request deletion of their data from Amazon's servers, &lt;a
-    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>modem.  However, even if it asked 
for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>data remain on other servers&lt;/a&gt;, where they 
can</em></ins></span> be <span class="removed"><del><strong>confident that 
Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>accessed by
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
     advertising companies and government agencies. In other words,
-    deleting</em></ins></span> the <span class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>collected information doesn't 
cancel</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>wrong of
+    deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>Nest 
thermostat,</em></ins></span> the <span class="removed"><del><strong>phone 
company to track</strong></del></span> <span class="inserted"><ins><em>Philips
-    Hue-connected lights,</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span> 
the <span class="removed"><del><strong>time; it is possible to physically 
remove</strong></del></span> <span class="inserted"><ins><em>Sonos
-    speakers are likewise stored longer than necessary on</em></ins></span> 
the <span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is</strong></del></span> <span class="inserted"><ins><em>servers
-    the devices are tethered to. Moreover, they are</em></ins></span> made 
available to <span class="removed"><del><strong>car manufacturers, insurance 
companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really</strong></del></span>
-    <span class="inserted"><ins><em>Alexa. As</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>result, Amazon has a very precise 
picture</em></ins></span> of <span class="removed"><del><strong>privacy, and 
should be replaced with anonymous
-      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>users' life
-    at home, not only in the present,</em></ins></span> but <span 
class="inserted"><ins><em>in</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>past (and, who knows,</em></ins></span>
-    in the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>Apple
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service staff 
even has access to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
-    location</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>other personal data&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>client program is nonfree, and data processing is done
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>get the data
-      and hand it over,</strong></del></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>recordings 
unless human eavesdroppers &lt;a
+    to know what happens to the recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtHome</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
+  &lt;li id="M201902080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS:</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The HP &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to</em></ins></span> make sure 
<span class="removed"><del><strong>to place new items on top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about</strong></del></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers</strong></del></span> <span 
class="inserted"><ins><em>user is still
-    paying for the subscription, and hasn't printed more pages 
than</em></ins></span> were <span class="removed"><del><strong>programmed to 
spy</strong></del></span>
-    <span class="inserted"><ins><em>paid for.&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>their renters&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
-    restrictions</em></ins></span> in <span class="removed"><del><strong>TV 
Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
-    and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>was
-before</strong></del></span> <span class="inserted"><ins><em>country,
-    do you think</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>would have the moral fiber to say no?&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
     &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3344,9 +3431,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush</em></ins></span> that <span 
class="removed"><del><strong>is viewed</strong></del></span> <span 
class="inserted"><ins><em>snoops</em></ins></span> on <span 
class="removed"><del><strong>them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
@@ -3354,34 +3440,20 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in</em></ins></span> the <span 
class="removed"><del><strong>user's own
-    computer,</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>TV reports what it 
is. The existence</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Today's technological practice does not include any 
way</em></ins></span> of <span 
class="inserted"><ins><em>making</em></ins></span>
-    a <span class="removed"><del><strong>way to
-    disable the surveillance, even</strong></del></span> <span 
class="inserted"><ins><em>device that can obey your voice commands without 
potentially spying
-    on you.  Even</em></ins></span> if it <span 
class="removed"><del><strong>were not hidden as</strong></del></span> <span 
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span 
class="removed"><del><strong>was in
-    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Today's technological practice does not include any way of making
+    a device that can obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+  &lt;li id="M201407170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot</em></ins></span> of <span class="removed"><del><strong>2014, but we don't 
expect this has got better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal</strong></del></span>
-    data <span class="removed"><del><strong>are totally inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> the <span 
class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
@@ -3389,7 +3461,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>tracking, the TV</strong></del></span> <span 
class="inserted"><ins><em>spy on their renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3407,15 +3479,10 @@
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> will
-      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>teach the 
sheeple</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>find it normal that companies
-    monitor every aspect of</em></ins></span> what
-      <span class="removed"><del><strong>the user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
@@ -3426,19 +3493,13 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>lot of security flaws. They</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    privacy. In addition, they have a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>child and spoof 
messages to and from the watch, possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -3448,15 +3509,13 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+  &lt;li id="M201407090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
@@ -3484,7 +3543,7 @@
     &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
     disconnect its cellular antenna and its GPS antenna.  If you want
     GPS navigation, get a separate navigator which runs free software
-    and works</em></ins></span> with <span class="removed"><del><strong>Viacom 
adds 2.3 million households</strong></del></span> <span 
class="inserted"><ins><em>Open Street Map.&lt;/p&gt;
+    and works with Open Street Map.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912171"&gt;
@@ -3492,23 +3551,19 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Most modern cars now &lt;a
     
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
-    the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>user, access to the data is nearly impossible, 
as it involves
-    cracking the car's computer, which is always hidden and 
running</em></ins></span> with <span class="removed"><del><strong>online
-      social media participation, Tivo can now</strong></del></span>
-    <span class="inserted"><ins><em>proprietary software.&lt;/p&gt;
+    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data, and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard the driver's personal data 
goes</em></ins></span> with <span class="removed"><del><strong>online 
purchases&lt;/a&gt;, exposing all users</strong></del></span>
-    <span class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
+    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to a junkyard the driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902011"&gt;
@@ -3516,193 +3571,136 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car 
network&lt;/a&gt;. It is constantly
-    connected</em></ins></span> to <span class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>the 
cellular phone network and sends Ford a lot of data,
+    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
+    connected to the cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
     key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
-    connectivity</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the 
cellular modem, or wrapping the
-    antenna</em></ins></span> in
-      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>aluminum foil?&lt;/p&gt;
+    connectivity by disconnecting the cellular modem, or wrapping the
+    antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
+    forward it to the government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+  &lt;li id="M201810230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
-      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
-    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
-    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
-
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
-    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
-    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
-
-      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
-      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
-
-    &lt;p&gt;But if you really want</em></ins></span> to
-      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn 
this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>car's
-    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>the
-      transmission reports a 404 error really means nothing; the server
-      could save</strong></del></span> <span class="inserted"><ins><em>data, 
or</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on the user's local network.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-      &lt;p&gt;LG later said it had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>the software
-    is free so we know it won't collect</em></ins></span> any <span 
class="removed"><del><strong>product
-      could spy this way.&lt;/p&gt;
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
+  &lt;li id="M201711230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareAtPlay</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
+  &lt;li id="M201607160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Users</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p id="car-spying"&gt;Computerized cars 
with nonfree software</em></ins></span> are <span 
class="removed"><del><strong>suing Bose for</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app for</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
-Specifically,</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
+    access its computers remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>system has no authentication
-    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if it asked
+    &lt;p&gt;That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if it asked
     for authentication, you couldn't be confident that Nissan
-    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>car is 
proprietary, &lt;a
+    has no access.  The software in the car is proprietary, &lt;a
     href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>along with</strong></del></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
-&lt;/p&gt;
-
-&lt;p&gt;The suit accuses that this was done without</strong></del></span> 
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
-    enables</em></ins></span> the <span class="removed"><del><strong>fine 
print of</strong></del></span> <span class="inserted"><ins><em>phone company to 
track</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>car's 
movements all the time;</em></ins></span>
-    it <span class="removed"><del><strong>acceptable? No way! It should be 
flat out
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>physically remove</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cell phone 
modem, though.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+    enables the phone company to track the car's movements all the time;
+    it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
-      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+  &lt;li id="M201306140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tesla cars allow the company to extract
     data remotely and determine the car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
-    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says it doesn't store this
-    information, but if the state orders it</em></ins></span> to <span 
class="inserted"><ins><em>get</em></ins></span> the 
-      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
-
-      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> and <span 
class="removed"><del><strong>you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state can store it.&lt;/p&gt;</em></ins></span>
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> <span 
class="inserted"><ins><em>c of</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>and would then have to
+      give</strong></del></span> <span class="inserted"><ins><em>doesn't store 
this
+    information, but if the state orders</em></ins></span> it to <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>US or some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not to be trusted 
unless</strong></del></span> <span class="inserted"><ins><em>data and 
hand</em></ins></span> it <span class="removed"><del><strong>is done
+    by free</strong></del></span>
+    <span class="inserted"><ins><em>over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201303250"&gt;
+  &lt;li id="M201303250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="records-drivers"&gt;Proprietary software in 
cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of data</strong></del></span>
+    &lt;p id="records-drivers"&gt;Proprietary</em></ins></span> software in 
<span class="removed"><del><strong>your own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
+      that</strong></del></span> <span 
class="inserted"><ins><em>cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+      data containing sensitive</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information</em></ins></span> about <span 
class="removed"><del><strong>their users</strong></del></span> <span 
class="inserted"><ins><em>drivers' movements&lt;/a&gt;, which is made
-    available to car manufacturers, insurance companies,</em></ins></span> and 
<span class="removed"><del><strong>their users' 
-      friends</strong></del></span> <span 
class="inserted"><ins><em>others.&lt;/p&gt;
-
-    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
-    is not really a matter of proprietary surveillance. These systems
-    are an intolerable invasion of privacy,</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced 
with
-    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>data
-      collected</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done</em></ins></span> by <span class="removed"><del><strong>various 
cr&hellip;apps and sites made</strong></del></span> <span 
class="inserted"><ins><em>malware. The
-    other cases mentioned are done</em></ins></span> by <span 
class="removed"><del><strong>different 
-      companies.&lt;/p&gt;
+    records</em></ins></span> information <span 
class="removed"><del><strong>will be transmitted</strong></del></span> <span 
class="inserted"><ins><em>about drivers' movements&lt;/a&gt;, which is made
+    available</em></ins></span> to
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span> <span class="inserted"><ins><em>car 
manufacturers, insurance companies,</em></ins></span> and
+      <span class="removed"><del><strong>the switch to 
turn</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
+
+    &lt;p&gt;The case of toll-collection systems, mentioned 
in</em></ins></span> this <span class="removed"><del><strong>off has no effect. 
 (The fact that the
+      transmission reports a 404 error</strong></del></span> <span 
class="inserted"><ins><em>article,
+    is not</em></ins></span> really <span class="removed"><del><strong>means 
nothing;</strong></del></span> <span class="inserted"><ins><em>a matter of 
proprietary surveillance. These systems
+    are an intolerable invasion of privacy, and should be replaced with
+    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>server
+      could save that data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done by malware. The</em></ins></span>
+    other <span class="removed"><del><strong>devices on</strong></del></span> 
<span class="inserted"><ins><em>cases mentioned are done by proprietary malware 
in</em></ins></span> the <span class="removed"><del><strong>user's local 
network.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;They use this data to manipulate people</strong></del></span> 
<span class="inserted"><ins><em>proprietary malware in the car.&lt;/p&gt;
+      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3718,61 +3716,70 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users</em></ins></span> to <span class="removed"><del><strong>buy things, 
and hunt 
-      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>identify themselves</em></ins></span> to <span 
class="removed"><del><strong>spend a lot of money. They 
-      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
-    free rein</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus users.&lt;/p&gt;
+    users</em></ins></span> to <span class="removed"><del><strong>stop this, 
but any product
+      could spy</strong></del></span> <span class="inserted"><ins><em>identify 
themselves to Facebook&lt;/a&gt;. This will give Facebook
+    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates</em></ins></span> the <span class="removed"><del><strong>game 
play</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
+    creates the potential for the most intimate
+    surveillance ever. All it takes to make</em></ins></span> this <span 
class="removed"><del><strong>way.&lt;/p&gt;
 
-      &lt;p&gt;While</strong></del></span> the <span 
class="removed"><del><strong>article describes gratis games, games that cost 
money</strong></del></span> <span class="inserted"><ins><em>most intimate
-    surveillance ever. All it takes to make this potential real &lt;a
-    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
-    software as malicious as many other programs listed in this
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>potential real</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    software as malicious as many other</em></ins></span> programs <span 
class="removed"><del><strong>people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>listed in this
     page&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You</em></ins></span> can <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>bet Facebook will implement</em></ins></span> the 
<span class="removed"><del><strong>same 
tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>maximum possible
+    &lt;p&gt;You can bet Facebook will implement the maximum possible
     surveillance on Oculus Rift devices. The moral is, never trust a VR
     system with nonfree software in it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;!-- #SpywareAtPlay 
--&gt;</strong></del></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnTheWeb"&gt;Spyware on the 
Web&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many web sites spy on their visitors.  Web sites are not
-   programs, so it
-   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but the surveillance is an abuse all the same.&lt;/p&gt;
-
 <span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Users</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;When</strong></del></span>
+<span class="inserted"><ins><em>&lt;p&gt;In addition, many web sites spy on 
their visitors.  Web sites</em></ins></span> are <span 
class="removed"><del><strong>suing Bose for</strong></del></span> <span 
class="inserted"><ins><em>not
+   programs, so it</em></ins></span>
+   &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing a spyware app for its headphones&lt;/a&gt;.
+Specifically,</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but</em></ins></span> the <span class="removed"><del><strong>app would 
record</strong></del></span> <span class="inserted"><ins><em>surveillance is an 
abuse all</em></ins></span> the <span 
class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>same.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201904210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of April 2019, it is &lt;a
+    &lt;p&gt;As</em></ins></span> of <span class="removed"><del><strong>the 
audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>April 2019, 
it is &lt;a
     
