www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary all.fr.html malware-apple.es.ht...


From: GNUN
Subject: www/proprietary all.fr.html malware-apple.es.ht...
Date: Tue, 3 Aug 2021 10:32:41 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/08/03 10:32:40

Modified files:
        proprietary    : all.fr.html malware-apple.es.html 
                         malware-apple.fr.html 
                         proprietary-insecurity.es.html 
                         proprietary-insecurity.fr.html 
                         proprietary.fr.html 
        proprietary/po : all.fr-en.html all.fr.po all.pot all.pt-br.po 
                         all.ru.po de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es-en.html malware-apple.es.po 
                         malware-apple.fr-en.html malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.pt-br.po 
                         malware-apple.ru.po nl.po pl.po pot 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.es-en.html 
                         proprietary-insecurity.es.po 
                         proprietary-insecurity.fr-en.html 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.pt-br.po 
                         proprietary-insecurity.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr-en.html 
                         proprietary.fr.po proprietary.it-diff.html 
                         proprietary.it.po proprietary.ja-diff.html 
                         proprietary.ja.po proprietary.nl-diff.html 
                         proprietary.nl.po proprietary.pl-diff.html 
                         proprietary.pl.po proprietary.pot 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.tr.po proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.fr.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.es.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.478&r2=1.479
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.590&r2=1.591
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.342&r2=1.343
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pt-br.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.335&r2=1.336
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es-en.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.272&r2=1.273
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.308&r2=1.309
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.500&r2=1.501
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.524&r2=1.525
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.317&r2=1.318
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.318&r2=1.319
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.445&r2=1.446
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.541&r2=1.542
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.281&r2=1.282
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.416&r2=1.417
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.698&r2=1.699
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.334&r2=1.335

Patches:
Index: all.fr.html
===================================================================
RCS file: /web/www/www/proprietary/all.fr.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- all.fr.html 1 Aug 2021 18:31:02 -0000       1.22
+++ all.fr.html 3 Aug 2021 14:32:36 -0000       1.23
@@ -48,28 +48,6 @@
 
 <ul class="blurbs">
 <!--#set var='ADD' value='2021-07-30' -->
-<!--#set var='PUB' value='2021-07-19' -->
-<li><small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
- &ndash; Dernière référence : <!--#echo encoding='none' var='PUB' -->
-</small>
-    <p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Des
-crackers ont exploité une faille des iTrucs pour installer un logiciel
-espion</a> sur des appareils Apple dont beaucoup appartenaient à des
-journalistes, et ceci même quand leur système d'exploitation était
-parfaitement à jour.</p>
-
-    <p>Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette
-vulnérabilité, si c'est sa décision. Un système d'exploitation libre
-laisserait aux gens la possibilité d'identifier les failles de sécurité et
-de les corriger.</p>
-
-    <p><small>(Notez que cet article utilise le terme « <a
-href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
-escient.)</small></p>
-  </li>
-
-<!--#set var='ADD' value='2021-07-30' -->
 <!--#set var='PUB' value='2021-07-18' -->
 <li><small class='date-tag'>Ajout : <!--#echo encoding='none' var='ADD' -->
  &ndash; Dernière référence : <!--#echo encoding='none' var='PUB' -->
@@ -3177,7 +3155,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/08/01 18:31:02 $
+$Date: 2021/08/03 14:32:36 $
 
 <!-- timestamp end -->
 </p>

Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- malware-apple.es.html       2 Aug 2021 09:32:11 -0000       1.108
+++ malware-apple.es.html       3 Aug 2021 14:32:36 -0000       1.109
@@ -305,29 +305,6 @@
 que el software privativo de prestigio está libre de graves fallos.</p>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Delincuentes
-informáticos han aprovechado un fallo en las iCosas de Apple para instalar
-software espía</a> en los dispositivos de los usuarios, muchos de ellos
-periodistas, aun cuando estuvieran utilizando la última versión del programa
-privativo instalado en sus dispositivos.</p>
-
-    <p>Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios 
tienen
-que esperar a que Apple solucione esos agujeros de seguridad, si es que
-decide hacerlo. Un sistema operativo libre permitiría a la gente identificar
-el agujero y solucionar el problema.</p>
-
-    <p><small>Advierta que en ese artículo se refieren erróneamente a los
-«<cite>crackers</cite>» como <a
-href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a>.</small></p>
-  </li>
-
   <li id="M202107180">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1498,7 +1475,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/08/02 09:32:11 $
+$Date: 2021/08/03 14:32:36 $
 
 <!-- timestamp end -->
 </p>

Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- malware-apple.fr.html       1 Aug 2021 18:31:02 -0000       1.118
+++ malware-apple.fr.html       3 Aug 2021 14:32:36 -0000       1.119
@@ -303,29 +303,6 @@
 que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Des
-crackers ont exploité une faille des iTrucs pour installer un logiciel
-espion</a> sur des appareils Apple dont beaucoup appartenaient à des
-journalistes, et ceci même quand leur système d'exploitation était
-parfaitement à jour.</p>
-
-    <p>Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette
-vulnérabilité, si c'est sa décision. Un système d'exploitation libre
-laisserait aux gens la possibilité d'identifier les failles de sécurité et
-de les corriger.</p>
-
-    <p><small>(Notez que cet article utilise le terme « <a
-href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
-escient.)</small></p>
-  </li>
-
   <li id="M202107180">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1498,7 +1475,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/08/01 18:31:02 $
+$Date: 2021/08/03 14:32:36 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.es.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-insecurity.es.html      2 Aug 2021 09:32:11 -0000       1.48
+++ proprietary-insecurity.es.html      3 Aug 2021 14:32:36 -0000       1.49
@@ -87,29 +87,6 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Delincuentes
-informáticos han aprovechado un fallo en las iCosas de Apple para instalar
-software espía</a> en los dispositivos de los usuarios, muchos de ellos
-periodistas, aun cuando estuvieran utilizando la última versión del programa
-privativo instalado en sus dispositivos.</p>
-
-    <p>Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios 
tienen
-que esperar a que Apple solucione esos agujeros de seguridad, si es que
-decide hacerlo. Un sistema operativo libre permitiría a la gente identificar
-el agujero y solucionar el problema.</p>
-
-    <p><small>Advierta que en ese artículo se refieren erróneamente a los
-«<cite>crackers</cite>» como <a
-href="/philosophy/words-to-avoid.es.html#Hacker">«<cite>hackers</cite>»</a></small></p>
-  </li>
-
   <li id="M202107180">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1529,7 +1506,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2021/08/02 09:32:11 $
+$Date: 2021/08/03 14:32:36 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary-insecurity.fr.html      1 Aug 2021 18:31:02 -0000       1.135
+++ proprietary-insecurity.fr.html      3 Aug 2021 14:32:36 -0000       1.136
@@ -89,29 +89,6 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Des
-crackers ont exploité une faille des iTrucs pour installer un logiciel
-espion</a> sur des appareils Apple dont beaucoup appartenaient à des
-journalistes, et ceci même quand leur système d'exploitation était
-parfaitement à jour.</p>
-
-    <p>Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette
-vulnérabilité, si c'est sa décision. Un système d'exploitation libre
-laisserait aux gens la possibilité d'identifier les failles de sécurité et
-de les corriger.</p>
-
-    <p><small>(Notez que cet article utilise le terme « <a
-href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
-escient.)</small></p>
-  </li>
-
   <li id="M202107180">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1516,7 +1493,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/08/01 18:31:02 $
+$Date: 2021/08/03 14:32:36 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary.fr.html 1 Aug 2021 18:31:02 -0000       1.236
+++ proprietary.fr.html 3 Aug 2021 14:32:36 -0000       1.237
@@ -197,29 +197,6 @@
 <h3 id="latest">Ajouts récents</h3>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2021-07</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p><a
-href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Des
-crackers ont exploité une faille des iTrucs pour installer un logiciel
-espion</a> sur des appareils Apple dont beaucoup appartenaient à des
-journalistes, et ceci même quand leur système d'exploitation était
-parfaitement à jour.</p>
-
-    <p>Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette
-vulnérabilité, si c'est sa décision. Un système d'exploitation libre
-laisserait aux gens la possibilité d'identifier les failles de sécurité et
-de les corriger.</p>
-
-    <p><small>(Notez que cet article utilise le terme « <a
-href="/philosophy/words-to-avoid.html#Hacker">hackers</a> » à mauvais
-escient.)</small></p>
-  </li>
-
   <li id="M202107180">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -304,6 +281,19 @@
 d'entrée) au point que même les sociétés les plus puissantes n'oseront plus
 la braver.</p>
   </li>
+
+  <li id="M202106190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/";>Google
+a installé automatiquement une appli sur beaucoup de téléphones
+Android</a>. L'appli n'est peut-être pas malveillante, mais le pouvoir que
+possède Google sur les téléphones Android (privateurs) est dangereux.</p>
+  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">Voir plus&hellip;</a></p>
@@ -383,7 +373,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/08/01 18:31:02 $
+$Date: 2021/08/03 14:32:36 $
 
 <!-- timestamp end -->
 </p>

Index: po/all.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/all.fr-en.html   1 Aug 2021 18:31:03 -0000       1.18
+++ po/all.fr-en.html   3 Aug 2021 14:32:36 -0000       1.19
@@ -42,24 +42,6 @@
 <div class="column-limit" id="all-malware"></div>
 
 <ul class="blurbs">
-<!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-19' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
-    <p><a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used an exploit in Apple iThings to install
-    spyware</a> on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.</p>
-
-    <p>Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
-
 <!--#set var='ADD' value='2021-07-30' --><!--#set var='PUB' value='2021-07-18' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p><a
     
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones";>
@@ -2350,7 +2332,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/08/01 18:31:03 $
+$Date: 2021/08/03 14:32:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/all.fr.po        1 Aug 2021 18:01:04 -0000       1.47
+++ po/all.fr.po        3 Aug 2021 14:32:36 -0000       1.48
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-08-01 19:59+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -79,39 +79,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
-"iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
-"beaucoup appartenaient à des journalistes, et ceci même quand leur système 
"
-"d'exploitation était parfaitement à jour."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
-"vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
-"laisserait aux gens la possibilité d'identifier les failles de sécurité et 
"
-"de les corriger."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -136,6 +103,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -4426,3 +4401,26 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
+#~ "iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
+#~ "beaucoup appartenaient à des journalistes, et ceci même quand leur "
+#~ "système d'exploitation était parfaitement à jour."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
+#~ "vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
+#~ "laisserait aux gens la possibilité d'identifier les failles de sécurité 
"
+#~ "et de les corriger."

Index: po/all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/all.pot  1 Aug 2021 17:32:24 -0000       1.25
+++ po/all.pot  3 Aug 2021 14:32:36 -0000       1.26
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -75,28 +75,6 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a "
-"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
 "
-"used an exploit in Apple iThings to install spyware</a> on people's devices, "
-"many of them to be journalists, even if they were using the latest version "
-"of the proprietary operating system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
 
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
 "The pegasus spyware used vulnerabilities on proprietary smartphone operating "
 "systems</a> to impose surveillance on people. It can record people's calls, "
@@ -112,6 +90,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a "
 
"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
 "can allow crackers to remotely gain access to the operating system</a> and "

Index: po/all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- po/all.pt-br.po     1 Aug 2021 17:32:24 -0000       1.20
+++ po/all.pt-br.po     3 Aug 2021 14:32:36 -0000       1.21
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -82,48 +82,6 @@
 #. type: Content of: <div><ul><li><p>
 #, fuzzy
 #| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
-"\">exploit</i> de dia zero e clique zero em iCoisas da Apple para instalar "
-"<em>spyware</em></a> nos dispositivos das pessoas, muitas delas para serem "
-"jornalistas, mesmo que estivessem usando a versão mais recente do sistema "
-"operacional privativo instalado em seu iDispositivo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm que "
-"esperar até que a Apple conserte essas falhas de segurança, se decidir "
-"consertá-las. Um sistema operacional livre permitiria que as pessoas "
-"identificassem o problema e o consertassem."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
-"small>"
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 #| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 #| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -163,6 +121,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
+"small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -4375,3 +4342,34 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última atualização:"
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente 
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm 
que "
+#~ "esperar até que a Apple conserte essas falhas de segurança, se decidir "
+#~ "consertá-las. Um sistema operacional livre permitiria que as pessoas "
+#~ "identificassem o problema e o consertassem."

Index: po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- po/all.ru.po        1 Aug 2021 17:32:24 -0000       1.44
+++ po/all.ru.po        3 Aug 2021 14:32:36 -0000       1.45
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-04-27 13:06+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -86,54 +86,6 @@
 
 #. type: Content of: <div><ul><li><p>
 # | <a
-# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
-# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
-# | install spyware</a> on people's devices, many of them to be journalists,
-# | even if they were using the latest version of the proprietary operating
-# | system installed on their iDevice.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
-"нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
-"устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если те "
-"пользовались самой поздней версией 
несвободной операционной системы, "
-"установленной на их устройстве."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Никто ничего не может поделать с этими 
уязвимостями, и люди вынуждены ждать, "
-"пока Apple устранит эти прорехи в защите, 
если эта компания решит устранить "
-"их. Свободная операционная система 
позволила бы людям выявить прореху и "
-"устранить ее."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
-"взломщиков.</small>"
-
-#. type: Content of: <div><ul><li><p>
-# | <a
 # | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
@@ -180,6 +132,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
+"взломщиков.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -4430,5 +4391,36 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
+#~ "нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
+#~ "устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если "
+#~ "те пользовались самой поздней версией 
несвободной операционной системы, "
+#~ "установленной на их устройстве."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Никто ничего не может поделать с этими 
уязвимостями, и люди вынуждены "
+#~ "ждать, пока Apple устранит эти прорехи в 
защите, если эта компания решит "
+#~ "устранить их. Свободная операционная 
система позволила бы людям выявить "
+#~ "прореху и устранить ее."
+
 #~ msgid "Copyright &copy; 2018-2021, 2021 Free Software Foundation, Inc."
 #~ msgstr "Copyright &copy; 2018-2021, 2021 Free Software Foundation, Inc."

Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- po/de.po    1 Aug 2021 17:32:24 -0000       1.334
+++ po/de.po    3 Aug 2021 14:32:36 -0000       1.335
@@ -662,18 +662,18 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people will be compelled to wait for corporations to fix "
+"the problems."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -696,22 +696,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
-"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
-"vulnerabilities on proprietary smartphone operating systems</a> to impose "
-"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a security vulnerability."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A free operating system would've let people to fix the bugs for themselves "
-"but now infected people will be compelled to wait for corporations to fix "
-"the problems."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.478
retrieving revision 1.479
diff -u -b -r1.478 -r1.479
--- po/es.po    1 Aug 2021 17:32:24 -0000       1.478
+++ po/es.po    3 Aug 2021 14:32:36 -0000       1.479
@@ -616,51 +616,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado un "
-"fallo en las iCosas de Apple para instalar software espía</a> en los "
-"dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
-"estuvieran utilizando la última versión del programa privativo instalado en 
"
-"sus dispositivos."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios tienen "
-"que esperar a que Apple solucione esos agujeros de seguridad, si es que "
-"decide hacerlo. Un sistema operativo libre permitiría a la gente identificar 
"
-"el agujero y solucionar el problema."
-
-#. type: Content of: <div><ul><li><p>
-# | <small>[-(-]Please note that the article wrongly refers to crackers as
-# | [-\"<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
-# | {+&ldquo;<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>
-# | +}
-#, fuzzy
-#| msgid ""
-#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Advierta que en ese artículo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -694,6 +649,25 @@
 "que las empresas solucionen esos problemas."
 
 #. type: Content of: <div><ul><li><p>
+# | <small>[-(-]Please note that the article wrongly refers to crackers as
+# | [-\"<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>-]
+# | {+&ldquo;<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>
+# | +}
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Advierta que en ese artículo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
+
+#. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
@@ -16039,6 +16013,30 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado "
+#~ "un fallo en las iCosas de Apple para instalar software espía</a> en los "
+#~ "dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
+#~ "estuvieran utilizando la última versión del programa privativo instalado 
"
+#~ "en sus dispositivos."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios "
+#~ "tienen que esperar a que Apple solucione esos agujeros de seguridad, si "
+#~ "es que decide hacerlo. Un sistema operativo libre permitiría a la gente "
+#~ "identificar el agujero y solucionar el problema."
+
+#~ msgid ""
 #~ "A free operating system would've let people to fix the bugs for "
 #~ "themselves but now infected people are forced to wait for corporations to "
 #~ "fix the problems."

Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.590
retrieving revision 1.591
diff -u -b -r1.590 -r1.591
--- po/fr.po    1 Aug 2021 18:01:04 -0000       1.590
+++ po/fr.po    3 Aug 2021 14:32:37 -0000       1.591
@@ -502,39 +502,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
-"iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
-"beaucoup appartenaient à des journalistes, et ceci même quand leur système 
"
-"d'exploitation était parfaitement à jour."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
-"vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
-"laisserait aux gens la possibilité d'identifier les failles de sécurité et 
"
-"de les corriger."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -559,6 +526,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -13563,3 +13538,26 @@
 #. type: Content of: <div><div><dl><dd><ul><li>
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
+#~ "iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
+#~ "beaucoup appartenaient à des journalistes, et ceci même quand leur "
+#~ "système d'exploitation était parfaitement à jour."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
+#~ "vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
+#~ "laisserait aux gens la possibilité d'identifier les failles de sécurité 
"
+#~ "et de les corriger."

Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- po/it.po    1 Aug 2021 17:32:24 -0000       1.334
+++ po/it.po    3 Aug 2021 14:32:37 -0000       1.335
@@ -628,28 +628,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -666,6 +644,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/ja.po    1 Aug 2021 17:32:24 -0000       1.342
+++ po/ja.po    3 Aug 2021 14:32:37 -0000       1.343
@@ -471,28 +471,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -509,6 +487,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- po/malware-apple.de-diff.html       1 Aug 2021 17:32:25 -0000       1.80
+++ po/malware-apple.de-diff.html       3 Aug 2021 14:32:37 -0000       1.81
@@ -307,26 +307,6 @@
   &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -486,21 +466,21 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
     iOS, the operating system of the Apple iThings, is the prototype
-    of a jail&lt;/a&gt;.  It was Apple that introduced the 
practice</em></ins></span> of
-    <span class="inserted"><ins><em>designing general purpose computers with 
censorship of application
+    of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
+    designing general purpose computers with censorship of application
     programs.&lt;/p&gt;
 
     &lt;p&gt;Here is an article about the &lt;a
     href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-    code signing&lt;/a&gt; that the</em></ins></span> iThings <span 
class="inserted"><ins><em>use to lock up the user.&lt;/p&gt;
+    code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
 
     &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
-    walls of the iThing jail: users can now install apps built from
+    walls</em></ins></span> of <span class="inserted"><ins><em>the iThing 
jail: users can now install apps built from
     source code, provided the source code is written in Swift.  Users
     cannot do this freely because they are required to identify
     themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
     are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
-    big enough to mean that the iThings are no longer jails.&lt;/p&gt;
+    big enough to mean that the</em></ins></span> iThings <span 
class="inserted"><ins><em>are no longer jails.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -810,22 +790,22 @@
     to describe the DRM, but we prefer to use the term &lt;a
   <span 
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"&gt;</em></ins></span>
 digital <span 
class="removed"><del><strong>handcuffs&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    <span 
class="inserted"><ins><em>handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201606080"&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
     stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
-    while refusing to fix them itself.&lt;/p&gt;</em></ins></span>
+    while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;
+  &lt;li id="M201605040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;The Apple Music client program &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
@@ -1413,8 +1393,7 @@
       fighting in the Civil War.&lt;/p&gt;
     &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should 
not
       be allowed to censor apps.  Even if Apple carried out this act of
-      censorship with some care, it would still be wrong.  Whether racism
-      is bad, whether educating people about drone 
attacks</strong></del></span> is <span class="removed"><del><strong>bad, are not
+      censorship with some care, it would still be wrong.  Whether 
racism</strong></del></span> is <span class="removed"><del><strong>bad, whether 
educating people about drone attacks is bad, are not
       the real issue.  Apple should not have the power to impose its views
       about either of these questions, or any 
other.&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>still true in iOS 
7.)&lt;/p&gt;</em></ins></span>
@@ -1561,7 +1540,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:25 $
+$Date: 2021/08/03 14:32:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- po/malware-apple.de.po      1 Aug 2021 17:32:25 -0000       1.171
+++ po/malware-apple.de.po      3 Aug 2021 14:32:37 -0000       1.172
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -535,18 +535,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people will be compelled to wait for corporations to fix "
+"the problems."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -569,22 +569,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
-"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
-"vulnerabilities on proprietary smartphone operating systems</a> to impose "
-"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a security vulnerability."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"A free operating system would've let people to fix the bugs for themselves "
-"but now infected people will be compelled to wait for corporations to fix "
-"the problems."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- po/malware-apple.es-en.html 2 Aug 2021 09:32:13 -0000       1.98
+++ po/malware-apple.es-en.html 3 Aug 2021 14:32:37 -0000       1.99
@@ -254,26 +254,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used an exploit in Apple iThings to install
-    spyware</a> on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.</p>
-
-    <p>Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
-
   <li id="M202107180">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1214,7 +1194,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/08/02 09:32:13 $
+$Date: 2021/08/03 14:32:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- po/malware-apple.es.po      2 Aug 2021 09:32:14 -0000       1.225
+++ po/malware-apple.es.po      3 Aug 2021 14:32:37 -0000       1.226
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -410,41 +410,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado un "
-"fallo en las iCosas de Apple para instalar software espía</a> en los "
-"dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
-"estuvieran utilizando la última versión del programa privativo instalado en 
"
-"sus dispositivos."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios tienen "
-"que esperar a que Apple solucione esos agujeros de seguridad, si es que "
-"decide hacerlo. Un sistema operativo libre permitiría a la gente identificar 
"
-"el agujero y solucionar el problema."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Advierta que en ese artículo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a>.</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -471,6 +436,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>Advierta que en ese artículo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
@@ -1848,3 +1822,27 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado "
+#~ "un fallo en las iCosas de Apple para instalar software espía</a> en los "
+#~ "dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
+#~ "estuvieran utilizando la última versión del programa privativo instalado 
"
+#~ "en sus dispositivos."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios "
+#~ "tienen que esperar a que Apple solucione esos agujeros de seguridad, si "
+#~ "es que decide hacerlo. Un sistema operativo libre permitiría a la gente "
+#~ "identificar el agujero y solucionar el problema."

Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- po/malware-apple.fr-en.html 1 Aug 2021 18:31:03 -0000       1.109
+++ po/malware-apple.fr-en.html 3 Aug 2021 14:32:37 -0000       1.110
@@ -254,26 +254,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used an exploit in Apple iThings to install
-    spyware</a> on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.</p>
-
-    <p>Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
-
   <li id="M202107180">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1214,7 +1194,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/08/01 18:31:03 $
+$Date: 2021/08/03 14:32:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- po/malware-apple.fr.po      1 Aug 2021 18:01:04 -0000       1.226
+++ po/malware-apple.fr.po      3 Aug 2021 14:32:37 -0000       1.227
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-08-01 19:59+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -407,39 +407,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
-"iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
-"beaucoup appartenaient à des journalistes, et ceci même quand leur système 
"
-"d'exploitation était parfaitement à jour."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
-"vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
-"laisserait aux gens la possibilité d'identifier les failles de sécurité et 
"
-"de les corriger."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -464,6 +431,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
@@ -1841,3 +1816,26 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
+#~ "iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
+#~ "beaucoup appartenaient à des journalistes, et ceci même quand leur "
+#~ "système d'exploitation était parfaitement à jour."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
+#~ "vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
+#~ "laisserait aux gens la possibilité d'identifier les failles de sécurité 
"
+#~ "et de les corriger."

Index: po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- po/malware-apple.it-diff.html       1 Aug 2021 17:32:25 -0000       1.85
+++ po/malware-apple.it-diff.html       3 Aug 2021 14:32:37 -0000       1.86
@@ -116,9 +116,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple appears</em></ins></span> to <span 
class="removed"><del><strong>restrict what users can do with the data in their 
computers.&lt;/li&gt;
-&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application programs.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>reject any operating system</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+&lt;li&gt;&lt;a 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>impose censorship on application 
programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    that reject any operating system</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/"&gt;
     there is a back door in MacOS&lt;/a&gt; for automatically updating some
     (all?) apps.&lt;/p&gt;
@@ -199,7 +199,7 @@
   &lt;li id="M201908150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apple is putting DRM on</em></ins></span> iPhone <span 
class="inserted"><ins><em>batteries, and the system proprietary
+    &lt;p&gt;Apple is putting DRM on iPhone batteries, and the system 
proprietary
     software &lt;a href="#M201908150"&gt;turns off certain features when 
batteries
     are replaced other than by Apple.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -207,7 +207,7 @@
   &lt;li id="M201704070.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
+    &lt;p&gt;DRM makes the</em></ins></span> iPhone <span 
class="inserted"><ins><em>7 nearly &lt;a
     href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -305,26 +305,6 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -387,16 +367,16 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code from any application which uses this API to 
render</em></ins></span> a
-    <span class="inserted"><ins><em>certain kind of image 
file&lt;/a&gt;.&lt;/p&gt;
+    malicious code from any application which uses this API to render a
+    certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201604120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A bug in the iThings Messages app &lt;a
-    
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-    a malicious web site to extract all the user's messaging
+    
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</em></ins></span>
+    a <span class="inserted"><ins><em>malicious web site to extract all the 
user's messaging
     history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1499,7 +1479,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:25 $
+$Date: 2021/08/03 14:32:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- po/malware-apple.it.po      1 Aug 2021 17:32:25 -0000       1.164
+++ po/malware-apple.it.po      3 Aug 2021 14:32:37 -0000       1.165
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,28 +485,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -523,6 +501,12 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- po/malware-apple.ja-diff.html       1 Aug 2021 17:32:25 -0000       1.100
+++ po/malware-apple.ja-diff.html       3 Aug 2021 14:32:37 -0000       1.101
@@ -333,33 +333,15 @@
 &lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike</em></ins></span> the 
<span class="removed"><del><strong>developers
-fixed one &ldquo;problem&rdquo;,</strong></del></span> <span 
class="inserted"><ins><em>rest of the file
-  they do not count as malware. We mention them to refute the
-  supposition that prestigious proprietary software doesn't have grave
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>rest 
of</em></ins></span> the <span class="removed"><del><strong>fifth rejection,
+Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring</strong></del></span> <span class="inserted"><ins><em>file
+  they do not count as malware. We mention them to refute</em></ins></span> 
the <span class="removed"><del><strong>app based</strong></del></span>
+  <span class="inserted"><ins><em>supposition that prestigious proprietary 
software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in</em></ins></span> Apple <span 
class="removed"><del><strong>complained about another.
-After</strong></del></span> <span class="inserted"><ins><em>iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using</em></ins></span> the <span 
class="removed"><del><strong>fifth rejection,</strong></del></span> <span 
class="inserted"><ins><em>latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until</em></ins></span> Apple <span 
class="removed"><del><strong>&lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted</strong></del></span>
 <span class="inserted"><ins><em>fixes these security holes, 
if</em></ins></span> it <span class="removed"><del><strong>was 
censoring</strong></del></span> <span class="inserted"><ins><em>decides
-    to fix it. A free operating system would let people to 
identify</em></ins></span> the <span class="removed"><del><strong>app 
based</strong></del></span>
-    <span class="inserted"><ins><em>hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -520,14 +502,14 @@
     useful and would not be wrong.  Requiring users to get
     Apple's approval is tyranny. Apple says the check will
     only look for malware (not counting the malware that is &lt;a
-    href="/proprietary/malware-apple.html#TOC"&gt;part</em></ins></span> of
-    <span class="inserted"><ins><em>the operating system&lt;/a&gt;), but Apple 
could change that policy step
+    href="/proprietary/malware-apple.html#TOC"&gt;part of
+    the operating system&lt;/a&gt;), but Apple could change that policy step
     by step.  Or perhaps Apple will define malware to include any app
     that China does not like.&lt;/p&gt;
 
