www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/po/all.fr.po proprietary/po/all...


From: GNUN
Subject: www proprietary/po/all.fr.po proprietary/po/all...
Date: Fri, 30 Jul 2021 12:02:42 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/07/30 12:02:41

Modified files:
        proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po 
                         es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.pt-br.po 
                         malware-apple.ru.po malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.pt-br.po malware-google.ru.po 
                         nl.po pl.po pot 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.pt-br.po 
                         proprietary-insecurity.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 
        thankgnus/po   : 2021supporters.pot 2021supporters.pt-br.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.330&r2=1.331
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.473&r2=1.474
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.583&r2=1.584
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.330&r2=1.331
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pt-br.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.331&r2=1.332
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.330&r2=1.331
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.309&r2=1.310
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.304&r2=1.305
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.491&r2=1.492
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.517&r2=1.518
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.297&r2=1.298
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.313&r2=1.314
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.298&r2=1.299
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.440&r2=1.441
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.536&r2=1.537
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.410&r2=1.411
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.692&r2=1.693
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.330&r2=1.331
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pot?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2021supporters.pt-br.po?cvsroot=www&r1=1.125&r2=1.126

Patches:
Index: proprietary/po/all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/all.fr.po    30 Jul 2021 15:33:32 -0000      1.40
+++ proprietary/po/all.fr.po    30 Jul 2021 16:02:32 -0000      1.41
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-07-26 20:32+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -104,6 +104,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/all.pot      30 Jul 2021 15:33:33 -0000      1.21
+++ proprietary/po/all.pot      30 Jul 2021 16:02:32 -0000      1.22
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -97,6 +97,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a "
+"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
+"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
+"systems</a> to impose surveillance on people. It can record people's calls, "
+"copy their messages, and secretly film them, using a zero-click (means no "
+"interaction is needed) and zero-day (means the bug was not found yet) "
+"vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a "
 
"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
 "can allow crackers to remotely gain access to the operating system</a> and "

Index: proprietary/po/all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/all.pt-br.po 30 Jul 2021 15:33:33 -0000      1.15
+++ proprietary/po/all.pt-br.po 30 Jul 2021 16:02:33 -0000      1.16
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -106,6 +106,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/all.ru.po    30 Jul 2021 15:33:33 -0000      1.39
+++ proprietary/po/all.ru.po    30 Jul 2021 16:02:34 -0000      1.40
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-04-27 13:06+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -111,6 +111,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.330
retrieving revision 1.331
diff -u -b -r1.330 -r1.331
--- proprietary/po/de.po        30 Jul 2021 15:33:33 -0000      1.330
+++ proprietary/po/de.po        30 Jul 2021 16:02:34 -0000      1.331
@@ -696,6 +696,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.473
retrieving revision 1.474
diff -u -b -r1.473 -r1.474
--- proprietary/po/es.po        30 Jul 2021 15:33:34 -0000      1.473
+++ proprietary/po/es.po        30 Jul 2021 16:02:36 -0000      1.474
@@ -651,6 +651,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.583
retrieving revision 1.584
diff -u -b -r1.583 -r1.584
--- proprietary/po/fr.po        30 Jul 2021 15:33:35 -0000      1.583
+++ proprietary/po/fr.po        30 Jul 2021 16:02:36 -0000      1.584
@@ -526,6 +526,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.330
retrieving revision 1.331
diff -u -b -r1.330 -r1.331
--- proprietary/po/it.po        30 Jul 2021 15:33:36 -0000      1.330
+++ proprietary/po/it.po        30 Jul 2021 16:02:37 -0000      1.331
@@ -650,6 +650,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary/po/ja.po        30 Jul 2021 15:33:36 -0000      1.338
+++ proprietary/po/ja.po        30 Jul 2021 16:02:38 -0000      1.339
@@ -493,6 +493,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/malware-apple.de-diff.html   30 Jul 2021 15:33:36 -0000      
1.76
+++ proprietary/po/malware-apple.de-diff.html   30 Jul 2021 16:02:38 -0000      
1.77
@@ -327,6 +327,26 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202012200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -452,8 +472,8 @@
     useful and would not be wrong.  Requiring users to get
     Apple's approval is tyranny. Apple says the check will
     only look for malware (not counting the malware that is &lt;a
-    href="/proprietary/malware-apple.html#TOC"&gt;part of
-    the operating system&lt;/a&gt;), but Apple could change that policy step
+    href="/proprietary/malware-apple.html#TOC"&gt;part</em></ins></span> of
+    <span class="inserted"><ins><em>the operating system&lt;/a&gt;), but Apple 
could change that policy step
     by step.  Or perhaps Apple will define malware to include any app
     that China does not like.&lt;/p&gt;
 
@@ -468,19 +488,19 @@
     &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
     iOS, the operating system of the Apple iThings, is the prototype
     of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
-    designing general purpose computers with censorship</em></ins></span> of 
<span class="inserted"><ins><em>application
+    designing general purpose computers with censorship of application
     programs.&lt;/p&gt;
 
     &lt;p&gt;Here is an article about the &lt;a
     href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
     code signing&lt;/a&gt; that the</em></ins></span> iThings <span 
class="inserted"><ins><em>use to lock up the user.&lt;/p&gt;
 
-    &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+    &lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>allow limited passage through the
     walls of the iThing jail: users can now install apps built from
     source code, provided the source code is written in Swift.  Users
-    cannot do this freely because they are required</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>identify
+    cannot do this freely because they are required to identify
     themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
-    are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
+    are details&lt;/a&gt;. While this is</em></ins></span> a <span 
class="inserted"><ins><em>crack in the prison walls, it is not
     big enough to mean that the iThings are no longer jails.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -498,7 +518,7 @@
 
     &lt;p&gt;This is a symptom of a very big injustice: that Apple has the
     power to decide what software can be installed on an iMonster.
-    That it is</em></ins></span> a <span 
class="inserted"><ins><em>jail.&lt;/p&gt;
+    That it is a jail.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910100"&gt;
@@ -663,12 +683,12 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Manipulation&lt;/h3&gt;
+&lt;h3 id="manipulation"&gt;Manipulation&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
@@ -681,12 +701,12 @@
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
     to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;
+    to actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;</em></ins></span>
+&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="pressuring"&gt;Pressuring&lt;/h3&gt;</em></ins></span>
 
 &lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
 
@@ -1302,8 +1322,8 @@
 
 &lt;p&gt;Curiously,</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either</em></ins></span> Apple <span class="removed"><del><strong>is 
beginning to allow limited passage through the
-walls of</strong></del></span> <span 
class="inserted"><ins><em>helps</em></ins></span> the <span 
class="removed"><del><strong>iThing jail: users can now install apps built from
+    Either</em></ins></span> Apple <span class="removed"><del><strong>is 
beginning to allow limited passage through</strong></del></span> <span 
class="inserted"><ins><em>helps</em></ins></span> the
+<span class="removed"><del><strong>walls of the iThing jail: users can now 
install apps built from
 source code, provided</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="removed"><del><strong>source code is written in Swift.  Users
 cannot do this freely because they are required to identify
 themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
@@ -1542,7 +1562,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:36 $
+$Date: 2021/07/30 16:02:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary/po/malware-apple.de.po  30 Jul 2021 15:33:36 -0000      1.167
+++ proprietary/po/malware-apple.de.po  30 Jul 2021 16:02:38 -0000      1.168
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -569,6 +569,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: proprietary/po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary/po/malware-apple.es.po  30 Jul 2021 15:33:37 -0000      1.216
+++ proprietary/po/malware-apple.es.po  30 Jul 2021 16:02:38 -0000      1.217
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -446,6 +446,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: proprietary/po/malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary/po/malware-apple.fr.po  30 Jul 2021 15:33:37 -0000      1.219
+++ proprietary/po/malware-apple.fr.po  30 Jul 2021 16:02:38 -0000      1.220
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-06-13 13:33+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -432,6 +432,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: proprietary/po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary/po/malware-apple.it-diff.html   30 Jul 2021 15:33:37 -0000      
1.81
+++ proprietary/po/malware-apple.it-diff.html   30 Jul 2021 16:02:38 -0000      
1.82
@@ -53,8 +53,8 @@
 &lt;em&gt;Malware&lt;/em&gt; means</strong></del></span> <span 
class="inserted"><ins><em>class="infobox"&gt;
 &lt;hr class="full-width" /&gt;
 &lt;p&gt;Nonfree (proprietary)</em></ins></span> software <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to 
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm the user.  (This does not 
include accidental errors.)
-This page explains how</strong></del></span> the <span 
class="removed"><del><strong>software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm</strong></del></span> the 
<span class="removed"><del><strong>user.  (This does not include accidental 
errors.)
+This page explains how the software in Apple's computer products are
 malware.
 &lt;/p&gt;
 