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
-    longer possible to disable an
-    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    longer possible</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses</strong></del></span> <span 
class="inserted"><ins><em>disable an
+    unscrupulous tracking anti-feature&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>this was done without</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
     users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
-    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+    Opera, Microsoft Edge and also in</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>upcoming Microsoft 
Edge that is
     going to be based on Chromium.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3781,7 +3788,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
     
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    sent</em></ins></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span> <span class="inserted"><ins><em>precise GPS location 
to Twitter's server&lt;/a&gt;. It still
     contains these GPS locations.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3790,79 +3797,89 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
-    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
+    on</em></ins></span> the <span class="removed"><del><strong>app 
said</strong></del></span> <span 
class="inserted"><ins><em>reporters</em></ins></span> that <span 
class="removed"><del><strong>users gave consent</strong></del></span> <span 
class="inserted"><ins><em>use it&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;When</em></ins></span> a page uses Disqus
-    for comments, <span class="removed"><del><strong>&lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the</strong></del></span>
 <span class="inserted"><ins><em>the</em></ins></span> proprietary Disqus 
software <span class="removed"><del><strong>loads</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads</em></ins></span>
-    a Facebook software package into the browser of every anonymous visitor
-    to the page, and makes the page's URL available to <span 
class="removed"><del><strong>Facebook&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Online</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;When a page uses Disqus</em></ins></span>
+    for <span class="removed"><del><strong>this,
+would that make it acceptable? No way! It should be flat 
out</strong></del></span> <span class="inserted"><ins><em>comments, the 
proprietary Disqus software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
+    a Facebook software package into the browser of every anonymous 
visitor</em></ins></span>
+    to <span class="removed"><del><strong>design</strong></del></span> the 
<span class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>page, and makes the page's URL 
available</em></ins></span> to <span class="removed"><del><strong>snoop at 
all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201612064"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612064"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Online</em></ins></span> sales, with tracking and surveillance of 
customers, &lt;a
+    &lt;p&gt;Online sales, with tracking</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>surveillance of customers, &lt;a
     
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-    businesses to show different people different prices&lt;/a&gt;. Most of
-    the tracking is done by recording interactions with servers, but
-    proprietary software contributes.&lt;/p&gt;
-  &lt;/li&gt;
+    businesses</em></ins></span> to <span class="inserted"><ins><em>show 
different people different prices&lt;/a&gt;. Most of</em></ins></span>
+    the 
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
-      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
+      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>tracking</em></ins></span> is <span 
class="removed"><del><strong>a computer, and you can't trust a 
computer</strong></del></span> <span class="inserted"><ins><em>done by 
recording interactions</em></ins></span> with 
+      <span class="removed"><del><strong>a nonfree operating 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>servers, but
+    proprietary software contributes.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
-      &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-      enable Facebook to track visitors</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of data about their users and 
their</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-    Microsoft SkyDrive allows the NSA</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
-      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>directly examine users'
-    data&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    Microsoft SkyDrive allows the NSA to directly examine</em></ins></span> 
users' 
+      <span class="removed"><del><strong>friends and 
associates&lt;/a&gt;.&lt;/p&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+      &lt;p&gt;Even nastier, they do it through ad</strong></del></span>
+    <span class="inserted"><ins><em>data&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201210240"&gt;
+  &lt;li id="M201210240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many</em></ins></span> web sites rat their visitors to advertising
-    networks that track users.  Of the top 1000 web sites, &lt;a
+    &lt;p&gt;Many web sites rat their visitors to advertising</em></ins></span>
+    networks that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>track users.  Of</em></ins></span> the <span 
class="removed"><del><strong>data
+      collected by various cr&hellip;apps and</strong></del></span> <span 
class="inserted"><ins><em>top 1000 web sites, &lt;a
     
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
     (as of 5/17/2012) fed their visitors third-party cookies, allowing
-    other sites to track them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    other</em></ins></span> sites <span class="removed"><del><strong>made by 
different 
+      companies.&lt;/p&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+      &lt;p&gt;They use this data</strong></del></span> to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>track them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201208210"&gt;
+  &lt;li id="M201208210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many</em></ins></span> web sites report all their visitors
-    to Google by using the Google Analytics service, which &lt;a
+    &lt;p&gt;Many web sites report all their visitors</em></ins></span>
+    to <span class="removed"><del><strong>buy things,</strong></del></span> 
<span class="inserted"><ins><em>Google by using the Google Analytics service, 
which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address and the page that was <span 
class="removed"><del><strong>visited.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>visited&lt;/a&gt;.&lt;/p&gt;
+    tells Google the IP address</em></ins></span> and <span 
class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>the page that was visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201200000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
-    of other people's phone numbers or email addresses).  This violates
-    the privacy of those other people.&lt;/p&gt;
+    &lt;p&gt;Many web sites try</em></ins></span> to <span 
class="removed"><del><strong>spend a lot</strong></del></span> <span 
class="inserted"><ins><em>collect users' address books (the user's 
list</em></ins></span>
+    of <span class="removed"><del><strong>money. They 
+      also use a back door to manipulate the game play for specific 
players.&lt;/p&gt;
+
+      &lt;p&gt;While</strong></del></span> <span 
class="inserted"><ins><em>other people's phone numbers or email addresses).  
This violates</em></ins></span>
+    the <span class="removed"><del><strong>article describes gratis games, 
games</strong></del></span> <span class="inserted"><ins><em>privacy of those 
other people.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201110040"&gt;
@@ -3870,51 +3887,54 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
     
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
-    that don't have Facebook accounts.&lt;/p&gt;
+    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even 
users</em></ins></span>
+    that <span class="removed"><del><strong>cost money 
+      can use the same tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>don't have Facebook 
accounts.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the 
Web&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+&lt;p&gt;In addition, many</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201811270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites use JavaScript code &lt;a
+    &lt;p&gt;Many</em></ins></span> web sites <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>use JavaScript code &lt;a
     
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information that users have typed into a
-    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
-    
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
+    to snoop</em></ins></span> on <span class="inserted"><ins><em>information 
that users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn</em></ins></span> their 
<span class="removed"><del><strong>visitors.  Web sites</strong></del></span> 
<span class="inserted"><ins><em>identity. Some</em></ins></span> are <span 
class="removed"><del><strong>not
+   programs, so it</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
     &lt;p&gt;The chat facilities of some customer services use the same sort of
-    malware to &lt;a
+    malware</em></ins></span> to <span class="removed"><del><strong>call them 
&ldquo;free&rdquo; or &ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read what the user is typing before it is 
posted&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    read what</em></ins></span> the <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>an abuse</strong></del></span> <span 
class="inserted"><ins><em>typing before it is posted&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201807190"&gt;
+  &lt;li id="M201807190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its</em></ins></span> web <span 
class="removed"><del><strong>sites try</strong></del></span> <span 
class="inserted"><ins><em>site</em></ins></span> to <span 
class="removed"><del><strong>collect users' address books (the
-      user's list of other people's phone numbers or email addresses).
-      This violates the privacy of those</strong></del></span> <span 
class="inserted"><ins><em>give</em></ins></span> other <span 
class="removed"><del><strong>people.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>companies personal data on
-    its customers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    JavaScript on its web site to give other companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-      Microsoft SkyDrive allows</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201712300"&gt;
+  &lt;li id="M201712300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some JavaScript malware &lt;a
@@ -3926,19 +3946,28 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some websites send
-    JavaScript code to collect all</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>user's input, &lt;a
-    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
-    can then be used</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+    JavaScript code to collect</em></ins></span> all the <span 
class="removed"><del><strong>same.&lt;/p&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;When a page uses Disqus for
+  comments,</strong></del></span> <span class="inserted"><ins><em>user's 
input,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the
+  proprietary Disqus software loads a Facebook software package into
+  the browser of every anonymous visitor</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used</em></ins></span> to <span 
class="inserted"><ins><em>reproduce</em></ins></span> the <span 
class="removed"><del><strong>page, and makes the
+  page's URL available to Facebook&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Online sales, with tracking</strong></del></span> <span 
class="inserted"><ins><em>whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;</em></ins></span>
+    code.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-
 
-<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
+&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -3947,74 +3976,112 @@
   &lt;li id="M201310110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Flash and JavaScript are used for &lt;a
-    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>identify 
users.&lt;/p&gt;
+    &lt;p&gt;Flash</em></ins></span> and <span 
class="removed"><del><strong>surveillance of customers,</strong></del></span> 
<span class="inserted"><ins><em>JavaScript are used for</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+      businesses</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>show different people different prices&lt;/a&gt;. 
Most
+      of the tracking is done by recording interactions with
+      servers, but proprietary software 
contributes.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>identify users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201003010"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+      Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201003010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Flash Player's &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Flash Player's &lt;a
     
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+    cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Pages that contain 
&ldquo;Like&rdquo; buttons</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInChrome"&gt;Spyware in 
Chrome&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201906220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google</em></ins></span> Chrome <span 
class="removed"><del><strong>contains a key logger that</strong></del></span> 
<span class="inserted"><ins><em>is an</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
-       sends Google every URL typed in&lt;/a&gt;, one key 
at</strong></del></span>
+    &lt;p&gt;Google Chrome is an</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+      enable Facebook</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
     instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
-    users' computers and report the sites they visit to advertising and
-    data companies, first of all to Google. Moreover, if users 
have</em></ins></span> a <span class="removed"><del><strong>time.&lt;/p&gt;
+    users' computers and report the sites they visit</em></ins></span> to 
<span class="removed"><del><strong>track visitors</strong></del></span> <span 
class="inserted"><ins><em>advertising and
+    data companies, first of all</em></ins></span> to <span 
class="removed"><del><strong>those 
pages&lt;/a&gt;&mdash;even</strong></del></span> <span 
class="inserted"><ins><em>Google. Moreover, if</em></ins></span> users <span 
class="removed"><del><strong>that don't</strong></del></span> have <span 
class="removed"><del><strong>Facebook accounts.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
-    <span class="inserted"><ins><em>Gmail account,</em></ins></span> Chrome 
<span class="removed"><del><strong>includes</strong></del></span> <span 
class="inserted"><ins><em>automatically logs them in to the browser for
+  &lt;li&gt;&lt;p&gt;Many web sites rat their visitors</strong></del></span> 
<span class="inserted"><ins><em>a
+    Gmail account, Chrome automatically logs them in</em></ins></span> to 
<span class="removed"><del><strong>advertising networks that track
+      users.  Of</strong></del></span> the <span 
class="removed"><del><strong>top 1000 web sites,</strong></del></span> <span 
class="inserted"><ins><em>browser for
     more convenient profiling. On Android, Chrome also reports their
     location to Google.&lt;/p&gt;
 
-    &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
-    href="/software/icecat/"&gt;IceCat&lt;/a&gt;,</em></ins></span> a <span 
class="removed"><del><strong>module</strong></del></span> <span 
class="inserted"><ins><em>modified version of Firefox
-    with several changes to protect users' privacy.&lt;/p&gt;
+    &lt;p&gt;The best way to escape surveillance is to switch 
to</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+      (as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a 
modified version</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing other
+      sites</strong></del></span> <span class="inserted"><ins><em>Firefox
+    with several changes</em></ins></span> to <span 
class="removed"><del><strong>track 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protect users' privacy.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704131"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many web sites report 
all their visitors to Google by using
+      the Google Analytics service, which</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
-    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+      tells Google</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
     collecting far more data on students than is necessary, and store
-    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
-    of transparency on the part of both the educational services and the
-    schools, the difficulty of opting out of these services, and the lack
-    of proper privacy policies, among other things.&lt;/p&gt;
+    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>IP 
address</strong></del></span> <span class="inserted"><ins><em>lack
+    of transparency on the part of both the educational 
services</em></ins></span> and the <span class="removed"><del><strong>page that 
was visited.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many web sites try to collect users' address books (the
+      user's list</strong></del></span>
+    <span class="inserted"><ins><em>schools, the difficulty</em></ins></span> 
of <span class="removed"><del><strong>other people's phone numbers or email 
addresses).
+      This violates</strong></del></span> <span 
class="inserted"><ins><em>opting out of these services, and</em></ins></span> 
the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>lack</em></ins></span>
+    of <span class="removed"><del><strong>those</strong></del></span> <span 
class="inserted"><ins><em>proper privacy policies, among</em></ins></span> 
other <span class="removed"><del><strong>people.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+      Microsoft SkyDrive allows</strong></del></span> <span 
class="inserted"><ins><em>things.&lt;/p&gt;
 
