www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy surveillance-vs-democracy.it.htm...


From: GNUN
Subject: www/philosophy surveillance-vs-democracy.it.htm...
Date: Wed, 1 Sep 2021 04:02:37 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/09/01 04:02:37

Modified files:
        philosophy     : surveillance-vs-democracy.it.html 
                         surveillance-vs-democracy.ja.html 
                         surveillance-vs-democracy.nl.html 
        philosophy/po  : surveillance-vs-democracy.it-diff.html 
                         surveillance-vs-democracy.ja-diff.html 
                         surveillance-vs-democracy.nl-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.it.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ja.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.nl.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja-diff.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl-diff.html?cvsroot=www&r1=1.31&r2=1.32

Patches:
Index: surveillance-vs-democracy.it.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.it.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- surveillance-vs-democracy.it.html   30 Apr 2021 06:36:16 -0000      1.41
+++ surveillance-vs-democracy.it.html   1 Sep 2021 08:02:36 -0000       1.42
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/surveillance-vs-democracy.it.po">
+ https://www.gnu.org/philosophy/po/surveillance-vs-democracy.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/surveillance-vs-democracy.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/surveillance-vs-democracy.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2021-07-03" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.90 -->
@@ -20,6 +25,7 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2 class="center">Quanta sorveglianza può sostenere una democrazia?</h2>
 
 <address class="byline center">di <a href="http://www.stallman.org/";>Richard 
Stallman</a></address>
@@ -653,7 +659,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2021/04/30 06:36:16 $
+$Date: 2021/09/01 08:02:36 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.ja.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ja.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- surveillance-vs-democracy.ja.html   1 Jul 2021 02:03:51 -0000       1.28
+++ surveillance-vs-democracy.ja.html   1 Sep 2021 08:02:36 -0000       1.29
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/surveillance-vs-democracy.ja.po">
+ https://www.gnu.org/philosophy/po/surveillance-vs-democracy.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/surveillance-vs-democracy.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/surveillance-vs-democracy.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2021-07-03" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.ja.html" -->
 <!-- Parent-Version: 1.90 -->
@@ -19,6 +24,7 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
 <h2 class="center">民主主義はどれくらい監視に耐え得るか?</h2>
 
 <address class="byline center"><a 
href="http://www.stallman.org/";>リチャード・ストールマン</a>著</address>
@@ -338,7 +344,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2021/07/01 02:03:51 $
+$Date: 2021/09/01 08:02:36 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.nl.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.nl.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- surveillance-vs-democracy.nl.html   31 May 2021 09:06:20 -0000      1.16
+++ surveillance-vs-democracy.nl.html   1 Sep 2021 08:02:36 -0000       1.17
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/surveillance-vs-democracy.nl.po">
+ https://www.gnu.org/philosophy/po/surveillance-vs-democracy.nl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/surveillance-vs-democracy.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/surveillance-vs-democracy.nl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2021-07-03" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.nl.html" -->
 <!-- Parent-Version: 1.90 -->
@@ -20,6 +25,7 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.nl.html" -->
+<!--#include virtual="/server/outdated.nl.html" -->
 <h2 class="center">Hoeveel controle kan onze democratie verdragen?</h2>
 
 <address class="byline center">door <a href="http://www.stallman.org/";>Richard 
Stallman</a></address>
@@ -674,7 +680,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2021/05/31 09:06:20 $
+$Date: 2021/09/01 08:02:36 $
 
 <!-- timestamp end -->
 </p>

Index: po/surveillance-vs-democracy.it-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/surveillance-vs-democracy.it-diff.html   17 Dec 2020 21:31:16 -0000      
1.15
+++ po/surveillance-vs-democracy.it-diff.html   1 Sep 2021 08:02:37 -0000       
1.16
@@ -11,40 +11,43 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.86</strong></del></span> <span 
class="inserted"><ins><em>1.90</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.90</strong></del></span> <span 
class="inserted"><ins><em>1.96 --&gt;
+&lt;!-- This page is derived from /server/standards/boilerplate.html --&gt;
+&lt;!--#set var="TAGS" value="essays cultural evils" --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes"</em></ins></span> --&gt;
 &lt;title&gt;How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
 #intro { margin: 2em auto 1.5em; }
 .pict.wide { width: 23em; }
-.pict p { <span class="removed"><del><strong>margin-top: 
.2em;</strong></del></span> <span class="inserted"><ins><em>margin-bottom: 
0;</em></ins></span> }
+.pict p { margin-bottom: 0; }
 @media (min-width: 55em) {
    #intro { max-width: 55em; }
-   <span class="removed"><del><strong>.pict.wide { margin-bottom: 0; 
}</strong></del></span>
 }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
-&lt;/style&gt;</em></ins></span>
+--&gt;
+&lt;/style&gt;
 &lt;!-- GNUN: localize URL /graphics/dog.small.jpg --&gt;
 &lt;!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" 
--&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
+<span class="inserted"><ins><em>&lt;!--#include 
virtual="/philosophy/ph-breadcrumb.html" --&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div class="article"&gt;</em></ins></span>
 &lt;h2 class="center"&gt;How Much Surveillance Can Democracy 
Withstand?&lt;/h2&gt;
 
-<span class="removed"><del><strong>&lt;p</strong></del></span>
+&lt;address class="byline center"&gt;by
+&lt;a <span 
class="removed"><del><strong>href="http://www.stallman.org/"&gt;Richard</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.stallman.org/"&gt;Richard</em></ins></span>
 Stallman&lt;/a&gt;&lt;/address&gt;
 
-<span class="inserted"><ins><em>&lt;address</em></ins></span> class="byline 
center"&gt;by
-&lt;a href="http://www.stallman.org/"&gt;Richard <span 
class="removed"><del><strong>Stallman&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>Stallman&lt;/a&gt;&lt;/address&gt;</em></ins></span>
-
-&lt;!-- rms: I deleted the link because of Wired's announced
+<span class="removed"><del><strong>&lt;!-- rms: I deleted the link because of 
Wired's announced
      anti-ad-block system --&gt;
-&lt;blockquote <span 
class="removed"><del><strong>class="center"&gt;&lt;p&gt;A</strong></del></span> 
<span 
class="inserted"><ins><em>class="center"&gt;&lt;p&gt;&lt;em&gt;A</em></ins></span>
 version of this article was first published in
+&lt;blockquote class="center"&gt;&lt;p&gt;&lt;em&gt;A version of this article 
was first published in
 &lt;cite&gt;Wired&lt;/cite&gt; in October&nbsp;2013.&lt;br /&gt;
 Also consider reading &ldquo;&lt;a
 
href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance"&gt;A
 radical proposal to keep your personal data safe&lt;/a&gt;,&rdquo; published in
-&lt;cite&gt;The Guardian&lt;/cite&gt; in <span 
class="removed"><del><strong>April&nbsp;2018.&lt;/p&gt;&lt;/blockquote&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>April&nbsp;2018.&lt;/em&gt;&lt;/p&gt;&lt;/blockquote&gt;</em></ins></span>
+&lt;cite&gt;The Guardian&lt;/cite&gt; in 
April&nbsp;2018.&lt;/em&gt;&lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;div class="article"&gt;
+&lt;div class="article"&gt;</strong></del></span>
 
 &lt;div id="intro"&gt;
 &lt;div class="pict wide"&gt;
@@ -55,8 +58,8 @@
 
 &lt;p&gt;Thanks to Edward Snowden's disclosures, we know that the current
 level of general surveillance in society is incompatible with human
-rights.  <span class="inserted"><ins><em>Expecting every action to be noted 
down &lt;a href="https://www.socialcooling.com/"&gt;makes people censor and
-limit themselves&lt;/a&gt;.</em></ins></span>  The repeated harassment and 
prosecution of dissidents,
+rights.  Expecting every action to be noted down &lt;a 
href="https://www.socialcooling.com/"&gt;makes people censor and
+limit themselves&lt;/a&gt;.  The repeated harassment and prosecution of 
dissidents,
 sources, and journalists in the US and elsewhere provides
 confirmation.  We need to reduce the level of general surveillance,
 but how far?  Where exactly is the
@@ -70,10 +73,10 @@
 &lt;p&gt;Faced with government secrecy, we the people depend on
 whistleblowers
 to &lt;a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama"&gt;tell
-us what the state is doing&lt;/a&gt;.  <span class="inserted"><ins><em>(We 
were reminded of this in 2019 as
+us what the state is doing&lt;/a&gt;.  (We were reminded of this in 2019 as
 various whistleblowers gave the public increments
 of &lt;a 
href="https://www.commondreams.org/views/2019/09/27/trumps-ukraine-scandal-shows-why-whistleblowers-are-so-vital-democracy"&gt;information
-about Trump's attempt to shake down the president of 
Ukraine&lt;/a&gt;.)</em></ins></span>
+about Trump's attempt to shake down the president of Ukraine&lt;/a&gt;.)
 However, today's surveillance intimidates potential whistleblowers,
 which means it is too much.  To recover our democratic control over
 the state, we must reduce surveillance to the point where
@@ -81,19 +84,20 @@
 
 &lt;p&gt;Using free/libre
 software, &lt;a href="/philosophy/free-software-even-more-important.html"&gt;as
-I've advocated <span class="removed"><del><strong>for 30 
years&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>since 
1983&lt;/a&gt;,</em></ins></span> is the first step in taking control
+I've advocated since 1983&lt;/a&gt;, is the first step in taking control
 of our digital lives, and that includes preventing surveillance.  We
 can't trust nonfree software; the NSA
 &lt;a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;uses&lt;/a&gt;
 and
-even &lt;a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;
+even &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;</em></ins></span>
 security weaknesses in nonfree software to invade our own computers
 and routers.  Free software gives us control of our own computers,
-but &lt;a href="http://www.wired.com/opinion/2013/10/149481/"&gt;that won't
+but &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/149481/"&gt;that</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/149481/"&gt;that</em></ins></span>
 won't
 protect our privacy once we set foot on the Internet&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan</em></ins></span>
 legislation to &ldquo;curtail the domestic surveillance
 powers&rdquo;&lt;/a&gt; in the U.S. is being drawn up, but it relies on
 limiting the government's use of our virtual dossiers.  That won't
@@ -102,7 +106,7 @@
 or her.  We need to go further.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader" style="clear: both"&gt;The Upper Limit on 
Surveillance in a Democracy&lt;/h3&gt;
+&lt;h3 <span 
class="removed"><del><strong>class="subheader"</strong></del></span> 
style="clear: both"&gt;The Upper Limit on Surveillance in a Democracy&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;If whistleblowers don't dare reveal crimes and lies, we lose the
@@ -113,29 +117,32 @@
 