@@ -116,9 +116,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple appears</em></ins></span> to <span 
class="removed"><del><strong>restrict what users can do with the data in their 
computers.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>impose censorship on application 
programs.&lt;/li&gt;
-&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
-    that reject any operating system</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>reject any operating system</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
     there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
@@ -199,7 +199,7 @@
   &lt;li id="M201908150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple is putting DRM on iPhone batteries, and the system 
proprietary
+    &lt;p&gt;Apple is putting DRM on</em></ins></span> iPhone <span 
class="inserted"><ins><em>batteries, and the system proprietary
     software &lt;a href="#M201908150"&gt;turns off certain features when 
batteries
     are replaced other than by Apple.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -207,7 +207,7 @@
   &lt;li id="M201704070.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;DRM makes the</em></ins></span> iPhone <span 
class="inserted"><ins><em>7 nearly &lt;a
+    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
     href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -325,6 +325,26 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202012200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -451,7 +471,7 @@
     by step.  Or perhaps Apple will define malware to include any app
     that China does not like.&lt;/p&gt;
 
-    &lt;p&gt;For free software, this means</em></ins></span> users <span 
class="inserted"><ins><em>will need to get Apple's
+    &lt;p&gt;For free software, this means users will need to get Apple's
     approval after compilation.  This amounts to a system of surveilling
     the use of free programs.&lt;/p&gt;
   &lt;/li&gt;
@@ -470,7 +490,7 @@
     code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
 
     &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
-    walls of the iThing jail: users can now install apps built from
+    walls of the iThing jail:</em></ins></span> users <span 
class="inserted"><ins><em>can now install apps built from
     source code, provided the source code is written in Swift.  Users
     cannot do this freely because they</em></ins></span> are <span 
class="removed"><del><strong>led into
 enabling</strong></del></span> <span class="inserted"><ins><em>required to 
identify
@@ -857,22 +877,22 @@
     to describe the DRM, but we prefer to use the term &lt;a
   <span 
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"&gt;</em></ins></span>
 digital <span 
class="removed"><del><strong>handcuffs&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    <span 
class="inserted"><ins><em>handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201606080"&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
     stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
-    while refusing to fix them itself.&lt;/p&gt;</em></ins></span>
+    while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;
+  &lt;li id="M201605040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;The Apple Music client program &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
@@ -1480,7 +1500,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:37 $
+$Date: 2021/07/30 16:02:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary/po/malware-apple.it.po  30 Jul 2021 15:33:37 -0000      1.160
+++ proprietary/po/malware-apple.it.po  30 Jul 2021 16:02:38 -0000      1.161
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -507,6 +507,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: proprietary/po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary/po/malware-apple.ja-diff.html   30 Jul 2021 15:33:37 -0000      
1.96
+++ proprietary/po/malware-apple.ja-diff.html   30 Jul 2021 16:02:38 -0000      
1.97
@@ -59,8 +59,8 @@
 &lt;em&gt;Malware&lt;/em&gt; means</strong></del></span> <span 
class="inserted"><ins><em>class="infobox"&gt;
 &lt;hr class="full-width" /&gt;
 &lt;p&gt;Nonfree (proprietary)</em></ins></span> software <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to 
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm the user.  (This does not 
include accidental errors.)
-This page explains how</strong></del></span> the <span 
class="removed"><del><strong>software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm</strong></del></span> the 
<span class="removed"><del><strong>user.  (This does not include accidental 
errors.)
+This page explains how the software in Apple's computer products are
 malware.
 &lt;/p&gt;
 
@@ -126,9 +126,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple appears</em></ins></span> to <span 
class="removed"><del><strong>restrict what users can do with the data in their 
computers.&lt;/li&gt;
-&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application programs.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>reject any operating system</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+&lt;li&gt;&lt;a 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>impose censorship on application 
programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
     there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
@@ -281,8 +281,8 @@
 
 &lt;p&gt;In this section, we list characteristics of</em></ins></span> Apple 
<span class="removed"><del><strong>&lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
 banned a program</strong></del></span> <span 
class="inserted"><ins><em>programs that block or
-hinder users</em></ins></span> from <span class="inserted"><ins><em>switching 
to any alternative program&mdash;and, in
-particular, from switching to free software which can 
liberate</em></ins></span> the <span class="removed"><del><strong>App 
Store&lt;/a&gt; because its developers
+hinder users from switching to any alternative program&mdash;and, in
+particular,</em></ins></span> from <span class="inserted"><ins><em>switching 
to free software which can liberate</em></ins></span> the <span 
class="removed"><del><strong>App Store&lt;/a&gt; because its developers
 committed</strong></del></span> <span 
class="inserted"><ins><em>device</em></ins></span>
 the <span class="removed"><del><strong>enormity</strong></del></span> <span 
class="inserted"><ins><em>software runs on.&lt;/p&gt;
 
@@ -352,14 +352,34 @@
 
     &lt;p&gt;Nobody can do anything about these vulnerabilities and people
     have to wait until</em></ins></span> Apple <span 
class="removed"><del><strong>&lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted</strong></del></span>
 <span class="inserted"><ins><em>fixes these security holes, 
if</em></ins></span> it <span class="removed"><del><strong>was 
censoring</strong></del></span> <span class="inserted"><ins><em>decides
-    to fix it. A free operating system would let people to 
identify</em></ins></span> the <span class="removed"><del><strong>app based 
on</strong></del></span>
+    to fix it. A free operating system would let people to 
identify</em></ins></span> the <span class="removed"><del><strong>app 
based</strong></del></span>
     <span class="inserted"><ins><em>hole and fix it.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;Please note that</em></ins></span> the <span 
class="removed"><del><strong>subject matter&lt;/a&gt;.
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities</em></ins></span> on <span 
class="inserted"><ins><em>proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day 
(means</em></ins></span> the <span class="removed"><del><strong>subject 
matter&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
-As</strong></del></span> <span class="inserted"><ins><em>article
+As</strong></del></span>
+    <span class="inserted"><ins><em>bug was not found yet) 
vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -501,8 +521,8 @@
     useful and would not be wrong.  Requiring users to get
     Apple's approval is tyranny. Apple says the check will
     only look for malware (not counting the malware that is &lt;a
-    href="/proprietary/malware-apple.html#TOC"&gt;part of
-    the operating system&lt;/a&gt;), but Apple could change that policy step
+    href="/proprietary/malware-apple.html#TOC"&gt;part</em></ins></span> of
+    <span class="inserted"><ins><em>the operating system&lt;/a&gt;), but Apple 
could change that policy step
     by step.  Or perhaps Apple will define malware to include any app
     that China does not like.&lt;/p&gt;
 
@@ -517,20 +537,20 @@
     &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
     iOS, the operating system of the Apple iThings, is the prototype
     of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
-    designing general purpose computers with censorship</em></ins></span> of 
<span class="inserted"><ins><em>application
+    designing general purpose computers with censorship of application
     programs.&lt;/p&gt;
 
     &lt;p&gt;Here is an article about the &lt;a
     href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-    code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
+    code signing&lt;/a&gt; that the</em></ins></span> iThings <span 
class="inserted"><ins><em>use to lock up the user.&lt;/p&gt;
 