     &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
-    should realize</em></ins></span> that <span class="inserted"><ins><em>the 
software Google uses to spy on students is
+    should realize that</em></ins></span> the <span 
class="removed"><del><strong>NSA to directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>software Google uses</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInChrome"&gt;Spyware in Chrome&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger 
that</strong></del></span> <span class="inserted"><ins><em>students is
     nonfree, so they can't verify what it really does. The only remedy is
-    to persuade school officials to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-       activates microphones</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
-    exclusively use free software&lt;/a&gt; for both 
education</em></ins></span> and <span class="removed"><del><strong>transmits 
audio</strong></del></span> <span class="inserted"><ins><em>school
+    to persuade school officials to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+       sends Google every URL typed in&lt;/a&gt;, one 
key</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
     administration. If the school is run locally, parents and teachers
-    can mandate their representatives at the School Board</em></ins></span> to 
<span class="removed"><del><strong>its 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>refuse the
-    budget unless the school initiates a switch to free software. If
+    can mandate their representatives</em></ins></span> at <span 
class="inserted"><ins><em>the School Board to refuse the
+    budget unless the school initiates</em></ins></span> a <span 
class="removed"><del><strong>time.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Google Chrome includes a module that
+      &lt;a 
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+       activates microphones and transmits audio</strong></del></span> <span 
class="inserted"><ins><em>switch to free software. If
     education is run nation-wide, they need to persuade legislators
     (e.g., through free software organizations, political parties,
-    etc.) to migrate the public schools to free 
software.&lt;/p&gt;</em></ins></span>
+    etc.)</em></ins></span> to <span class="removed"><del><strong>its 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>migrate the public schools to free 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
@@ -4066,6 +4133,17 @@
 <span class="inserted"><ins><em>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202104060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others&lt;/a&gt;, and gives people no control over their personal
+    information/data. The app also sometimes shows old photos and memories
+    to the user without user having control over this.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202102160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -4270,7 +4348,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/15 19:01:22 $
+$Date: 2021/04/26 12:04:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.402
retrieving revision 1.403
diff -u -b -r1.402 -r1.403
--- proprietary/po/proprietary-surveillance.it.po       15 Apr 2021 19:01:23 
-0000      1.402
+++ proprietary/po/proprietary-surveillance.it.po       26 Apr 2021 12:04:36 
-0000      1.403
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5461,6 +5461,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -b -r1.264 -r1.265
--- proprietary/po/proprietary-surveillance.ja-diff.html        15 Apr 2021 
19:01:23 -0000      1.264
+++ proprietary/po/proprietary-surveillance.ja-diff.html        26 Apr 2021 
12:04:37 -0000      1.265
@@ -1146,66 +1146,140 @@
   <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The iMessage app</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> <span 
class="inserted"><ins><em>iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that</em></ins></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The iMessage app</em></ins></span> on <span 
class="removed"><del><strong>its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;;</em></ins></span> the 
<span class="removed"><del><strong>temperature of</strong></del></span>
-    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
+      &lt;p&gt;The app reports the temperature of the vibrator minute by
+      minute (thus, indirectly, whether it is surrounded 
by</strong></del></span> <span class="inserted"><ins><em>iThings &lt;a
+    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</em></ins></span>
+    a <span class="removed"><del><strong>person's
+      body), and</strong></del></span> <span class="inserted"><ins><em>server 
every phone number that</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>user 
types into it&lt;/a&gt;;</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users can check
+      and change.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
 
-  &lt;li id="M201509240"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span class="removed"><del><strong>vibrator 
minute</strong></del></span> <span class="inserted"><ins><em>photos
-    and videos they make.&lt;/p&gt;
+    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>spy on children</strong></del></span> <span 
class="inserted"><ins><em>Apple's servers all the photos</em></ins></span>
+    and <span class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps them up to date on all your devices. Any edits you
+    take, and keeps them up</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>date</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>all 
your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</em></ins></span> 
by
-      <span class="removed"><del><strong>minute (thus, indirectly, whether 
it</strong></del></span> <span class="inserted"><ins><em>the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    &lt;p&gt;(From</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+    information&lt;/a&gt; as accessed</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>24 Sep 2015.) The iCloud 
feature</em></ins></span> is <span class="removed"><del><strong>not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span>
+    &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by</em></ins></span> the <span class="removed"><del><strong>emails of 
members</strong></del></span>
+    <span class="inserted"><ins><em>startup</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; 
means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There</em></ins></span> is <span 
class="removed"><del><strong>surrounded</strong></del></span> <span 
class="inserted"><ins><em>a way to
-    &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active</em></ins></span> by <span 
class="inserted"><ins><em>default so it still counts as</em></ins></span> a 
<span class="removed"><del><strong>person's
-      body),</strong></del></span>
-    <span class="inserted"><ins><em>surveillance functionality.&lt;/p&gt;
+    &lt;p&gt;There is a way to</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
 
-    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
-    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span> <span 
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT201104"&gt; 
deactivate
+    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
+    surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    security to get at them, but NSA can access any of them 
through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple can,</em></ins></span> and <span 
class="inserted"><ins><em>regularly does, &lt;a
+    &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
-
-      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
 
-  &lt;li id="M201407230"&gt;
+&lt;!-- #SpywareOnTheRoad</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist
+    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>exist
     for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
     
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
@@ -1213,8 +1287,11 @@
 
   &lt;li id="M201401100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
     get other info too.&lt;/p&gt;
@@ -1225,14 +1302,25 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    Either Apple helps the NSA snoop</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>all the data</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>an iThing, 
or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The iThing also &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera</strong></del></span> <span 
class="inserted"><ins><em>iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
     turned off.&lt;/p&gt;
@@ -1241,8 +1329,10 @@
   &lt;li id="M201210170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    &lt;p&gt;There is also a feature for web sites to track users, 
which</em></ins></span> is &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
@@ -3026,76 +3116,146 @@
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
-    speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made available to
-    Alexa. As a result, Amazon has a very precise picture of users' life
-    at home, not only in the present, but in the past (and, who knows,
-    in the future too?)&lt;/p&gt;
+    &lt;p&gt;Data collected by devices such as</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>Nest thermostat,</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span> 
and <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops</strong></del></span> <span class="inserted"><ins><em>the 
Sonos
+    speakers are likewise stored longer than necessary</em></ins></span> on 
<span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>servers</em></ins></span>
+    the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe</strong></del></span> <span 
class="inserted"><ins><em>devices are tethered to. Moreover, they 
are</em></ins></span> made <span class="removed"><del><strong>&ldquo;Digital 
Editions,&rdquo; the e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
+    <span class="inserted"><ins><em>Alexa. As a result, 
Amazon</em></ins></span> has a <span class="removed"><del><strong>built-in cell 
phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes</strong></del></span> <span 
class="inserted"><ins><em>very precise picture of users' life
+    at home, not only</em></ins></span> in <span 
class="removed"><del><strong>various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>present, but in</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+    in the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
-    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    recorded for Amazon employees</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
 
-    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    &lt;p&gt;A fraction of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff even has access to &lt;a
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
     tell you how and where it's done&rdquo;), users have no way
-    to know what happens to the recordings unless human eavesdroppers &lt;a
+    to know what happens</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
-    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+    break their non-disclosure 
agreements&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the 
user is still
+    paying for the subscription,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
     specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use of ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;
+    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
+      really</strong></del></span>
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
+      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
+    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product in that country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done 
by malware. The other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine the car's location at any time. (See</strong></del></span> 
<span class="inserted"><ins><em>say no?&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
     &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A medical insurance company &lt;a
+    &lt;p&gt;A medical insurance</em></ins></span> company <span 
class="removed"><del><strong>says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
     offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
@@ -3103,73 +3263,63 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>house, all the 
time&lt;/a&gt;.&lt;/p&gt;
+    listen</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>everyone in the house, all</em></ins></span> the 
<span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Today's technological practice does not include any way of 
making</em></ins></span>
-    a <span class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>device 
that</em></ins></span> can <span class="removed"><del><strong>check
-      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially spying
+    &lt;p&gt;Today's technological practice does not include any way of making
+    a device that can obey your voice commands without potentially spying
     on you.  Even if it is air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
+    about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+  &lt;li id="M201407170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot 
of</em></ins></span>
+    data
+      <span class="removed"><del><strong>and hand it 
over,</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201310260"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to spy on <span 
class="removed"><del><strong>children and 
adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-&lt;/ul&gt;
 
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;</em></ins></span>
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>find it normal 
that companies
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3180,30 +3330,22 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202009100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Internet-enabled watches with 
proprietary software
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have a lot of security flaws. 
They</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
-    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+    privacy. In addition, they have</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people)</em></ins></span> to 
<span class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>access&lt;/a&gt; the watch.&lt;/p&gt;
+
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>child and spoof messages to and 
from</em></ins></span> the <span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>watch, possibly 
endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;Thus, ill-intentioned unauthorized people</em></ins></span> can 
<span class="removed"><del><strong>collect</strong></del></span> <span 
class="inserted"><ins><em>intercept communications between parent and child and 
spoof messages to and from</em></ins></span> the <span 
class="removed"><del><strong>emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>watch, 
possibly endangering the child.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>article misuses the word &ldquo;&lt;a
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>this article misuses 
the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -3211,56 +3353,42 @@
   &lt;li id="M201603020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects to an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>report was as of 2014, but 
we don't expect</strong></del></span> <span class="inserted"><ins><em>article 
says</em></ins></span> this <span class="removed"><del><strong>has got 
better.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>is certainly surveillance, at least.&lt;/p&gt;
+    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>is a back door, but</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
     to report its location to someone else and to transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202008181"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;New Toyotas will &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;New Toyotas will &lt;a
     href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
-    upload data</em></ins></span> to <span class="removed"><del><strong>place 
new items</strong></del></span> <span class="inserted"><ins><em>AWS to help 
create custom insurance premiums&lt;/a&gt;
-    based</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection</strong></del></span> <span class="inserted"><ins><em>driver 
behaviour.&lt;/p&gt;
+    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
+    based on driver behaviour.&lt;/p&gt;
 
     &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
     disconnect its cellular antenna and its GPS antenna.  If you want
@@ -3270,267 +3398,263 @@
 
   &lt;li id="M201912171"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Most modern cars 
now</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
-    record and send various kinds of data to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. For</em></ins></span>
-    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user, access to the data</em></ins></span> is 
<span class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>nearly impossible, as</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>involves
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
+    the user, access</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+      consent before collecting personal</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> data <span 
class="removed"><del><strong>are totally inadequate.
+      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>is nearly impossible, as it involves
     cracking the car's computer, which is always hidden and running with
-    proprietary software.&lt;/p&gt;</em></ins></span>
+    proprietary software.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903290"&gt;
+  &lt;li id="M201903290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
+    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span 
class="inserted"><ins><em>junkyard</em></ins></span> the <span 
class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902011"&gt;
+  &lt;li id="M201902011"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
-    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
-    connected to the cellular phone network and sends Ford a lot of data,
+    near-complete access</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>internal car 
network&lt;/a&gt;. It is constantly
+    connected</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span> the <span class="removed"><del><strong>user watches 
&mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>cellular phone network and sends 
Ford</em></ins></span> a <span class="removed"><del><strong>step further than 
other TV manufacturers in spying on 
+      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span class="inserted"><ins><em>lot of data,
     including car location. This feature operates even when the ignition
-    key is removed, and users report that they can't disable it.&lt;/p&gt;
+    key is removed,</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>users 
report</em></ins></span> that <span class="removed"><del><strong>advertisers 
can track</strong></del></span> <span class="inserted"><ins><em>they can't 
disable it.&lt;/p&gt;
+
+    &lt;p&gt;If</em></ins></span> you 
+      <span class="removed"><del><strong>across devices.&lt;/p&gt;
 
-    &lt;p&gt;If you own one of these cars, have you 
succeeded</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only</strong></del></span> <span 
class="inserted"><ins><em>breaking</em></ins></span> the
-      <span class="removed"><del><strong>Kindle:</strong></del></span>
-    <span class="inserted"><ins><em>connectivity by disconnecting the cellular 
modem, or wrapping the
+      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>own 
one of these cars, have you succeeded in breaking the
+    connectivity by disconnecting the cellular modem, or wrapping the
     antenna in aluminum foil?&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with a terminal that &lt;a
+    &lt;p&gt;In China, it</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>mandatory for electric
+    cars</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>be equipped with a terminal that &lt;a
     href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to a government-run platform&lt;/a&gt;. In practice,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
-    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;</em></ins></span>
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect</em></ins></span> this <span 
class="removed"><del><strong>off, but having</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; as part of their own spying, then
+    forward</em></ins></span> it <span class="removed"><del><strong>enabled by 
default
+      is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> to the <span class="removed"><del><strong>600 
millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+  &lt;li id="M201810230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;GM &lt;a
     href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>e-reader 
used</strong></del></span> <span class="inserted"><ins><em>choices of radio 
programs&lt;/a&gt; in its
-    &ldquo;connected&rdquo; cars, minute</em></ins></span> by <span 
class="removed"><del><strong>most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send</strong></del></span> <span 
class="inserted"><ins><em>minute.&lt;/p&gt;
+    tracked</em></ins></span> the <span class="removed"><del><strong>company 
already
+      monitors. Tivo customers are unaware they're being 
watched</strong></del></span> <span class="inserted"><ins><em>choices of radio 
programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute</em></ins></span> by
+      <span class="removed"><del><strong>advertisers. By combining TV viewing 
information with online
+      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing 
all</strong></del></span> <span class="inserted"><ins><em>minute.&lt;/p&gt;
 