     &lt;p&gt;For free software, this means users will need to get Apple's
     approval after compilation.  This amounts to a system of surveilling
-    the use of free programs.&lt;/p&gt;
+    the use</em></ins></span> of <span class="inserted"><ins><em>free 
programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200803070"&gt;
@@ -541,7 +523,7 @@
 
     &lt;p&gt;Here is an article about the &lt;a
     href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-    code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
+    code signing&lt;/a&gt; that the</em></ins></span> iThings <span 
class="inserted"><ins><em>use to lock up the user.&lt;/p&gt;
 
     &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
     walls of the iThing jail: users can now install apps built from
@@ -549,7 +531,7 @@
     cannot do this freely because they are required to identify
     themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
     are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
-    big enough to mean that the</em></ins></span> iThings <span 
class="inserted"><ins><em>are no longer jails.&lt;/p&gt;
+    big enough to mean that the iThings are no longer jails.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -731,12 +713,12 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="manipulation"&gt;Manipulation&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Manipulation&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
@@ -749,12 +731,12 @@
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
     to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+    to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="pressuring"&gt;Pressuring&lt;/h3&gt;</em></ins></span>
+&lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;</em></ins></span>
 
 &lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
 
@@ -1061,8 +1043,8 @@
   &lt;li id="M201809070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
+    
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1079,8 +1061,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
     know you want to be spied on&rdquo;.&lt;/p&gt;
@@ -1464,7 +1446,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:25 $
+$Date: 2021/08/03 14:32:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- po/malware-apple.ja.po      1 Aug 2021 17:32:25 -0000       1.147
+++ po/malware-apple.ja.po      3 Aug 2021 14:32:37 -0000       1.148
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -405,28 +405,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -443,6 +421,12 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- po/malware-apple.nl-diff.html       1 Aug 2021 17:32:25 -0000       1.103
+++ po/malware-apple.nl-diff.html       3 Aug 2021 14:32:37 -0000       1.104
@@ -333,33 +333,15 @@
 &lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike</em></ins></span> the 
<span class="removed"><del><strong>developers
-fixed one &ldquo;problem&rdquo;,</strong></del></span> <span 
class="inserted"><ins><em>rest of the file
-  they do not count as malware. We mention them to refute the
-  supposition that prestigious proprietary software doesn't have grave
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>rest 
of</em></ins></span> the <span class="removed"><del><strong>fifth rejection,
+Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring</strong></del></span> <span class="inserted"><ins><em>file
+  they do not count as malware. We mention them to refute</em></ins></span> 
the <span class="removed"><del><strong>app based</strong></del></span>
+  <span class="inserted"><ins><em>supposition that prestigious proprietary 
software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in</em></ins></span> Apple <span 
class="removed"><del><strong>complained about another.
-After</strong></del></span> <span class="inserted"><ins><em>iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using</em></ins></span> the <span 
class="removed"><del><strong>fifth rejection,</strong></del></span> <span 
class="inserted"><ins><em>latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until</em></ins></span> Apple <span 
class="removed"><del><strong>&lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted</strong></del></span>
 <span class="inserted"><ins><em>fixes these security holes, 
if</em></ins></span> it <span class="removed"><del><strong>was 
censoring</strong></del></span> <span class="inserted"><ins><em>decides
-    to fix it. A free operating system would let people to 
identify</em></ins></span> the <span class="removed"><del><strong>app 
based</strong></del></span>
-    <span class="inserted"><ins><em>hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -520,14 +502,14 @@
     useful and would not be wrong.  Requiring users to get
     Apple's approval is tyranny. Apple says the check will
     only look for malware (not counting the malware that is &lt;a
-    href="/proprietary/malware-apple.html#TOC"&gt;part</em></ins></span> of
-    <span class="inserted"><ins><em>the operating system&lt;/a&gt;), but Apple 
could change that policy step
+    href="/proprietary/malware-apple.html#TOC"&gt;part of
+    the operating system&lt;/a&gt;), but Apple could change that policy step
     by step.  Or perhaps Apple will define malware to include any app
     that China does not like.&lt;/p&gt;
 
     &lt;p&gt;For free software, this means users will need to get Apple's
     approval after compilation.  This amounts to a system of surveilling
-    the use of free programs.&lt;/p&gt;
+    the use</em></ins></span> of <span class="inserted"><ins><em>free 
programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200803070"&gt;
@@ -541,7 +523,7 @@
 
     &lt;p&gt;Here is an article about the &lt;a
     href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-    code signing&lt;/a&gt; that the iThings use to lock up the user.&lt;/p&gt;
+    code signing&lt;/a&gt; that the</em></ins></span> iThings <span 
class="inserted"><ins><em>use to lock up the user.&lt;/p&gt;
 
     &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
     walls of the iThing jail: users can now install apps built from
@@ -549,7 +531,7 @@
     cannot do this freely because they are required to identify
     themselves. &lt;a href="https://developer.apple.com/xcode/"&gt;Here
     are details&lt;/a&gt;. While this is a crack in the prison walls, it is not
-    big enough to mean that the</em></ins></span> iThings <span 
class="inserted"><ins><em>are no longer jails.&lt;/p&gt;
+    big enough to mean that the iThings are no longer jails.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -731,12 +713,12 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="manipulation"&gt;Manipulation&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Manipulation&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201308290"&gt;
@@ -749,12 +731,12 @@
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
     to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+    to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="pressuring"&gt;Pressuring&lt;/h3&gt;</em></ins></span>
+&lt;h3 id="pressuring"&gt;Pressuring&lt;/h3&gt;</em></ins></span>
 
 &lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
 
@@ -1061,8 +1043,8 @@
   &lt;li id="M201809070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
+    
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
     the user's browsing history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1079,8 +1061,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
     know you want to be spied on&rdquo;.&lt;/p&gt;
@@ -1464,7 +1446,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:25 $
+$Date: 2021/08/03 14:32:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- po/malware-apple.nl.po      1 Aug 2021 17:32:25 -0000       1.101
+++ po/malware-apple.nl.po      3 Aug 2021 14:32:37 -0000       1.102
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -423,28 +423,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -461,6 +439,12 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "

Index: po/malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- po/malware-apple.pot        1 Aug 2021 17:32:25 -0000       1.111
+++ po/malware-apple.pot        3 Aug 2021 14:32:37 -0000       1.112
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -315,28 +315,6 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a "
-"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
 "
-"used an exploit in Apple iThings to install spyware</a> on people's devices, "
-"many of them to be journalists, even if they were using the latest version "
-"of the proprietary operating system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<a "
 
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
 "The pegasus spyware used vulnerabilities on proprietary smartphone operating "
 "systems</a> to impose surveillance on people. It can record people's calls, "
@@ -352,6 +330,12 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a "
 
"href=\"https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say\";>
 "
 "get passwords out of an iMonster</a>, use the microphone and camera, and "

Index: po/malware-apple.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pt-br.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/malware-apple.pt-br.po   1 Aug 2021 17:32:25 -0000       1.7
+++ po/malware-apple.pt-br.po   3 Aug 2021 14:32:37 -0000       1.8
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -404,48 +404,6 @@
 #. type: Content of: <div><div><ul><li><p>
 #, fuzzy
 #| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
-"\">exploit</i> de dia zero e clique zero em iCoisas da Apple para instalar "
-"<em>spyware</em></a> nos dispositivos das pessoas, muitas delas para serem "
-"jornalistas, mesmo que estivessem usando a versão mais recente do sistema "
-"operacional privativo instalado em seu iDispositivo."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm que "
-"esperar até que a Apple conserte essas falhas de segurança, se decidir "
-"consertá-las. Um sistema operacional livre permitiria que as pessoas "
-"identificassem o problema e o consertassem."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
-"small>"
-
-#. type: Content of: <div><div><ul><li><p>
-#, fuzzy
-#| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 #| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 #| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -485,6 +443,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
+"small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
@@ -1843,3 +1810,34 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última atualização:"
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente 
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm 
que "
+#~ "esperar até que a Apple conserte essas falhas de segurança, se decidir "
+#~ "consertá-las. Um sistema operacional livre permitiria que as pessoas "
+#~ "identificassem o problema e o consertassem."

Index: po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- po/malware-apple.ru.po      1 Aug 2021 17:32:25 -0000       1.273
+++ po/malware-apple.ru.po      3 Aug 2021 14:32:37 -0000       1.274
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -406,54 +406,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 # | <a
-# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
-# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
-# | install spyware</a> on people's devices, many of them to be journalists,
-# | even if they were using the latest version of the proprietary operating
-# | system installed on their iDevice.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
-"нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
-"устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если те "
-"пользовались самой поздней версией 
несвободной операционной системы, "
-"установленной на их устройстве."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Никто ничего не может поделать с этими 
уязвимостями, и люди вынуждены ждать, "
-"пока Apple устранит эти прорехи в защите, 
если эта компания решит устранить "
-"их. Свободная операционная система 
позволила бы людям выявить прореху и "
-"устранить ее."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
-"взломщиков.</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-# | <a
 # | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
@@ -500,6 +452,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
+"взломщиков.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Commercial crackware can <a href=\"https://www.theguardian.com/";
 "technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-"
 "researchers-say\"> get passwords out of an iMonster</a>, use the microphone "
@@ -1868,3 +1829,34 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Обновлено:"
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
+#~ "нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
+#~ "устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если "
+#~ "те пользовались самой поздней версией 
несвободной операционной системы, "
+#~ "установленной на их устройстве."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Никто ничего не может поделать с этими 
уязвимостями, и люди вынуждены "
+#~ "ждать, пока Apple устранит эти прорехи в 
защите, если эта компания решит "
+#~ "устранить их. Свободная операционная 
система позволила бы людям выявить "
+#~ "прореху и устранить ее."

Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- po/nl.po    1 Aug 2021 17:32:25 -0000       1.335
+++ po/nl.po    3 Aug 2021 14:32:37 -0000       1.336
@@ -449,28 +449,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -487,6 +465,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- po/pl.po    1 Aug 2021 17:32:25 -0000       1.334
+++ po/pl.po    3 Aug 2021 14:32:38 -0000       1.335
@@ -438,28 +438,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -476,6 +454,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- po/pot      1 Aug 2021 17:32:26 -0000       1.333
+++ po/pot      3 Aug 2021 14:32:38 -0000       1.334
@@ -368,28 +368,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -406,6 +384,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- po/proprietary-insecurity.de-diff.html      1 Aug 2021 17:32:26 -0000       
1.88
+++ po/proprietary-insecurity.de-diff.html      3 Aug 2021 14:32:38 -0000       
1.89
@@ -66,57 +66,46 @@
 software that has grave consequences or is otherwise
 <span class="removed"><del><strong>noteworthy.&lt;/p&gt;
 