-    &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+    &lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>allow limited passage through the
     walls of the iThing jail: users can now install apps built from
     source code, provided the source code is written in Swift.  Users
     cannot do this freely because they are required to identify
     themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
     are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
-    big enough to mean that the</em></ins></span> iThings <span 
class="inserted"><ins><em>are no longer jails.&lt;/p&gt;
+    big enough to mean that the iThings are no longer jails.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -545,9 +565,9 @@
     putting the squeeze on all business&lt;/a&gt; conducted through apps
     for iMonsters.&lt;/p&gt;
 
-    &lt;p&gt;This is a symptom of a very big injustice: that Apple has the
-    power</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>decide what software can be installed on an iMonster.
-    That it is</em></ins></span> a <span 
class="inserted"><ins><em>jail.&lt;/p&gt;
+    &lt;p&gt;This is a symptom of</em></ins></span> a <span 
class="inserted"><ins><em>very big injustice: that Apple has the
+    power to decide what software can be installed on an iMonster.
+    That it is a jail.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910100"&gt;
@@ -800,15 +820,15 @@
 
     &lt;p&gt;The <span class="removed"><del><strong>Apple 
Music</strong></del></span> <span 
class="inserted"><ins><em>Telegram</em></ins></span> client
       <span class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>is free software on other platforms, but not on
-    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    iThings. Since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
     are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
+    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
     changes</em></ins></span> the <span 
class="removed"><del><strong>user's</strong></del></span> file system <span 
class="inserted"><ins><em>from HFS+  to APFS&lt;/a&gt;, which cannot be
     accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
@@ -1024,8 +1044,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
@@ -1080,8 +1100,8 @@
   &lt;li id="M201611170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -1445,7 +1465,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:37 $
+$Date: 2021/07/30 16:02:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary/po/malware-apple.ja.po  30 Jul 2021 15:33:37 -0000      1.143
+++ proprietary/po/malware-apple.ja.po  30 Jul 2021 16:02:39 -0000      1.144
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -427,6 +427,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: proprietary/po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary/po/malware-apple.nl-diff.html   30 Jul 2021 15:33:38 -0000      
1.99
+++ proprietary/po/malware-apple.nl-diff.html   30 Jul 2021 16:02:39 -0000      
1.100
@@ -59,8 +59,8 @@
 &lt;em&gt;Malware&lt;/em&gt; means</strong></del></span> <span 
class="inserted"><ins><em>class="infobox"&gt;
 &lt;hr class="full-width" /&gt;
 &lt;p&gt;Nonfree (proprietary)</em></ins></span> software <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>is very often malware (designed</em></ins></span> to 
<span class="removed"><del><strong>function in ways that</strong></del></span>
-mistreat <span class="removed"><del><strong>or harm the user.  (This does not 
include accidental errors.)
-This page explains how</strong></del></span> the <span 
class="removed"><del><strong>software in Apple's computer products are
+mistreat <span class="removed"><del><strong>or harm</strong></del></span> the 
<span class="removed"><del><strong>user.  (This does not include accidental 
errors.)
+This page explains how the software in Apple's computer products are
 malware.
 &lt;/p&gt;
 
@@ -126,9 +126,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple appears</em></ins></span> to <span 
class="removed"><del><strong>restrict what users can do with the data in their 
computers.&lt;/li&gt;
-&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application programs.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>reject any operating system</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+&lt;li&gt;&lt;a 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>impose censorship on application 
programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
     there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
@@ -281,8 +281,8 @@
 
 &lt;p&gt;In this section, we list characteristics of</em></ins></span> Apple 
<span class="removed"><del><strong>&lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
 banned a program</strong></del></span> <span 
class="inserted"><ins><em>programs that block or
-hinder users</em></ins></span> from <span class="inserted"><ins><em>switching 
to any alternative program&mdash;and, in
-particular, from switching to free software which can 
liberate</em></ins></span> the <span class="removed"><del><strong>App 
Store&lt;/a&gt; because its developers
+hinder users from switching to any alternative program&mdash;and, in
+particular,</em></ins></span> from <span class="inserted"><ins><em>switching 
to free software which can liberate</em></ins></span> the <span 
class="removed"><del><strong>App Store&lt;/a&gt; because its developers
 committed</strong></del></span> <span 
class="inserted"><ins><em>device</em></ins></span>
 the <span class="removed"><del><strong>enormity</strong></del></span> <span 
class="inserted"><ins><em>software runs on.&lt;/p&gt;
 
@@ -352,14 +352,34 @@
 
     &lt;p&gt;Nobody can do anything about these vulnerabilities and people
     have to wait until</em></ins></span> Apple <span 
class="removed"><del><strong>&lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted</strong></del></span>
 <span class="inserted"><ins><em>fixes these security holes, 
if</em></ins></span> it <span class="removed"><del><strong>was 
censoring</strong></del></span> <span class="inserted"><ins><em>decides
-    to fix it. A free operating system would let people to 
identify</em></ins></span> the <span class="removed"><del><strong>app based 
on</strong></del></span>
+    to fix it. A free operating system would let people to 
identify</em></ins></span> the <span class="removed"><del><strong>app 
based</strong></del></span>
     <span class="inserted"><ins><em>hole and fix it.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;Please note that</em></ins></span> the <span 
class="removed"><del><strong>subject matter&lt;/a&gt;.
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities</em></ins></span> on <span 
class="inserted"><ins><em>proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day 
(means</em></ins></span> the <span class="removed"><del><strong>subject 
matter&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
-As</strong></del></span> <span class="inserted"><ins><em>article
+As</strong></del></span>
+    <span class="inserted"><ins><em>bug was not found yet) 
vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
     wrongly refers to crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -501,8 +521,8 @@
     useful and would not be wrong.  Requiring users to get
     Apple's approval is tyranny. Apple says the check will
     only look for malware (not counting the malware that is &lt;a
-    href="/proprietary/malware-apple.html#TOC"&gt;part of
-    the operating system&lt;/a&gt;), but Apple could change that policy step
+    href="/proprietary/malware-apple.html#TOC"&gt;part</em></ins></span> of
+    <span class="inserted"><ins><em>the operating system&lt;/a&gt;), but Apple 
could change that policy step
     by step.  Or perhaps Apple will define malware to include any app
     that China does not like.&lt;/p&gt;
 
@@ -517,20 +537,20 @@
     &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
     iOS, the operating system of the Apple iThings, is the prototype
     of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
-    designing general purpose computers with censorship</em></ins></span> of 
<span class="inserted"><ins><em>application
+    designing general purpose computers with censorship of application
     programs.&lt;/p&gt;
 
     &lt;p&gt;Here is an article about the &lt;a
     href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-    code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
+    code signing&lt;/a&gt; that the</em></ins></span> iThings <span 
class="inserted"><ins><em>use to lock up the user.&lt;/p&gt;
 
-    &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+    &lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>allow limited passage through the
     walls of the iThing jail: users can now install apps built from
     source code, provided the source code is written in Swift.  Users
     cannot do this freely because they are required to identify
     themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
     are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
-    big enough to mean that the</em></ins></span> iThings <span 
class="inserted"><ins><em>are no longer jails.&lt;/p&gt;
+    big enough to mean that the iThings are no longer jails.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -545,9 +565,9 @@
     putting the squeeze on all business&lt;/a&gt; conducted through apps
     for iMonsters.&lt;/p&gt;
 
-    &lt;p&gt;This is a symptom of a very big injustice: that Apple has the
-    power</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>decide what software can be installed on an iMonster.
-    That it is</em></ins></span> a <span 
class="inserted"><ins><em>jail.&lt;/p&gt;
+    &lt;p&gt;This is a symptom of</em></ins></span> a <span 
class="inserted"><ins><em>very big injustice: that Apple has the
+    power to decide what software can be installed on an iMonster.
+    That it is a jail.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910100"&gt;
@@ -800,15 +820,15 @@
 