     &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
-    sneaking it into the contract that users sign for some digital service
+    sneaking it into the contract that</em></ins></span> users <span 
class="inserted"><ins><em>sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect</em></ins></span> lots of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>other data: listening</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>you,
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>you,
     watching you, following your movements, tracking passengers' cell
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
-    &lt;p&gt;But if you really want</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure the car's
+    &lt;p&gt;But if you really want</em></ins></span> to be
+      <span class="removed"><del><strong>picked up by proprietary malware 
running on other devices in
+      range</strong></del></span> <span class="inserted"><ins><em>safe, we 
must make sure the car's
     hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of that 
data.&lt;/p&gt;</em></ins></span>
+    is free</em></ins></span> so <span class="removed"><del><strong>as to 
determine</strong></del></span> <span class="inserted"><ins><em>we know it 
won't collect any of</em></ins></span> that <span 
class="removed"><del><strong>they are nearby.  Once your
+      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
+  &lt;li id="M201711230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;AI-powered driving apps can &lt;a
-    
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;AI-powered driving apps</em></ins></span> can
+      <span class="removed"><del><strong>correlate ads with Web activity, and
+      other</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and
+      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people</strong></del></span>
 
-  &lt;li id="M201607160"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="car-spying"&gt;Computerized</em></ins></span> cars with nonfree 
software are &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;</em></ins></span>
-    snooping devices&lt;/a&gt;.&lt;/p&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree 
software</em></ins></span> are <span 
class="removed"><del><strong>watching&lt;/a&gt;,
+      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="nissan-modem"&gt;The</em></ins></span> Nissan Leaf has a built-in
-    cell phone modem which allows effectively anyone <span 
class="inserted"><ins><em>to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;</em></ins></span>
-    access its computers remotely and make changes in various
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
+    cell phone modem which allows effectively anyone to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication
-    when accessed through the modem.  However, even if it asked
+    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span> <span class="inserted"><ins><em>system 
has no authentication
+    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>internet to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if</em></ins></span> it <span 
class="removed"><del><strong>and would then have to
+      give</strong></del></span> <span class="inserted"><ins><em>asked
     for authentication, you couldn't be confident that Nissan
     has no access.  The software in the car is proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
-    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+    href="/philosophy/free-software-even-more-important.html"&gt;which 
means</em></ins></span>
+    it <span class="inserted"><ins><em>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
-    enables the phone company to track the car's movements all the time;
-    it is possible to physically remove the cell phone <span 
class="removed"><del><strong>modem</strong></del></span> <span 
class="inserted"><ins><em>modem,</em></ins></span> though.&lt;/p&gt;
+    &lt;p&gt;Even if no one connects</em></ins></span> to the <span 
class="removed"><del><strong>US or some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
+    enables the phone company</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless</strong></del></span> <span 
class="inserted"><ins><em>track the car's movements all the 
time;</em></ins></span>
+    it is <span class="removed"><del><strong>done
+    by free software in your own computer.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span> 
<span class="inserted"><ins><em>possible to physically remove</em></ins></span> 
the <span class="removed"><del><strong>user watches, and</strong></del></span> 
<span class="inserted"><ins><em>cell phone modem, though.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+  &lt;li id="M201306140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tesla cars allow the company to extract
-    data remotely and determine the car's location
-    at any time. (See Section 2, paragraphs b and c of the &lt;a
-    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    &lt;p&gt;Tesla cars allow</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The fact 
that</strong></del></span> <span class="inserted"><ins><em>extract
+    data remotely and determine</em></ins></span> the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>car's location
+    at any time. (See Section 2, paragraphs b and c of</em></ins></span> the 
<span class="removed"><del><strong>server
+      could save that data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
     privacy statement&lt;/a&gt;.) The company says it doesn't store this
-    information, but if the state orders it to get the data and hand it
-    over, the state can store it.&lt;/p&gt;
-  &lt;/li&gt;
+    information, but if</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
 
-  &lt;li id="M201303250"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p id="records-drivers"&gt;Proprietary</em></ins></span> software in 
cars &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records</em></ins></span> information about drivers' movements&lt;/a&gt;, 
which is made
-    available to car manufacturers, insurance companies, and others.&lt;/p&gt;
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>state orders</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch</strong></del></span> to 
<span class="removed"><del><strong>stop this, but any product
+      could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
-    is not really a matter of proprietary surveillance. These systems
-    are an intolerable invasion of privacy, and should be replaced with
-    anonymous payment systems, but the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
-      determine the car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if the state orders it to get the data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't done by malware. The
-    other cases mentioned are done by proprietary malware in</em></ins></span> 
the <span class="removed"><del><strong>state can store it.&lt;/p&gt;
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span> <span 
class="inserted"><ins><em>get the data</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- #SpywareAtPlay</strong></del></span>
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201303250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>car.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p id="records-drivers"&gt;Proprietary 
software in cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and report to the 
+      internet&lt;/a&gt;&mdash; even what their users weigh.&lt;/p&gt;
+
+      &lt;p&gt;A game console</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+    records information about drivers' movements&lt;/a&gt;, 
which</em></ins></span> is <span class="removed"><del><strong>a 
computer,</strong></del></span> <span class="inserted"><ins><em>made
+    available to car manufacturers, insurance companies,</em></ins></span> and 
<span class="removed"><del><strong>you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
+      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect</strong></del></span> <span 
class="inserted"><ins><em>others.&lt;/p&gt;
+
+    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
+    is not really</em></ins></span> a <span class="removed"><del><strong>wide 
range</strong></del></span> <span 
class="inserted"><ins><em>matter</em></ins></span> of <span 
class="removed"><del><strong>data about their users and their users' 
+      friends</strong></del></span> <span 
class="inserted"><ins><em>proprietary surveillance. These systems
+    are an intolerable invasion of privacy,</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced 
with
+    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>data
+      collected</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done</em></ins></span> by <span class="removed"><del><strong>various 
cr&hellip;apps and sites made</strong></del></span> <span 
class="inserted"><ins><em>malware. The
+    other cases mentioned are done</em></ins></span> by <span 
class="removed"><del><strong>different 
+      companies.&lt;/p&gt;
+
+      &lt;p&gt;They use this data to manipulate people</strong></del></span> 
<span class="inserted"><ins><em>proprietary malware in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInVR"&gt;Virtual 
Reality&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInVR"&gt;Virtual Reality&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
-    users</em></ins></span> to <span class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>identify themselves to Facebook&lt;/a&gt;. This will 
give Facebook
-    free rein to pervasively snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>Oculus users.&lt;/p&gt;
+    users</em></ins></span> to <span class="removed"><del><strong>buy things, 
and hunt 
+      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>identify themselves</em></ins></span> to <span 
class="removed"><del><strong>spend a lot of money. They 
+      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. This will give Facebook
+    free rein</em></ins></span> to <span 
class="removed"><del><strong>manipulate</strong></del></span> <span 
class="inserted"><ins><em>pervasively snoop on Oculus users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates</em></ins></span> the <span class="removed"><del><strong>other 
way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>potential for the 
most intimate
-    surveillance ever. All it takes to make this potential 
real</em></ins></span> &lt;a <span class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+    creates</em></ins></span> the <span class="removed"><del><strong>game 
play</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
 
-    &lt;p&gt;The report was</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
-    software</em></ins></span> as <span class="removed"><del><strong>of 2014, 
but we don't expect</strong></del></span> <span 
class="inserted"><ins><em>malicious as many other programs listed 
in</em></ins></span> this <span class="removed"><del><strong>has got 
better.&lt;/p&gt;
+      &lt;p&gt;While</strong></del></span> the <span 
class="removed"><del><strong>article describes gratis games, games that cost 
money</strong></del></span> <span class="inserted"><ins><em>most intimate
+    surveillance ever. All it takes to make this potential real &lt;a
+    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    software as malicious as many other programs listed in this
+    page&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the 
TV</strong></del></span>
-    <span class="inserted"><ins><em>page&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;You can bet Facebook</em></ins></span> will
-      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span 
class="inserted"><ins><em>implement</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>maximum possible
-    surveillance on Oculus Rift devices. The moral is, never 
trust</em></ins></span> a <span class="removed"><del><strong>step further than 
other TV manufacturers</strong></del></span> <span class="inserted"><ins><em>VR
-    system with nonfree software</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;
+    &lt;p&gt;You</em></ins></span> can <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>bet Facebook will implement</em></ins></span> the 
<span class="removed"><del><strong>same 
tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>maximum possible
+    surveillance on Oculus Rift devices. The moral is, never trust a VR
+    system with nonfree software in it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- #SpywareOnTheWeb 
--&gt;</strong></del></span>
+
 
 
 &lt;div class="big-section"&gt;
@@ -3539,92 +3663,71 @@
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;p&gt;In addition, many web sites spy</em></ins></span> on their <span 
class="removed"><del><strong>users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>visitors.  Web sites are not
-   programs,</em></ins></span> so <span class="removed"><del><strong>that 
advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>it
-   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense</em></ins></span> to <span class="removed"><del><strong>turn 
this off,</strong></del></span> <span class="inserted"><ins><em>call them 
&ldquo;free&rdquo; or &ldquo;proprietary&rdquo;&lt;/a&gt;,</em></ins></span>
-   but <span class="removed"><del><strong>having it enabled by 
default</strong></del></span> <span class="inserted"><ins><em>the 
surveillance</em></ins></span> is an <span 
class="removed"><del><strong>injustice already.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to
-      the 600 millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>abuse all</em></ins></span> the <span 
class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>same.&lt;/p&gt;
+&lt;p&gt;In addition, many web sites spy on their visitors.  Web sites are not
+   programs, so it
+   &lt;a <span 
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but the surveillance is an abuse all the same.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201904210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of April 2019, it is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
-    longer possible</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>disable an
+    &lt;p&gt;As of April 2019, it is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
+    longer possible to disable an
     unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
     
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
     users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
-    Opera, Microsoft Edge</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>also in the 
upcoming Microsoft Edge that is
-    going</em></ins></span> to be
-      <span class="removed"><del><strong>picked up by proprietary malware 
running</strong></del></span> <span 
class="inserted"><ins><em>based</em></ins></span> on <span 
class="removed"><del><strong>other devices in
-      range so as to determine that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Chromium.&lt;/p&gt;</em></ins></span>
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+    going to be based on Chromium.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201901101"&gt;
+  &lt;li id="M201901101"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Until 2015, any tweet that listed</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>geographical tag &lt;a
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
     
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
     sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
-    contains these GPS locations.&lt;/p&gt;</em></ins></span>
+    contains these GPS locations.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201805170"&gt;
+  &lt;li id="M201805170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Storyful program</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
-    on</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>reporters that use 
it&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The Storyful program &lt;a
+    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
+    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201701060"&gt;
+  &lt;li id="M201701060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;When a page uses Disqus
-    for comments, the proprietary Disqus software</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
-    a Facebook software package into</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>browser of every anonymous visitor</em></ins></span>
-    to <span class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>the page,</em></ins></span> and <span 
class="removed"><del><strong>would then have</strong></del></span> <span 
class="inserted"><ins><em>makes the page's URL available</em></ins></span> to
-      <span class="removed"><del><strong>give it</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    for comments, the proprietary Disqus software &lt;a
+    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
+    a Facebook software package into the browser of every anonymous 
visitor</em></ins></span>
+    to <span class="removed"><del><strong>call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but</strong></del></span> the <span 
class="removed"><del><strong>surveillance is an abuse all</strong></del></span> 
<span class="inserted"><ins><em>page, and makes</em></ins></span> the <span 
class="removed"><del><strong>same.&lt;/p&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;Online</strong></del></span> <span 
class="inserted"><ins><em>page's URL available to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612064"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Online sales, with tracking and surveillance of customers, &lt;a
+    &lt;p&gt;Online</em></ins></span> sales, with tracking and surveillance of 
customers, &lt;a
     