 &lt;p&gt;An unnamed U.S. government official ominously told journalists in
 2011 that
-the &lt;a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.
 would
+the &lt;a <span 
class="removed"><del><strong>href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/"&gt;U.S.</em></ins></span>
 would
 not subpoena reporters because &ldquo;We know who you're talking
 to.&rdquo;&lt;/a&gt;
-Sometimes &lt;a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'
+Sometimes &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'</em></ins></span>
 phone call records are subpoenaed&lt;/a&gt; to find this out, but Snowden
 has shown us that in effect they subpoena all the phone call records
 of everyone in the U.S., all the
 time, &lt;a 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from
 Verizon&lt;/a&gt;
-and &lt;a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from
+and &lt;a <span 
class="removed"><del><strong>href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from</em></ins></span>
 other companies too&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Opposition and dissident activities need to keep secrets from
 states that are willing to play dirty tricks on them.  The ACLU has
 demonstrated the U.S. government's &lt;a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic
+<span 
class="removed"><del><strong>href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic</em></ins></span>
 practice of infiltrating peaceful dissident groups&lt;/a&gt; on the pretext
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Information, Once Collected, Will Be 
Misused&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Information,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Information,</em></ins></span> Once 
Collected, Will Be Misused&lt;/h3&gt;
 
 &lt;div  class="columns"&gt;
 &lt;p id="willbemisused"&gt;When people recognize
@@ -144,7 +151,7 @@
 accumulated data.  That sounds nice, but it won't fix the problem, not
 even slightly, even supposing that the government obeys the rules.
 (The NSA has misled the FISA court, which said it
-was &lt;a 
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable
+was &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable</em></ins></span>
 to effectively hold the NSA accountable&lt;/a&gt;.) Suspicion of a crime
 will be grounds for access, so once a whistleblower is accused of
 &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
@@ -160,7 +167,7 @@
 
 &lt;p&gt;In addition, the state's surveillance staff will misuse the data
 for personal reasons.  Some NSA
-agents &lt;a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used
+agents &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used</em></ins></span>
 U.S. surveillance systems to track their lovers&lt;/a&gt;&mdash;past,
 present, or wished-for&mdash;in a practice called
 &ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
@@ -173,7 +180,7 @@
 with &lt;a 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared"&gt;new
 digital systems&lt;/a&gt;.  In 2016, a prosecutor was accused of forging
 judges' signatures to get authorization
-to &lt;a 
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;
+to &lt;a <span 
class="removed"><del><strong>href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;</em></ins></span>
 wiretap someone who was the object of a romantic obsession&lt;/a&gt;. The AP
 knows
 of &lt;a href="https://apnews.com/699236946e3140659fff8a2362e16f43"&gt;many
@@ -187,19 +194,32 @@
 from &lt;a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;,
 &lt;a href="https://en.wikipedia.org/wiki/Japanese_American_internment"&gt;the
 US&lt;/a&gt;, and most
-recently &lt;a 
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.
+recently &lt;a <span 
class="removed"><del><strong>href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.</em></ins></span>
 (Turkey's confusion about who had really used the Bylock program only
 exacerbated the basic deliberate injustice of arbitrarily punishing
 people for having used it.)
 &lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;You may feel your government won't 
use your personal data for
+repression, but you can't rely on that feeling, because governments do
+change.  As of 2021, many ostensibly democratic states
+are &lt;a 
href="https://www.theguardian.com/commentisfree/2021/aug/21/beware-state-surveillance-of-your-lives-governments-can-change-afghanistan"&gt;ruled
+by people with authoritarian leanings&lt;/a&gt;, and the Taliban have taken
+over Afghanistan's systems of biometric identification that were set
+up at the instigation of the US.  The UK is working on a law
+to &lt;a 
href="https://www.theguardian.com/commentisfree/2021/aug/09/police-bill-not-law-order-state-control-erosion-freedom"&gt;repress
+nonviolent protests that might be described as causing &ldquo;serious
+disruption.&rdquo;&lt;/a&gt;  The US could become permanently repressive in
+2025, for all we know.
+&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Personal data collected by the state is also likely to be obtained
 by outside crackers that break the security of the servers, even
 by &lt;a 
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml"&gt;crackers
 working for hostile states&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Governments can easily use massive surveillance capability
-to &lt;a 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert
+to &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert</em></ins></span>
 democracy directly&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Total surveillance accessible to the state enables the state to
@@ -208,13 +228,14 @@
 that is easily accessible to the state.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Robust Protection for Privacy Must Be 
Technical&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Robust</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Robust</em></ins></span> Protection 
for Privacy Must Be Technical&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to &lt;a
-<span 
class="removed"><del><strong>href="https://en.necessaryandproportionate.org/text"&gt;prevent</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://necessaryandproportionate.org"&gt;prevent</em></ins></span>
 the
+href="https://necessaryandproportionate.org"&gt;prevent the
 abuses of massive surveillance&lt;/a&gt;.  These principles include,
 crucially, explicit legal protection for whistleblowers; as a
 consequence, they would be adequate for protecting democratic
@@ -224,7 +245,8 @@
 &lt;p&gt;However, such legal protections are precarious: as recent history
 shows, they can be repealed (as in the FISA Amendments Act),
 suspended, or &lt;a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;Meanwhile, demagogues will cite the usual excuses as grounds for
 total surveillance; any terrorist attack, even one that kills just a
@@ -241,7 +263,9 @@
 ignoring this law, the idea would hardly make sense.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;First, Don't Be Foolish&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;First,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;First,</em></ins></span> Don't Be 
Foolish&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;To have privacy, you must not throw it away: the first one who has
@@ -267,7 +291,7 @@
 pertinent data to the company's server.&lt;/p&gt;
 
 &lt;p&gt;Protect your friends' and acquaintances' privacy,
-too.  &lt;a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't
+too.  &lt;a <span 
class="removed"><del><strong>href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't</em></ins></span>
 give out their personal information&lt;/a&gt; except how to contact them,
 and never give any web site your list of email or phone contacts.
 Don't tell a company such as Facebook anything about your friends that
@@ -286,7 +310,9 @@
 suspects.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;We Must Design Every System for Privacy&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;We</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;We</em></ins></span> Must Design 
Every System for Privacy&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;If we don't want a total surveillance society, we must consider
@@ -305,18 +331,18 @@
 any desired period of time, with the average usage pattern for that
 period.  The same benefit, with no surveillance!&lt;/p&gt;
 
-&lt;p&gt;We need to design such privacy into all our digital <span 
class="removed"><del><strong>systems.&lt;/p&gt;</strong></del></span>
-<span class="inserted"><ins><em>systems&nbsp;[&lt;a 
href="#ambientprivacy"&gt;1&lt;/a&gt;].&lt;/p&gt;</em></ins></span>
+&lt;p&gt;We need to design such privacy into all our digital
+systems&nbsp;[&lt;a href="#ambientprivacy"&gt;1&lt;/a&gt;].&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Remedy for Collecting Data: Leaving It 
Dispersed&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Remedy</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Remedy</em></ins></span> for 
Collecting Data: Leaving It Dispersed&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
-<span class="removed"><del><strong>&lt;p&gt;One</strong></del></span>
-<span class="inserted"><ins><em>&lt;p id="dispersal"&gt;One</em></ins></span> 
way to make monitoring safe for privacy is
-to <span class="removed"><del><strong>&lt;a 
name="dispersal"&gt;keep</strong></del></span> <span 
class="inserted"><ins><em>keep</em></ins></span> the data dispersed and 
inconvenient to
-<span class="removed"><del><strong>access&lt;/a&gt;.</strong></del></span>
-<span class="inserted"><ins><em>access.</em></ins></span>  Old-fashioned 
security cameras were no threat to privacy(&lt;a 
href="#privatespace"&gt;*&lt;/a&gt;).
+&lt;p id="dispersal"&gt;One way to make monitoring safe for privacy is
+to keep the data dispersed and inconvenient to
+access.  Old-fashioned security cameras were no threat to privacy(&lt;a 
href="#privatespace"&gt;*&lt;/a&gt;).
 The recording was stored on the premises, and kept for a few weeks at
 most.  Because of the inconvenience of accessing these recordings, it
 was never done massively; they were accessed only in the places where
@@ -345,15 +371,22 @@
 occasionally, but the systematic accumulation of such data on the
 Internet must be limited.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;&lt;a 
name="privatespace"&gt;&lt;b&gt;*&lt;/b&gt;&lt;/a&gt;I</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p id="privatespace"&gt;(*) 
I</em></ins></span> assume here that the security
+&lt;p id="privatespace"&gt;(*) I assume here that the security
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 id="digitalcash" class="subheader"&gt;Remedy for Internet Commerce 
Surveillance&lt;/h3&gt;
+<span class="inserted"><ins><em>&lt;div class="announcement comment" 
role="complementary"&gt;
+&lt;hr class="no-display" /&gt;
+&lt;p&gt;Also consider reading &ldquo;&lt;a
+href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance"&gt;A
+radical proposal to keep your personal data safe&lt;/a&gt;,&rdquo; published in
+&lt;cite&gt;The Guardian&lt;/cite&gt; in April&nbsp;2018.&lt;/p&gt;
+&lt;hr class="no-display" /&gt;
+&lt;/div&gt;</em></ins></span>
+
+&lt;h3 <span class="removed"><del><strong>id="digitalcash" 
class="subheader"&gt;Remedy</strong></del></span> <span 
class="inserted"><ins><em>id="digitalcash"&gt;Remedy</em></ins></span> for 
Internet Commerce Surveillance&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;Most data collection comes from people's own digital activities.
@@ -364,10 +397,10 @@
 systematically available to the state.&lt;/p&gt;
 
 &lt;p&gt;The NSA, through PRISM,
-has &lt;a href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten
+has &lt;a <span 
class="removed"><del><strong>href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies"&gt;gotten</em></ins></span>
 into the databases of many large Internet corporations&lt;/a&gt;.  AT&amp;T
 has saved all its phone call records since 1987
-and &lt;a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes
+and &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes</em></ins></span>
 them available to the DEA&lt;/a&gt; to search on request.  Strictly
 speaking, the U.S.  government does not possess that data, but in
 practical terms it may as well possess it.  Some companies are praised
@@ -397,17 +430,17 @@
 &lt;p&gt;We could correct both problems by adopting a system of anonymous
 payments&mdash;anonymous for the payer, that is.  (We don't want to
 help the payee dodge
-taxes.)  &lt;a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin
+taxes.)  &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin</em></ins></span>
 is not anonymous&lt;/a&gt;, though there are efforts to develop ways to pay
 anonymously with Bitcoin.  However, technology
-for &lt;a 
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital
+for &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital</em></ins></span>
 cash was first developed in the 1980s&lt;/a&gt;; the GNU software for doing
-this is called &lt;a href="http://taler.net/"&gt;GNU Taler&lt;/a&gt;.  Now we 
need
+this is called &lt;a <span 
class="removed"><del><strong>href="http://taler.net/"&gt;GNU</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://taler.net/"&gt;GNU</em></ins></span> 
Taler&lt;/a&gt;.  Now we need
 only suitable business arrangements, and for the state not to obstruct
 them.&lt;/p&gt;
 