     &lt;p&gt;The <span class="removed"><del><strong>Apple 
Music</strong></del></span> <span 
class="inserted"><ins><em>Telegram</em></ins></span> client
       <span class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>is free software on other platforms, but not on
-    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    iThings. Since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple"&gt;they
     are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
+    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
     changes</em></ins></span> the <span 
class="removed"><del><strong>user's</strong></del></span> file system <span 
class="inserted"><ins><em>from HFS+  to APFS&lt;/a&gt;, which cannot be
     accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
@@ -1024,8 +1044,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In spite of Apple's supposed commitment to
-    privacy, iPhone apps contain trackers that are busy at 
night</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
     sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
@@ -1080,8 +1100,8 @@
   &lt;li id="M201611170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -1445,7 +1465,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:38 $
+$Date: 2021/07/30 16:02:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary/po/malware-apple.nl.po  30 Jul 2021 15:33:38 -0000      1.97
+++ proprietary/po/malware-apple.nl.po  30 Jul 2021 16:02:39 -0000      1.98
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -445,6 +445,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: proprietary/po/malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/malware-apple.pot    30 Jul 2021 15:33:38 -0000      1.107
+++ proprietary/po/malware-apple.pot    30 Jul 2021 16:02:39 -0000      1.108
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -337,6 +337,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a "
+"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
+"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
+"systems</a> to impose surveillance on people. It can record people's calls, "
+"copy their messages, and secretly film them, using a zero-click (means no "
+"interaction is needed) and zero-day (means the bug was not found yet) "
+"vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a "
 
"href=\"https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say\";>
 "
 "get passwords out of an iMonster</a>, use the microphone and camera, and "

Index: proprietary/po/malware-apple.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/po/malware-apple.pt-br.po       30 Jul 2021 15:33:38 -0000      
1.2
+++ proprietary/po/malware-apple.pt-br.po       30 Jul 2021 16:02:39 -0000      
1.3
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -428,6 +428,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: proprietary/po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- proprietary/po/malware-apple.ru.po  30 Jul 2021 15:33:39 -0000      1.268
+++ proprietary/po/malware-apple.ru.po  30 Jul 2021 16:02:39 -0000      1.269
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -431,6 +431,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: proprietary/po/malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/malware-google.de-diff.html  3 Jul 2021 08:33:09 -0000       
1.68
+++ proprietary/po/malware-google.de-diff.html  30 Jul 2021 16:02:39 -0000      
1.69
@@ -311,6 +311,26 @@
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202008110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -344,11 +364,11 @@
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
     lots of bugs in the phones' radio <span 
class="removed"><del><strong>software&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>software&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
-&lt;h3 id="interference"&gt;Interference&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="sabotage"&gt;Google 
Sabotage&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="interference"&gt;Interference&lt;/h3&gt;
 
 &lt;p&gt;This section gives examples of Google software harassing or annoying
 the user, or causing trouble for the user.  These actions are like
@@ -374,11 +394,11 @@
     contains&lt;/a&gt;. Users could conceivably reverse the change in a fork
     of Chromium, but surely Chrome (nonfree) will have the same change,
     and users can't fix it there.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="sabotage"&gt;Google 
Sabotage&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="sabotage"&gt;Sabotage&lt;/h3&gt;</em></ins></span>
+&lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;</em></ins></span>
 
 &lt;p&gt;The wrongs in this section are not precisely malware, since they do
 not involve making the program that runs in a way that hurts the user.
@@ -651,10 +671,12 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google's new voice messaging app &lt;a
     
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;
+    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609140"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
@@ -673,12 +695,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</em></ins></span>
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
+  &lt;li id="M201506180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google</em></ins></span> Chrome includes a module that &lt;a 
<span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;</strong></del></span>
@@ -903,7 +923,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/03 08:33:09 $
+$Date: 2021/07/30 16:02:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary/po/malware-google.de.po 3 Jul 2021 08:33:09 -0000       1.78
+++ proprietary/po/malware-google.de.po 30 Jul 2021 16:02:39 -0000      1.79
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-03 08:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -550,6 +550,40 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-It is unfortunate-]{+<small>Please note+} that the article [-uses the
+# | term <a
+# | 
href=\"/philosophy/words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>.-]
+# | {+wrongly refers to crackers as &ldquo;<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">&ldquo;monetize&rdquo;</a>."
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">„monetarisieren“</a> verwendet."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "TikTok <a href=\"https://boingboing.net/2020/08/11/tiktok-exploited-android-";
 "secur.html\"> exploited an Android vulnerability</a> to obtain user MAC "
 "addresses."

Index: proprietary/po/malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary/po/malware-google.es.po 8 Jul 2021 09:33:22 -0000       1.92
+++ proprietary/po/malware-google.es.po 30 Jul 2021 16:02:39 -0000      1.93
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-03 08:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-07-08 11:03+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-30 15:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -411,6 +412,41 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>[-(-]Please note that the article wrongly refers to crackers as
+# | [-\"<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+&ldquo;<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Advierta que en ese artículo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "TikTok <a href=\"https://boingboing.net/2020/08/11/tiktok-exploited-android-";
 "secur.html\"> exploited an Android vulnerability</a> to obtain user MAC "
 "addresses."

Index: proprietary/po/malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary/po/malware-google.fr.po 3 Jul 2021 09:31:54 -0000       1.137
+++ proprietary/po/malware-google.fr.po 30 Jul 2021 16:02:39 -0000      1.138
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-03 08:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-07-03 11:07+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-30 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -407,6 +408,30 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "TikTok <a href=\"https://boingboing.net/2020/08/11/tiktok-exploited-android-";
 "secur.html\"> exploited an Android vulnerability</a> to obtain user MAC "
 "addresses."

Index: proprietary/po/malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary/po/malware-google.pot   3 Jul 2021 08:33:10 -0000       1.72
+++ proprietary/po/malware-google.pot   30 Jul 2021 16:02:39 -0000      1.73
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-03 08:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -309,6 +309,29 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a "
+"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
+"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
+"systems</a> to impose surveillance on people. It can record people's calls, "
+"copy their messages, and secretly film them, using a zero-click (means no "
+"interaction is needed) and zero-day (means the bug was not found yet) "
+"vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "TikTok <a "
 
"href=\"https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html\";>
 "
 "exploited an Android vulnerability</a> to obtain user MAC addresses."

Index: proprietary/po/malware-google.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pt-br.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/malware-google.pt-br.po      11 Jul 2021 23:33:27 -0000      
1.7
+++ proprietary/po/malware-google.pt-br.po      30 Jul 2021 16:02:39 -0000      
1.8
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-07-03 08:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-30 15:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 
 #. type: Content of: <title>
@@ -404,6 +405,31 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
+"small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "TikTok <a href=\"https://boingboing.net/2020/08/11/tiktok-exploited-android-";
 "secur.html\"> exploited an Android vulnerability</a> to obtain user MAC "
 "addresses."

Index: proprietary/po/malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary/po/malware-google.ru.po 3 Jul 2021 17:59:54 -0000       1.151
+++ proprietary/po/malware-google.ru.po 30 Jul 2021 16:02:39 -0000      1.152
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-03 08:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-30 15:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -409,6 +410,31 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
+"взломщиков.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "TikTok <a href=\"https://boingboing.net/2020/08/11/tiktok-exploited-android-";
 "secur.html\"> exploited an Android vulnerability</a> to obtain user MAC "
 "addresses."