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-    businesses</em></ins></span> to <span class="inserted"><ins><em>show 
different people different prices&lt;/a&gt;. Most of</em></ins></span>
-    the <span class="removed"><del><strong>US or some other 
government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not to be trusted unless 
it</strong></del></span> <span 
class="inserted"><ins><em>tracking</em></ins></span> is done by <span 
class="removed"><del><strong>free</strong></del></span> <span 
class="inserted"><ins><em>recording interactions with servers, but
-    proprietary</em></ins></span> software <span 
class="removed"><del><strong>in your own 
computer.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>contributes.&lt;/p&gt;</em></ins></span>
+    businesses to show different people different prices&lt;/a&gt;. Most of
+    the tracking is done by recording interactions with servers, but
+    proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+      Baidu's Japanese-input</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
@@ -3639,9 +3742,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many web sites rat their visitors to advertising
-    networks that track users.  Of the top 1000 web sites,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+    networks that track users.  Of the top 1000 web sites, &lt;a
+    
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
     (as of 5/17/2012) fed their visitors third-party cookies, allowing
     other sites to track them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -3650,15 +3752,15 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many web sites report all their visitors
-    to Google by using</em></ins></span> the <span 
class="removed"><del><strong>user watches,</strong></del></span> <span 
class="inserted"><ins><em>Google Analytics service, which &lt;a
+    to Google by using the Google Analytics service, which &lt;a
     
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-    tells Google the IP address</em></ins></span> and the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>page that was visited&lt;/a&gt;.&lt;/p&gt;
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201200000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many web sites try</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The 
fact</strong></del></span> <span class="inserted"><ins><em>collect users' 
address books (the user's list
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
     of other people's phone numbers or email addresses).  This violates
     the privacy of those other people.&lt;/p&gt;
   &lt;/li&gt;
@@ -3685,29 +3787,24 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many web sites use JavaScript code &lt;a
     
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information</em></ins></span> that <span 
class="inserted"><ins><em>users have typed into a
+    to snoop on information that users have typed into a
     form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
     
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
-    &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>same sort of
+    &lt;p&gt;The chat facilities of some customer services use the same sort of
     malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
-    read what</em></ins></span> the <span class="removed"><del><strong>server
-      could save that data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>user is typing before</em></ins></span> it <span 
class="inserted"><ins><em>is posted&lt;/a&gt;.&lt;/p&gt;
+    read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;British Airways used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript</em></ins></span> on <span class="inserted"><ins><em>its web 
site to give</em></ins></span> other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>companies personal data</em></ins></span> on
-    <span class="inserted"><ins><em>its customers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;British Airways used &lt;a
+    
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
+    JavaScript on its web site to give other companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712300"&gt;
@@ -3722,60 +3819,44 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some websites send
-    JavaScript code to collect all</em></ins></span> the user's <span 
class="removed"><del><strong>local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>input,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
-    can then be used</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+    JavaScript code to collect all the user's input, &lt;a
+    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;</em></ins></span>
+    code.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtPlay 
--&gt;</strong></del></span>
-
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many 
-      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201310110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Flash</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>JavaScript are used for &lt;a
-    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>the 
-      internet&lt;/a&gt;&mdash; even what their users weigh.&lt;/p&gt;
+    &lt;p&gt;Flash</em></ins></span> and <span 
class="removed"><del><strong>Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>identify users.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; 
buttons</strong></del></span> <span class="inserted"><ins><em>JavaScript are 
used for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+      enable Facebook to track visitors</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
+      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>identify users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201003010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Flash Player's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Flash Player's &lt;a
+    
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
+    cookie feature helps</em></ins></span> web sites <span 
class="removed"><del><strong>rat their visitors to advertising networks 
that</strong></del></span> track
+      <span class="removed"><del><strong>users.  Of the top 1000 web 
sites,</strong></del></span> <span 
class="inserted"><ins><em>visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3789,108 +3870,59 @@
   &lt;li id="M201906220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome is an &lt;a
-    
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
-    instrument</em></ins></span> of <span class="removed"><del><strong>data 
about their users and their</strong></del></span> <span 
class="inserted"><ins><em>surveillance&lt;/a&gt;. It lets thousands of trackers 
invade</em></ins></span>
-    users' 
-      <span class="removed"><del><strong>friends</strong></del></span> <span 
class="inserted"><ins><em>computers</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> the <span 
class="removed"><del><strong>data
-      collected by various cr&hellip;apps and</strong></del></span> sites 
<span class="removed"><del><strong>made by different 
-      companies.&lt;/p&gt;
+    &lt;p&gt;Google Chrome is an</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+      (as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
+    instrument</em></ins></span> of <span 
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies, 
allowing other</strong></del></span> <span 
class="inserted"><ins><em>surveillance&lt;/a&gt;. It lets thousands of trackers 
invade
+    users' computers and report the</em></ins></span> sites <span 
class="inserted"><ins><em>they visit</em></ins></span> to <span 
class="removed"><del><strong>track them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;They use this</strong></del></span> <span 
class="inserted"><ins><em>they visit to advertising and</em></ins></span>
-    data <span class="inserted"><ins><em>companies, first of all to Google. 
Moreover, if users have a
-    Gmail account, Chrome automatically logs them in to the browser for
+  &lt;li&gt;&lt;p&gt;Many web sites report</strong></del></span> <span 
class="inserted"><ins><em>advertising and
+    data companies, first of</em></ins></span> all <span 
class="removed"><del><strong>their visitors</strong></del></span> to <span 
class="removed"><del><strong>Google by using</strong></del></span> <span 
class="inserted"><ins><em>Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to</em></ins></span> the 
<span class="removed"><del><strong>Google Analytics service, 
which</strong></del></span> <span class="inserted"><ins><em>browser for
     more convenient profiling. On Android, Chrome also reports their
     location to Google.&lt;/p&gt;
 
-    &lt;p&gt;The best way</em></ins></span> to <span 
class="removed"><del><strong>manipulate people</strong></del></span> <span 
class="inserted"><ins><em>escape surveillance is</em></ins></span> to <span 
class="removed"><del><strong>buy things, and hunt 
-      for &ldquo;whales&rdquo; who can be led</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>spend</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="/software/icecat/"&gt;IceCat&lt;/a&gt;,</em></ins></span> a <span 
class="removed"><del><strong>lot</strong></del></span> <span 
class="inserted"><ins><em>modified version</em></ins></span> of <span 
class="removed"><del><strong>money. They 
-      also use a back door</strong></del></span> <span 
class="inserted"><ins><em>Firefox
-    with several changes</em></ins></span> to <span 
class="removed"><del><strong>manipulate the game play for specific 
players.&lt;/p&gt;
-
-      &lt;p&gt;While the article describes gratis games, games that cost money 
-      can use the same tactics.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protect users' privacy.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The best way to escape surveillance is to switch 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+      tells Google</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a 
modified version of Firefox
+    with several changes to protect users' privacy.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- #SpywareOnTheWeb</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201704131"&gt;
+  &lt;li id="M201704131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Low-priced Chromebooks for 
schools are &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
     href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
-    collecting far more data</em></ins></span> on <span 
class="inserted"><ins><em>students than is necessary, and store
-    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>Web&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;p&gt;In addition, many web sites spy</strong></del></span> <span 
class="inserted"><ins><em>lack
-    of transparency</em></ins></span> on <span 
class="removed"><del><strong>their visitors.  Web sites are not
-   programs, so it
-   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
-   but</strong></del></span> the <span 
class="removed"><del><strong>surveillance is an abuse all</strong></del></span> 
<span class="inserted"><ins><em>part of both</em></ins></span> the <span 
class="removed"><del><strong>same.&lt;/p&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;&lt;p&gt;Online sales, with tracking</strong></del></span> <span 
class="inserted"><ins><em>educational services</em></ins></span> and <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>the
-    schools, the difficulty</em></ins></span> of <span 
class="removed"><del><strong>customers, &lt;a 
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
-      businesses to show different people different prices&lt;/a&gt;. 
Most</strong></del></span> <span class="inserted"><ins><em>opting 
out</em></ins></span> of <span class="inserted"><ins><em>these services, 
and</em></ins></span> the <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>lack
-    of proper privacy policies, among other things.&lt;/p&gt;
-
-    &lt;p&gt;But complaining</em></ins></span> is <span 
class="removed"><del><strong>done by recording interactions with
-      servers, but proprietary software contributes.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
-      Baidu's Japanese-input</strong></del></span> <span 
class="inserted"><ins><em>not sufficient. Parents, students</em></ins></span> 
and <span class="removed"><del><strong>Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain 
about</em></ins></span> the <span class="removed"><del><strong>IP 
address</strong></del></span> <span class="inserted"><ins><em>lack
+    of transparency on the part of both the educational 
services</em></ins></span> and the <span class="removed"><del><strong>page that 
was visited.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
-      &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-      enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even
-      users that don't have Facebook accounts.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Many web sites try to collect users' address books (the
+      user's list</strong></del></span>
+    <span class="inserted"><ins><em>schools, the difficulty</em></ins></span> 
of <span class="removed"><del><strong>other people's phone numbers or email 
addresses).
+      This violates</strong></del></span> <span 
class="inserted"><ins><em>opting out of these services, and</em></ins></span> 
the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>lack</em></ins></span>
+    of <span class="removed"><del><strong>those</strong></del></span> <span 
class="inserted"><ins><em>proper privacy policies, among</em></ins></span> 
other <span class="removed"><del><strong>people.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many web sites rat their visitors to advertising 
networks</strong></del></span> <span class="inserted"><ins><em>teachers
-    should realize</em></ins></span> that <span 
class="removed"><del><strong>track
-      users.  Of</strong></del></span> the <span 
class="removed"><del><strong>top 1000 web sites, &lt;a
-      
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-      (as of 5/17/2012) fed their visitors third-party cookies, allowing other
-      sites</strong></del></span> <span class="inserted"><ins><em>software 
Google uses</em></ins></span> to <span class="removed"><del><strong>track 
them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+      Microsoft SkyDrive allows</strong></del></span> <span 
class="inserted"><ins><em>things.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Many web sites report all their 
visitors</strong></del></span> <span class="inserted"><ins><em>spy on students 
is
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
     nonfree, so they can't verify what it really does. The only remedy is
-    to persuade school officials</em></ins></span> to <span 
class="removed"><del><strong>Google by using
-      the Google Analytics service, which</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-      tells Google</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
     exclusively use free software&lt;/a&gt; for both education and school
-    administration. If</em></ins></span> the <span 
class="removed"><del><strong>IP address</strong></del></span> <span 
class="inserted"><ins><em>school is run locally, parents</em></ins></span> and 
<span class="inserted"><ins><em>teachers
-    can mandate their representatives at</em></ins></span> the <span 
class="removed"><del><strong>page that was visited.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Many web sites try</strong></del></span> <span 
class="inserted"><ins><em>School Board</em></ins></span> to <span 
class="removed"><del><strong>collect users' address books (the
-      user's list of other people's phone numbers or email addresses).
-      This violates</strong></del></span> <span 
class="inserted"><ins><em>refuse</em></ins></span> the <span 
class="removed"><del><strong>privacy of those other people.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-      Microsoft SkyDrive allows</strong></del></span>
-    <span class="inserted"><ins><em>budget unless</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>school initiates a switch</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' data&lt;/a&gt;.&lt;/p&gt;
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>School Board</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' data&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>free software. If
-    education is run nation-wide, they need</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>persuade 
legislators
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>refuse the
+    budget unless the school initiates a switch</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>free software. 
If
+    education is run nation-wide, they need to persuade legislators
     (e.g., through free software organizations, political parties,
     etc.) to migrate the public schools to free software.&lt;/p&gt;
   &lt;/li&gt;
@@ -3949,6 +3981,17 @@
 <span class="inserted"><ins><em>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202104060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others&lt;/a&gt;, and gives people no control over their personal
+    information/data. The app also sometimes shows old photos and memories
+    to the user without user having control over this.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202102160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -4153,7 +4196,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/15 19:01:23 $
+$Date: 2021/04/26 12:04:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.384
retrieving revision 1.385
diff -u -b -r1.384 -r1.385
--- proprietary/po/proprietary-surveillance.ja.po       15 Apr 2021 19:01:23 
-0000      1.384
+++ proprietary/po/proprietary-surveillance.ja.po       26 Apr 2021 12:04:37 
-0000      1.385
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4375,6 +4375,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "

Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.323
retrieving revision 1.324
diff -u -b -r1.323 -r1.324
--- proprietary/po/proprietary-surveillance.pot 15 Apr 2021 19:01:23 -0000      
1.323
+++ proprietary/po/proprietary-surveillance.pot 26 Apr 2021 12:04:37 -0000      
1.324
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3551,6 +3551,16 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a "
+"href=\"https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/\";>WeddingWire
 "
+"app saves people's wedding photos forever and hands over data to others</a>, "
+"and gives people no control over their personal information/data. The app "
+"also sometimes shows old photos and memories to the user without user having "
+"control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google <a "
 
"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\";>handed
 "
 "over personal data of Indian protesters and activists to Indian police</a> "