 &lt;p&gt;Another possible method for anonymous payments would
-use &lt;a 
href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid
+use &lt;a <span 
class="removed"><del><strong>href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid</strong></del></span>
 <span 
class="inserted"><ins><em>href="/philosophy/phone-anonymous-payment.html"&gt;prepaid</em></ins></span>
 phone cards&lt;/a&gt;.  It is less convenient, but very easy to
 implement.&lt;/p&gt;
 
@@ -418,7 +451,9 @@
 knows nothing about you.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Remedy for Travel Surveillance&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Remedy</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Remedy</em></ins></span> for Travel 
Surveillance&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;We must convert digital toll collection to anonymous payment (using
@@ -478,16 +513,18 @@
 borrower's identity immediately.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Remedy for Communications Dossiers&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Remedy</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Remedy</em></ins></span> for 
Communications Dossiers&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
-also &lt;a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record
+also &lt;a <span 
class="removed"><del><strong>href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record</em></ins></span>
 the user's physical location&lt;/a&gt;.  They keep these dossiers for a long
 time: over 30 years, in the case of AT&amp;T.  Soon they will
-even &lt;a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record
+even &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record</em></ins></span>
 the user's body activities&lt;/a&gt;.  It appears that
 the &lt;a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location"&gt;NSA
 collects cell phone location data&lt;/a&gt; in bulk.&lt;/p&gt;
@@ -500,7 +537,7 @@
 &lt;p&gt;This solution is not entirely satisfactory, because it won't
 physically stop the government from collecting all the information
 immediately as it is generated&mdash;which is what
-the &lt;a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.
 does
+the &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.</em></ins></span>
 does
 with some or all phone companies&lt;/a&gt;.  We would have to rely on
 prohibiting that by law.  However, that would be better than the
 current situation, where the relevant law (the PAT RIOT Act) does not
@@ -520,7 +557,9 @@
 would be hard to determine that you had sent mail to me.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;But Some Surveillance Is Necessary&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;But</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;But</em></ins></span> Some 
Surveillance Is Necessary&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;For the state to find criminals, it needs to be able to investigate
@@ -537,20 +576,19 @@
 police have their own jargon term for perjury,
 &ldquo;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302"&gt;testilying&lt;/a&gt;,&rdquo;
 since they do it so frequently, particularly about protesters
-and &lt;a <span 
class="removed"><del><strong>href="https://www.themaven.net/pinacnews/"&gt;photographers&lt;/a&gt;.)</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"&gt;
-photographers&lt;/a&gt;.)</em></ins></span>
+and &lt;a 
href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"&gt;
+photographers&lt;/a&gt;.)
 One city in California that required police to wear video cameras all
 the time
-found &lt;a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their
+found &lt;a <span 
class="removed"><del><strong>href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their</em></ins></span>
 use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-<span 
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</em></ins></span>
+href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
 are not people, and not entitled to human rights&lt;/a&gt;.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., &lt;a href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;) or political
+(e.g., &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;)</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;)</em></ins></span>
 or political
 (e.g., lobbying) hazards to society, to whatever level is needed for
 public well-being.  The danger of these operations (consider the BP
 oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -582,7 +620,7 @@
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.&lt;/p&gt;
 &lt;/div&gt;
-<span class="inserted"><ins><em>&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
 &lt;h3 class="footnote"&gt;End Note&lt;/h3&gt;
 &lt;ol&gt;
@@ -590,12 +628,20 @@
 has been referred to as &lt;a
 href="https://idlewords.com/2019/06/the_new_wilderness.htm"&gt;ambient
 privacy&lt;/a&gt;.&lt;/li&gt;
-&lt;/ol&gt;</em></ins></span>
+&lt;/ol&gt;
+
+<span class="inserted"><ins><em>&lt;div class="infobox extra"&gt;
+&lt;hr /&gt;
+&lt;!-- rms: I deleted the link because of Wired's announced
+     anti-ad-block system --&gt;
+&lt;p&gt;A version of this article was first published in
+&lt;cite&gt;Wired&lt;/cite&gt; in October&nbsp;2013.&lt;/p&gt;
+&lt;/div&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
-&lt;div id="footer"&gt;
+&lt;div <span 
class="removed"><del><strong>id="footer"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="footer" role="contentinfo"&gt;</em></ins></span>
 &lt;div class="unprintable"&gt;
 
 &lt;p&gt;Please send general FSF &amp; GNU inquiries to
@@ -613,13 +659,13 @@
         to &lt;a href="mailto:web-translators@gnu.org"&gt;
         &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;For information on coordinating and submitting translations of
+        &lt;p&gt;For information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations of
         our web pages, see &lt;a
         href="/server/standards/README.translations.html"&gt;Translations
         README&lt;/a&gt;. --&gt;
 Please see the &lt;a
 href="/server/standards/README.translations.html"&gt;Translations
-README&lt;/a&gt; for information on coordinating and submitting translations
+README&lt;/a&gt; for information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
@@ -640,7 +686,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016, 2017, 2018, <span 
class="removed"><del><strong>2019</strong></del></span> <span 
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2015, 2016, 2017, 
2018, 2019, 2020</strong></del></span> <span 
class="inserted"><ins><em>2013-2019, 2021</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -650,7 +696,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/17 21:31:16 $
+$Date: 2021/09/01 08:02:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/surveillance-vs-democracy.ja-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.ja-diff.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/surveillance-vs-democracy.ja-diff.html   31 Mar 2020 14:30:35 -0000      
1.23
+++ po/surveillance-vs-democracy.ja-diff.html   1 Sep 2021 08:02:37 -0000       
1.24
@@ -11,35 +11,43 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.90</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.90</strong></del></span> <span 
class="inserted"><ins><em>1.96 --&gt;
+&lt;!-- This page is derived from /server/standards/boilerplate.html --&gt;
+&lt;!--#set var="TAGS" value="essays cultural evils" --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes"</em></ins></span> --&gt;
 &lt;title&gt;How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
-#intro { margin: <span class="removed"><del><strong>1.5em 
auto;</strong></del></span> <span class="inserted"><ins><em>2em auto 
1.5em;</em></ins></span> }
+#intro { margin: 2em auto 1.5em; }
 .pict.wide { width: 23em; }
-.pict p { margin-top: .2em; }
+.pict p { margin-bottom: 0; }
 @media (min-width: 55em) {
    #intro { max-width: 55em; }
-   .pict.wide { margin-bottom: 0; }
 }
---&gt;&lt;/style&gt;
+--&gt;
+&lt;/style&gt;
 &lt;!-- GNUN: localize URL /graphics/dog.small.jpg --&gt;
 &lt;!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" 
--&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
+<span class="inserted"><ins><em>&lt;!--#include 
virtual="/philosophy/ph-breadcrumb.html" --&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div class="article"&gt;</em></ins></span>
 &lt;h2 class="center"&gt;How Much Surveillance Can Democracy 
Withstand?&lt;/h2&gt;
 
-&lt;p class="byline center"&gt;by &lt;a 
href="http://www.stallman.org/"&gt;Richard Stallman&lt;/a&gt;&lt;/p&gt;
+&lt;address class="byline center"&gt;by
+&lt;a <span 
class="removed"><del><strong>href="http://www.stallman.org/"&gt;Richard</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.stallman.org/"&gt;Richard</em></ins></span>
 Stallman&lt;/a&gt;&lt;/address&gt;
 
-&lt;!-- rms: I deleted the link because of Wired's announced
+<span class="removed"><del><strong>&lt;!-- rms: I deleted the link because of 
Wired's announced
      anti-ad-block system --&gt;
-&lt;blockquote <span 
class="removed"><del><strong>class="center"&gt;&lt;p&gt;A</strong></del></span> 
<span 
class="inserted"><ins><em>class="center"&gt;&lt;p&gt;&lt;em&gt;A</em></ins></span>
 version of this article was first published in <span 
class="removed"><del><strong>Wired</strong></del></span>
-<span 
class="inserted"><ins><em>&lt;cite&gt;Wired&lt;/cite&gt;</em></ins></span> in 
<span class="removed"><del><strong>October 
2013.&lt;/p&gt;&lt;/blockquote&gt;</strong></del></span> <span 
class="inserted"><ins><em>October&nbsp;2013.&lt;br /&gt;
+&lt;blockquote class="center"&gt;&lt;p&gt;&lt;em&gt;A version of this article 
was first published in
+&lt;cite&gt;Wired&lt;/cite&gt; in October&nbsp;2013.&lt;br /&gt;
 Also consider reading &ldquo;&lt;a
 
href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance"&gt;A
 radical proposal to keep your personal data safe&lt;/a&gt;,&rdquo; published in
-&lt;cite&gt;The Guardian&lt;/cite&gt; in 
April&nbsp;2018.&lt;/em&gt;&lt;/p&gt;&lt;/blockquote&gt;</em></ins></span>
+&lt;cite&gt;The Guardian&lt;/cite&gt; in 
April&nbsp;2018.&lt;/em&gt;&lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;div class="article"&gt;
+&lt;div class="article"&gt;</strong></del></span>
 
 &lt;div id="intro"&gt;
 &lt;div class="pict wide"&gt;
@@ -50,7 +58,8 @@
 
 &lt;p&gt;Thanks to Edward Snowden's disclosures, we know that the current
 level of general surveillance in society is incompatible with human
-rights.  The repeated harassment and prosecution of dissidents,
+rights.  Expecting every action to be noted down &lt;a 
href="https://www.socialcooling.com/"&gt;makes people censor and
+limit themselves&lt;/a&gt;.  The repeated harassment and prosecution of 
dissidents,
 sources, and journalists in the US and elsewhere provides
 confirmation.  We need to reduce the level of general surveillance,
 but how far?  Where exactly is the
@@ -59,14 +68,15 @@
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.&lt;/p&gt;
 &lt;/div&gt;
+
 &lt;div class="columns" style="clear:both"&gt;
 &lt;p&gt;Faced with government secrecy, we the people depend on
 whistleblowers
 to &lt;a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama"&gt;tell
-us what the state is doing&lt;/a&gt;.  <span class="inserted"><ins><em>(We 
were reminded of this in 2019 as
+us what the state is doing&lt;/a&gt;.  (We were reminded of this in 2019 as
 various whistleblowers gave the public increments
 of &lt;a 
href="https://www.commondreams.org/views/2019/09/27/trumps-ukraine-scandal-shows-why-whistleblowers-are-so-vital-democracy"&gt;information
-about Trump's attempt to shake down the president of 
Ukraine&lt;/a&gt;.)</em></ins></span>
+about Trump's attempt to shake down the president of Ukraine&lt;/a&gt;.)
 However, today's surveillance intimidates potential whistleblowers,
 which means it is too much.  To recover our democratic control over
 the state, we must reduce surveillance to the point where
@@ -74,19 +84,20 @@
 