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.331
retrieving revision 1.332
diff -u -b -r1.331 -r1.332
--- proprietary/po/nl.po        30 Jul 2021 15:33:39 -0000      1.331
+++ proprietary/po/nl.po        30 Jul 2021 16:02:39 -0000      1.332
@@ -471,6 +471,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.330
retrieving revision 1.331
diff -u -b -r1.330 -r1.331
--- proprietary/po/pl.po        30 Jul 2021 15:33:39 -0000      1.330
+++ proprietary/po/pl.po        30 Jul 2021 16:02:39 -0000      1.331
@@ -460,6 +460,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- proprietary/po/pot  30 Jul 2021 15:33:39 -0000      1.329
+++ proprietary/po/pot  30 Jul 2021 16:02:39 -0000      1.330
@@ -390,6 +390,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/po/proprietary-insecurity.de-diff.html  30 Jul 2021 15:33:39 
-0000      1.84
+++ proprietary/po/proprietary-insecurity.de-diff.html  30 Jul 2021 16:02:39 
-0000      1.85
@@ -117,6 +117,26 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -472,10 +492,7 @@
 
     &lt;p&gt;The third party vulnerability is presumably
     unintentional and Amazon will probably fix it. However, we
-    do not expect Amazon to change</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>design that 
&lt;a
+    do not expect Amazon to change the design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -519,7 +536,10 @@
   &lt;li id="M201807100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa, and all</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>other 
voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
@@ -682,16 +702,16 @@
     enables malware authors to capture keystrokes without taking the risk
     of being classified as malicious task by AV
     <span class="removed"><del><strong>heuristics&rdquo;.
-  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>heuristics&rdquo;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
+  &lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
 &lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
 medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>heuristics&rdquo;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
 
-&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
@@ -1096,19 +1116,19 @@
     can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
     have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Mac OS X had an
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
@@ -1229,8 +1249,8 @@
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-The FTC punished a company</strong></del></span> for <span 
class="removed"><del><strong>making webcams with bad security so
-that it was easy for anyone to watch them&lt;/a&gt;.
+The FTC punished a company for making webcams with bad security so
+that it was easy</strong></del></span> for <span 
class="removed"><del><strong>anyone to watch them&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -1493,7 +1513,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:39 $
+$Date: 2021/07/30 16:02:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary/po/proprietary-insecurity.de.po 30 Jul 2021 15:33:39 -0000      
1.182
+++ proprietary/po/proprietary-insecurity.de.po 30 Jul 2021 16:02:39 -0000      
1.183
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -199,6 +199,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary/po/proprietary-insecurity.es.po 30 Jul 2021 15:33:40 -0000      
1.114
+++ proprietary/po/proprietary-insecurity.es.po 30 Jul 2021 16:02:39 -0000      
1.115
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: \n"
@@ -151,6 +151,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary/po/proprietary-insecurity.fr.po 30 Jul 2021 15:33:40 -0000      
1.263
+++ proprietary/po/proprietary-insecurity.fr.po 30 Jul 2021 16:02:39 -0000      
1.264
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-07-15 11:02+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -150,6 +150,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary/po/proprietary-insecurity.it-diff.html  30 Jul 2021 15:33:40 
-0000      1.97
+++ proprietary/po/proprietary-insecurity.it-diff.html  30 Jul 2021 16:02:39 
-0000      1.98
@@ -94,8 +94,8 @@
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
     used a zero-day and zero-click exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many</em></ins></span> of <span 
class="inserted"><ins><em>them to be journalists, even
-    if they were using the latest version of the</em></ins></span> proprietary 
<span class="removed"><del><strong>software</strong></del></span> <span 
class="inserted"><ins><em>operating
+    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
+    if they were using the latest version</em></ins></span> of <span 
class="inserted"><ins><em>the</em></ins></span> proprietary <span 
class="removed"><del><strong>software</strong></del></span> <span 
class="inserted"><ins><em>operating
     system installed on their iDevice.&lt;/p&gt;
 
     &lt;p&gt;Nobody can do anything about these vulnerabilities and people
@@ -104,6 +104,26 @@
     hole and fix it.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
     wrongly refers to crackers</em></ins></span> as <span 
class="removed"><del><strong>perfect,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -163,12 +183,12 @@
   &lt;li id="M202105030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The United States' government is reportedly considering &lt;a
+    &lt;p&gt;The United States' government</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>reportedly considering &lt;a
     
href="https://www.infosecurity-magazine.com/news/private-companies-may-spy-on/"&gt;teaming
     up with private companies to monitor American citizens' private online
     activity and digital communications&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;What creates the opportunity to try this</em></ins></span> is 
<span class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>the fact that these
+    &lt;p&gt;What creates the opportunity to try this is the fact that these
     companies are already snooping on users' private activities. That
     in turn is due to people's use of nonfree software which snoops,
     and online dis-services which snoop.&lt;/p&gt;
@@ -197,13 +217,13 @@
 
     &lt;p&gt;&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;It</em></ins></span> is 
<span class="removed"><del><strong>often quite sloppy.&lt;/p&gt;
 
-&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span>
-    to <span class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>the public&lt;/a&gt; for gyms, stores, hospitals, 
jails, and schools to
+&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice
+    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
     hand &ldquo;security&rdquo; footage to a company from which the government 
can
     collect it at any time, without even telling them.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
+    wrongly refers</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>crackers as &ldquo;&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -274,9 +294,9 @@
     &lt;p&gt;United States officials are facing
     one of biggest crackings against them in years, when &lt;a
     
href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department"&gt;malicious
-    code was sneaked into SolarWinds' proprietary</em></ins></span> software 
<span class="inserted"><ins><em>named
+    code was sneaked into SolarWinds' proprietary software named
     Orion&lt;/a&gt;. Crackers got access to networks when users downloaded
-    a tainted software update. Crackers were able to monitor internal
+    a tainted</em></ins></span> software <span 
class="inserted"><ins><em>update. Crackers were able to monitor internal
     emails at some of the top agencies in the US.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Please note that the article
@@ -355,9 +375,9 @@
   &lt;li id="M202004150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Riot Games' new anti-cheat</em></ins></span> is <span 
class="removed"><del><strong>human,</strong></del></span> <span 
class="inserted"><ins><em>malware; &lt;a
+    &lt;p&gt;Riot Games' new anti-cheat is malware; &lt;a
     
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver"&gt;runs
-    on system boot at kernel level&lt;/a&gt; on Windows. It is insecure 
software
+    on system boot at kernel level&lt;/a&gt; on Windows. It</em></ins></span> 
is <span class="removed"><del><strong>human,</strong></del></span> <span 
class="inserted"><ins><em>insecure software
     that increases the attack surface of the operating system.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1261,10 +1281,12 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201404250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &lt;a
@@ -1277,12 +1299,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
-    of WhatsApp&lt;/a&gt; makes eavesdropping a 
snap.&lt;/p&gt;</em></ins></span>
+    of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
+  &lt;li id="M201312290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
@@ -1467,7 +1487,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:40 $
+$Date: 2021/07/30 16:02:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary/po/proprietary-insecurity.it.po 30 Jul 2021 15:33:40 -0000      
1.199
+++ proprietary/po/proprietary-insecurity.it.po 30 Jul 2021 16:02:39 -0000      
1.200
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -177,6 +177,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary/po/proprietary-insecurity.ja-diff.html  30 Jul 2021 15:33:40 
-0000      1.118
+++ proprietary/po/proprietary-insecurity.ja-diff.html  30 Jul 2021 16:02:39 
-0000      1.119
@@ -95,8 +95,8 @@
     &lt;p&gt;&lt;a
     
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
     used a zero-day and zero-click exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many</em></ins></span> of <span 
class="inserted"><ins><em>them to be journalists, even
-    if they were using the latest version of the proprietary operating
+    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
+    if they were using the latest version</em></ins></span> of <span 
class="inserted"><ins><em>the proprietary operating
     system installed on their iDevice.&lt;/p&gt;
 
     &lt;p&gt;Nobody can do anything about these vulnerabilities and people
@@ -109,6 +109,26 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -192,11 +212,11 @@
     &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
     company's proprietary software are cracked&lt;/a&gt; by a major security
     breach. Crackers have had access to security archives of various
-    gyms, hospitals, jails, schools,</em></ins></span> and <span 
class="inserted"><ins><em>police stations that have used
+    gyms, hospitals, jails, schools, and police stations that have used
     Verkada's cameras.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;It is 
injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
+    to the public&lt;/a&gt; for gyms, stores, hospitals, 
jails,</em></ins></span> and <span class="inserted"><ins><em>schools to
     hand &ldquo;security&rdquo; footage to a company from which the government 
can
     collect it at</em></ins></span> any <span 
class="removed"><del><strong>system, free</strong></del></span> <span 
class="inserted"><ins><em>time, without even telling them.&lt;/p&gt;
 
@@ -353,9 +373,9 @@
   &lt;li id="M202004150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Riot Games' new anti-cheat is malware; &lt;a
+    &lt;p&gt;Riot Games' new anti-cheat</em></ins></span> is <span 
class="inserted"><ins><em>malware; &lt;a
     