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.708
retrieving revision 1.709
diff -u -b -r1.708 -r1.709
--- proprietary/po/proprietary-surveillance.ru.po       16 Apr 2021 05:31:06 
-0000      1.708
+++ proprietary/po/proprietary-surveillance.ru.po       26 Apr 2021 12:04:37 
-0000      1.709
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5255,6 +5256,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-";
 "arrest-puts-privacy-of-all-google-india-users-in-"
 "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary/po/proprietary.de-diff.html     18 Apr 2021 08:31:19 -0000      
1.248
+++ proprietary/po/proprietary.de-diff.html     26 Apr 2021 12:04:37 -0000      
1.249
@@ -224,6 +224,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202104060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others&lt;/a&gt;, and gives people no control over their personal
+    information/data. The app also sometimes shows old photos and memories
+    to the user without user having control over this.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202104090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -272,25 +283,6 @@
     is unacceptable. &lt;a href="/proprietary/proprietary-drm.html"&gt;DRM is
     an injustice to people&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202103090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
-    company's proprietary software are cracked&lt;/a&gt; by a major security
-    breach. Crackers have had access to security archives of various
-    gyms, hospitals, jails, schools, and police stations that have used
-    Verdaka's cameras.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;It is 
injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
-    hand &ldquo;security&rdquo; footage to a company from which the government 
can
-    collect it at any time, without even telling them.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -355,7 +347,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary/po/proprietary.de.po    18 Apr 2021 08:31:19 -0000      1.283
+++ proprietary/po/proprietary.de.po    26 Apr 2021 12:04:37 -0000      1.284
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,6 +480,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -525,42 +534,6 @@
 "injustice to people</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-# | [-It is unfortunate-]{+<small>Please note+} that the article [-uses the
-# | term <a
-# | 
href=\"/philosophy/words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>.-]
-# | {+wrongly refers to crackers as &ldquo;<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>
-# | +}
-#, fuzzy
-#| msgid ""
-#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#| "words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>."
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
-"to-avoid#Monetize\">„monetarisieren“</a> verwendet."
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}
@@ -674,6 +647,18 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#~| "words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>."
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</"
+#~ "small>"
+#~ msgstr ""
+#~ "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/"
+#~ "words-to-avoid#Monetize\">„monetarisieren“</a> verwendet."
+
+#, fuzzy
+#~| msgid ""
 #~| "The Amazon &ldquo;smart&rdquo; TV is <a href=\"http://www.theguardian.";
 #~| "com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-"
 #~| "listening-surveillance\"> snooping all the time</a>."

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.435
retrieving revision 1.436
diff -u -b -r1.435 -r1.436
--- proprietary/po/proprietary.es.po    20 Apr 2021 11:32:18 -0000      1.435
+++ proprietary/po/proprietary.es.po    26 Apr 2021 12:04:37 -0000      1.436
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -341,6 +342,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -416,45 +426,6 @@
 "inaceptable. <a href=\"/proprietary/proprietary-drm.html\">El DRM es una "
 "injusticia para la gente</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-"Un fallo de seguridad ha permitido que <a href=\"https://www.bloomberg.com/";
-"news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-"
-"security-cams\">que más de 150.000 cámaras de seguridad que utilizaban el "
-"software privativo de la compañía Verkada hayan sido <cite>crackeadas</"
-"cite></a>. Los atacantes han accedido a los archivos de seguridad de "
-"gimnasios, hospitales, prisiones, centros educativos y comisarías que han "
-"utilizado las cámaras de Verdaka."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">Es una injusticia "
-"para la gente</a> que acude a gimnasios, comercios, hospitales, prisiones y "
-"centros educativos entregar filmaciones de «seguridad» a una compañía de 
la "
-"que el Gobierno puede obtenerlas en cualquier momento, sin ni siquiera "
-"decírselo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Advierta que en ese artículo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a></small>"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Ver más&hellip;</a>"
@@ -538,3 +509,40 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-";
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand "
+#~ "security cameras that used Verkada company's proprietary software are "
+#~ "cracked</a> by a major security breach. Crackers have had access to "
+#~ "security archives of various gyms, hospitals, jails, schools, and police "
+#~ "stations that have used Verdaka's cameras."
+#~ msgstr ""
+#~ "Un fallo de seguridad ha permitido que <a href=\"https://www.bloomberg.";
+#~ "com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-"
+#~ "of-150-000-security-cams\">que más de 150.000 cámaras de seguridad que "
+#~ "utilizaban el software privativo de la compañía Verkada hayan sido "
+#~ "<cite>crackeadas</cite></a>. Los atacantes han accedido a los archivos de "
+#~ "seguridad de gimnasios, hospitales, prisiones, centros educativos y "
+#~ "comisarías que han utilizado las cámaras de Verdaka."
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
+#~ "the public</a> for gyms, stores, hospitals, jails, and schools to hand "
+#~ "&ldquo;security&rdquo; footage to a company from which the government can "
+#~ "collect it at any time, without even telling them."
+#~ msgstr ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">Es una injusticia "
+#~ "para la gente</a> que acude a gimnasios, comercios, hospitales, prisiones "
+#~ "y centros educativos entregar filmaciones de «seguridad» a una 
compañía "
+#~ "de la que el Gobierno puede obtenerlas en cualquier momento, sin ni "
+#~ "siquiera decírselo."
+
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>Advierta que en ese artículo se refieren erróneamente a los "
+#~ "«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+#~ "html#Hacker\">«<cite>hackers</cite>»</a></small>"

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.476
retrieving revision 1.477
diff -u -b -r1.476 -r1.477
--- proprietary/po/proprietary.fr.po    18 Apr 2021 09:16:44 -0000      1.476
+++ proprietary/po/proprietary.fr.po    26 Apr 2021 12:04:38 -0000      1.477
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2021-04-18 11:16+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -338,6 +339,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -411,41 +421,6 @@
 "qui est inacceptable. <a href=\"/proprietary/proprietary-drm.html\">Les DRM "
 "traitent les gens de manière injuste</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Le piratage d'au moins "
-"150 000 caméras de surveillance fonctionnant avec un logiciel de 
Verkada</a> "
-"a permis aux crackers d'accéder aux enregistrements de divers gymnases, "
-"hôpitaux, prisons, écoles et commissariats de police."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">C'est faire du tort "
-"au public</a> que de communiquer les enregistrements de caméras dites « de 
"
-"sécurité » à une entreprise chez qui le gouvernement peut aller les 
chercher "
-"n'importe quand, sans même avertir les personnes concernées."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Voir plus&hellip;</a>"
@@ -522,3 +497,37 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-";
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand "
+#~ "security cameras that used Verkada company's proprietary software are "
+#~ "cracked</a> by a major security breach. Crackers have had access to "
+#~ "security archives of various gyms, hospitals, jails, schools, and police "
+#~ "stations that have used Verdaka's cameras."
+#~ msgstr ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-";
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Le piratage d'au "
+#~ "moins 150 000 caméras de surveillance fonctionnant avec un logiciel de "
+#~ "Verkada</a> a permis aux crackers d'accéder aux enregistrements de divers 
"
+#~ "gymnases, hôpitaux, prisons, écoles et commissariats de police."
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
+#~ "the public</a> for gyms, stores, hospitals, jails, and schools to hand "
+#~ "&ldquo;security&rdquo; footage to a company from which the government can "
+#~ "collect it at any time, without even telling them."
+#~ msgstr ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">C'est faire du "
+#~ "tort au public</a> que de communiquer les enregistrements de caméras "
+#~ "dites « de sécurité » à une entreprise chez qui le gouvernement 
peut "
+#~ "aller les chercher n'importe quand, sans même avertir les personnes "
+#~ "concernées."
+
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>(Notez que cet article utilise le terme « <a href=\"/philosophy/"
+#~ "words-to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- proprietary/po/proprietary.it-diff.html     18 Apr 2021 08:31:19 -0000      
1.260
+++ proprietary/po/proprietary.it-diff.html     26 Apr 2021 12:04:38 -0000      
1.261
@@ -58,9 +58,8 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
@@ -71,8 +70,9 @@
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -223,6 +223,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202104060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others&lt;/a&gt;, and gives people no control over their personal
+    information/data. The app also sometimes shows old photos and memories
+    to the user without user having control over this.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202104090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,25 +282,6 @@
     is unacceptable. &lt;a href="/proprietary/proprietary-drm.html"&gt;DRM is
     an injustice to people&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202103090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
-    company's proprietary software are cracked&lt;/a&gt; by a major security
-    breach. Crackers have had access to security archives of various
-    gyms, hospitals, jails, schools, and police stations that have used
-    Verdaka's cameras.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;It is 
injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
-    hand &ldquo;security&rdquo; footage to a company from which the government 
can
-    collect it at any time, without even telling them.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -354,7 +346,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- proprietary/po/proprietary.it.po    18 Apr 2021 08:31:19 -0000      1.292
+++ proprietary/po/proprietary.it.po    26 Apr 2021 12:04:38 -0000      1.293
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,6 +485,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -530,30 +539,6 @@
 "injustice to people</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- proprietary/po/proprietary.ja-diff.html     18 Apr 2021 08:31:19 -0000      
1.265
+++ proprietary/po/proprietary.ja-diff.html     26 Apr 2021 12:04:38 -0000      
1.266
@@ -28,10 +28,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -63,8 +63,8 @@
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -171,8 +171,8 @@
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
@@ -183,8 +183,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -205,10 +205,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -228,6 +228,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202104060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others&lt;/a&gt;, and gives people no control over their personal
+    information/data. The app also sometimes shows old photos and memories
+    to the user without user having control over this.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202104090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -276,25 +287,6 @@
     is unacceptable. &lt;a href="/proprietary/proprietary-drm.html"&gt;DRM is
     an injustice to people&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202103090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
-    company's proprietary software are cracked&lt;/a&gt; by a major security
-    breach. Crackers have had access to security archives of various
-    gyms, hospitals, jails, schools, and police stations that have used
-    Verdaka's cameras.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;It is 
injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
-    hand &ldquo;security&rdquo; footage to a company from which the government 
can
-    collect it at any time, without even telling them.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -359,7 +351,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary/po/proprietary.ja.po    18 Apr 2021 08:31:19 -0000      1.276
+++ proprietary/po/proprietary.ja.po    26 Apr 2021 12:04:38 -0000      1.277
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,6 +343,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -388,30 +397,6 @@
 "injustice to people</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary/po/proprietary.nl-diff.html     18 Apr 2021 08:31:19 -0000      
1.261
+++ proprietary/po/proprietary.nl-diff.html     26 Apr 2021 12:04:38 -0000      
1.262
@@ -223,6 +223,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202104060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others&lt;/a&gt;, and gives people no control over their personal
+    information/data. The app also sometimes shows old photos and memories
+    to the user without user having control over this.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202104090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,25 +282,6 @@
     is unacceptable. &lt;a href="/proprietary/proprietary-drm.html"&gt;DRM is
     an injustice to people&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202103090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
-    company's proprietary software are cracked&lt;/a&gt; by a major security
-    breach. Crackers have had access to security archives of various
-    gyms, hospitals, jails, schools, and police stations that have used
-    Verdaka's cameras.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;It is 
injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
-    hand &ldquo;security&rdquo; footage to a company from which the government 
can
-    collect it at any time, without even telling them.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -354,7 +346,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary/po/proprietary.nl.po    18 Apr 2021 08:31:19 -0000      1.266
+++ proprietary/po/proprietary.nl.po    26 Apr 2021 12:04:38 -0000      1.267
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,6 +388,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -433,30 +442,6 @@
 "injustice to people</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
 # | {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary/po/proprietary.pl-diff.html     18 Apr 2021 08:31:19 -0000      
1.278
+++ proprietary/po/proprietary.pl-diff.html     26 Apr 2021 12:04:38 -0000      
1.279
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,13 +57,13 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -121,8 +121,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>March, 2021, the pages in this directory list 
around 500
-instances of malicious functionalities (with more than 590 references to
+&lt;p&gt;As of March, 2021, the pages in this directory list around 500
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 590 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;p&gt;If you want to be notified when we add new items or make other 
changes,
@@ -167,18 +167,18 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -222,6 +222,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202104060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others&lt;/a&gt;, and gives people no control over their personal
+    information/data. The app also sometimes shows old photos and memories
+    to the user without user having control over this.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202104090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -270,25 +281,6 @@
     is unacceptable. &lt;a href="/proprietary/proprietary-drm.html"&gt;DRM is
     an injustice to people&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202103090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
-    company's proprietary software are cracked&lt;/a&gt; by a major security
-    breach. Crackers have had access to security archives of various
-    gyms, hospitals, jails, schools, and police stations that have used
-    Verdaka's cameras.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;It is 
injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
-    hand &ldquo;security&rdquo; footage to a company from which the government 
can
-    collect it at any time, without even telling them.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -353,7 +345,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- proprietary/po/proprietary.pl.po    18 Apr 2021 08:31:19 -0000      1.259
+++ proprietary/po/proprietary.pl.po    26 Apr 2021 12:04:38 -0000      1.260
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,6 +569,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -614,30 +623,6 @@
 "injustice to people</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary/po/proprietary.pot      18 Apr 2021 08:31:19 -0000      1.256
+++ proprietary/po/proprietary.pot      26 Apr 2021 12:04:38 -0000      1.257
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,6 +280,16 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a "
+"href=\"https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/\";>WeddingWire
 "
+"app saves people's wedding photos forever and hands over data to others</a>, "
+"and gives people no control over their personal information/data. The app "
+"also sometimes shows old photos and memories to the user without user having "
+"control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a "
 