 &lt;p&gt;Using free/libre
 software, &lt;a href="/philosophy/free-software-even-more-important.html"&gt;as
-I've advocated <span class="removed"><del><strong>for 30 
years&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>since 
1983&lt;/a&gt;,</em></ins></span> is the first step in taking control
+I've advocated since 1983&lt;/a&gt;, is the first step in taking control
 of our digital lives, and that includes preventing surveillance.  We
 can't trust nonfree software; the NSA
 &lt;a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;uses&lt;/a&gt;
 and
-even &lt;a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;
+even &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;</em></ins></span>
 security weaknesses in nonfree software to invade our own computers
 and routers.  Free software gives us control of our own computers,
-but &lt;a href="http://www.wired.com/opinion/2013/10/149481/"&gt;that won't
+but &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/149481/"&gt;that</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/149481/"&gt;that</em></ins></span>
 won't
 protect our privacy once we set foot on the Internet&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan</em></ins></span>
 legislation to &ldquo;curtail the domestic surveillance
 powers&rdquo;&lt;/a&gt; in the U.S. is being drawn up, but it relies on
 limiting the government's use of our virtual dossiers.  That won't
@@ -95,7 +106,7 @@
 or her.  We need to go further.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader" style="clear: both"&gt;The Upper Limit on 
Surveillance in a Democracy&lt;/h3&gt;
+&lt;h3 <span 
class="removed"><del><strong>class="subheader"</strong></del></span> 
style="clear: both"&gt;The Upper Limit on Surveillance in a Democracy&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;If whistleblowers don't dare reveal crimes and lies, we lose the
@@ -106,29 +117,32 @@
 
 &lt;p&gt;An unnamed U.S. government official ominously told journalists in
 2011 that
-the &lt;a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.
 would
+the &lt;a <span 
class="removed"><del><strong>href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/"&gt;U.S.</em></ins></span>
 would
 not subpoena reporters because &ldquo;We know who you're talking
 to.&rdquo;&lt;/a&gt;
-Sometimes &lt;a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'
+Sometimes &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'</em></ins></span>
 phone call records are subpoenaed&lt;/a&gt; to find this out, but Snowden
 has shown us that in effect they subpoena all the phone call records
 of everyone in the U.S., all the
-time, &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20131226044537/http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from</em></ins></span>
+time, &lt;a 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from
 Verizon&lt;/a&gt;
-and &lt;a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from
+and &lt;a <span 
class="removed"><del><strong>href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from</em></ins></span>
 other companies too&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Opposition and dissident activities need to keep secrets from
 states that are willing to play dirty tricks on them.  The ACLU has
 demonstrated the U.S. government's &lt;a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic
+<span 
class="removed"><del><strong>href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic</em></ins></span>
 practice of infiltrating peaceful dissident groups&lt;/a&gt; on the pretext
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Information, Once Collected, Will Be 
Misused&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Information,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Information,</em></ins></span> Once 
Collected, Will Be Misused&lt;/h3&gt;
 
 &lt;div  class="columns"&gt;
 &lt;p id="willbemisused"&gt;When people recognize
@@ -137,13 +151,13 @@
 accumulated data.  That sounds nice, but it won't fix the problem, not
 even slightly, even supposing that the government obeys the rules.
 (The NSA has misled the FISA court, which said it
-was &lt;a 
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable
+was &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable</em></ins></span>
 to effectively hold the NSA accountable&lt;/a&gt;.) Suspicion of a crime
 will be grounds for access, so once a whistleblower is accused of
 &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
 excuse to access the accumulated material.&lt;/p&gt;
 
-&lt;p&gt;In <span class="inserted"><ins><em>practice, we can't expect state 
agencies even to make up excuses
+&lt;p&gt;In practice, we can't expect state agencies even to make up excuses
 to satisfy the rules for using surveillance data&mdash;because US
 agencies
 already &lt;a 
href="https://theintercept.com/2018/01/09/dark-side-fbi-dea-illegal-searches-secret-evidence/"&gt;
@@ -151,9 +165,9 @@
 meant to be obeyed; rather, they are a fairy-tale we can believe if we
 like.&lt;/p&gt;
 
-&lt;p&gt;In</em></ins></span> addition, the state's surveillance staff will 
misuse the data
+&lt;p&gt;In addition, the state's surveillance staff will misuse the data
 for personal reasons.  Some NSA
-agents &lt;a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used
+agents &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used</em></ins></span>
 U.S. surveillance systems to track their lovers&lt;/a&gt;&mdash;past,
 present, or wished-for&mdash;in a practice called
 &ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
@@ -166,10 +180,10 @@
 with &lt;a 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared"&gt;new
 digital systems&lt;/a&gt;.  In 2016, a prosecutor was accused of forging
 judges' signatures to get authorization
-to &lt;a 
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;
+to &lt;a <span 
class="removed"><del><strong>href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;</em></ins></span>
 wiretap someone who was the object of a romantic obsession&lt;/a&gt;. The AP
 knows
-of &lt;a <span 
class="removed"><del><strong>href="http://bigstory.ap.org/article/699236946e3140659fff8a2362e16f43/ap-across-us-police-officers-abuse-confidential-databases"&gt;many</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://apnews.com/699236946e3140659fff8a2362e16f43"&gt;many</em></ins></span>
+of &lt;a href="https://apnews.com/699236946e3140659fff8a2362e16f43"&gt;many
 other instances in the US&lt;/a&gt;.
 &lt;/p&gt;
 
@@ -177,15 +191,26 @@
 this is prohibited.  Once the data has been accumulated and the state
 has the possibility of access to it, it can misuse that data in
 dreadful ways, as shown by examples
-from &lt;a <span 
class="removed"><del><strong>href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;
-and</strong></del></span> <span 
class="inserted"><ins><em>href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;,</em></ins></span>
+from &lt;a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;,
 &lt;a href="https://en.wikipedia.org/wiki/Japanese_American_internment"&gt;the
-<span class="removed"><del><strong>US 
&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-<span class="inserted"><ins><em>US&lt;/a&gt;, and most
-recently &lt;a 
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.
+US&lt;/a&gt;, and most
+recently &lt;a <span 
class="removed"><del><strong>href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.</em></ins></span>
 (Turkey's confusion about who had really used the Bylock program only
 exacerbated the basic deliberate injustice of arbitrarily punishing
 people for having used it.)
+&lt;/p&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;You may feel your government won't 
use your personal data for
+repression, but you can't rely on that feeling, because governments do
+change.  As of 2021, many ostensibly democratic states
+are &lt;a 
href="https://www.theguardian.com/commentisfree/2021/aug/21/beware-state-surveillance-of-your-lives-governments-can-change-afghanistan"&gt;ruled
+by people with authoritarian leanings&lt;/a&gt;, and the Taliban have taken
+over Afghanistan's systems of biometric identification that were set
+up at the instigation of the US.  The UK is working on a law
+to &lt;a 
href="https://www.theguardian.com/commentisfree/2021/aug/09/police-bill-not-law-order-state-control-erosion-freedom"&gt;repress
+nonviolent protests that might be described as causing &ldquo;serious
+disruption.&rdquo;&lt;/a&gt;  The US could become permanently repressive in
+2025, for all we know.
 &lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;Personal data collected by the state is also likely to be obtained
@@ -194,7 +219,7 @@
 working for hostile states&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Governments can easily use massive surveillance capability
-to &lt;a 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert
+to &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert</em></ins></span>
 democracy directly&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Total surveillance accessible to the state enables the state to
@@ -203,12 +228,14 @@
 that is easily accessible to the state.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Robust Protection for Privacy Must Be 
Technical&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Robust</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Robust</em></ins></span> Protection 
for Privacy Must Be Technical&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to &lt;a
-href="https://en.necessaryandproportionate.org/text"&gt;prevent the
+href="https://necessaryandproportionate.org"&gt;prevent the
 abuses of massive surveillance&lt;/a&gt;.  These principles include,
 crucially, explicit legal protection for whistleblowers; as a
 consequence, they would be adequate for protecting democratic
@@ -218,7 +245,8 @@
 &lt;p&gt;However, such legal protections are precarious: as recent history
 shows, they can be repealed (as in the FISA Amendments Act),
 suspended, or &lt;a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;Meanwhile, demagogues will cite the usual excuses as grounds for
 total surveillance; any terrorist attack, even one that kills just a
@@ -235,7 +263,9 @@
 ignoring this law, the idea would hardly make sense.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;First, Don't Be Foolish&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;First,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;First,</em></ins></span> Don't Be 
Foolish&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;To have privacy, you must not throw it away: the first one who has
@@ -251,26 +281,23 @@
 files, with free software on your own computer before uploading
 it.&lt;/p&gt;
 
-&lt;p&gt;For privacy's sake, you must avoid nonfree <span 
class="removed"><del><strong>software since, as a
-consequence of giving others</strong></del></span> <span 
class="inserted"><ins><em>software; if you give</em></ins></span>
-control of your <span class="removed"><del><strong>computing, it
-is</strong></del></span> <span class="inserted"><ins><em>computer's operations 
to companies, they
-are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;likely</strong></del></span>
 <span 
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html"&gt;likely</em></ins></span>
 to <span class="inserted"><ins><em>make it</em></ins></span>
+&lt;p&gt;For privacy's sake, you must avoid nonfree software; if you give
+control of your computer's operations to companies, they
+are &lt;a href="/malware/proprietary-surveillance.html"&gt;likely to make it
 spy on you&lt;/a&gt;.
 Avoid &lt;a 
href="/philosophy/who-does-that-server-really-serve.html"&gt;service
-as a software substitute&lt;/a&gt;; <span class="removed"><del><strong>as well 
as</strong></del></span> <span class="inserted"><ins><em>in addition 
to</em></ins></span> giving others control of
-<span class="inserted"><ins><em>how</em></ins></span> your
-<span class="removed"><del><strong>computing,</strong></del></span> <span 
class="inserted"><ins><em>computing is done,</em></ins></span> it requires you 
to hand over all the
-pertinent data to the <span 
class="inserted"><ins><em>company's</em></ins></span> server.&lt;/p&gt;
+as a software substitute&lt;/a&gt;; in addition to giving others control of
+how your computing is done, it requires you to hand over all the
+pertinent data to the company's server.&lt;/p&gt;
 
 &lt;p&gt;Protect your friends' and acquaintances' privacy,
-too.  &lt;a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't
+too.  &lt;a <span 
class="removed"><del><strong>href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't</em></ins></span>
 give out their personal information&lt;/a&gt; except how to contact them,
 and never give any web site your list of email or phone contacts.
 Don't tell a company such as Facebook anything about your friends that
 they might not wish to publish in a newspaper.  Better yet, don't be
 used by Facebook at all.  Reject communication systems that require
-users to give their real names, even if you are <span 
class="removed"><del><strong>going</strong></del></span> <span 
class="inserted"><ins><em>happy</em></ins></span> to <span 
class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>divulge</em></ins></span> yours,
+users to give their real names, even if you are happy to divulge yours,
 since they pressure other people to surrender their privacy.&lt;/p&gt;
 