-&lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>noteworthy. 
Even
-though most of these security flaws are unintentional, thus are not
-malicious functionalities in a strict sense, we report them to show that
-proprietary software is not as secure as mainstream media may say.&lt;/p&gt;
-
-&lt;p&gt;This doesn't imply that free software</em></ins></span> is <span 
class="removed"><del><strong>incorrect</strong></del></span> <span 
class="inserted"><ins><em>immune</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>bugs or insecurities.
-The difference between</em></ins></span> free <span 
class="inserted"><ins><em>and proprietary</em></ins></span> software <span 
class="removed"><del><strong>with a fictitious idea</strong></del></span> <span 
class="inserted"><ins><em>in this respect is
-the handling</em></ins></span> of
-<span class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span 
class="inserted"><ins><em>users are able to study the
-program and/or fix the bugs they find, often in communities</em></ins></span> 
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span 
class="inserted"><ins><em>they are
-able to share the program, while proprietary program users are forced to
+&lt;p&gt;It is incorrect to compare free software with a fictitious 
idea</strong></del></span> <span class="inserted"><ins><em>noteworthy. Even
+though most</em></ins></span> of
+<span class="removed"><del><strong>proprietary software as perfect, but the 
press often implicitly does
+that whenever a</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> security <span 
class="removed"><del><strong>hole</strong></del></span> <span 
class="inserted"><ins><em>flaws are unintentional, thus are not
+malicious functionalities</em></ins></span> in a <span 
class="removed"><del><strong>free program is discovered.  The
+examples below</strong></del></span> <span class="inserted"><ins><em>strict 
sense, we report them to</em></ins></span> show that
+proprietary software <span class="removed"><del><strong>isn't perfect, 
and</strong></del></span> is <span class="removed"><del><strong>often quite 
sloppy.&lt;/p&gt;
+
+&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>not as secure as mainstream media may say.&lt;/p&gt;
+
+&lt;p&gt;This doesn't imply that free software is immune</em></ins></span> to 
<span class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>bugs or insecurities.
+The difference between free and</em></ins></span> proprietary software <span 
class="removed"><del><strong>with
+a fictitious idea</strong></del></span> <span class="inserted"><ins><em>in 
this respect is
+the handling</em></ins></span> of <span class="inserted"><ins><em>the 
bugs:</em></ins></span> free software <span class="removed"><del><strong>as 
perfect.  Every nontrivial</strong></del></span> <span 
class="inserted"><ins><em>users are able to study the</em></ins></span>
+program <span class="removed"><del><strong>has bugs, and any system, free or 
proprietary, may have
+security errors.  To err is human, and not culpable.  But proprietary
+software developers frequently disregard gaping holes, or even
+introduce them deliberately.  In any case,</strong></del></span> <span 
class="inserted"><ins><em>and/or fix the bugs they find, often in communities 
as</em></ins></span> they <span 
class="removed"><del><strong>keep</strong></del></span> <span 
class="inserted"><ins><em>are
+able to share the program, while proprietary program</em></ins></span> users
+<span class="removed"><del><strong>&lt;em&gt;helpless</strong></del></span> 
<span class="inserted"><ins><em>are forced to
 rely on the program's developer for fixes.&lt;/p&gt;
 
 
-&lt;p&gt;If</em></ins></span> the <span 
class="removed"><del><strong>press</strong></del></span> <span 
class="inserted"><ins><em>developer does not care to fix the problem 
&mdash;</em></ins></span> often <span 
class="removed"><del><strong>implicitly</strong></del></span> <span 
class="inserted"><ins><em>the case for
-embedded software and old releases &mdash; the users are sunk. But if the
-developer</em></ins></span> does <span class="inserted"><ins><em>send a 
corrected version, it may contain new malicious
+&lt;p&gt;If the developer does not care</em></ins></span> to fix <span 
class="removed"><del><strong>any security problems that arise&lt;/em&gt;.  
Keeping</strong></del></span> <span class="inserted"><ins><em>the problem 
&mdash; often the case for
+embedded software and old releases &mdash;</em></ins></span> the users <span 
class="removed"><del><strong>helpless is what's culpable about proprietary 
software.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>are 
sunk. But if the
+developer does send a corrected version, it may contain new malicious
 functionalities as well as bug fixes.&lt;/p&gt;
 
 
-&lt;div class="important"&gt;
-&lt;p&gt;If you know of an example</em></ins></span> that <span 
class="removed"><del><strong>whenever</strong></del></span> <span 
class="inserted"><ins><em>ought to be in this page but isn't
+&lt;div class="important"&gt;</em></ins></span>
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include the URL of</em></ins></span> a <span 
class="inserted"><ins><em>trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to <span class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these</em></ins></span> security <span 
class="inserted"><ins><em>holes, if it decides
-    to fix it. A free operating system would let people to identify 
the</em></ins></span>
-    hole <span class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -124,10 +113,10 @@
     
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
     The pegasus spyware used vulnerabilities on proprietary smartphone
     operating systems&lt;/a&gt; to impose surveillance on people. It can record
-    people's calls, copy their messages, and secretly film them, 
using</em></ins></span> a
-    <span class="inserted"><ins><em>security vulnerability.&lt;/p&gt;
+    people's calls, copy their messages, and secretly film them, using a
+    security vulnerability.&lt;/p&gt;
 
-    &lt;p&gt;A</em></ins></span> free <span 
class="removed"><del><strong>program</strong></del></span> <span 
class="inserted"><ins><em>operating system would've let people to fix the bugs 
for
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
     themselves but now infected people will be compelled to wait for 
corporations to
     fix the problems.&lt;/p&gt;
 
@@ -170,7 +159,7 @@
     &lt;p&gt;&lt;a
     
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/"&gt;Apple
     is moving its Chinese customers' iCloud data to a datacenter controlled
-    by the Chinese government&lt;/a&gt;. Apple</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>already storing the encryption
+    by the Chinese government&lt;/a&gt;. Apple is already storing the 
encryption
     keys on these servers, obeying Chinese authority, making all Chinese
     user data available to the government.&lt;/p&gt;
   &lt;/li&gt;
@@ -208,9 +197,8 @@
     &lt;p&gt;A zero-day vulnerability in Zoom which &lt;a
     
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/"&gt;can
     be used to launch remote code execution (RCE) attacks&lt;/a&gt; has been
-    disclosed by researchers.</em></ins></span> The
-<span class="removed"><del><strong>examples below show</strong></del></span> 
<span class="inserted"><ins><em>researchers demonstrated a three-bug
-    attack chain</em></ins></span> that <span class="inserted"><ins><em>caused 
an RCE on a target machine, all this without
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, all this without
     any form of user interaction.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -218,16 +206,14 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
-    company's</em></ins></span> proprietary software <span 
class="removed"><del><strong>isn't perfect,</strong></del></span> <span 
class="inserted"><ins><em>are cracked&lt;/a&gt; by a major security
+    company's proprietary software are cracked&lt;/a&gt; by a major security
     breach. Crackers have had access to security archives of various
-    gyms, hospitals, jails, schools,</em></ins></span> and <span 
class="inserted"><ins><em>police stations that have used
+    gyms, hospitals, jails, schools, and police stations that have used
     Verkada's cameras.&lt;/p&gt;
 
-    &lt;p&gt;&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;It</em></ins></span> is 
<span class="removed"><del><strong>often quite sloppy.&lt;/p&gt;
-
-&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice
+    &lt;p&gt;&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;It is 
injustice
     to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and schools to
-    hand &ldquo;security&rdquo; footage</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>a company from which the government can
+    hand &ldquo;security&rdquo; footage to a company from which the government 
can
     collect it at any time, without even telling them.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
@@ -242,19 +228,19 @@
     in the United States are newly &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;cracked&lt;/a&gt;&rdquo; 
via &lt;a
     
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"&gt;holes
-    in Microsoft's</em></ins></span> proprietary <span 
class="removed"><del><strong>software</strong></del></span> <span 
class="inserted"><ins><em>email software, named Microsoft 365&lt;/a&gt;. It
+    in Microsoft's proprietary email software, named Microsoft 365&lt;/a&gt;. 
It
     is unclear whether there are other holes and vulnerabilities in the
     program or not but history and experience tells us it wouldn't be
-    the last disaster</em></ins></span> with <span 
class="inserted"><ins><em>proprietary programs.&lt;/p&gt;
+    the last disaster with proprietary programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202102110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Researchers at the security firm SentinelOne 
discovered</em></ins></span> a <span class="removed"><del><strong>fictitious 
idea of</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Researchers at the security firm SentinelOne discovered a &lt;a
     
href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/"&gt;security
     flaw in proprietary program Microsoft Windows Defender that lurked
-    undetected for 12 years&lt;/a&gt;. If the program was</em></ins></span> 
free <span class="inserted"><ins><em>(as in freedom),
+    undetected for 12 years&lt;/a&gt;. If the program was free (as in freedom),
     more people would have had a chance to notice the problem, therefore,
     it could've been fixed a lot sooner.&lt;/p&gt;
   &lt;/li&gt;
@@ -304,12 +290,11 @@
     
href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department"&gt;malicious
     code was sneaked into SolarWinds' proprietary software named
     Orion&lt;/a&gt;. Crackers got access to networks when users downloaded
-    a tainted</em></ins></span> software <span 
class="inserted"><ins><em>update. Crackers were able to monitor internal
+    a tainted software update. Crackers were able to monitor internal
     emails at some of the top agencies in the US.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(Please note that the article
-    wrongly refers to crackers</em></ins></span> as <span 
class="removed"><del><strong>perfect.  Every nontrivial
-program has bugs,</strong></del></span> <span class="inserted"><ins><em>"&lt;a
+    wrongly refers to crackers as "&lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;".)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -319,10 +304,10 @@
     &lt;p&gt;Baidu apps were &lt;a
     
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;
     caught collecting sensitive personal data&lt;/a&gt; that can be used for
-    lifetime tracking of users,</em></ins></span> and <span 
class="removed"><del><strong>any system, free or 
proprietary,</strong></del></span> <span class="inserted"><ins><em>putting them 
in danger. More than 1.4
+    lifetime tracking of users, and putting them in danger. More than 1.4
     billion people worldwide are affected by these proprietary apps, and
     users' privacy is jeopardized by this surveillance tool. Data collected
-    by Baidu</em></ins></span> may <span 
class="removed"><del><strong>have</strong></del></span> <span 
class="inserted"><ins><em>be handed over to the Chinese government, possibly
+    by Baidu may be handed over to the Chinese government, possibly
     putting Chinese people in danger.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -363,7 +348,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"&gt;
-    A disasterous</em></ins></span> security <span 
class="removed"><del><strong>errors.  To err</strong></del></span> <span 
class="inserted"><ins><em>bug&lt;/a&gt; touches millions of products in the
+    A disasterous security bug&lt;/a&gt; touches millions of products in the
     Internet of Stings.&lt;/p&gt;
 
     &lt;p&gt;As a result, anyone can sting the user, not only the
@@ -383,7 +368,7 @@
   &lt;li id="M202004150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Riot Games' new anti-cheat</em></ins></span> is <span 
class="removed"><del><strong>human,</strong></del></span> <span 
class="inserted"><ins><em>malware; &lt;a
+    &lt;p&gt;Riot Games' new anti-cheat is malware; &lt;a
     
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver"&gt;runs
     on system boot at kernel level&lt;/a&gt; on Windows. It is insecure 
software
     that increases the attack surface of the operating system.&lt;/p&gt;
@@ -405,14 +390,13 @@
     &lt;p&gt;Internet-tethered Amazon Ring had
     a security vulnerability that enabled attackers to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;,</em></ins></span> and <span 
class="inserted"><ins><em>snoop on the household
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
-    &lt;p&gt;Knowledge of the wifi password would</em></ins></span> not <span 
class="removed"><del><strong>culpable.</strong></del></span> <span 
class="inserted"><ins><em>be sufficient to carry
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
     out any significant surveillance if the devices implemented proper
-    security, including encryption.</em></ins></span> But <span 
class="inserted"><ins><em>many devices with</em></ins></span> proprietary
-    software <span class="removed"><del><strong>developers frequently 
disregard gaping holes, or even
-introduce them deliberately.  In any case,</strong></del></span> <span 
class="inserted"><ins><em>lack this. Of course,</em></ins></span> they <span 
class="removed"><del><strong>keep</strong></del></span> <span 
class="inserted"><ins><em>are also used by their
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
     manufacturers for snooping.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -426,26 +410,22 @@
     the user's iMonster&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The deep insecurity of iMonsters is even more pertinent given that
-    Apple's proprietary software makes</em></ins></span> users
-<span class="removed"><del><strong>&lt;em&gt;helpless</strong></del></span> 
<span class="inserted"><ins><em>totally dependent on Apple
+    Apple's proprietary software makes users totally dependent on Apple
     for even a modicum of security.  It also means that the devices do
-    not even try</em></ins></span> to <span class="removed"><del><strong>fix 
any</strong></del></span> <span 
class="inserted"><ins><em>offer</em></ins></span> security <span 
class="removed"><del><strong>problems</strong></del></span> <span 
class="inserted"><ins><em>against Apple itself.&lt;/p&gt;
+    not even try to offer security against Apple itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Out of 21 gratis Android antivirus apps</em></ins></span>
-    that <span class="removed"><del><strong>arise&lt;/em&gt;.  
Keeping</strong></del></span> <span class="inserted"><ins><em>were tested by 
security researchers, eight &lt;a
+    &lt;p&gt;Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight &lt;a
     
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/"&gt;
     failed to detect a test virus&lt;/a&gt;. All of them asked for dangerous
     permissions or contained advertising trackers, with seven being more
-    risky than</em></ins></span> the
-<span class="removed"><del><strong>users helpless is what's culpable 
about</strong></del></span> <span class="inserted"><ins><em>average of the 100 
most popular Android apps.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(Note that the article refers to 
these</em></ins></span> proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
+    risky than the average of the 100 most popular Android apps.&lt;/p&gt;
 
-&lt;p&gt;If you know</strong></del></span> <span 
class="inserted"><ins><em>apps as
+    &lt;p&gt;&lt;small&gt;(Note that the article refers to these proprietary 
apps as
     &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
     instead.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -465,7 +445,7 @@
   &lt;li id="M201905150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Users caught in the jail</em></ins></span> of an <span 
class="removed"><del><strong>example</strong></del></span> <span 
class="inserted"><ins><em>iMonster are &lt;a
+    &lt;p&gt;Users caught in the jail of an iMonster are &lt;a
     href="https://boingboing.net/2019/05/15/brittle-security.html"&gt; sitting
     ducks for other attackers&lt;/a&gt;, and the app censorship prevents 
security
     companies from figuring out how those attacks work.&lt;/p&gt;
@@ -479,15 +459,14 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
     