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver"&gt;runs
-    on system boot at kernel level&lt;/a&gt; on Windows. It</em></ins></span> 
is <span class="inserted"><ins><em>insecure software
+    on system boot at kernel level&lt;/a&gt; on Windows. It is insecure 
software
     that increases the attack surface of the operating system.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -437,7 +457,7 @@
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
+    inexcusable</em></ins></span> even <span 
class="removed"><del><strong>introduce</strong></del></span> <span 
class="inserted"><ins><em>if it didn't lead to security threats as 
well.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903210"&gt;
@@ -486,7 +506,7 @@
     &lt;p&gt;Since the beginning of 2017, &lt;a
     
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/"&gt;Android
     phones have been collecting the addresses of nearby cellular
-    towers&lt;/a&gt;,</em></ins></span> even <span 
class="removed"><del><strong>introduce</strong></del></span> <span 
class="inserted"><ins><em>when location services are disabled, and sending
+    towers&lt;/a&gt;, even when location services are disabled, and sending
     that data back to Google.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -497,8 +517,7 @@
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span 
class="inserted"><ins><em>to do this. The job would be much
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
     easier for Amazon. And if some government such as China or the US
     told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
@@ -531,7 +550,7 @@
     &lt;p&gt;One of the dangers of the &ldquo;internet of stings&rdquo;
     is that, if you lose your internet service, you also &lt;a
     
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control of your house</em></ins></span> and <span 
class="removed"><del><strong>&lt;em&gt;the</strong></del></span> <span 
class="inserted"><ins><em>appliances&lt;/a&gt;.&lt;/p&gt;
+    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For your safety, don't use any appliance with a connection to the
     real internet.&lt;/p&gt;
@@ -598,7 +617,8 @@
     &lt;p&gt;That is a malicious functionality, but in addition it
     is a gross insecurity since anyone, including malicious crackers, &lt;a
     
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
-    find those accounts and use them to get into users' 
cameras&lt;/a&gt;.&lt;/p&gt;
+    find those accounts and use</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span 
class="inserted"><ins><em>to get into users' cameras&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706050"&gt;
@@ -612,7 +632,7 @@
     &lt;p&gt;The vulnerability allowed a cracker to access
     the computer's Intel Active Management Technology (AMT) &lt;a
     
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
-    web interface with an empty password and gave administrative
+    web interface with an empty password</em></ins></span> and <span 
class="removed"><del><strong>&lt;em&gt;the</strong></del></span> <span 
class="inserted"><ins><em>gave administrative
     access&lt;/a&gt; to access the computer's keyboard, mouse, monitor among
     other privileges.&lt;/p&gt;
 
@@ -998,19 +1018,19 @@
     can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
     have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;
 Mac OS X had an
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
@@ -1088,17 +1108,17 @@
 
     &lt;p&gt;Depending</em></ins></span> on what drug is being infused, the 
insecurity could open
     the door to <span class="removed"><del><strong>murder.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;
 Due to bad security in a drug pump, crackers could use it to
 &lt;a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504090"&gt;
@@ -1395,7 +1415,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:40 $
+$Date: 2021/07/30 16:02:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- proprietary/po/proprietary-insecurity.ja.po 30 Jul 2021 15:33:40 -0000      
1.171
+++ proprietary/po/proprietary-insecurity.ja.po 30 Jul 2021 16:02:39 -0000      
1.172
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -153,6 +153,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary/po/proprietary-insecurity.pot   30 Jul 2021 15:33:40 -0000      
1.137
+++ proprietary/po/proprietary-insecurity.pot   30 Jul 2021 16:02:39 -0000      
1.138
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -119,6 +119,23 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a "
+"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
+"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
+"systems</a> to impose surveillance on people. It can record people's calls, "
+"copy their messages, and secretly film them, using a zero-click (means no "
+"interaction is needed) and zero-day (means the bug was not found yet) "
+"vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a "
 
"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
 "can allow crackers to remotely gain access to the operating system</a> and "

Index: proprietary/po/proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-insecurity.pt-br.po      30 Jul 2021 15:33:40 
-0000      1.7
+++ proprietary/po/proprietary-insecurity.pt-br.po      30 Jul 2021 16:02:39 
-0000      1.8
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -143,6 +143,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.309
retrieving revision 1.310
diff -u -b -r1.309 -r1.310
--- proprietary/po/proprietary-insecurity.ru.po 30 Jul 2021 15:33:41 -0000      
1.309
+++ proprietary/po/proprietary-insecurity.ru.po 30 Jul 2021 16:02:39 -0000      
1.310
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -147,6 +147,22 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary/po/proprietary.de-diff.html     30 Jul 2021 15:33:41 -0000      
1.287
+++ proprietary/po/proprietary.de-diff.html     30 Jul 2021 16:02:39 -0000      
1.288
@@ -66,13 +66,13 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -244,6 +244,26 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -297,16 +317,6 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202106190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
-    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
-    might or might not do malicious things but the power Google has over 
proprietary
-    Android phones is dangerous.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -370,7 +380,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:41 $
+$Date: 2021/07/30 16:02:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.304
retrieving revision 1.305
diff -u -b -r1.304 -r1.305
--- proprietary/po/proprietary.de.po    30 Jul 2021 15:33:41 -0000      1.304
+++ proprietary/po/proprietary.de.po    30 Jul 2021 16:02:39 -0000      1.305
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -514,6 +514,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -568,15 +584,6 @@
 "the most powerful companies don't dare."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.491
retrieving revision 1.492
diff -u -b -r1.491 -r1.492
--- proprietary/po/proprietary.es.po    30 Jul 2021 15:33:41 -0000      1.491
+++ proprietary/po/proprietary.es.po    30 Jul 2021 16:02:39 -0000      1.492
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -367,6 +367,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -452,20 +468,6 @@
 "privativo, que es su puerta de entrada) hasta el punto de que ni siquiera "
 "las compañías más poderosas se atrevan a introducirlas."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google ha instalado "
-"automáticamente una aplicación en muchos teléfonos privativos Android</a>. 
"
-"La aplicación podría hacer algo malicioso o podría no hacerlo, pero el 
poder "
-"que tiene Google sobre los teléfonos privativos Android es peligroso."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Ver más&hellip;</a>"
@@ -546,6 +548,20 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
+#~ "automatically installed an app on many proprietary Android phones</a>. "
+#~ "The app might or might not do malicious things but the power Google has "
+#~ "over proprietary Android phones is dangerous."
+#~ msgstr ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google ha "
+#~ "instalado automáticamente una aplicación en muchos teléfonos privativos 
"
+#~ "Android</a>. La aplicación podría hacer algo malicioso o podría no "
+#~ "hacerlo, pero el poder que tiene Google sobre los teléfonos privativos "
+#~ "Android es peligroso."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-";
 #~ "of-10-health-apps-harvest-user-data-global-study-shows\">Almost all "
 #~ "proprietary health apps harvest users' data</a>, including sensitive "

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.517
retrieving revision 1.518
diff -u -b -r1.517 -r1.518
--- proprietary/po/proprietary.fr.po    30 Jul 2021 15:33:41 -0000      1.517
+++ proprietary/po/proprietary.fr.po    30 Jul 2021 16:02:39 -0000      1.518
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-07-15 11:02+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -363,6 +363,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -448,20 +464,6 @@
 "d'entrée) au point que même les sociétés les plus puissantes n'oseront 
plus "
 "la braver."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google a installé "
-"automatiquement une appli sur beaucoup de téléphones Android</a>. L'appli "
-"n'est peut-être pas malveillante, mais le pouvoir que possède Google sur 
les "
-"téléphones Android (privateurs) est dangereux."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Voir plus&hellip;</a>"
@@ -536,6 +538,19 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
+#~ "automatically installed an app on many proprietary Android phones</a>. "
+#~ "The app might or might not do malicious things but the power Google has "
+#~ "over proprietary Android phones is dangerous."
+#~ msgstr ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google a installé "
+#~ "automatiquement une appli sur beaucoup de téléphones Android</a>. 
L'appli "
+#~ "n'est peut-être pas malveillante, mais le pouvoir que possède Google sur 
"
+#~ "les téléphones Android (privateurs) est dangereux."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-";
 #~ "of-10-health-apps-harvest-user-data-global-study-shows\">Almost all "
 #~ "proprietary health apps harvest users' data</a>, including sensitive "