 &lt;p&gt;Self-protection is essential, but even the most rigorous
@@ -283,7 +310,9 @@
 suspects.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;We Must Design Every System for Privacy&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;We</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;We</em></ins></span> Must Design 
Every System for Privacy&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;If we don't want a total surveillance society, we must consider
@@ -302,16 +331,18 @@
 any desired period of time, with the average usage pattern for that
 period.  The same benefit, with no surveillance!&lt;/p&gt;
 
-&lt;p&gt;We need to design such privacy into all our digital <span 
class="removed"><del><strong>systems.&lt;/p&gt;</strong></del></span>
-<span class="inserted"><ins><em>systems&nbsp;[&lt;a 
href="#ambientprivacy"&gt;1&lt;/a&gt;].&lt;/p&gt;</em></ins></span>
+&lt;p&gt;We need to design such privacy into all our digital
+systems&nbsp;[&lt;a href="#ambientprivacy"&gt;1&lt;/a&gt;].&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Remedy for Collecting Data: Leaving It 
Dispersed&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Remedy</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Remedy</em></ins></span> for 
Collecting Data: Leaving It Dispersed&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
-&lt;p&gt;One way to make monitoring safe for privacy is
-to &lt;a name="dispersal"&gt;keep the data dispersed and inconvenient to
-access&lt;/a&gt;.  Old-fashioned security cameras were no threat to 
privacy(&lt;a href="#privatespace"&gt;*&lt;/a&gt;).
+&lt;p id="dispersal"&gt;One way to make monitoring safe for privacy is
+to keep the data dispersed and inconvenient to
+access.  Old-fashioned security cameras were no threat to privacy(&lt;a 
href="#privatespace"&gt;*&lt;/a&gt;).
 The recording was stored on the premises, and kept for a few weeks at
 most.  Because of the inconvenience of accessing these recordings, it
 was never done massively; they were accessed only in the places where
@@ -320,18 +351,18 @@
 
 &lt;p&gt;Nowadays, security cameras have become surveillance cameras: they
 are connected to the Internet so recordings can be collected in a data
-center and saved forever.  <span class="inserted"><ins><em>In Detroit, the 
cops pressure businesses to
+center and saved forever.  In Detroit, the cops pressure businesses to
 give them &lt;a
 
href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/"&gt;unlimited
 access to their surveillance cameras&lt;/a&gt; so that they can look through
-them at any and all times.</em></ins></span>  This is already dangerous, but 
it is going
+them at any and all times.  This is already dangerous, but it is going
 to get worse.  Advances in face recognition may bring the day when
 suspected journalists can be tracked on the street all the time to see
 who they talk with.&lt;/p&gt;
 
 &lt;p&gt;Internet-connected cameras often have lousy digital security
-themselves, which means &lt;a <span 
class="removed"><del><strong>href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances"&gt;anyone</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://www.csoonline.com/article/2221934/cia-wants-to-spy-on-you-through-your-appliances.html"&gt;anyone</em></ins></span>
+themselves, which means &lt;a
+href="https://www.csoonline.com/article/2221934/cia-wants-to-spy-on-you-through-your-appliances.html"&gt;anyone
 can watch what those cameras see&lt;/a&gt;.  This makes internet-connected
 cameras a major threat to security as well as privacy.  For privacy's
 sake, we should ban the use of Internet-connected cameras aimed where
@@ -340,13 +371,22 @@
 occasionally, but the systematic accumulation of such data on the
 Internet must be limited.&lt;/p&gt;
 
-&lt;p&gt;&lt;a <span 
class="removed"><del><strong>name="privatespace"&gt;&lt;b&gt;*&lt;/b&gt;&lt;/a&gt;I</strong></del></span>
 <span 
class="inserted"><ins><em>name="privatespace"&gt;&lt;b&gt;*&lt;/b&gt;&lt;/a&gt; 
I</em></ins></span> assume here that the security
+&lt;p id="privatespace"&gt;(*) I assume here that the security
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 id="digitalcash" class="subheader"&gt;Remedy for Internet Commerce 
Surveillance&lt;/h3&gt;
+<span class="inserted"><ins><em>&lt;div class="announcement comment" 
role="complementary"&gt;
+&lt;hr class="no-display" /&gt;
+&lt;p&gt;Also consider reading &ldquo;&lt;a
+href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance"&gt;A
+radical proposal to keep your personal data safe&lt;/a&gt;,&rdquo; published in
+&lt;cite&gt;The Guardian&lt;/cite&gt; in April&nbsp;2018.&lt;/p&gt;
+&lt;hr class="no-display" /&gt;
+&lt;/div&gt;</em></ins></span>
+
+&lt;h3 <span class="removed"><del><strong>id="digitalcash" 
class="subheader"&gt;Remedy</strong></del></span> <span 
class="inserted"><ins><em>id="digitalcash"&gt;Remedy</em></ins></span> for 
Internet Commerce Surveillance&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;Most data collection comes from people's own digital activities.
@@ -357,10 +397,10 @@
 systematically available to the state.&lt;/p&gt;
 
 &lt;p&gt;The NSA, through PRISM,
-has &lt;a href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten
+has &lt;a <span 
class="removed"><del><strong>href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies"&gt;gotten</em></ins></span>
 into the databases of many large Internet corporations&lt;/a&gt;.  AT&amp;T
 has saved all its phone call records since 1987
-and &lt;a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes
+and &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes</em></ins></span>
 them available to the DEA&lt;/a&gt; to search on request.  Strictly
 speaking, the U.S.  government does not possess that data, but in
 practical terms it may as well possess it.  Some companies are praised
@@ -390,19 +430,19 @@
 &lt;p&gt;We could correct both problems by adopting a system of anonymous
 payments&mdash;anonymous for the payer, that is.  (We don't want to
 help the payee dodge
-taxes.)  &lt;a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin
+taxes.)  &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin</em></ins></span>
 is not anonymous&lt;/a&gt;, though there are efforts to develop ways to pay
 anonymously with Bitcoin.  However, technology
-for &lt;a 
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital
+for &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital</em></ins></span>
 cash was first developed in the 1980s&lt;/a&gt;; the GNU software for doing
-this is called &lt;a href="http://taler.net/"&gt;GNU Taler&lt;/a&gt;.  Now we 
need
+this is called &lt;a <span 
class="removed"><del><strong>href="http://taler.net/"&gt;GNU</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://taler.net/"&gt;GNU</em></ins></span> 
Taler&lt;/a&gt;.  Now we need
 only suitable business arrangements, and for the state not to obstruct
 them.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;Another possible method for anonymous 
payments would
-use &lt;a 
href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid
+&lt;p&gt;Another possible method for anonymous payments would
+use &lt;a <span 
class="removed"><del><strong>href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid</strong></del></span>
 <span 
class="inserted"><ins><em>href="/philosophy/phone-anonymous-payment.html"&gt;prepaid</em></ins></span>
 phone cards&lt;/a&gt;.  It is less convenient, but very easy to
-implement.&lt;/p&gt;</em></ins></span>
+implement.&lt;/p&gt;
 
 &lt;p&gt;A further threat from sites' collection of personal data is that
 security breakers might get in, take it, and misuse it.  This includes
@@ -411,13 +451,15 @@
 knows nothing about you.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Remedy for Travel Surveillance&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Remedy</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Remedy</em></ins></span> for Travel 
Surveillance&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
-<span class="inserted"><ins><em>&lt;a 
href="https://www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-law-enforcement-agencies-automated"&gt;</em></ins></span>
-recognize all <span class="inserted"><ins><em>cars'</em></ins></span> license 
<span class="removed"><del><strong>plates,</strong></del></span> <span 
class="inserted"><ins><em>plates&lt;/a&gt;,</em></ins></span> and
+&lt;a 
href="https://www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-law-enforcement-agencies-automated"&gt;
+recognize all cars' license plates&lt;/a&gt;, and
 the &lt;a 
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm"&gt;data
 can be kept indefinitely&lt;/a&gt;; they should be required by law to notice
 and record only those license numbers that are on a list of cars
@@ -471,16 +513,18 @@
 borrower's identity immediately.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Remedy for Communications Dossiers&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Remedy</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Remedy</em></ins></span> for 
Communications Dossiers&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
-also &lt;a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record
+also &lt;a <span 
class="removed"><del><strong>href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record</em></ins></span>
 the user's physical location&lt;/a&gt;.  They keep these dossiers for a long
 time: over 30 years, in the case of AT&amp;T.  Soon they will
-even &lt;a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record
+even &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record</em></ins></span>
 the user's body activities&lt;/a&gt;.  It appears that
 the &lt;a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location"&gt;NSA
 collects cell phone location data&lt;/a&gt; in bulk.&lt;/p&gt;
@@ -493,7 +537,7 @@
 &lt;p&gt;This solution is not entirely satisfactory, because it won't
 physically stop the government from collecting all the information
 immediately as it is generated&mdash;which is what
-the &lt;a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.
 does
+the &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.</em></ins></span>
 does
 with some or all phone companies&lt;/a&gt;.  We would have to rely on
 prohibiting that by law.  However, that would be better than the
 current situation, where the relevant law (the PAT RIOT Act) does not
@@ -513,7 +557,9 @@
 would be hard to determine that you had sent mail to me.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;But Some Surveillance Is Necessary&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;But</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;But</em></ins></span> Some 
Surveillance Is Necessary&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;For the state to find criminals, it needs to be able to investigate
@@ -530,18 +576,19 @@
 police have their own jargon term for perjury,
 &ldquo;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302"&gt;testilying&lt;/a&gt;,&rdquo;
 since they do it so frequently, particularly about protesters
-and &lt;a <span 
class="removed"><del><strong>href="http://photographyisnotacrime.com/"&gt;photographers&lt;/a&gt;.)</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.themaven.net/pinacnews/"&gt;photographers&lt;/a&gt;.)</em></ins></span>
+and &lt;a 
href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"&gt;
+photographers&lt;/a&gt;.)
 One city in California that required police to wear video cameras all
 the time
-found &lt;a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their
+found &lt;a <span 
class="removed"><del><strong>href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their</em></ins></span>
 use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
+href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
 are not people, and not entitled to human rights&lt;/a&gt;.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., &lt;a href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;) or political
+(e.g., &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;)</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;)</em></ins></span>
 or political
 (e.g., lobbying) hazards to society, to whatever level is needed for
 public well-being.  The danger of these operations (consider the BP
 oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -573,20 +620,28 @@
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.&lt;/p&gt;
 &lt;/div&gt;
-<span class="inserted"><ins><em>&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
-&lt;h3 style="font-size: 1.2em"&gt;End Note&lt;/h3&gt;
+&lt;h3 class="footnote"&gt;End Note&lt;/h3&gt;
 &lt;ol&gt;
 &lt;li id="ambientprivacy"&gt;The condition of &lt;em&gt;not being 
monitored&lt;/em&gt;
 has been referred to as &lt;a
 href="https://idlewords.com/2019/06/the_new_wilderness.htm"&gt;ambient
 privacy&lt;/a&gt;.&lt;/li&gt;
-&lt;/ol&gt;</em></ins></span>
+&lt;/ol&gt;
+
+<span class="inserted"><ins><em>&lt;div class="infobox extra"&gt;
+&lt;hr /&gt;
+&lt;!-- rms: I deleted the link because of Wired's announced
+     anti-ad-block system --&gt;
+&lt;p&gt;A version of this article was first published in
+&lt;cite&gt;Wired&lt;/cite&gt; in October&nbsp;2013.&lt;/p&gt;
+&lt;/div&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
-&lt;div id="footer"&gt;
+&lt;div <span 
class="removed"><del><strong>id="footer"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="footer" role="contentinfo"&gt;</em></ins></span>
 &lt;div class="unprintable"&gt;
 