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities</em></ins></span> that <span 
class="removed"><del><strong>ought</strong></del></span> <span 
class="inserted"><ins><em>affect several models of implantable
+    two vulnerabilities that affect several models of implantable
     defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
     vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the 
company</em></ins></span> to <span 
class="removed"><del><strong>be</strong></del></span>
-    <span class="inserted"><ins><em>correct them. This means you can't rely on 
proprietary software
-    developers to fix bugs</em></ins></span> in <span 
class="removed"><del><strong>this page but isn't
-here, please write</strong></del></span> <span class="inserted"><ins><em>their 
products.&lt;/p&gt;
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902270"&gt;
@@ -501,9 +480,9 @@
 
     &lt;p&gt;The third party vulnerability is presumably
     unintentional and Amazon will probably fix it. However, we
-    do not expect Amazon</em></ins></span> to <span 
class="inserted"><ins><em>change the design that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
-    Amazon</em></ins></span> to <span class="removed"><del><strong>inform us. 
Please include</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.&lt;/p&gt;
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201809240"&gt;
@@ -518,9 +497,9 @@
   &lt;li id="M201808130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>URL</strong></del></span> <span 
class="inserted"><ins><em>beginning of 2017, &lt;a
+    &lt;p&gt;Since the beginning of 2017, &lt;a
     
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/"&gt;Android
-    phones have been collecting the addresses</em></ins></span> of <span 
class="inserted"><ins><em>nearby cellular
+    phones have been collecting the addresses of nearby cellular
     towers&lt;/a&gt;, even when location services are disabled, and sending
     that data back to Google.&lt;/p&gt;
   &lt;/li&gt;
@@ -528,16 +507,13 @@
   &lt;li id="M201808120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>trustworthy reference</strong></del></span> <span 
class="inserted"><ins><em>way to break the security of an Amazon device,
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China</em></ins></span> 
or <span class="removed"><del><strong>two</strong></del></span> <span 
class="inserted"><ins><em>the US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>product in 
that country,
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
@@ -548,7 +524,10 @@
   &lt;li id="M201807100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa, and all</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>other 
voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
@@ -711,16 +690,16 @@
     enables malware authors to capture keystrokes without taking the risk
     of being classified as malicious task by AV
     <span class="removed"><del><strong>heuristics&rdquo;.
-  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>heuristics&rdquo;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
+  &lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
 &lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
 medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>heuristics&rdquo;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
 
-&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
@@ -1125,19 +1104,19 @@
     can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
     have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;
 Mac OS X had an
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
@@ -1215,17 +1194,17 @@
 
     &lt;p&gt;Depending</em></ins></span> on what drug is being infused, the 
insecurity could open
     the door to <span class="removed"><del><strong>murder.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;
 Due to bad security in a drug pump, crackers could use it to
 &lt;a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504090"&gt;
@@ -1258,8 +1237,8 @@
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-The FTC punished a company</strong></del></span> for <span 
class="removed"><del><strong>making webcams with bad security so
-that it was easy for anyone to watch them&lt;/a&gt;.
+The FTC punished a company for making webcams with bad security so
+that it was easy</strong></del></span> for <span 
class="removed"><del><strong>anyone to watch them&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -1522,7 +1501,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- po/proprietary-insecurity.de.po     1 Aug 2021 17:32:26 -0000       1.186
+++ po/proprietary-insecurity.de.po     3 Aug 2021 14:32:38 -0000       1.187
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -175,18 +175,18 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people will be compelled to wait for corporations to fix "
+"the problems."
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><p>
@@ -209,22 +209,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
-"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
-"vulnerabilities on proprietary smartphone operating systems</a> to impose "
-"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a security vulnerability."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"A free operating system would've let people to fix the bugs for themselves "
-"but now infected people will be compelled to wait for corporations to fix "
-"the problems."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: po/proprietary-insecurity.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es-en.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- po/proprietary-insecurity.es-en.html        2 Aug 2021 09:32:14 -0000       
1.43
+++ po/proprietary-insecurity.es-en.html        3 Aug 2021 14:32:38 -0000       
1.44
@@ -79,26 +79,6 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used an exploit in Apple iThings to install
-    spyware</a> on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.</p>
-
-    <p>Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
-
   <li id="M202107180">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1205,7 +1185,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/08/02 09:32:14 $
+$Date: 2021/08/03 14:32:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- po/proprietary-insecurity.es.po     2 Aug 2021 09:32:14 -0000       1.123
+++ po/proprietary-insecurity.es.po     3 Aug 2021 14:32:38 -0000       1.124
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: \n"
@@ -141,41 +141,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado un "
-"fallo en las iCosas de Apple para instalar software espía</a> en los "
-"dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
-"estuvieran utilizando la última versión del programa privativo instalado en 
"
-"sus dispositivos."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios tienen "
-"que esperar a que Apple solucione esos agujeros de seguridad, si es que "
-"decide hacerlo. Un sistema operativo libre permitiría a la gente identificar 
"
-"el agujero y solucionar el problema."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Advierta que en ese artículo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a></small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -202,6 +167,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>Advierta que en ese artículo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a></small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -1830,3 +1804,27 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado "
+#~ "un fallo en las iCosas de Apple para instalar software espía</a> en los "
+#~ "dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
+#~ "estuvieran utilizando la última versión del programa privativo instalado 
"
+#~ "en sus dispositivos."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios "
+#~ "tienen que esperar a que Apple solucione esos agujeros de seguridad, si "
+#~ "es que decide hacerlo. Un sistema operativo libre permitiría a la gente "
+#~ "identificar el agujero y solucionar el problema."

Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- po/proprietary-insecurity.fr-en.html        1 Aug 2021 18:31:03 -0000       
1.122
+++ po/proprietary-insecurity.fr-en.html        3 Aug 2021 14:32:38 -0000       
1.123
@@ -79,26 +79,6 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used an exploit in Apple iThings to install
-    spyware</a> on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.</p>
-
-    <p>Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
-
   <li id="M202107180">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1205,7 +1185,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/08/01 18:31:03 $
+$Date: 2021/08/03 14:32:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.272
retrieving revision 1.273
diff -u -b -r1.272 -r1.273
--- po/proprietary-insecurity.fr.po     1 Aug 2021 20:04:32 -0000       1.272
+++ po/proprietary-insecurity.fr.po     3 Aug 2021 14:32:38 -0000       1.273
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-08-01 19:59+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -141,39 +141,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
-"iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
-"beaucoup appartenaient à des journalistes, et ceci même quand leur système 
"
-"d'exploitation était parfaitement à jour."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
-"vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
-"laisserait aux gens la possibilité d'identifier les failles de sécurité et 
"
-"de les corriger."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -198,6 +165,14 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -1823,3 +1798,26 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
+#~ "iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
+#~ "beaucoup appartenaient à des journalistes, et ceci même quand leur "
+#~ "système d'exploitation était parfaitement à jour."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
+#~ "vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
+#~ "laisserait aux gens la possibilité d'identifier les failles de sécurité 
"
+#~ "et de les corriger."

Index: po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- po/proprietary-insecurity.it-diff.html      1 Aug 2021 17:32:26 -0000       
1.101
+++ po/proprietary-insecurity.it-diff.html      3 Aug 2021 14:32:38 -0000       
1.102
@@ -76,47 +76,28 @@
 the handling</em></ins></span> of
 <span class="removed"><del><strong>proprietary</strong></del></span> <span 
class="inserted"><ins><em>the bugs: free</em></ins></span> software <span 
class="inserted"><ins><em>users are able to study the
 program and/or fix the bugs they find, often in communities</em></ins></span> 
as <span class="removed"><del><strong>perfect, but</strong></del></span> <span 
class="inserted"><ins><em>they are
-able to share</em></ins></span> the <span 
class="removed"><del><strong>press</strong></del></span> <span 
class="inserted"><ins><em>program, while proprietary program users are forced to
+able to share the program, while proprietary program users are forced to
 rely on the program's developer for fixes.&lt;/p&gt;
 
 
-&lt;p&gt;If the developer does not care to fix the problem 
&mdash;</em></ins></span> often <span 
class="removed"><del><strong>implicitly</strong></del></span> <span 
class="inserted"><ins><em>the case for
+&lt;p&gt;If</em></ins></span> the <span 
class="removed"><del><strong>press</strong></del></span> <span 
class="inserted"><ins><em>developer does not care to fix the problem 
&mdash;</em></ins></span> often <span 
class="removed"><del><strong>implicitly</strong></del></span> <span 
class="inserted"><ins><em>the case for
 embedded software and old releases &mdash; the users are sunk. But if the
-developer</em></ins></span> does <span class="inserted"><ins><em>send a 
corrected version, it may contain new malicious
+developer</em></ins></span> does
+<span class="removed"><del><strong>that whenever</strong></del></span> <span 
class="inserted"><ins><em>send</em></ins></span> a <span 
class="removed"><del><strong>security hole</strong></del></span> <span 
class="inserted"><ins><em>corrected version, it may contain new malicious
 functionalities as well as bug fixes.&lt;/p&gt;
 
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know of an example</em></ins></span> that <span 
class="removed"><del><strong>whenever</strong></del></span> <span 
class="inserted"><ins><em>ought to be in this page but isn't
+&lt;p&gt;If you know of an example that ought to be</em></ins></span> in <span 
class="inserted"><ins><em>this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
-to inform us. Please include the URL of</em></ins></span> a <span 
class="inserted"><ins><em>trustworthy reference or two
+to inform us. Please include the URL of a trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these</em></ins></span> security <span 
class="inserted"><ins><em>holes, if it decides
-    to fix it. A free operating system would let people to identify 
the</em></ins></span>
-    hole <span class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -178,7 +159,7 @@
   &lt;li id="M202105040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A motorcycle company named Klim is selling airbag
+    &lt;p&gt;A motorcycle company named Klim</em></ins></span> is <span 
class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>selling airbag
     vests with different payment methods, one of them is through a &lt;a
     
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment"&gt;proprietary
     subscription-based option that will block the vest from inflating if
@@ -196,7 +177,7 @@
     up with private companies to monitor American citizens' private online
     activity and digital communications&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;What creates the opportunity to try this</em></ins></span> is 
<span class="removed"><del><strong>discovered.</strong></del></span> <span 
class="inserted"><ins><em>the fact that these
+    &lt;p&gt;What creates the opportunity to try this is the fact that these
     companies are already snooping on users' private activities. That
     in turn is due to people's use of nonfree software which snoops,
     and online dis-services which snoop.&lt;/p&gt;
@@ -210,14 +191,14 @@
     be used to launch remote code execution (RCE) attacks&lt;/a&gt; has been
     disclosed by researchers.</em></ins></span> The
 <span class="removed"><del><strong>examples below show</strong></del></span> 
<span class="inserted"><ins><em>researchers demonstrated a three-bug
-    attack chain</em></ins></span> that <span class="inserted"><ins><em>caused 
an RCE on a target machine, all this without
+    attack chain that caused an RCE on a target machine, all this without
     any form of user interaction.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202103090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras that used Verkada
+    &lt;p&gt;&lt;a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams"&gt;Over
 150 thousand security cameras</em></ins></span> that <span 
class="inserted"><ins><em>used Verkada
     company's</em></ins></span> proprietary software <span 
class="removed"><del><strong>isn't perfect,</strong></del></span> <span 
class="inserted"><ins><em>are cracked&lt;/a&gt; by a major security
     breach. Crackers have had access to security archives of various
     gyms, hospitals, jails, schools,</em></ins></span> and <span 
class="inserted"><ins><em>police stations that have used
@@ -225,9 +206,9 @@
 
     &lt;p&gt;&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;It</em></ins></span> is 
<span class="removed"><del><strong>often quite sloppy.&lt;/p&gt;
 
-&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice
-    to the public&lt;/a&gt; for gyms, stores, hospitals, jails, and 
schools</em></ins></span> to <span 
class="removed"><del><strong>compare</strong></del></span>
-    <span class="inserted"><ins><em>hand &ldquo;security&rdquo; footage to a 
company from which the government can
+&lt;p&gt;It would be equally incorrect</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span>
+    to <span class="removed"><del><strong>compare</strong></del></span> <span 
class="inserted"><ins><em>the public&lt;/a&gt; for gyms, stores, hospitals, 
jails, and schools to
+    hand &ldquo;security&rdquo; footage to a company from which the government 
can
     collect it at any time, without even telling them.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;Please note that the article
@@ -394,7 +375,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some security breakers (wrongly referred in this article as &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;)
-    managed to interfere the Amazon Ring proprietary system, and &lt;a
+    managed to interfere the Amazon Ring proprietary system,</em></ins></span> 
and <span class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras"&gt;access
     its camera, speakers and microphones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -405,7 +386,7 @@
     &lt;p&gt;Internet-tethered Amazon Ring had
     a security vulnerability that enabled attackers to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;,</em></ins></span> and <span 
class="inserted"><ins><em>snoop on the household
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
     through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would</em></ins></span> not <span 
class="removed"><del><strong>culpable.</strong></del></span> <span 
class="inserted"><ins><em>be sufficient to carry
@@ -684,16 +665,16 @@
     enables malware authors to capture keystrokes without taking the risk
     of being classified as malicious task by AV
     <span class="removed"><del><strong>heuristics&rdquo;.
-  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>heuristics&rdquo;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
+  &lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
 &lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
 medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>heuristics&rdquo;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
 