"href=\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/\";>can
 "
 "be used to launch remote code execution (RCE) attacks</a> has been disclosed "
@@ -326,30 +336,6 @@
 "injustice to people</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams\";>Over
 "
-"150 thousand security cameras that used Verkada company's proprietary "
-"software are cracked</a> by a major security breach. Crackers have had "
-"access to security archives of various gyms, hospitals, jails, schools, and "
-"police stations that have used Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr ""

Index: proprietary/po/proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/proprietary.pt-br-diff.html  23 Apr 2021 10:29:19 -0000      
1.19
+++ proprietary/po/proprietary.pt-br-diff.html  26 Apr 2021 12:04:38 -0000      
1.20
@@ -198,111 +198,103 @@
 &lt;h3 id="latest"&gt;Latest additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li <span 
class="removed"><del><strong>id="M202102010"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202104090"&gt;</em></ins></span>
+  &lt;li <span 
class="removed"><del><strong>id="M202102010"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202104060"&gt;</em></ins></span>
     &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-02&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2021-04&lt;/small&gt;'</em></ins></span>
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     <span class="removed"><del><strong>&lt;p&gt;Many cr&hellip;apps, developed 
by various
-    companies for various organizations, do</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;A zero-day vulnerability in Zoom 
which</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
-    location tracking unknown to those companies and those
-    organizations&lt;/a&gt;.  It's actually some widely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/"&gt;can
-    be</em></ins></span> used <span class="removed"><del><strong>libraries 
that do
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over 
data</em></ins></span>
+    to <span class="removed"><del><strong>those 
companies</strong></del></span> <span 
class="inserted"><ins><em>others&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
     the tracking.&lt;/p&gt;
 
     &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
     proprietary software developers B1 &hellip; B50 into making platforms for
-    A</strong></del></span> to <span class="removed"><del><strong>mistreat the 
end user.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>launch remote code execution (RCE) attacks&lt;/a&gt; 
has been
-    disclosed by researchers. The researchers demonstrated a three-bug
-    attack chain that caused an RCE on a target machine, and all without
-    any form of user interaction.&lt;/p&gt;</em></ins></span>
+    A</strong></del></span> <span class="inserted"><ins><em>gives people no 
control over their personal
+    information/data. The app also sometimes shows old photos and 
memories</em></ins></span>
+    to <span class="removed"><del><strong>mistreat</strong></del></span> the 
<span class="removed"><del><strong>end user.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user without user having control over 
this.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="M202010120"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202102160"&gt;</em></ins></span>
-    &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2020-10&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2021-02&lt;/small&gt;'</em></ins></span>
+  &lt;li <span 
class="removed"><del><strong>id="M202010120"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202104090"&gt;</em></ins></span>
+    &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2020-10&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2021-04&lt;/small&gt;'</em></ins></span>
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    <span class="removed"><del><strong>&lt;p&gt;Samsung is forcing its 
smartphone users in Hong Kong (and Macau)</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Google</em></ins></span> &lt;a
+    <span class="removed"><del><strong>&lt;p&gt;Samsung is forcing its 
smartphone users</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;A zero-day 
vulnerability</em></ins></span> in <span class="removed"><del><strong>Hong Kong 
(and Macau)</strong></del></span> <span class="inserted"><ins><em>Zoom 
which</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/"&gt;to
-    use a public DNS in Mainland China&lt;/a&gt;, using software update 
released
-    in September 2020,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
-    over personal data of Indian protesters and activists to Indian
-    police&lt;/a&gt;</em></ins></span> which <span 
class="removed"><del><strong>causes many unease</strong></del></span> <span 
class="inserted"><ins><em>led to their arrest. The cops requested the IP
-    address</em></ins></span> and <span class="removed"><del><strong>privacy 
concerns.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
location where a document was created and with that
-    information, they identified protesters and 
activists.&lt;/p&gt;</em></ins></span>
+    use</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/"&gt;can
+    be used to launch remote code execution (RCE) attacks&lt;/a&gt; has been
+    disclosed by researchers. The researchers demonstrated</em></ins></span> a 
<span class="removed"><del><strong>public DNS in Mainland China&lt;/a&gt;, 
using software update released
+    in September 2020, which causes many unease</strong></del></span> <span 
class="inserted"><ins><em>three-bug
+    attack chain that caused an RCE on a target machine,</em></ins></span> and 
<span class="removed"><del><strong>privacy 
concerns.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>all 
without
+    any form of user interaction.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="M202101130"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202007020"&gt;</em></ins></span>
-    &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-01&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2020-07&lt;/small&gt;'</em></ins></span>
+  &lt;li <span 
class="removed"><del><strong>id="M202101130"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202102160"&gt;</em></ins></span>
+    &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-01&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2021-02&lt;/small&gt;'</em></ins></span>
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     <span class="removed"><del><strong>&lt;p&gt;The authorities in Venice 
track the</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;BMW is trying 
to</em></ins></span> &lt;a
+    <span class="inserted"><ins><em>&lt;p&gt;Google</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html"&gt;
     movements</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
-    certain features of its cars, and force people to pay to use 
part</em></ins></span> of <span class="removed"><del><strong>all 
tourists&lt;/a&gt; using their portable phones.  The article
-    says that &lt;em&gt;at present&lt;/em&gt;</strong></del></span>
-    the <span class="removed"><del><strong>system</strong></del></span> <span 
class="inserted"><ins><em>car they already bought&lt;/a&gt;. 
This</em></ins></span> is <span class="removed"><del><strong>configured to 
report only
+    <span 
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data</em></ins></span> of <span 
class="removed"><del><strong>all tourists&lt;/a&gt; using</strong></del></span> 
<span class="inserted"><ins><em>Indian protesters and activists to Indian
+    police&lt;/a&gt; which led to</em></ins></span> their <span 
class="removed"><del><strong>portable phones.</strong></del></span> <span 
class="inserted"><ins><em>arrest.</em></ins></span> The <span 
class="removed"><del><strong>article
+    says that &lt;em&gt;at present&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>cops requested</em></ins></span> the <span 
class="removed"><del><strong>system is configured to report only
     aggregated information.  But that could be changed.  What will that
     system do 10 years from now?  What will a similar system in another
-    country do?  Those are</strong></del></span> <span 
class="inserted"><ins><em>done through forced update
-    of</em></ins></span> the <span class="removed"><del><strong>questions this 
raises.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>car 
software via a radio-operated back door.&lt;/p&gt;</em></ins></span>
+    country do?  Those are</strong></del></span> <span 
class="inserted"><ins><em>IP
+    address and</em></ins></span> the <span 
class="removed"><del><strong>questions this 
raises.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>location where a document was created and with that
+    information, they identified protesters and 
activists.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="M202101110"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202103100"&gt;</em></ins></span>
-    &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-01&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2021-03&lt;/small&gt;'</em></ins></span>
+  &lt;li <span 
class="removed"><del><strong>id="M202101110"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202007020"&gt;</em></ins></span>
+    &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-01&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2020-07&lt;/small&gt;'</em></ins></span>
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     <span class="removed"><del><strong>&lt;p&gt;A cracker</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Amazon's monopoly and DRM 
is</em></ins></span> &lt;a
+    <span class="inserted"><ins><em>&lt;p&gt;BMW is trying 
to</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom"&gt;took
-    control of people's internet-connected chastity cages</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly/"&gt;stopping
-    public libraries from lending e-books</em></ins></span> and <span 
class="removed"><del><strong>demanded
-    ransom&lt;/a&gt;. The chastity cages are being 
controlled</strong></del></span>
-    <span class="inserted"><ins><em>audiobooks&lt;/a&gt;. Amazon became 
powerful in e-book world</em></ins></span> by <span 
class="inserted"><ins><em>&lt;a
-    href="/philosophy/why-call-it-the-swindle.html"&gt;Swindle&lt;/a&gt;,
-    and is now misusing its power and violates people's rights using
-    &lt;a href="https://www.defectivebydesign.org"&gt;Digital Restrictions
-    Management&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article is written in</em></ins></span> a <span 
class="removed"><del><strong>proprietary
+    control</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates"&gt;lock
+    certain features</em></ins></span> of <span 
class="removed"><del><strong>people's internet-connected chastity 
cages</strong></del></span> <span class="inserted"><ins><em>its 
cars,</em></ins></span> and <span class="removed"><del><strong>demanded
+    ransom&lt;/a&gt;. The chastity cages are being controlled by a proprietary
     app (mobile program).&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Please note</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> that <span 
class="removed"><del><strong>the article
-    wrongly refers</strong></del></span> <span 
class="inserted"><ins><em>endorses DRM in general, which
-    is unacceptable. &lt;a href="/proprietary/proprietary-drm.html"&gt;DRM is
-    an injustice</em></ins></span> to <span 
class="removed"><del><strong>crackers as "&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;".)&lt;/small&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>people&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;(Please note that the article
+    wrongly refers</strong></del></span> <span class="inserted"><ins><em>force 
people</em></ins></span> to <span class="removed"><del><strong>crackers as 
"&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;".)&lt;/small&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>pay to use part of
+    the car they already bought&lt;/a&gt;. This is done through forced update
+    of the car software via a radio-operated back 
door.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="M202101080"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202103090"&gt;</em></ins></span>
+  &lt;li <span 
class="removed"><del><strong>id="M202101080"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202103100"&gt;</em></ins></span>
     &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-01&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2021-03&lt;/small&gt;'</em></ins></span>
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    <span class="removed"><del><strong>&lt;p&gt;As of 2021, WhatsApp 
(one</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
-    company's proprietary software are cracked&lt;/a&gt; by a major security
-    breach. Crackers have had access to security archives</em></ins></span> of 
<span class="removed"><del><strong>Facebook's 
subsidiaries)</strong></del></span> <span class="inserted"><ins><em>various
-    gyms, hospitals, jails, schools, and police stations that have used
-    Verdaka's cameras.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;It</em></ins></span> is 
<span class="removed"><del><strong>&lt;a
-    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users</strong></del></span> <span class="inserted"><ins><em>injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and 
schools</em></ins></span> to
-    hand <span class="removed"><del><strong>over sensitive personal 
data&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;security&rdquo; footage</em></ins></span> to 
<span class="removed"><del><strong>its parent
-    company. This increases Facebook's power over users, and further
-    jeopardizes people's privacy and security.&lt;/p&gt;
-
-    &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU 
Jami&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>a company 
from</em></ins></span> which <span class="removed"><del><strong>is
-    free software and will not</strong></del></span> <span 
class="inserted"><ins><em>the government can</em></ins></span>
-    collect <span class="removed"><del><strong>your 
data.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>it at any 
time, without even telling them.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    <span class="removed"><del><strong>&lt;p&gt;As of 2021, WhatsApp (one of 
Facebook's subsidiaries)</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Amazon's monopoly and 
DRM</em></ins></span> is &lt;a
+    <span 
class="removed"><del><strong>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
+    its users to hand over sensitive personal data&lt;/a&gt; 
to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly/"&gt;stopping
+    public libraries from lending e-books and
+    audiobooks&lt;/a&gt;. Amazon became powerful in e-book world by &lt;a
+    href="/philosophy/why-call-it-the-swindle.html"&gt;Swindle&lt;/a&gt;,
+    and is now misusing</em></ins></span> its <span 
class="removed"><del><strong>parent
+    company. This increases Facebook's</strong></del></span> power <span 
class="removed"><del><strong>over users,</strong></del></span> and <span 
class="removed"><del><strong>further
+    jeopardizes</strong></del></span> <span 
class="inserted"><ins><em>violates</em></ins></span> people's <span 
class="removed"><del><strong>privacy and security.&lt;/p&gt;
+
+    &lt;p&gt;Instead of WhatsApp you can use</strong></del></span> <span 
class="inserted"><ins><em>rights using</em></ins></span>
+    &lt;a
+    <span 
class="removed"><del><strong>href="https://directory.fsf.org/wiki/Jami"&gt;GNU 
Jami&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.defectivebydesign.org"&gt;Digital 
Restrictions
+    Management&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is written in a way that endorses DRM in 
general,</em></ins></span> which
+    is
+    <span class="removed"><del><strong>free software and will not collect your 
data.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unacceptable. &lt;a 
href="/proprietary/proprietary-drm.html"&gt;DRM is
+    an injustice to people&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 <span class="inserted"><ins><em>&lt;p class="button right-align"&gt;
@@ -367,7 +359,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/23 10:29:19 $
+$Date: 2021/04/26 12:04:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.408
retrieving revision 1.409
diff -u -b -r1.408 -r1.409
--- proprietary/po/proprietary.pt-br.po 18 Apr 2021 08:31:19 -0000      1.408
+++ proprietary/po/proprietary.pt-br.po 26 Apr 2021 12:04:38 -0000      1.409
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2021-02-07 15:33-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -341,6 +341,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -386,37 +395,6 @@
 "injustice to people</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
-"small>"
-
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
@@ -497,6 +475,19 @@
 msgid "Updated:"
 msgstr "Última atualização:"
 