 &lt;p&gt;Please send general FSF &amp; GNU inquiries to
@@ -604,13 +659,13 @@
         to &lt;a href="mailto:web-translators@gnu.org"&gt;
         &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;For information on coordinating and submitting translations of
+        &lt;p&gt;For information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations of
         our web pages, see &lt;a
         href="/server/standards/README.translations.html"&gt;Translations
         README&lt;/a&gt;. --&gt;
 Please see the &lt;a
 href="/server/standards/README.translations.html"&gt;Translations
-README&lt;/a&gt; for information on coordinating and submitting translations
+README&lt;/a&gt; for information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
@@ -631,7 +686,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2015, 2016, 2017, 
2018, 2019, 2020</strong></del></span> <span 
class="inserted"><ins><em>2013-2019, 2021</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -641,12 +696,11 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/03/31 14:30:35 $
+$Date: 2021/09/01 08:02:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;&lt;!-- for class="inner", starts 
in the banner include --&gt;</em></ins></span>
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
 &lt;/body&gt;
 &lt;/html&gt;
 </pre></body></html>

Index: po/surveillance-vs-democracy.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.nl-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/surveillance-vs-democracy.nl-diff.html   17 Dec 2020 21:31:17 -0000      
1.31
+++ po/surveillance-vs-democracy.nl-diff.html   1 Sep 2021 08:02:37 -0000       
1.32
@@ -11,41 +11,43 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.90</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.90</strong></del></span> <span 
class="inserted"><ins><em>1.96 --&gt;
+&lt;!-- This page is derived from /server/standards/boilerplate.html --&gt;
+&lt;!--#set var="TAGS" value="essays cultural evils" --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes"</em></ins></span> --&gt;
 &lt;title&gt;How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
-#intro { margin: <span class="removed"><del><strong>1.5em 
auto;</strong></del></span> <span class="inserted"><ins><em>2em auto 
1.5em;</em></ins></span> }
+#intro { margin: 2em auto 1.5em; }
 .pict.wide { width: 23em; }
-.pict p { <span class="removed"><del><strong>margin-top: 
.2em;</strong></del></span> <span class="inserted"><ins><em>margin-bottom: 
0;</em></ins></span> }
+.pict p { margin-bottom: 0; }
 @media (min-width: 55em) {
    #intro { max-width: 55em; }
-   <span class="removed"><del><strong>.pict.wide { margin-bottom: 
0;</strong></del></span>
 }
-<span class="removed"><del><strong>}
---&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
-&lt;/style&gt;</em></ins></span>
+--&gt;
+&lt;/style&gt;
 &lt;!-- GNUN: localize URL /graphics/dog.small.jpg --&gt;
 &lt;!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" 
--&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
+<span class="inserted"><ins><em>&lt;!--#include 
virtual="/philosophy/ph-breadcrumb.html" --&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div class="article"&gt;</em></ins></span>
 &lt;h2 class="center"&gt;How Much Surveillance Can Democracy 
Withstand?&lt;/h2&gt;
 
-<span class="removed"><del><strong>&lt;p</strong></del></span>
+&lt;address class="byline center"&gt;by
+&lt;a <span 
class="removed"><del><strong>href="http://www.stallman.org/"&gt;Richard</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.stallman.org/"&gt;Richard</em></ins></span>
 Stallman&lt;/a&gt;&lt;/address&gt;
 
-<span class="inserted"><ins><em>&lt;address</em></ins></span> class="byline 
center"&gt;by
-&lt;a href="http://www.stallman.org/"&gt;Richard <span 
class="removed"><del><strong>Stallman&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>Stallman&lt;/a&gt;&lt;/address&gt;</em></ins></span>
-
-&lt;!-- rms: I deleted the link because of Wired's announced
+<span class="removed"><del><strong>&lt;!-- rms: I deleted the link because of 
Wired's announced
      anti-ad-block system --&gt;
-&lt;blockquote <span 
class="removed"><del><strong>class="center"&gt;&lt;p&gt;A</strong></del></span> 
<span 
class="inserted"><ins><em>class="center"&gt;&lt;p&gt;&lt;em&gt;A</em></ins></span>
 version of this article was first published in <span 
class="removed"><del><strong>Wired</strong></del></span>
-<span 
class="inserted"><ins><em>&lt;cite&gt;Wired&lt;/cite&gt;</em></ins></span> in 
<span class="removed"><del><strong>October 
2013.&lt;/p&gt;&lt;/blockquote&gt;</strong></del></span> <span 
class="inserted"><ins><em>October&nbsp;2013.&lt;br /&gt;
+&lt;blockquote class="center"&gt;&lt;p&gt;&lt;em&gt;A version of this article 
was first published in
+&lt;cite&gt;Wired&lt;/cite&gt; in October&nbsp;2013.&lt;br /&gt;
 Also consider reading &ldquo;&lt;a
 
href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance"&gt;A
 radical proposal to keep your personal data safe&lt;/a&gt;,&rdquo; published in
-&lt;cite&gt;The Guardian&lt;/cite&gt; in 
April&nbsp;2018.&lt;/em&gt;&lt;/p&gt;&lt;/blockquote&gt;</em></ins></span>
+&lt;cite&gt;The Guardian&lt;/cite&gt; in 
April&nbsp;2018.&lt;/em&gt;&lt;/p&gt;&lt;/blockquote&gt;
 
-&lt;div class="article"&gt;
+&lt;div class="article"&gt;</strong></del></span>
 
 &lt;div id="intro"&gt;
 &lt;div class="pict wide"&gt;
@@ -56,8 +58,8 @@
 
 &lt;p&gt;Thanks to Edward Snowden's disclosures, we know that the current
 level of general surveillance in society is incompatible with human
-rights.  <span class="inserted"><ins><em>Expecting every action to be noted 
down &lt;a href="https://www.socialcooling.com/"&gt;makes people censor and
-limit themselves&lt;/a&gt;.</em></ins></span>  The repeated harassment and 
prosecution of dissidents,
+rights.  Expecting every action to be noted down &lt;a 
href="https://www.socialcooling.com/"&gt;makes people censor and
+limit themselves&lt;/a&gt;.  The repeated harassment and prosecution of 
dissidents,
 sources, and journalists in the US and elsewhere provides
 confirmation.  We need to reduce the level of general surveillance,
 but how far?  Where exactly is the
@@ -71,10 +73,10 @@
 &lt;p&gt;Faced with government secrecy, we the people depend on
 whistleblowers
 to &lt;a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama"&gt;tell
-us what the state is doing&lt;/a&gt;.  <span class="inserted"><ins><em>(We 
were reminded of this in 2019 as
+us what the state is doing&lt;/a&gt;.  (We were reminded of this in 2019 as
 various whistleblowers gave the public increments
 of &lt;a 
href="https://www.commondreams.org/views/2019/09/27/trumps-ukraine-scandal-shows-why-whistleblowers-are-so-vital-democracy"&gt;information
-about Trump's attempt to shake down the president of 
Ukraine&lt;/a&gt;.)</em></ins></span>
+about Trump's attempt to shake down the president of Ukraine&lt;/a&gt;.)
 However, today's surveillance intimidates potential whistleblowers,
 which means it is too much.  To recover our democratic control over
 the state, we must reduce surveillance to the point where
@@ -82,19 +84,20 @@
 
 &lt;p&gt;Using free/libre
 software, &lt;a href="/philosophy/free-software-even-more-important.html"&gt;as
-I've advocated <span class="removed"><del><strong>for 30 
years&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>since 
1983&lt;/a&gt;,</em></ins></span> is the first step in taking control
+I've advocated since 1983&lt;/a&gt;, is the first step in taking control
 of our digital lives, and that includes preventing surveillance.  We
 can't trust nonfree software; the NSA
 &lt;a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;uses&lt;/a&gt;
 and
-even &lt;a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;
+even &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;</em></ins></span>
 security weaknesses in nonfree software to invade our own computers
 and routers.  Free software gives us control of our own computers,
-but &lt;a href="http://www.wired.com/opinion/2013/10/149481/"&gt;that won't
+but &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/149481/"&gt;that</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/149481/"&gt;that</em></ins></span>
 won't
 protect our privacy once we set foot on the Internet&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan</em></ins></span>
 legislation to &ldquo;curtail the domestic surveillance
 powers&rdquo;&lt;/a&gt; in the U.S. is being drawn up, but it relies on
 limiting the government's use of our virtual dossiers.  That won't
@@ -103,7 +106,7 @@
 or her.  We need to go further.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader" style="clear: both"&gt;The Upper Limit on 
Surveillance in a Democracy&lt;/h3&gt;
+&lt;h3 <span 
class="removed"><del><strong>class="subheader"</strong></del></span> 
style="clear: both"&gt;The Upper Limit on Surveillance in a Democracy&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;If whistleblowers don't dare reveal crimes and lies, we lose the
@@ -114,29 +117,32 @@
 
 &lt;p&gt;An unnamed U.S. government official ominously told journalists in
 2011 that
-the &lt;a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.
 would
+the &lt;a <span 
class="removed"><del><strong>href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.rcfp.org/journals/news-media-and-law-summer-2011/lessons-wye-river/"&gt;U.S.</em></ins></span>
 would
 not subpoena reporters because &ldquo;We know who you're talking
 to.&rdquo;&lt;/a&gt;
-Sometimes &lt;a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'
+Sometimes &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'</em></ins></span>
 phone call records are subpoenaed&lt;/a&gt; to find this out, but Snowden
 has shown us that in effect they subpoena all the phone call records
 of everyone in the U.S., all the
-time, &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20131226044537/http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from</em></ins></span>
+time, &lt;a 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from
 Verizon&lt;/a&gt;
-and &lt;a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from
+and &lt;a <span 
class="removed"><del><strong>href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from</em></ins></span>
 other companies too&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Opposition and dissident activities need to keep secrets from
 states that are willing to play dirty tricks on them.  The ACLU has
 demonstrated the U.S. government's &lt;a
-href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic
+<span 
class="removed"><del><strong>href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic</em></ins></span>
 practice of infiltrating peaceful dissident groups&lt;/a&gt; on the pretext
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Information, Once Collected, Will Be 
Misused&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Information,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Information,</em></ins></span> Once 
Collected, Will Be Misused&lt;/h3&gt;
 