-&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
@@ -1098,19 +1079,19 @@
     can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
     have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;
 Mac OS X had an
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
@@ -1289,12 +1270,10 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
+  &lt;li id="M201404250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &lt;a
@@ -1307,10 +1286,12 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
-    of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
+    of WhatsApp&lt;/a&gt; makes eavesdropping a 
snap.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312290"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
@@ -1495,7 +1476,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- po/proprietary-insecurity.it.po     1 Aug 2021 17:32:26 -0000       1.203
+++ po/proprietary-insecurity.it.po     3 Aug 2021 14:32:38 -0000       1.204
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -165,28 +165,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -203,6 +181,12 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- po/proprietary-insecurity.ja-diff.html      1 Aug 2021 17:32:26 -0000       
1.122
+++ po/proprietary-insecurity.ja-diff.html      3 Aug 2021 14:32:38 -0000       
1.123
@@ -97,26 +97,6 @@
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -447,9 +427,10 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
+    users' movements</em></ins></span> even <span 
class="removed"><del><strong>introduce</strong></del></span> <span 
class="inserted"><ins><em>when the user says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+    not to allow</em></ins></span> them
+<span class="removed"><del><strong>deliberately,</strong></del></span> <span 
class="inserted"><ins><em>access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
@@ -464,7 +445,7 @@
     companies from figuring out how those attacks work.&lt;/p&gt;
 
     &lt;p&gt;Apple's censorship of apps is fundamentally unjust, and would be
-    inexcusable</em></ins></span> even <span 
class="removed"><del><strong>introduce</strong></del></span> <span 
class="inserted"><ins><em>if it didn't lead to security threats as 
well.&lt;/p&gt;
+    inexcusable even if it didn't lead to security threats as well.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903210"&gt;
@@ -624,8 +605,7 @@
     &lt;p&gt;That is a malicious functionality, but in addition it
     is a gross insecurity since anyone, including malicious crackers, &lt;a
     
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
-    find those accounts and use</em></ins></span> them
-<span class="removed"><del><strong>deliberately,</strong></del></span> <span 
class="inserted"><ins><em>to get into users' cameras&lt;/a&gt;.&lt;/p&gt;
+    find those accounts and use them to get into users' 
cameras&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706050"&gt;
@@ -1115,17 +1095,17 @@
 
     &lt;p&gt;Depending</em></ins></span> on what drug is being infused, the 
insecurity could open
     the door to <span class="removed"><del><strong>murder.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;
 Due to bad security in a drug pump, crackers could use it to
 &lt;a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504090"&gt;
@@ -1216,12 +1196,10 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
+  &lt;li id="M201404250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Lots of &lt;a
@@ -1234,10 +1212,12 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
-    of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
+    of WhatsApp&lt;/a&gt; makes eavesdropping a 
snap.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312290"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
@@ -1422,7 +1402,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- po/proprietary-insecurity.ja.po     1 Aug 2021 17:32:26 -0000       1.175
+++ po/proprietary-insecurity.ja.po     3 Aug 2021 14:32:38 -0000       1.176
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -141,28 +141,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -179,6 +157,12 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- po/proprietary-insecurity.pot       1 Aug 2021 17:32:26 -0000       1.141
+++ po/proprietary-insecurity.pot       3 Aug 2021 14:32:38 -0000       1.142
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -107,28 +107,6 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a "
-"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
 "
-"used an exploit in Apple iThings to install spyware</a> on people's devices, "
-"many of them to be journalists, even if they were using the latest version "
-"of the proprietary operating system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<a "
 
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
 "The pegasus spyware used vulnerabilities on proprietary smartphone operating "
 "systems</a> to impose surveillance on people. It can record people's calls, "
@@ -144,6 +122,12 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a "
 
"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
 "can allow crackers to remotely gain access to the operating system</a> and "

Index: po/proprietary-insecurity.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pt-br.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/proprietary-insecurity.pt-br.po  1 Aug 2021 17:32:26 -0000       1.12
+++ po/proprietary-insecurity.pt-br.po  3 Aug 2021 14:32:38 -0000       1.13
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -132,48 +132,6 @@
 #. type: Content of: <div><div><ul><li><p>
 #, fuzzy
 #| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
-"\">exploit</i> de dia zero e clique zero em iCoisas da Apple para instalar "
-"<em>spyware</em></a> nos dispositivos das pessoas, muitas delas para serem "
-"jornalistas, mesmo que estivessem usando a versão mais recente do sistema "
-"operacional privativo instalado em seu iDispositivo."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm que "
-"esperar até que a Apple conserte essas falhas de segurança, se decidir "
-"consertá-las. Um sistema operacional livre permitiria que as pessoas "
-"identificassem o problema e o consertassem."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
-"small>"
-
-#. type: Content of: <div><div><ul><li><p>
-#, fuzzy
-#| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 #| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 #| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -213,6 +171,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
+"small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -1818,6 +1785,37 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente 
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm 
que "
+#~ "esperar até que a Apple conserte essas falhas de segurança, se decidir "
+#~ "consertá-las. Um sistema operacional livre permitiria que as pessoas "
+#~ "identificassem o problema e o consertassem."
+
+#, fuzzy
+#~| msgid ""
 #~| "All complex programs, whether free or proprietary, contain bugs. What "
 #~| "makes bugs more dangerous in proprietary software is that users are "
 #~| "<em>helpless to fix any security problems that arise</em>.  Keeping the "

Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- po/proprietary-insecurity.ru.po     1 Aug 2021 17:32:26 -0000       1.314
+++ po/proprietary-insecurity.ru.po     3 Aug 2021 14:32:38 -0000       1.315
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -171,54 +171,6 @@
 
 #. type: Content of: <div><div><ul><li><p>
 # | <a
-# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
-# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
-# | install spyware</a> on people's devices, many of them to be journalists,
-# | even if they were using the latest version of the proprietary operating
-# | system installed on their iDevice.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
-"нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
-"устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если те "
-"пользовались самой поздней версией 
несвободной операционной системы, "
-"установленной на их устройстве."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Никто ничего не может поделать с этими 
уязвимостями, и люди вынуждены ждать, "
-"пока Apple устранит эти прорехи в защите, 
если эта компания решит устранить "
-"их. Свободная операционная система 
позволила бы людям выявить прореху и "
-"устранить ее."
-
-#. type: Content of: <div><div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
-"взломщиков.</small>"
-
-#. type: Content of: <div><div><ul><li><p>
-# | <a
 # | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
@@ -265,6 +217,15 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
+"взломщиков.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -1874,6 +1835,37 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
+#~ "нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
+#~ "устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если "
+#~ "те пользовались самой поздней версией 
несвободной операционной системы, "
+#~ "установленной на их устройстве."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Никто ничего не может поделать с этими 
уязвимостями, и люди вынуждены "
+#~ "ждать, пока Apple устранит эти прорехи в 
защите, если эта компания решит "
+#~ "устранить их. Свободная операционная 
система позволила бы людям выявить "
+#~ "прореху и устранить ее."
+
 #~ msgid ""
 #~ "The point of this page is not to imply that free software is immune to "
 #~ "bugs or insecurities; it's to show that <em>proprietary software has bugs "

Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- po/proprietary.de-diff.html 1 Aug 2021 17:32:26 -0000       1.291
+++ po/proprietary.de-diff.html 3 Aug 2021 14:32:38 -0000       1.292
@@ -28,8 +28,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
@@ -66,13 +66,13 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -200,10 +200,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -224,26 +224,6 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -316,6 +296,16 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M202106190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
+    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
+    might or might not do malicious things but the power Google has over 
proprietary
+    Android phones is dangerous.&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -379,7 +369,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.308
retrieving revision 1.309
diff -u -b -r1.308 -r1.309
--- po/proprietary.de.po        1 Aug 2021 17:32:26 -0000       1.308
+++ po/proprietary.de.po        3 Aug 2021 14:32:38 -0000       1.309
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,18 +480,18 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people will be compelled to wait for corporations to fix "
+"the problems."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -514,22 +514,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
-"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
-"vulnerabilities on proprietary smartphone operating systems</a> to impose "
-"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a security vulnerability."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A free operating system would've let people to fix the bugs for themselves "
-"but now infected people will be compelled to wait for corporations to fix "
-"the problems."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -584,6 +568,15 @@
 "the most powerful companies don't dare."
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.500
retrieving revision 1.501
diff -u -b -r1.500 -r1.501
--- po/proprietary.es.po        2 Aug 2021 09:32:14 -0000       1.500
+++ po/proprietary.es.po        3 Aug 2021 14:32:38 -0000       1.501
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-08-03 14:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -341,41 +342,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado un "
-"fallo en las iCosas de Apple para instalar software espía</a> en los "
-"dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
-"estuvieran utilizando la última versión del programa privativo instalado en 
"
-"sus dispositivos."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios tienen "
-"que esperar a que Apple solucione esos agujeros de seguridad, si es que "
-"decide hacerlo. Un sistema operativo libre permitiría a la gente identificar 
"
-"el agujero y solucionar el problema."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Advierta que en ese artículo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a>).</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -402,6 +368,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Advierta que en ese artículo se refieren erróneamente a los "
+"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+"html#Hacker\">«<cite>hackers</cite>»</a>).</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -487,6 +462,32 @@
 "privativo, que es su puerta de entrada) hasta el punto de que ni siquiera "
 "las compañías más poderosas se atrevan a introducirlas."
 
+#. type: Content of: <div><ul><li><p>
+# | <a
+# | 
href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/\";>Google
+# | automatically installed an app on many {+proprietary+} Android phones</a>.
+# | The app {+might or+} might not do malicious things but the power Google
+# | has over proprietary Android phones is dangerous.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+#| "tracking-google-silently-pushed-app-to-users-phones/\">Google "
+#| "automatically installed an app on many Android phones</a>. The app might "
+#| "not do malicious things but the power Google has over proprietary Android "
+#| "phones is dangerous."
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google ha instalado "
+"automáticamente una aplicación en muchos teléfonos Android</a>. La "
+"aplicación podría no hacer nada malicioso, pero el poder que tiene Google "
+"sobre los teléfonos privativos Android es peligroso."
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Ver más&hellip;</a>"
@@ -565,3 +566,27 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Delincuentes informáticos han aprovechado "
+#~ "un fallo en las iCosas de Apple para instalar software espía</a> en los "
+#~ "dispositivos de los usuarios, muchos de ellos periodistas, aun cuando "
+#~ "estuvieran utilizando la última versión del programa privativo instalado 
"
+#~ "en sus dispositivos."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Nadie puede hacer nada frente a estas vulnerabilidades y los usuarios "
+#~ "tienen que esperar a que Apple solucione esos agujeros de seguridad, si "
+#~ "es que decide hacerlo. Un sistema operativo libre permitiría a la gente "
+#~ "identificar el agujero y solucionar el problema."

Index: po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- po/proprietary.fr-en.html   1 Aug 2021 18:31:03 -0000       1.221
+++ po/proprietary.fr-en.html   3 Aug 2021 14:32:38 -0000       1.222
@@ -186,26 +186,6 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-  <li id="M202107190">
-    <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p><a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/";>Crackers
-    used an exploit in Apple iThings to install
-    spyware</a> on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.</p>
-
-    <p>Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.</p>
-
-    <p><small>Please note that the article
-    wrongly refers to crackers as &ldquo;<a
-    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
-  </li>
-
   <li id="M202107180">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -278,6 +258,16 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.</p>
   </li>
+
+  <li id="M202106190">
+    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/";>Google
+    automatically installed an app on many proprietary Android phones</a>. The 
app
+    might or might not do malicious things but the power Google has over 
proprietary
+    Android phones is dangerous.</p>
+  </li>
 </ul>
 <p class="button right-align">
 <a href="/proprietary/all.html">More items&hellip;</a></p>
@@ -340,7 +330,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/08/01 18:31:03 $
+$Date: 2021/08/03 14:32:38 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.524
retrieving revision 1.525
diff -u -b -r1.524 -r1.525
--- po/proprietary.fr.po        1 Aug 2021 18:01:04 -0000       1.524
+++ po/proprietary.fr.po        3 Aug 2021 14:32:38 -0000       1.525
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-08-01 19:59+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -338,39 +338,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
-"iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
-"beaucoup appartenaient à des journalistes, et ceci même quand leur système 
"
-"d'exploitation était parfaitement à jour."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
-"vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
-"laisserait aux gens la possibilité d'identifier les failles de sécurité et 
"
-"de les corriger."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -395,6 +362,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a 
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -480,6 +455,20 @@
 "d'entrée) au point que même les sociétés les plus puissantes n'oseront 
plus "
 "la braver."
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google a installé "
+"automatiquement une appli sur beaucoup de téléphones Android</a>. L'appli "
+"n'est peut-être pas malveillante, mais le pouvoir que possède Google sur 
les "
+"téléphones Android (privateurs) est dangereux."
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Voir plus&hellip;</a>"
@@ -552,3 +541,26 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Des crackers ont exploité une faille des "
+#~ "iTrucs pour installer un logiciel espion</a> sur des appareils Apple dont "
+#~ "beaucoup appartenaient à des journalistes, et ceci même quand leur "
+#~ "système d'exploitation était parfaitement à jour."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Personne ne peut rien y faire. On doit attendre qu'Apple corrige cette "
+#~ "vulnérabilité, si c'est sa décision. Un système d'exploitation libre "
+#~ "laisserait aux gens la possibilité d'identifier les failles de sécurité 
"
+#~ "et de les corriger."

Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- po/proprietary.it-diff.html 1 Aug 2021 17:32:26 -0000       1.301
+++ po/proprietary.it-diff.html 3 Aug 2021 14:32:38 -0000       1.302
@@ -28,8 +28,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
@@ -66,13 +66,13 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -223,26 +223,6 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -315,6 +295,16 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M202106190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
+    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
+    might or might not do malicious things but the power Google has over 
proprietary
+    Android phones is dangerous.&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -378,7 +368,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- po/proprietary.it.po        1 Aug 2021 17:32:26 -0000       1.317
+++ po/proprietary.it.po        3 Aug 2021 14:32:38 -0000       1.318
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,28 +485,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -523,6 +501,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -577,6 +561,15 @@
 "the most powerful companies don't dare."
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- po/proprietary.ja-diff.html 1 Aug 2021 17:32:26 -0000       1.306
+++ po/proprietary.ja-diff.html 3 Aug 2021 14:32:39 -0000       1.307
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -57,13 +57,13 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
+#TOC a { text-decoration: none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -166,8 +166,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a
 href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;
 to
-servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
+servers&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a
 href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
@@ -179,8 +179,8 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
@@ -205,10 +205,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -228,26 +228,6 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -320,6 +300,16 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M202106190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
+    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
+    might or might not do malicious things but the power Google has over 
proprietary
+    Android phones is dangerous.&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -383,7 +373,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- po/proprietary.ja.po        1 Aug 2021 17:32:26 -0000       1.300
+++ po/proprietary.ja.po        3 Aug 2021 14:32:39 -0000       1.301
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,28 +343,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -381,6 +359,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -435,6 +419,15 @@
 "the most powerful companies don't dare."
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"

Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- po/proprietary.nl-diff.html 1 Aug 2021 17:32:26 -0000       1.302
+++ po/proprietary.nl-diff.html 3 Aug 2021 14:32:39 -0000       1.303
@@ -28,8 +28,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
@@ -66,13 +66,13 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -223,26 +223,6 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -315,6 +295,16 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M202106190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
+    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
+    might or might not do malicious things but the power Google has over 
proprietary
+    Android phones is dangerous.&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -378,7 +368,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- po/proprietary.nl.po        1 Aug 2021 17:32:26 -0000       1.291
+++ po/proprietary.nl.po        3 Aug 2021 14:32:39 -0000       1.292
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,28 +388,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -426,6 +404,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -480,6 +464,15 @@
 "the most powerful companies don't dare."
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
 # | {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.318
retrieving revision 1.319
diff -u -b -r1.318 -r1.319
--- po/proprietary.pl-diff.html 1 Aug 2021 17:32:26 -0000       1.318
+++ po/proprietary.pl-diff.html 3 Aug 2021 14:32:39 -0000       1.319
@@ -63,8 +63,8 @@
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -121,8 +121,8 @@
 &lt;hr class="thin" /&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As of July, 2021, the pages in this directory list around 500
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 610 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>July, 2021, the pages in this directory list 
around 500
+instances of malicious functionalities (with more than 610 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;p&gt;If you want to be notified when we add new items or make other 
changes,
@@ -166,17 +166,17 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -222,26 +222,6 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -314,6 +294,16 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M202106190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
+    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
+    might or might not do malicious things but the power Google has over 
proprietary
+    Android phones is dangerous.&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -377,7 +367,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:26 $
+$Date: 2021/08/03 14:32:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- po/proprietary.pl.po        1 Aug 2021 17:32:26 -0000       1.283
+++ po/proprietary.pl.po        3 Aug 2021 14:32:39 -0000       1.284
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,28 +569,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -607,6 +585,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -661,6 +645,15 @@
 "the most powerful companies don't dare."
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- po/proprietary.pot  1 Aug 2021 17:32:27 -0000       1.280
+++ po/proprietary.pot  3 Aug 2021 14:32:39 -0000       1.281
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -281,28 +281,6 @@
 #. type: Content of: <div><ul><li><p>
 msgid ""
 "<a "
-"href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
 "
-"used an exploit in Apple iThings to install spyware</a> on people's devices, "
-"many of them to be journalists, even if they were using the latest version "
-"of the proprietary operating system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
 
"href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 "
 "The pegasus spyware used vulnerabilities on proprietary smartphone operating "
 "systems</a> to impose surveillance on people. It can record people's calls, "
@@ -318,6 +296,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a "
 
"href=\"https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/\";>
 "
 "can allow crackers to remotely gain access to the operating system</a> and "
@@ -373,6 +357,15 @@
 "the most powerful companies don't dare."
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a "
+"href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/\";>Google
 "
+"automatically installed an app on many proprietary Android phones</a>. The "
+"app might or might not do malicious things but the power Google has over "
+"proprietary Android phones is dangerous."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr ""

Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.445
retrieving revision 1.446
diff -u -b -r1.445 -r1.446
--- po/proprietary.pt-br.po     1 Aug 2021 17:32:27 -0000       1.445
+++ po/proprietary.pt-br.po     3 Aug 2021 14:32:39 -0000       1.446
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-06-13 12:11-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -337,48 +337,6 @@
 #. type: Content of: <div><ul><li><p>
 #, fuzzy
 #| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
-"\">exploit</i> de dia zero e clique zero em iCoisas da Apple para instalar "
-"<em>spyware</em></a> nos dispositivos das pessoas, muitas delas para serem "
-"jornalistas, mesmo que estivessem usando a versão mais recente do sistema "
-"operacional privativo instalado em seu iDispositivo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm que "
-"esperar até que a Apple conserte essas falhas de segurança, se decidir "
-"consertá-las. Um sistema operacional livre permitiria que as pessoas "
-"identificassem o problema e o consertassem."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
-"small>"
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 #| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 #| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -418,6 +376,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
+"small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -501,6 +468,20 @@
 "(e o software privativo que é seu caminho de entrada) a tal ponto que mesmo "
 "as empresas mais poderosas não ousem."
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google instalou "
+"automaticamente um aplicativo em muitos telefones privativos com Android</"
+"a>. O aplicativo pode não fazer coisas maliciosas, mas o poder que Google "
+"tem sobre os telefones privativos com Android é perigoso."
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Mais itens…</a>"
@@ -575,18 +556,36 @@
 msgid "Updated:"
 msgstr "Última atualização:"
 
-#~ msgid ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
-#~ "automatically installed an app on many proprietary Android phones</a>. "
-#~ "The app might or might not do malicious things but the power Google has "
-#~ "over proprietary Android phones is dangerous."
-#~ msgstr ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google instalou "
-#~ "automaticamente um aplicativo em muitos telefones privativos com Android</"
-#~ "a>. O aplicativo pode não fazer coisas maliciosas, mas o poder que Google 
"
-#~ "tem sobre os telefones privativos com Android é perigoso."
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente 
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm 
que "
+#~ "esperar até que a Apple conserte essas falhas de segurança, se decidir "
+#~ "consertá-las. Um sistema operacional livre permitiria que as pessoas "
+#~ "identificassem o problema e o consertassem."
 
 #~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-";

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.541
retrieving revision 1.542
diff -u -b -r1.541 -r1.542
--- po/proprietary.ru.po        1 Aug 2021 17:32:27 -0000       1.541
+++ po/proprietary.ru.po        3 Aug 2021 14:32:39 -0000       1.542
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -341,54 +341,6 @@
 
 #. type: Content of: <div><ul><li><p>
 # | <a
-# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
-# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
-# | install spyware</a> on people's devices, many of them to be journalists,
-# | even if they were using the latest version of the proprietary operating
-# | system installed on their iDevice.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
-"нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
-"устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если те "
-"пользовались самой поздней версией 
несвободной операционной системы, "
-"установленной на их устройстве."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Никто ничего не может поделать с этими 
уязвимостями, и люди вынуждены ждать, "
-"пока Apple устранит эти прорехи в защите, 
если эта компания решит устранить "
-"их. Свободная операционная система 
позволила бы людям выявить прореху и "
-"устранить ее."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
-"взломщиков.</small>"
-
-#. type: Content of: <div><ul><li><p>
-# | <a
 # | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
@@ -435,6 +387,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
+"взломщиков.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -519,6 +480,20 @@
 "вредоносных функций (и несвободных 
программ, которые вводят их) до такой "
 "степени, чтобы даже самые могущественные 
компании не смели этого делать."
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Компания 
Google "
+"автоматически установила приложение на 
многие телефоны Android</a>. Это "
+"приложение могло бы наносит вред, а могло 
бы не наносить, но власть Google "
+"над телефонами с несвободной системой 
Android опасна."
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Далее...</a>"
@@ -595,18 +570,36 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
-#~ msgid ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
-#~ "automatically installed an app on many proprietary Android phones</a>. "
-#~ "The app might or might not do malicious things but the power Google has "
-#~ "over proprietary Android phones is dangerous."
-#~ msgstr ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Компания 
Google "
-#~ "автоматически установила приложение на 
многие телефоны Android</a>. Это "
-#~ "приложение могло бы наносит вред, а 
могло бы не наносить, но власть "
-#~ "Google над телефонами с несвободной 
системой Android опасна."
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
+#~ "нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
+#~ "устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если "
+#~ "те пользовались самой поздней версией 
несвободной операционной системы, "
+#~ "установленной на их устройстве."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Никто ничего не может поделать с этими 
уязвимостями, и люди вынуждены "
+#~ "ждать, пока Apple устранит эти прорехи в 
защите, если эта компания решит "
+#~ "устранить их. Свободная операционная 
система позволила бы людям выявить "
+#~ "прореху и устранить ее."
 
 #~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-";

Index: po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- po/proprietary.tr.po        1 Aug 2021 17:32:27 -0000       1.191
+++ po/proprietary.tr.po        3 Aug 2021 14:32:39 -0000       1.192
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-08-01 08:38+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -337,40 +337,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"Güvenlik kırıcıları, çoğu gazeteci olan insanların aygıtlarına <a 
href="
-"\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-";
-"on-journalists/\">casus yazılım kurmak için Apple iŞeyler'deki bir 
açığı "
-"kullandılar</a>, iAygıtlarında en son sürüm özel mülk işletim sistemi 
"
-"kullanıyor olsalar bile bu bir işe yaramadı."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Hiç kimse bu açıklar konusunda bir şey yapamıyor, insanlar Apple'nin bu "
-"güvenlik açıklarını düzeltmesini beklemek zorunda, üstelik düzeltmeye 
karar "
-"verirse. Özgür bir işletim sistemi insanların açıkları tespit etmesine 
ve "
-"düzeltmesine olanak sağlar."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Bu yazı güvenlik kırıcılarını hatalı bir şekilde \"<a 
href=\"/"
-"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
-"adlandırmaktır.</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -401,6 +367,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>Bu yazı güvenlik kırıcılarını hatalı bir şekilde \"<a 
href=\"/"
+"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
+"adlandırmaktır.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -484,6 +459,20 @@
 "yazılımlara) karşı öfkemizi, en güçlü şirketlerin bile böyle bir 
şeye "
 "cesaret edemeyeceği bir düzeye yükseltmemiz gerekiyor."
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google, birçok özel "
+"mülk Android telefona otomatik olarak bir uygulama kurdu</a>. Uygulama "
+"kötücül şeyler yapıyor olabilir veya olmayabilir ancak Google'nin 
Android "
+"telefonlar üzerinde sahip olduğu iktidar tehlikeli."
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Daha fazlası&hellip;</a>"
@@ -565,17 +554,27 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
-#~ "automatically installed an app on many proprietary Android phones</a>. "
-#~ "The app might or might not do malicious things but the power Google has "
-#~ "over proprietary Android phones is dangerous."
-#~ msgstr ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google, birçok "
-#~ "özel mülk Android telefona otomatik olarak bir uygulama kurdu</a>. "
-#~ "Uygulama kötücül şeyler yapıyor olabilir veya olmayabilir ancak "
-#~ "Google'nin Android telefonlar üzerinde sahip olduğu iktidar tehlikeli."
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "Güvenlik kırıcıları, çoğu gazeteci olan insanların aygıtlarına 
<a href="
+#~ "\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-";
+#~ "spy-on-journalists/\">casus yazılım kurmak için Apple iŞeyler'deki bir 
"
+#~ "açığı kullandılar</a>, iAygıtlarında en son sürüm özel mülk 
işletim "
+#~ "sistemi kullanıyor olsalar bile bu bir işe yaramadı."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Hiç kimse bu açıklar konusunda bir şey yapamıyor, insanlar Apple'nin 
bu "
+#~ "güvenlik açıklarını düzeltmesini beklemek zorunda, üstelik 
düzeltmeye "
+#~ "karar verirse. Özgür bir işletim sistemi insanların açıkları tespit 
"
+#~ "etmesine ve düzeltmesine olanak sağlar."
 