+#, fuzzy
+#~| msgid ""
+#~| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#~| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</"
+#~ "em> como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</"
+#~ "a>”.)</small>"
+
 #~ msgid ""
 #~ "Many cr&hellip;apps, developed by various companies for various "
 #~ "organizations, do <a href=\"https://www.expressvpn.com/digital-security-";

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.498
retrieving revision 1.499
diff -u -b -r1.498 -r1.499
--- proprietary/po/proprietary.ru.po    19 Apr 2021 14:01:29 -0000      1.498
+++ proprietary/po/proprietary.ru.po    26 Apr 2021 12:04:39 -0000      1.499
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -340,6 +341,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -413,43 +423,6 @@
 "целом, что неприемлемо. <a 
href=\"/proprietary/proprietary-drm.html"
 "\">Цифровое управление ограничениями 
несправедливо по отношению к людям</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Свыше 150 тысяч 
камер "
-"наблюдения, в которых применялись 
несвободные программы компании Verkada, "
-"были взломаны</a> с помощью серьезного 
упущения в защите. Взломщики получили "
-"доступ к архивам охраны различных 
спортзалов, больниц, тюрем, школ и "
-"отделений полиции, которые применяли 
камеры Verdaka."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">По 
отношению к "
-"обществу несправедливо</a>, когда 
спортзалы, магазины, больницы и школы "
-"вручают записи &ldquo;охраны&rdquo; компании, у 
которой государство может "
-"собирать их в любое время, не говоря им об 
этом."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
-"взломщиков.</small>"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Далее...</a>"
@@ -530,6 +503,41 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-";
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand "
+#~ "security cameras that used Verkada company's proprietary software are "
+#~ "cracked</a> by a major security breach. Crackers have had access to "
+#~ "security archives of various gyms, hospitals, jails, schools, and police "
+#~ "stations that have used Verdaka's cameras."
+#~ msgstr ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-";
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Свыше 150 
тысяч "
+#~ "камер наблюдения, в которых применялись 
несвободные программы компании "
+#~ "Verkada, были взломаны</a> с помощью 
серьезного упущения в защите. "
+#~ "Взломщики получили доступ к архивам ох
раны различных спортзалов, больниц, "
+#~ "тюрем, школ и отделений полиции, которые 
применяли камеры Verdaka."
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
+#~ "the public</a> for gyms, stores, hospitals, jails, and schools to hand "
+#~ "&ldquo;security&rdquo; footage to a company from which the government can "
+#~ "collect it at any time, without even telling them."
+#~ msgstr ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">По 
отношению к "
+#~ "обществу несправедливо</a>, когда 
спортзалы, магазины, больницы и школы "
+#~ "вручают записи &ldquo;охраны&rdquo; компании, 
у которой государство может "
+#~ "собирать их в любое время, не говоря им 
об этом."
+
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
+#~ "html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для "
+#~ "обозначения взломщиков.</small>"
+
+#~ msgid ""
 #~ "TV manufacturers are turning to produce only &ldquo;Smart&rdquo; TV sets "
 #~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-";
 #~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."

Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary/po/proprietary.tr.po    19 Apr 2021 05:51:36 -0000      1.152
+++ proprietary/po/proprietary.tr.po    26 Apr 2021 12:04:39 -0000      1.153
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2021-04-19 07:49+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 2.4.2\n"
 
@@ -336,6 +337,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -410,44 +420,6 @@
 "edilemez. <a href=\"/proprietary/proprietary-drm.html\">DRM insanlara karşı 
"
 "bir haksızlıktır</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Verkada şirketinin özel "
-"mülk yazılımını kullanan 150 binden fazla güvenlik kamerası</a> 
büyük bir "
-"güvenlik ihlaliyle kırıldı. Güvenlik kırıcıları, Verdaka'nın 
kameralarını "
-"kullanan çeşitli spor salonu, hastane, hapishane, okul ve polis merkezinin "
-"güvenlik arşivlerine erişime sahip oldu."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-"Spor salonlarının, mağazaların, hastanelerin, hapishanelerin ve 
okulların, "
-"&ldquo;güvenlik&rdquo; görüntü kayıtlarını, hükümetin istediği 
zaman "
-"toplayabileceği şekilde, ve hatta onlara hiç bir şey söylemeden, bir 
şirkete "
-"teslim edilmesi <a href=\"/philosophy/surveillance-vs-democracy.html\">halka "
-"yönelik bir haksızlıktır</a> ."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Bu yazı güvenlik kırıcılarını hatalı bir şekilde \"<a 
href=\"/"
-"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
-"adlandırmaktır.</small>"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Daha fazlası&hellip;</a>"
@@ -533,6 +505,43 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-";
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand "
+#~ "security cameras that used Verkada company's proprietary software are "
+#~ "cracked</a> by a major security breach. Crackers have had access to "
+#~ "security archives of various gyms, hospitals, jails, schools, and police "
+#~ "stations that have used Verdaka's cameras."
+#~ msgstr ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-";
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Verkada "
+#~ "şirketinin özel mülk yazılımını kullanan 150 binden fazla güvenlik 
"
+#~ "kamerası</a> büyük bir güvenlik ihlaliyle kırıldı. Güvenlik 
kırıcıları, "
+#~ "Verdaka'nın kameralarını kullanan çeşitli spor salonu, hastane, "
+#~ "hapishane, okul ve polis merkezinin güvenlik arşivlerine erişime sahip "
+#~ "oldu."
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
+#~ "the public</a> for gyms, stores, hospitals, jails, and schools to hand "
+#~ "&ldquo;security&rdquo; footage to a company from which the government can "
+#~ "collect it at any time, without even telling them."
+#~ msgstr ""
+#~ "Spor salonlarının, mağazaların, hastanelerin, hapishanelerin ve "
+#~ "okulların, &ldquo;güvenlik&rdquo; görüntü kayıtlarını, hükümetin 
istediği "
+#~ "zaman toplayabileceği şekilde, ve hatta onlara hiç bir şey 
söylemeden, "
+#~ "bir şirkete teslim edilmesi <a href=\"/philosophy/surveillance-vs-"
+#~ "democracy.html\">halka yönelik bir haksızlıktır</a> ."
+
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>Bu yazı güvenlik kırıcılarını hatalı bir şekilde \"<a 
href=\"/"
+#~ "philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
+#~ "adlandırmaktır.</small>"
+
+#~ msgid ""
 #~ "TV manufacturers are turning to produce only &ldquo;Smart&rdquo; TV sets "
 #~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-";
 #~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."

Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary/po/proprietary.zh-cn.po 19 Apr 2021 06:30:03 -0000      1.190
+++ proprietary/po/proprietary.zh-cn.po 26 Apr 2021 12:04:39 -0000      1.191
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2021-04-19 13:38+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -315,6 +316,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -379,39 +389,6 @@
 "此文章以一种支持 DRM 
的口吻来撰写,原则上也是不对的。<a href=\"/proprietary/"
 "proprietary-drm.html\">DRM 是对人们的不公正</a>。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">超过 15 万使用 Verkada 
公司"
-"专有软件的安全摄像头被破解</a>,导致安全泄漏。破解者
获取了多个使用 Verdaka 摄"
-"像头的健身房、监狱、学校和警察局的安全数据档案。"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-"在未被告知的情
况下,将涉及健身房、商店、医院、监狱和学校的 &ldquo;安å…
¨"
-"&rdquo; 数据交给会随时将它们交给政府的公司 <a 
href=\"/philosophy/"
-"surveillance-vs-democracy.html\">对公众是不公正的</a>。"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>请注意,本文错误地将&ldquo;<a 
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">黑客</a>&rdquo;一词当成骇客来用。</small>"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">更多内容&hellip;</a>"
@@ -493,6 +470,37 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-";
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand "
+#~ "security cameras that used Verkada company's proprietary software are "
+#~ "cracked</a> by a major security breach. Crackers have had access to "
+#~ "security archives of various gyms, hospitals, jails, schools, and police "
+#~ "stations that have used Verdaka's cameras."
+#~ msgstr ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-";
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">超过 15 
万使用 "
+#~ "Verkada 公司专有软件的安全摄像头被破解</a>,导致安å…
¨æ³„漏。破解者获取了多个"
+#~ "使用 Verdaka 摄像头的健身房、监狱、学校和警察局的安å…
¨æ•°æ®æ¡£æ¡ˆã€‚"
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
+#~ "the public</a> for gyms, stores, hospitals, jails, and schools to hand "
+#~ "&ldquo;security&rdquo; footage to a company from which the government can "
+#~ "collect it at any time, without even telling them."
+#~ msgstr ""
+#~ "在未被告知的情
况下,将涉及健身房、商店、医院、监狱和学校的 &ldquo;安å…
¨"
+#~ "&rdquo; 数据交给会随时将它们交给政府的公司 <a 
href=\"/philosophy/"
+#~ "surveillance-vs-democracy.html\">对公众是不公正的</a>。"
+
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as &ldquo;"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>请注意,本文错误地将&ldquo;<a 
href=\"/philosophy/words-to-avoid."
+#~ "html#Hacker\">黑客</a>&rdquo;一词当成骇客来用。</small>"
+
+#~ msgid ""
 #~ "TV manufacturers are turning to produce only &ldquo;Smart&rdquo; TV sets "
 #~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-";
 #~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -b -r1.241 -r1.242
--- proprietary/po/proprietary.zh-tw-diff.html  18 Apr 2021 08:31:19 -0000      
1.241
+++ proprietary/po/proprietary.zh-tw-diff.html  26 Apr 2021 12:04:39 -0000      
1.242
@@ -224,6 +224,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202104060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others&lt;/a&gt;, and gives people no control over their personal
+    information/data. The app also sometimes shows old photos and memories
+    to the user without user having control over this.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202104090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -272,25 +283,6 @@
     is unacceptable. &lt;a href="/proprietary/proprietary-drm.html"&gt;DRM is
     an injustice to people&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202103090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
-    company's proprietary software are cracked&lt;/a&gt; by a major security
-    breach. Crackers have had access to security archives of various
-    gyms, hospitals, jails, schools, and police stations that have used
-    Verdaka's cameras.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;It is 
injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
-    hand &ldquo;security&rdquo; footage to a company from which the government 
can
-    collect it at any time, without even telling them.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -355,7 +347,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary/po/proprietary.zh-tw.po 18 Apr 2021 08:31:20 -0000      1.246
+++ proprietary/po/proprietary.zh-tw.po 26 Apr 2021 12:04:39 -0000      1.247
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,6 +458,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/";
 "article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
 "user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -503,30 +512,6 @@
 "injustice to people</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-";
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"&ldquo;security&rdquo; footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.377
retrieving revision 1.378
diff -u -b -r1.377 -r1.378
--- proprietary/po/pt-br.po     18 Apr 2021 08:31:20 -0000      1.377
+++ proprietary/po/pt-br.po     26 Apr 2021 12:04:39 -0000      1.378
@@ -9191,6 +9191,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.640
retrieving revision 1.641
diff -u -b -r1.640 -r1.641
--- proprietary/po/ru.po        19 Apr 2021 14:32:49 -0000      1.640
+++ proprietary/po/ru.po        26 Apr 2021 12:04:39 -0000      1.641
@@ -11105,6 +11105,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary/po/tr.po        18 Apr 2021 08:31:20 -0000      1.170
+++ proprietary/po/tr.po        26 Apr 2021 12:04:39 -0000      1.171
@@ -8294,6 +8294,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary/po/zh-cn.po     19 Apr 2021 06:30:03 -0000      1.172
+++ proprietary/po/zh-cn.po     26 Apr 2021 12:04:39 -0000      1.173
@@ -8020,6 +8020,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/zh-tw.po     18 Apr 2021 08:31:20 -0000      1.306
+++ proprietary/po/zh-tw.po     26 Apr 2021 12:04:39 -0000      1.307
@@ -7774,6 +7774,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-";
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "The Prodigy maths game played in schools at no cost entices students to play "
 "it at home, where <a href=\"https://www.theguardian.com/technology/2021/";
 "feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]