 &lt;div  class="columns"&gt;
 &lt;p id="willbemisused"&gt;When people recognize
@@ -145,13 +151,13 @@
 accumulated data.  That sounds nice, but it won't fix the problem, not
 even slightly, even supposing that the government obeys the rules.
 (The NSA has misled the FISA court, which said it
-was &lt;a 
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable
+was &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable</em></ins></span>
 to effectively hold the NSA accountable&lt;/a&gt;.) Suspicion of a crime
 will be grounds for access, so once a whistleblower is accused of
 &ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
 excuse to access the accumulated material.&lt;/p&gt;
 
-&lt;p&gt;In <span class="inserted"><ins><em>practice, we can't expect state 
agencies even to make up excuses
+&lt;p&gt;In practice, we can't expect state agencies even to make up excuses
 to satisfy the rules for using surveillance data&mdash;because US
 agencies
 already &lt;a 
href="https://theintercept.com/2018/01/09/dark-side-fbi-dea-illegal-searches-secret-evidence/"&gt;
@@ -159,9 +165,9 @@
 meant to be obeyed; rather, they are a fairy-tale we can believe if we
 like.&lt;/p&gt;
 
-&lt;p&gt;In</em></ins></span> addition, the state's surveillance staff will 
misuse the data
+&lt;p&gt;In addition, the state's surveillance staff will misuse the data
 for personal reasons.  Some NSA
-agents &lt;a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used
+agents &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used</em></ins></span>
 U.S. surveillance systems to track their lovers&lt;/a&gt;&mdash;past,
 present, or wished-for&mdash;in a practice called
 &ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
@@ -174,10 +180,10 @@
 with &lt;a 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared"&gt;new
 digital systems&lt;/a&gt;.  In 2016, a prosecutor was accused of forging
 judges' signatures to get authorization
-to &lt;a 
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;
+to &lt;a <span 
class="removed"><del><strong>href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;</em></ins></span>
 wiretap someone who was the object of a romantic obsession&lt;/a&gt;. The AP
 knows
-of &lt;a <span 
class="removed"><del><strong>href="http://bigstory.ap.org/article/699236946e3140659fff8a2362e16f43/ap-across-us-police-officers-abuse-confidential-databases"&gt;many</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://apnews.com/699236946e3140659fff8a2362e16f43"&gt;many</em></ins></span>
+of &lt;a href="https://apnews.com/699236946e3140659fff8a2362e16f43"&gt;many
 other instances in the US&lt;/a&gt;.
 &lt;/p&gt;
 
@@ -185,15 +191,26 @@
 this is prohibited.  Once the data has been accumulated and the state
 has the possibility of access to it, it can misuse that data in
 dreadful ways, as shown by examples
-from &lt;a <span 
class="removed"><del><strong>href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;
-and</strong></del></span> <span 
class="inserted"><ins><em>href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;,</em></ins></span>
+from &lt;a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;,
 &lt;a href="https://en.wikipedia.org/wiki/Japanese_American_internment"&gt;the
-<span class="removed"><del><strong>US 
&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-<span class="inserted"><ins><em>US&lt;/a&gt;, and most
-recently &lt;a 
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.
+US&lt;/a&gt;, and most
+recently &lt;a <span 
class="removed"><del><strong>href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.</em></ins></span>
 (Turkey's confusion about who had really used the Bylock program only
 exacerbated the basic deliberate injustice of arbitrarily punishing
 people for having used it.)
+&lt;/p&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;You may feel your government won't 
use your personal data for
+repression, but you can't rely on that feeling, because governments do
+change.  As of 2021, many ostensibly democratic states
+are &lt;a 
href="https://www.theguardian.com/commentisfree/2021/aug/21/beware-state-surveillance-of-your-lives-governments-can-change-afghanistan"&gt;ruled
+by people with authoritarian leanings&lt;/a&gt;, and the Taliban have taken
+over Afghanistan's systems of biometric identification that were set
+up at the instigation of the US.  The UK is working on a law
+to &lt;a 
href="https://www.theguardian.com/commentisfree/2021/aug/09/police-bill-not-law-order-state-control-erosion-freedom"&gt;repress
+nonviolent protests that might be described as causing &ldquo;serious
+disruption.&rdquo;&lt;/a&gt;  The US could become permanently repressive in
+2025, for all we know.
 &lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;Personal data collected by the state is also likely to be obtained
@@ -202,7 +219,7 @@
 working for hostile states&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Governments can easily use massive surveillance capability
-to &lt;a 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert
+to &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert</em></ins></span>
 democracy directly&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;Total surveillance accessible to the state enables the state to
@@ -211,13 +228,14 @@
 that is easily accessible to the state.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Robust Protection for Privacy Must Be 
Technical&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Robust</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Robust</em></ins></span> Protection 
for Privacy Must Be Technical&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to &lt;a
-<span 
class="removed"><del><strong>href="https://en.necessaryandproportionate.org/text"&gt;prevent</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://necessaryandproportionate.org"&gt;prevent</em></ins></span>
 the
+href="https://necessaryandproportionate.org"&gt;prevent the
 abuses of massive surveillance&lt;/a&gt;.  These principles include,
 crucially, explicit legal protection for whistleblowers; as a
 consequence, they would be adequate for protecting democratic
@@ -227,7 +245,8 @@
 &lt;p&gt;However, such legal protections are precarious: as recent history
 shows, they can be repealed (as in the FISA Amendments Act),
 suspended, or &lt;a
-href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;Meanwhile, demagogues will cite the usual excuses as grounds for
 total surveillance; any terrorist attack, even one that kills just a
@@ -244,7 +263,9 @@
 ignoring this law, the idea would hardly make sense.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;First, Don't Be Foolish&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;First,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;First,</em></ins></span> Don't Be 
Foolish&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;To have privacy, you must not throw it away: the first one who has
@@ -260,25 +281,23 @@
 files, with free software on your own computer before uploading
 it.&lt;/p&gt;
 
-&lt;p&gt;For privacy's sake, you must avoid nonfree <span 
class="removed"><del><strong>software since, as a
-consequence of giving others</strong></del></span> <span 
class="inserted"><ins><em>software; if you give</em></ins></span>
-control of your <span class="removed"><del><strong>computing, it
-is</strong></del></span> <span class="inserted"><ins><em>computer's operations 
to companies, they
-are</em></ins></span> &lt;a 
href="/malware/proprietary-surveillance.html"&gt;likely to <span 
class="inserted"><ins><em>make it</em></ins></span>
+&lt;p&gt;For privacy's sake, you must avoid nonfree software; if you give
+control of your computer's operations to companies, they
+are &lt;a href="/malware/proprietary-surveillance.html"&gt;likely to make it
 spy on you&lt;/a&gt;.
 Avoid &lt;a 
href="/philosophy/who-does-that-server-really-serve.html"&gt;service
 as a software substitute&lt;/a&gt;; in addition to giving others control of
 how your computing is done, it requires you to hand over all the
-pertinent data to the <span 
class="inserted"><ins><em>company's</em></ins></span> server.&lt;/p&gt;
+pertinent data to the company's server.&lt;/p&gt;
 
 &lt;p&gt;Protect your friends' and acquaintances' privacy,
-too.  &lt;a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't
+too.  &lt;a <span 
class="removed"><del><strong>href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't</em></ins></span>
 give out their personal information&lt;/a&gt; except how to contact them,
 and never give any web site your list of email or phone contacts.
 Don't tell a company such as Facebook anything about your friends that
 they might not wish to publish in a newspaper.  Better yet, don't be
 used by Facebook at all.  Reject communication systems that require
-users to give their real names, even if you are <span 
class="removed"><del><strong>going</strong></del></span> <span 
class="inserted"><ins><em>happy</em></ins></span> to <span 
class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>divulge</em></ins></span> yours,
+users to give their real names, even if you are happy to divulge yours,
 since they pressure other people to surrender their privacy.&lt;/p&gt;
 
 &lt;p&gt;Self-protection is essential, but even the most rigorous
@@ -291,7 +310,9 @@
 suspects.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;We Must Design Every System for Privacy&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;We</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;We</em></ins></span> Must Design 
Every System for Privacy&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;If we don't want a total surveillance society, we must consider
@@ -310,18 +331,18 @@
 any desired period of time, with the average usage pattern for that
 period.  The same benefit, with no surveillance!&lt;/p&gt;
 
-&lt;p&gt;We need to design such privacy into all our digital <span 
class="removed"><del><strong>systems.&lt;/p&gt;</strong></del></span>
-<span class="inserted"><ins><em>systems&nbsp;[&lt;a 
href="#ambientprivacy"&gt;1&lt;/a&gt;].&lt;/p&gt;</em></ins></span>
+&lt;p&gt;We need to design such privacy into all our digital
+systems&nbsp;[&lt;a href="#ambientprivacy"&gt;1&lt;/a&gt;].&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Remedy for Collecting Data: Leaving It 
Dispersed&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Remedy</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Remedy</em></ins></span> for 
Collecting Data: Leaving It Dispersed&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
-<span class="removed"><del><strong>&lt;p&gt;One</strong></del></span>
-<span class="inserted"><ins><em>&lt;p id="dispersal"&gt;One</em></ins></span> 
way to make monitoring safe for privacy is
-to <span class="removed"><del><strong>&lt;a 
name="dispersal"&gt;keep</strong></del></span> <span 
class="inserted"><ins><em>keep</em></ins></span> the data dispersed and 
inconvenient to
-<span class="removed"><del><strong>access&lt;/a&gt;.</strong></del></span>
-<span class="inserted"><ins><em>access.</em></ins></span>  Old-fashioned 
security cameras were no threat to privacy(&lt;a 
href="#privatespace"&gt;*&lt;/a&gt;).
+&lt;p id="dispersal"&gt;One way to make monitoring safe for privacy is
+to keep the data dispersed and inconvenient to
+access.  Old-fashioned security cameras were no threat to privacy(&lt;a 
href="#privatespace"&gt;*&lt;/a&gt;).
 The recording was stored on the premises, and kept for a few weeks at
 most.  Because of the inconvenience of accessing these recordings, it
 was never done massively; they were accessed only in the places where
@@ -330,18 +351,18 @@
 
 &lt;p&gt;Nowadays, security cameras have become surveillance cameras: they
 are connected to the Internet so recordings can be collected in a data
-center and saved forever.  <span class="inserted"><ins><em>In Detroit, the 
cops pressure businesses to
+center and saved forever.  In Detroit, the cops pressure businesses to
 give them &lt;a
 
href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/"&gt;unlimited
 access to their surveillance cameras&lt;/a&gt; so that they can look through
-them at any and all times.</em></ins></span>  This is already dangerous, but 
it is going
+them at any and all times.  This is already dangerous, but it is going
 to get worse.  Advances in face recognition may bring the day when
 suspected journalists can be tracked on the street all the time to see
 who they talk with.&lt;/p&gt;
 