 #~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-";

Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- po/proprietary.zh-cn.po     1 Aug 2021 17:32:27 -0000       1.238
+++ po/proprietary.zh-cn.po     3 Aug 2021 14:32:39 -0000       1.239
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2021-07-16 16:36+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -316,30 +316,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>请注意,本文错误地将&ldquo;<a 
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">黑客</a>&rdquo;一词当成骇客来用。</small>"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -356,6 +332,14 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>请注意,本文错误地将&ldquo;<a 
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">黑客</a>&rdquo;一词当成骇客来用。</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -428,6 +412,19 @@
 "显然,公众的愤怒使该å…
¬å¸åšå‡ºäº†è®©æ­¥ã€‚如果我们要确保安å…
¨ï¼Œé‚£ä¹ˆæˆ‘们还需要对恶意"
 "功能(包
括专有软件整体)表示愤怒,这种愤怒要使最有权势的å…
¬å¸ä¹Ÿå¿ƒå­˜ç•æƒ§ã€‚"
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">谷歌在许多 
Android 电"
+"话上自动安装
一个应用</a>。该应用或许没做恶,但是谷歌对 Android 
电话的掌控权力"
+"非常危险。"
+
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">更多内容&hellip;</a>"
@@ -503,18 +500,6 @@
 msgstr "最后更新:"
 
 #~ msgid ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">Google "
-#~ "automatically installed an app on many proprietary Android phones</a>. "
-#~ "The app might or might not do malicious things but the power Google has "
-#~ "over proprietary Android phones is dangerous."
-#~ msgstr ""
-#~ "<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
-#~ "tracking-google-silently-pushed-app-to-users-phones/\">谷歌在许多 
Android "
-#~ "电话上自动安装
一个应用</a>。该应用或许没做恶,但是谷歌对 Android 
电话的掌"
-#~ "控权力非常危险。"
-
-#~ msgid ""
 #~ "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-";
 #~ "of-10-health-apps-harvest-user-data-global-study-shows\">Almost all "
 #~ "proprietary health apps harvest users' data</a>, including sensitive "

Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.281
retrieving revision 1.282
diff -u -b -r1.281 -r1.282
--- po/proprietary.zh-tw-diff.html      1 Aug 2021 17:32:27 -0000       1.281
+++ po/proprietary.zh-tw-diff.html      3 Aug 2021 14:32:40 -0000       1.282
@@ -28,8 +28,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
@@ -66,13 +66,13 @@
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-  .reduced-width { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+  .reduced-width</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 <span class="inserted"><ins><em>&lt;div 
class="reduced-width"&gt;</em></ins></span>
 
@@ -200,10 +200,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -224,26 +224,6 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202107190"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"&gt;Crackers
-    used an exploit in Apple iThings to install
-    spyware&lt;/a&gt; on people's devices, many of them to be journalists, even
-    if they were using the latest version of the proprietary operating
-    system installed on their iDevice.&lt;/p&gt;
-
-    &lt;p&gt;Nobody can do anything about these vulnerabilities and people
-    have to wait until Apple fixes these security holes, if it decides
-    to fix it. A free operating system would let people to identify the
-    hole and fix it.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Please note that the article
-    wrongly refers to crackers as &ldquo;&lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M202107180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -316,6 +296,16 @@
     features (and the proprietary software that is their entry path)
     to the point that even the most powerful companies don't dare.&lt;/p&gt;
   &lt;/li&gt;
+
+  &lt;li id="M202106190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
+    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
+    might or might not do malicious things but the power Google has over 
proprietary
+    Android phones is dangerous.&lt;/p&gt;
+  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -379,7 +369,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/08/01 17:32:27 $
+$Date: 2021/08/03 14:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- po/proprietary.zh-tw.po     1 Aug 2021 17:32:27 -0000       1.270
+++ po/proprietary.zh-tw.po     3 Aug 2021 14:32:40 -0000       1.271
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-08-01 17:25+0000\n"
+"POT-Creation-Date: 2021-08-03 14:25+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,28 +458,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -496,6 +474,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -550,6 +534,15 @@
 "the most powerful companies don't dare."
 msgstr ""
 
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<a href=\"https://arstechnica.com/gadgets/2021/06/even-creepier-covid-";
+"tracking-google-silently-pushed-app-to-users-phones/\">Google automatically "
+"installed an app on many proprietary Android phones</a>. The app might or "
+"might not do malicious things but the power Google has over proprietary "
+"Android phones is dangerous."
+msgstr ""
+
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.416
retrieving revision 1.417
diff -u -b -r1.416 -r1.417
--- po/pt-br.po 1 Aug 2021 17:32:27 -0000       1.416
+++ po/pt-br.po 3 Aug 2021 14:32:40 -0000       1.417
@@ -509,48 +509,6 @@
 #. type: Content of: <div><ul><li><p>
 #, fuzzy
 #| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
-"\">exploit</i> de dia zero e clique zero em iCoisas da Apple para instalar "
-"<em>spyware</em></a> nos dispositivos das pessoas, muitas delas para serem "
-"jornalistas, mesmo que estivessem usando a versão mais recente do sistema "
-"operacional privativo instalado em seu iDispositivo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm que "
-"esperar até que a Apple conserte essas falhas de segurança, se decidir "
-"consertá-las. Um sistema operacional livre permitiria que as pessoas "
-"identificassem o problema e o consertassem."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
-"small>"
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 #| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 #| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -590,6 +548,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
+"como “<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.)</"
+"small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -13342,6 +13309,37 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\"> <em>Crackers</em> usaram uma <i lang=\"en"
+#~ "\">exploit</i> de dia zero e clique zero em iCoisas da Apple para "
+#~ "instalar <em>spyware</em></a> nos dispositivos das pessoas, muitas delas "
+#~ "para serem jornalistas, mesmo que estivessem usando a versão mais recente 
"
+#~ "do sistema operacional privativo instalado em seu iDispositivo."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Ninguém pode fazer nada sobre essas vulnerabilidades e as pessoas têm 
que "
+#~ "esperar até que a Apple conserte essas falhas de segurança, se decidir "
+#~ "consertá-las. Um sistema operacional livre permitiria que as pessoas "
+#~ "identificassem o problema e o consertassem."
+
+#, fuzzy
+#~| msgid ""
 #~| "A free operating system would've let people to fix the bugs for "
 #~| "themselves but now infected people should wait for corporations to fix "
 #~| "the problems."

Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.698
retrieving revision 1.699
diff -u -b -r1.698 -r1.699
--- po/ru.po    1 Aug 2021 17:32:27 -0000       1.698
+++ po/ru.po    3 Aug 2021 14:32:40 -0000       1.699
@@ -509,54 +509,6 @@
 
 #. type: Content of: <div><ul><li><p>
 # | <a
-# | 
href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/\";>Crackers
-# | used [-a zero-day and zero-click-] {+an+} exploit in Apple iThings to
-# | install spyware</a> on people's devices, many of them to be journalists,
-# | even if they were using the latest version of the proprietary operating
-# | system installed on their iDevice.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
-"нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
-"устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если те "
-"пользовались самой поздней версией 
несвободной операционной системы, "
-"установленной на их устройстве."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Никто ничего не может поделать с этими 
уязвимостями, и люди вынуждены ждать, "
-"пока Apple устранит эти прорехи в защите, 
если эта компания решит устранить "
-"их. Свободная операционная система 
позволила бы людям выявить прореху и "
-"устранить ее."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
-"взломщиков.</small>"
-
-#. type: Content of: <div><ul><li><p>
-# | <a
 # | 
href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones\";>
 # | The pegasus spyware used vulnerabilities on proprietary smartphone
 # | operating systems</a> to impose surveillance on people. It can record
@@ -603,6 +555,15 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>Заметьте, что в статье термин <a 
href=\"/philosophy/words-to-avoid."
+"html#Hacker\">&ldquo;хакеры&rdquo;</a> неверно 
используется для обозначения "
+"взломщиков.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "
@@ -13560,6 +13521,37 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Взломщики применяли 
безщелчковую уязвимость "
+#~ "нулевого дня в ай-штучках Apple для 
установки шпионских программ</a> на "
+#~ "устройствах людей (многие из которых
&nbsp;&mdash; журналисты), даже если "
+#~ "те пользовались самой поздней версией 
несвободной операционной системы, "
+#~ "установленной на их устройстве."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Никто ничего не может поделать с этими 
уязвимостями, и люди вынуждены "
+#~ "ждать, пока Apple устранит эти прорехи в 
защите, если эта компания решит "
+#~ "устранить их. Свободная операционная 
система позволила бы людям выявить "
+#~ "прореху и устранить ее."
+
 #~ msgid ""
 #~ "A free operating system would've let people to fix the bugs for "
 #~ "themselves but now infected people are forced to wait for corporations to "

Index: po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- po/tr.po    1 Aug 2021 17:32:27 -0000       1.211
+++ po/tr.po    3 Aug 2021 14:32:40 -0000       1.212
@@ -415,51 +415,6 @@
 #. type: Content of: <div><ul><li><p>
 #, fuzzy
 #| msgid ""
-#| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-#| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
-#| "exploit in Apple iThings to install spyware</a> on people's devices, many "
-#| "of them to be journalists, even if they were using the latest version of "
-#| "the proprietary operating system installed on their iDevice."
-msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-"Kırıcılar, iAygıtlarında en son sürüm özel mülk işletim sistemi 
kurulu bile "
-"olsa, çoğu gazeteci olan insanların aygıtlarına <a 
href=\"https://www.xda-";
-"developers.com/zero-click-imessage-exploit-was-used-to-spy-on-journalists/"
-"\">casus yazılım kurmak için, Apple iŞeyler'deki bir sıfır gün 
açığını "
-"kullandılar</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-"Hiç kimse bu açıklar konusunda bir şey yapamıyor, insanlar Apple'nin bu "
-"güvenlik açıklarını düzeltmesini beklemek zorunda, üstelik düzeltmeye 
karar "
-"verirse. Özgür bir işletim sistemi insanların açıkları tespit etmesine 
ve "
-"düzeltmesine olanak sağlar."
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-"<small>(Bu yazının güvenlik kırıcılarını yanlış bir şekilde \"<a 
href=\"/"
-"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
-"adlandırdığını belirtmek isteriz)</small>"
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
 #| "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 #| "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 #| "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -496,6 +451,19 @@
 "çözmesini beklemek zorunda."
 
 #. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+"<small>(Bu yazının güvenlik kırıcılarını yanlış bir şekilde \"<a 
href=\"/"
+"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
+"adlandırdığını belirtmek isteriz)</small>"
+
+#. type: Content of: <div><ul><li><p>
 msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
@@ -10488,6 +10456,36 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~| "used-to-spy-on-journalists/\">Crackers used a zero-day and zero-click "
+#~| "exploit in Apple iThings to install spyware</a> on people's devices, "
+#~| "many of them to be journalists, even if they were using the latest "
+#~| "version of the proprietary operating system installed on their iDevice."
+#~ msgid ""
+#~ "<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
+#~ "used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings "
+#~ "to install spyware</a> on people's devices, many of them to be "
+#~ "journalists, even if they were using the latest version of the "
+#~ "proprietary operating system installed on their iDevice."
+#~ msgstr ""
+#~ "Kırıcılar, iAygıtlarında en son sürüm özel mülk işletim sistemi 
kurulu "
+#~ "bile olsa, çoğu gazeteci olan insanların aygıtlarına <a 
href=\"https://";
+#~ "www.xda-developers.com/zero-click-imessage-exploit-was-used-to-spy-on-"
+#~ "journalists/\">casus yazılım kurmak için, Apple iŞeyler'deki bir 
sıfır "
+#~ "gün açığını kullandılar</a>."
+
+#~ msgid ""
+#~ "Nobody can do anything about these vulnerabilities and people have to "
+#~ "wait until Apple fixes these security holes, if it decides to fix it. A "
+#~ "free operating system would let people to identify the hole and fix it."
+#~ msgstr ""
+#~ "Hiç kimse bu açıklar konusunda bir şey yapamıyor, insanlar Apple'nin 
bu "
+#~ "güvenlik açıklarını düzeltmesini beklemek zorunda, üstelik 
düzeltmeye "
+#~ "karar verirse. Özgür bir işletim sistemi insanların açıkları tespit 
"
+#~ "etmesine ve düzeltmesine olanak sağlar."
+
+#, fuzzy
+#~| msgid ""
 #~| "A free operating system would've let people to fix the bugs for "
 #~| "themselves but now infected people should wait for corporations to fix "
 #~| "the problems."

Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- po/zh-cn.po 1 Aug 2021 17:32:27 -0000       1.211
+++ po/zh-cn.po 3 Aug 2021 14:32:40 -0000       1.212
@@ -414,18 +414,18 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
+"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
+"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
+"vulnerabilities on proprietary smartphone operating systems</a> to impose "
+"surveillance on people. It can record people's calls, copy their messages, "
+"and secretly film them, using a security vulnerability."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
+"A free operating system would've let people to fix the bugs for themselves "
+"but now infected people will be compelled to wait for corporations to fix "
+"the problems."
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
@@ -442,22 +442,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
-"spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
-"vulnerabilities on proprietary smartphone operating systems</a> to impose "
-"surveillance on people. It can record people's calls, copy their messages, "
-"and secretly film them, using a security vulnerability."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"A free operating system would've let people to fix the bugs for themselves "
-"but now infected people will be compelled to wait for corporations to fix "
-"the problems."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "

Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- po/zh-tw.po 1 Aug 2021 17:32:27 -0000       1.334
+++ po/zh-tw.po 3 Aug 2021 14:32:40 -0000       1.335
@@ -439,28 +439,6 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
-"<a href=\"https://www.xda-developers.com/zero-click-imessage-exploit-was-";
-"used-to-spy-on-journalists/\">Crackers used an exploit in Apple iThings to "
-"install spyware</a> on people's devices, many of them to be journalists, "
-"even if they were using the latest version of the proprietary operating "
-"system installed on their iDevice."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Nobody can do anything about these vulnerabilities and people have to wait "
-"until Apple fixes these security holes, if it decides to fix it. A free "
-"operating system would let people to identify the hole and fix it."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
 "<a href=\"https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-";
 "spyware-and-how-does-it-hack-phones\"> The pegasus spyware used "
 "vulnerabilities on proprietary smartphone operating systems</a> to impose "
@@ -477,6 +455,12 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<small>Please note that the article wrongly refers to crackers as &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>&rdquo;.</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A newly found Microsoft Windows vulnerability <a href=\"https://edition.cnn.";
 "com/2021/07/08/tech/microsoft-windows-10-printnightmare/\"> can allow "
 "crackers to remotely gain access to the operating system</a> and install "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]