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -b -r1.297 -r1.298
--- proprietary/po/proprietary.it-diff.html     30 Jul 2021 15:33:41 -0000      
1.297
+++ proprietary/po/proprietary.it-diff.html     30 Jul 2021 16:02:39 -0000      
1.298
@@ -58,15 +58,15 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
-   text-decoration: none;
+   text-decoration: none;</em></ins></span>
 }
-#TOC a { text-decoration: none; }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
 #TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
@@ -243,6 +243,26 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -296,16 +316,6 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202106190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
-    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
-    might or might not do malicious things but the power Google has over 
proprietary
-    Android phones is dangerous.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -369,7 +379,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:41 $
+$Date: 2021/07/30 16:02:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.313
retrieving revision 1.314
diff -u -b -r1.313 -r1.314
--- proprietary/po/proprietary.it.po    30 Jul 2021 15:33:41 -0000      1.313
+++ proprietary/po/proprietary.it.po    30 Jul 2021 16:02:39 -0000      1.314
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -507,6 +507,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -561,15 +577,6 @@
 "the most powerful companies don't dare."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- proprietary/po/proprietary.ja-diff.html     30 Jul 2021 15:33:41 -0000      
1.302
+++ proprietary/po/proprietary.ja-diff.html     30 Jul 2021 16:02:40 -0000      
1.303
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -56,14 +56,14 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
+#TOC a { text-decoration: none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -129,7 +129,8 @@
   &lt;li&gt;&lt;a href="/proprietary/malware-mobiles.html"&gt;Malware in 
mobile devices&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="/proprietary/malware-kindle-swindle.html"&gt;Malware 
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
 subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+      Swindle&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="/proprietary/malware-games.html"&gt;Malware in 
games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
 href="https://lists.gnu.org/mailman/listinfo/www-malware-commits"&gt;mailing 
list
 &lt;www-malware-commits@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
@@ -141,8 +142,7 @@
  &lt;tr&gt;
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-appliances.html"&gt;Malware in 
appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -174,14 +174,14 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
@@ -248,6 +248,26 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -301,16 +321,6 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202106190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
-    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
-    might or might not do malicious things but the power Google has over 
proprietary
-    Android phones is dangerous.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -374,7 +384,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:41 $
+$Date: 2021/07/30 16:02:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary/po/proprietary.ja.po    30 Jul 2021 15:33:41 -0000      1.296
+++ proprietary/po/proprietary.ja.po    30 Jul 2021 16:02:40 -0000      1.297
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -365,6 +365,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -419,15 +435,6 @@
 "the most powerful companies don't dare."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.298
retrieving revision 1.299
diff -u -b -r1.298 -r1.299
--- proprietary/po/proprietary.nl-diff.html     30 Jul 2021 15:33:41 -0000      
1.298
+++ proprietary/po/proprietary.nl-diff.html     30 Jul 2021 16:02:40 -0000      
1.299
@@ -58,15 +58,15 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
-   text-decoration: none;
+   text-decoration: none;</em></ins></span>
 }
-#TOC a { text-decoration: none; }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
 #TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
@@ -243,6 +243,26 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -296,16 +316,6 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202106190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
-    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
-    might or might not do malicious things but the power Google has over 
proprietary
-    Android phones is dangerous.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -369,7 +379,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:41 $
+$Date: 2021/07/30 16:02:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary/po/proprietary.nl.po    30 Jul 2021 15:33:41 -0000      1.287
+++ proprietary/po/proprietary.nl.po    30 Jul 2021 16:02:40 -0000      1.288
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -410,6 +410,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -464,15 +480,6 @@
 "the most powerful companies don't dare."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
 # | {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- proprietary/po/proprietary.pl-diff.html     30 Jul 2021 15:33:41 -0000      
1.314
+++ proprietary/po/proprietary.pl-diff.html     30 Jul 2021 16:02:40 -0000      
1.315
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -59,12 +59,12 @@
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
-   <span class="inserted"><ins><em>color: #004caa;
+ #skiplinks a, #skiplinks a:visited {
+   color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -121,8 +121,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>July, 2021, the pages in this directory list 
around 500
-instances of malicious functionalities (with more than 610 references to
+&lt;p&gt;As of July, 2021, the pages in this directory list around 500
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 610 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;p&gt;If you want to be notified when we add new items or make other 
changes,
@@ -168,17 +168,17 @@
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -199,10 +199,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -242,6 +242,26 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -295,16 +315,6 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202106190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
-    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
-    might or might not do malicious things but the power Google has over 
proprietary
-    Android phones is dangerous.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -368,7 +378,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:41 $
+$Date: 2021/07/30 16:02:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary/po/proprietary.pl.po    30 Jul 2021 15:33:41 -0000      1.279
+++ proprietary/po/proprietary.pl.po    30 Jul 2021 16:02:40 -0000      1.280
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -591,6 +591,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -645,15 +661,6 @@
 "the most powerful companies don't dare."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary/po/proprietary.pot      30 Jul 2021 15:33:42 -0000      1.276
+++ proprietary/po/proprietary.pot      30 Jul 2021 16:02:40 -0000      1.277
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -303,6 +303,23 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a "
+"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
+"The pegasus spyware used vulnerabilities on proprietary smartphone operating "
+"systems</a> to impose surveillance on people. It can record people's calls, "
+"copy their messages, and secretly film them, using a zero-click (means no "
+"interaction is needed) and zero-day (means the bug was not found yet) "
+"vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a "
 
"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
 "can allow crackers to remotely gain access to the operating system</a> and "
@@ -358,15 +375,6 @@
 "the most powerful companies don't dare."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/\";>Google
 "
-"automatically installed an app on many proprietary Android phones</a>. The "
-"app might or might not do malicious things but the power Google has over "
-"proprietary Android phones is dangerous."
-msgstr ""
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr ""

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.440
retrieving revision 1.441
diff -u -b -r1.440 -r1.441
--- proprietary/po/proprietary.pt-br.po 30 Jul 2021 15:33:42 -0000      1.440
+++ proprietary/po/proprietary.pt-br.po 30 Jul 2021 16:02:40 -0000      1.441
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-06-13 12:11-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -361,6 +361,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -444,20 +460,6 @@
 "(e o software privativo que é seu caminho de entrada) a tal ponto que mesmo "
 "as empresas mais poderosas não ousem."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google instalou "
-"automaticamente um aplicativo em muitos telefones privativos com Android</"
-"a>. O aplicativo pode não fazer coisas maliciosas, mas o poder que Google "
-"tem sobre os telefones privativos com Android é perigoso."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Mais itens…</a>"
@@ -533,6 +535,19 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
+#~ "automatically installed an app on many proprietary Android phones</a>. "
+#~ "The app might or might not do malicious things but the power Google has "
+#~ "over proprietary Android phones is dangerous."
+#~ msgstr ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google instalou "
+#~ "automaticamente um aplicativo em muitos telefones privativos com Android</"
+#~ "a>. O aplicativo pode não fazer coisas maliciosas, mas o poder que Google 
"
+#~ "tem sobre os telefones privativos com Android é perigoso."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-";
 #~ "of-10-health-apps-harvest-user-data-global-study-shows\">Almost all "
 #~ "proprietary health apps harvest users' data</a>, including sensitive "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.536
retrieving revision 1.537
diff -u -b -r1.536 -r1.537
--- proprietary/po/proprietary.ru.po    30 Jul 2021 15:33:42 -0000      1.536
+++ proprietary/po/proprietary.ru.po    30 Jul 2021 16:02:40 -0000      1.537
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -366,6 +366,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -450,20 +466,6 @@
 "вредоносных функций (и несвободных 
программ, которые вводят их) до такой "
 "степени, чтобы даже самые могущественные 
компании не смели этого делать."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Компания 
Google "
-"автоматически установила приложение на 
многие телефоны Android</a>. Это "
-"приложение могло бы наносит вред, а могло 
бы не наносить, но власть Google "
-"над телефонами с несвободной системой 
Android опасна."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Далее...</a>"
@@ -541,6 +543,19 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
+#~ "automatically installed an app on many proprietary Android phones</a>. "
+#~ "The app might or might not do malicious things but the power Google has "
+#~ "over proprietary Android phones is dangerous."
+#~ msgstr ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Компания 
Google "
+#~ "автоматически установила приложение на 
многие телефоны Android</a>. Это "
+#~ "приложение могло бы наносит вред, а 
могло бы не наносить, но власть "
+#~ "Google над телефонами с несвободной 
системой Android опасна."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-";
 #~ "of-10-health-apps-harvest-user-data-global-study-shows\">Almost all "
 #~ "proprietary health apps harvest users' data</a>, including sensitive "

Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary/po/proprietary.tr.po    30 Jul 2021 15:33:42 -0000      1.184
+++ proprietary/po/proprietary.tr.po    30 Jul 2021 16:02:40 -0000      1.185
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-07-16 07:24+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -362,6 +362,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -445,20 +461,6 @@
 "yazılımlara) karşı öfkemizi, en güçlü şirketlerin bile böyle bir 
şeye "
 "cesaret edemeyeceği bir düzeye yükseltmemiz gerekiyor."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google, birçok özel "
-"mülk Android telefona otomatik olarak bir uygulama kurdu</a>. Uygulama "
-"kötücül şeyler yapıyor olabilir veya olmayabilir ancak Google'nin 
Android "
-"telefonlar üzerinde sahip olduğu iktidar tehlikeli."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Daha fazlası&hellip;</a>"
@@ -540,6 +542,19 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
+#~ "automatically installed an app on many proprietary Android phones</a>. "
+#~ "The app might or might not do malicious things but the power Google has "
+#~ "over proprietary Android phones is dangerous."
+#~ msgstr ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google, birçok "
+#~ "özel mülk Android telefona otomatik olarak bir uygulama kurdu</a>. "
+#~ "Uygulama kötücül şeyler yapıyor olabilir veya olmayabilir ancak "
+#~ "Google'nin Android telefonlar üzerinde sahip olduğu iktidar tehlikeli."
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-";
 #~ "of-10-health-apps-harvest-user-data-global-study-shows\">Almost all "
 #~ "proprietary health apps harvest users' data</a>, including sensitive "

Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary/po/proprietary.zh-cn.po 30 Jul 2021 15:33:43 -0000      1.234
+++ proprietary/po/proprietary.zh-cn.po 30 Jul 2021 16:02:40 -0000      1.235
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-07-16 16:36+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -340,6 +340,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -412,19 +428,6 @@
 "显然,公众的愤怒使该å…
¬å¸åšå‡ºäº†è®©æ­¥ã€‚如果我们要确保安å…
¨ï¼Œé‚£ä¹ˆæˆ‘们还需要对恶意"
 "功能(包
括专有软件整体)表示愤怒,这种愤怒要使最有权势的å…
¬å¸ä¹Ÿå¿ƒå­˜ç•æƒ§ã€‚"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">谷歌在许多 
Android 电"
-"话上自动安装
一个应用</a>。该应用或许没做恶,但是谷歌对 Android 
电话的掌控权力"
-"非常危险。"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">更多内容&hellip;</a>"
@@ -500,6 +503,18 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
+#~ "automatically installed an app on many proprietary Android phones</a>. "
+#~ "The app might or might not do malicious things but the power Google has "
+#~ "over proprietary Android phones is dangerous."
+#~ msgstr ""
+#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#~ "tracking-google-silently-pushed-app-to-users-phones/\">谷歌在许多 
Android "
+#~ "电话上自动安装
一个应用</a>。该应用或许没做恶,但是谷歌对 Android 
电话的掌"
+#~ "控权力非常危险。"
+
+#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-";
 #~ "of-10-health-apps-harvest-user-data-global-study-shows\">Almost all "
 #~ "proprietary health apps harvest users' data</a>, including sensitive "

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- proprietary/po/proprietary.zh-tw-diff.html  30 Jul 2021 15:33:43 -0000      
1.277
+++ proprietary/po/proprietary.zh-tw-diff.html  30 Jul 2021 16:02:40 -0000      
1.278
@@ -66,13 +66,13 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -244,6 +244,26 @@
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    zero-click (means no interaction is needed) and zero-day (means the
+    bug was not found yet) vulnerabilities.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people should wait for corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202107090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -297,16 +317,6 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202106190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
-    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
-    might or might not do malicious things but the power Google has over 
proprietary
-    Android phones is dangerous.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -370,7 +380,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/07/30 15:33:43 $
+$Date: 2021/07/30 16:02:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary/po/proprietary.zh-tw.po 30 Jul 2021 15:33:43 -0000      1.266
+++ proprietary/po/proprietary.zh-tw.po 30 Jul 2021 16:02:40 -0000      1.267
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-07-30 15:26+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -480,6 +480,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -534,15 +550,6 @@
 "the most powerful companies don't dare."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
-"installed an app on many proprietary Android phones</a>. The app might or "
-"might not do malicious things but the power Google has over proprietary "
-"Android phones is dangerous."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.410
retrieving revision 1.411
diff -u -b -r1.410 -r1.411
--- proprietary/po/pt-br.po     30 Jul 2021 15:33:43 -0000      1.410
+++ proprietary/po/pt-br.po     30 Jul 2021 16:02:40 -0000      1.411
@@ -533,6 +533,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.692
retrieving revision 1.693
diff -u -b -r1.692 -r1.693
--- proprietary/po/ru.po        30 Jul 2021 15:33:43 -0000      1.692
+++ proprietary/po/ru.po        30 Jul 2021 16:02:40 -0000      1.693
@@ -534,6 +534,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary/po/tr.po        30 Jul 2021 15:33:43 -0000      1.206
+++ proprietary/po/tr.po        30 Jul 2021 16:02:40 -0000      1.207
@@ -443,6 +443,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary/po/zh-cn.po     30 Jul 2021 15:33:43 -0000      1.207
+++ proprietary/po/zh-cn.po     30 Jul 2021 16:02:40 -0000      1.208
@@ -442,6 +442,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.330
retrieving revision 1.331
diff -u -b -r1.330 -r1.331
--- proprietary/po/zh-tw.po     30 Jul 2021 15:33:43 -0000      1.330
+++ proprietary/po/zh-tw.po     30 Jul 2021 16:02:40 -0000      1.331
@@ -461,6 +461,22 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a zero-click (means no interaction is needed) "
+"and zero-day (means the bug was not found yet) vulnerabilities."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people should wait for corporations to fix the problems."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: thankgnus/po/2021supporters.pot
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pot,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- thankgnus/po/2021supporters.pot     26 Jul 2021 13:31:05 -0000      1.80
+++ thankgnus/po/2021supporters.pot     30 Jul 2021 16:02:41 -0000      1.81
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-07-26 13:25+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -463,6 +463,10 @@
 msgstr ""
 
 #. type: Content of: <ul><li>
+msgid "Pete Batard"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Public Domain"
 msgstr ""
 

Index: thankgnus/po/2021supporters.pt-br.po
===================================================================
RCS file: /web/www/www/thankgnus/po/2021supporters.pt-br.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- thankgnus/po/2021supporters.pt-br.po        29 Jul 2021 17:01:51 -0000      
1.125
+++ thankgnus/po/2021supporters.pt-br.po        30 Jul 2021 16:02:41 -0000      
1.126
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: 2021supporters.html\n"
-"POT-Creation-Date: 2021-07-26 13:25+0000\n"
+"POT-Creation-Date: 2021-07-30 15:55+0000\n"
 "PO-Revision-Date: 2021-07-29 12:27-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-07-30 15:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "X-Generator: Gtranslator 40.0\n"
 
@@ -481,6 +482,12 @@
 msgstr "Pean Lim"
 
 #. type: Content of: <ul><li>
+#, fuzzy
+#| msgid "Mr. Pete Batard"
+msgid "Pete Batard"
+msgstr "Mr. Pete Batard"
+
+#. type: Content of: <ul><li>
 msgid "Public Domain"
 msgstr "Public Domain"
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]