 &lt;p&gt;Internet-connected cameras often have lousy digital security
-themselves, which means &lt;a <span 
class="removed"><del><strong>href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances"&gt;anyone</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://www.csoonline.com/article/2221934/cia-wants-to-spy-on-you-through-your-appliances.html"&gt;anyone</em></ins></span>
+themselves, which means &lt;a
+href="https://www.csoonline.com/article/2221934/cia-wants-to-spy-on-you-through-your-appliances.html"&gt;anyone
 can watch what those cameras see&lt;/a&gt;.  This makes internet-connected
 cameras a major threat to security as well as privacy.  For privacy's
 sake, we should ban the use of Internet-connected cameras aimed where
@@ -350,15 +371,22 @@
 occasionally, but the systematic accumulation of such data on the
 Internet must be limited.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;&lt;a 
name="privatespace"&gt;&lt;b&gt;*&lt;/b&gt;&lt;/a&gt;I</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p id="privatespace"&gt;(*) 
I</em></ins></span> assume here that the security
+&lt;p id="privatespace"&gt;(*) I assume here that the security
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 id="digitalcash" class="subheader"&gt;Remedy for Internet Commerce 
Surveillance&lt;/h3&gt;
+<span class="inserted"><ins><em>&lt;div class="announcement comment" 
role="complementary"&gt;
+&lt;hr class="no-display" /&gt;
+&lt;p&gt;Also consider reading &ldquo;&lt;a
+href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance"&gt;A
+radical proposal to keep your personal data safe&lt;/a&gt;,&rdquo; published in
+&lt;cite&gt;The Guardian&lt;/cite&gt; in April&nbsp;2018.&lt;/p&gt;
+&lt;hr class="no-display" /&gt;
+&lt;/div&gt;</em></ins></span>
+
+&lt;h3 <span class="removed"><del><strong>id="digitalcash" 
class="subheader"&gt;Remedy</strong></del></span> <span 
class="inserted"><ins><em>id="digitalcash"&gt;Remedy</em></ins></span> for 
Internet Commerce Surveillance&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;Most data collection comes from people's own digital activities.
@@ -369,10 +397,10 @@
 systematically available to the state.&lt;/p&gt;
 
 &lt;p&gt;The NSA, through PRISM,
-has &lt;a href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten
+has &lt;a <span 
class="removed"><del><strong>href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2013/08/23/latest-docs-show-financial-ties-between-nsa-and-internet-companies"&gt;gotten</em></ins></span>
 into the databases of many large Internet corporations&lt;/a&gt;.  AT&amp;T
 has saved all its phone call records since 1987
-and &lt;a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes
+and &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes</em></ins></span>
 them available to the DEA&lt;/a&gt; to search on request.  Strictly
 speaking, the U.S.  government does not possess that data, but in
 practical terms it may as well possess it.  Some companies are praised
@@ -402,17 +430,17 @@
 &lt;p&gt;We could correct both problems by adopting a system of anonymous
 payments&mdash;anonymous for the payer, that is.  (We don't want to
 help the payee dodge
-taxes.)  &lt;a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin
+taxes.)  &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin</em></ins></span>
 is not anonymous&lt;/a&gt;, though there are efforts to develop ways to pay
 anonymously with Bitcoin.  However, technology
-for &lt;a 
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital
+for &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital</em></ins></span>
 cash was first developed in the 1980s&lt;/a&gt;; the GNU software for doing
-this is called &lt;a href="http://taler.net/"&gt;GNU Taler&lt;/a&gt;.  Now we 
need
+this is called &lt;a <span 
class="removed"><del><strong>href="http://taler.net/"&gt;GNU</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://taler.net/"&gt;GNU</em></ins></span> 
Taler&lt;/a&gt;.  Now we need
 only suitable business arrangements, and for the state not to obstruct
 them.&lt;/p&gt;
 
 &lt;p&gt;Another possible method for anonymous payments would
-use &lt;a 
href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid
+use &lt;a <span 
class="removed"><del><strong>href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid</strong></del></span>
 <span 
class="inserted"><ins><em>href="/philosophy/phone-anonymous-payment.html"&gt;prepaid</em></ins></span>
 phone cards&lt;/a&gt;.  It is less convenient, but very easy to
 implement.&lt;/p&gt;
 
@@ -423,13 +451,15 @@
 knows nothing about you.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Remedy for Travel Surveillance&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Remedy</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Remedy</em></ins></span> for Travel 
Surveillance&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
-<span class="inserted"><ins><em>&lt;a 
href="https://www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-law-enforcement-agencies-automated"&gt;</em></ins></span>
-recognize all <span class="inserted"><ins><em>cars'</em></ins></span> license 
<span class="removed"><del><strong>plates,</strong></del></span> <span 
class="inserted"><ins><em>plates&lt;/a&gt;,</em></ins></span> and
+&lt;a 
href="https://www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-law-enforcement-agencies-automated"&gt;
+recognize all cars' license plates&lt;/a&gt;, and
 the &lt;a 
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm"&gt;data
 can be kept indefinitely&lt;/a&gt;; they should be required by law to notice
 and record only those license numbers that are on a list of cars
@@ -483,16 +513,18 @@
 borrower's identity immediately.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;Remedy for Communications Dossiers&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;Remedy</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;Remedy</em></ins></span> for 
Communications Dossiers&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
-also &lt;a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record
+also &lt;a <span 
class="removed"><del><strong>href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20210312235125/http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record</em></ins></span>
 the user's physical location&lt;/a&gt;.  They keep these dossiers for a long
 time: over 30 years, in the case of AT&amp;T.  Soon they will
-even &lt;a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record
+even &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record</em></ins></span>
 the user's body activities&lt;/a&gt;.  It appears that
 the &lt;a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location"&gt;NSA
 collects cell phone location data&lt;/a&gt; in bulk.&lt;/p&gt;
@@ -505,7 +537,7 @@
 &lt;p&gt;This solution is not entirely satisfactory, because it won't
 physically stop the government from collecting all the information
 immediately as it is generated&mdash;which is what
-the &lt;a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.
 does
+the &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.</em></ins></span>
 does
 with some or all phone companies&lt;/a&gt;.  We would have to rely on
 prohibiting that by law.  However, that would be better than the
 current situation, where the relevant law (the PAT RIOT Act) does not
@@ -525,7 +557,9 @@
 would be hard to determine that you had sent mail to me.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;h3 class="subheader"&gt;But Some Surveillance Is Necessary&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 
class="subheader"&gt;But</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h3&gt;But</em></ins></span> Some 
Surveillance Is Necessary&lt;/h3&gt;
 
 &lt;div class="columns"&gt;
 &lt;p&gt;For the state to find criminals, it needs to be able to investigate
@@ -542,20 +576,19 @@
 police have their own jargon term for perjury,
 &ldquo;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302"&gt;testilying&lt;/a&gt;,&rdquo;
 since they do it so frequently, particularly about protesters
-and &lt;a <span 
class="removed"><del><strong>href="http://photographyisnotacrime.com/"&gt;photographers&lt;/a&gt;.)</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"&gt;
-photographers&lt;/a&gt;.)</em></ins></span>
+and &lt;a 
href="https://web.archive.org/web/20131025014556/http://photographyisnotacrime.com/2013/10/23/jeff-gray-arrested-recording-cops-days-becoming-pinac-partner/"&gt;
+photographers&lt;/a&gt;.)
 One city in California that required police to wear video cameras all
 the time
-found &lt;a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their
+found &lt;a <span 
class="removed"><del><strong>href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their</em></ins></span>
 use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
 
 &lt;p&gt;&lt;a
-<span 
class="removed"><del><strong>href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations</em></ins></span>
+href="https://web.archive.org/web/20171019220057/http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
 are not people, and not entitled to human rights&lt;/a&gt;.  It is
 legitimate to require businesses to publish the details of processes
 that might cause chemical, biological, nuclear, fiscal, computational
-(e.g., &lt;a href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;) or political
+(e.g., &lt;a <span 
class="removed"><del><strong>href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;)</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;)</em></ins></span>
 or political
 (e.g., lobbying) hazards to society, to whatever level is needed for
 public well-being.  The danger of these operations (consider the BP
 oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
@@ -587,7 +620,7 @@
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.&lt;/p&gt;
 &lt;/div&gt;
-<span class="inserted"><ins><em>&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
 &lt;h3 class="footnote"&gt;End Note&lt;/h3&gt;
 &lt;ol&gt;
@@ -595,12 +628,20 @@
 has been referred to as &lt;a
 href="https://idlewords.com/2019/06/the_new_wilderness.htm"&gt;ambient
 privacy&lt;/a&gt;.&lt;/li&gt;
-&lt;/ol&gt;</em></ins></span>
+&lt;/ol&gt;
+
+<span class="inserted"><ins><em>&lt;div class="infobox extra"&gt;
+&lt;hr /&gt;
+&lt;!-- rms: I deleted the link because of Wired's announced
+     anti-ad-block system --&gt;
+&lt;p&gt;A version of this article was first published in
+&lt;cite&gt;Wired&lt;/cite&gt; in October&nbsp;2013.&lt;/p&gt;
+&lt;/div&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
-&lt;div id="footer"&gt;
+&lt;div <span 
class="removed"><del><strong>id="footer"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="footer" role="contentinfo"&gt;</em></ins></span>
 &lt;div class="unprintable"&gt;
 
 &lt;p&gt;Please send general FSF &amp; GNU inquiries to
@@ -618,13 +659,13 @@
         to &lt;a href="mailto:web-translators@gnu.org"&gt;
         &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;For information on coordinating and submitting translations of
+        &lt;p&gt;For information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations of
         our web pages, see &lt;a
         href="/server/standards/README.translations.html"&gt;Translations
         README&lt;/a&gt;. --&gt;
 Please see the &lt;a
 href="/server/standards/README.translations.html"&gt;Translations
-README&lt;/a&gt; for information on coordinating and submitting translations
+README&lt;/a&gt; for information on coordinating and <span 
class="removed"><del><strong>submitting</strong></del></span> <span 
class="inserted"><ins><em>contributing</em></ins></span> translations
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
@@ -645,7 +686,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Richard 
Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2015, 2016, 2017, 
2018, 2019, 2020</strong></del></span> <span 
class="inserted"><ins><em>2013-2019, 2021</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -655,12 +696,11 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2020/12/17 21:31:17 $
+$Date: 2021/09/01 08:02:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/div&gt;&lt;!-- for class="inner", starts 
in the banner include --&gt;</em></ins></span>
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
 &lt;/body&gt;
 &lt;/html&gt;
 </pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]