www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sat, 4 Jun 2022 11:32:24 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     22/06/04 11:32:23

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.pt-br-diff.html 
                         proprietary-surveillance.pt-br.po 
                         proprietary-surveillance.ru.po pt-br.po ru.po 
                         tr.po zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.578&r2=1.579
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.700&r2=1.701
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.404&r2=1.405
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.397&r2=1.398
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.395&r2=1.396
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.431&r2=1.432
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.288&r2=1.289
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.710&r2=1.711
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.443&r2=1.444
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.321&r2=1.322
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.424&r2=1.425
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.363&r2=1.364
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.781&r2=1.782
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.483&r2=1.484
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.829&r2=1.830
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.290&r2=1.291
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.294&r2=1.295
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.396&r2=1.397

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- de.po       4 Jun 2022 15:02:48 -0000       1.396
+++ de.po       4 Jun 2022 15:32:14 -0000       1.397
@@ -12990,6 +12990,14 @@
 
 #. type: Content of: <div><div><div><ul><li>
 # | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">… in Anwendungssoftware</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
 # | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
 #, fuzzy
 #| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -13458,6 +13466,23 @@
 msgstr " "
 
 #. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr " "
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr ""
 

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.578
retrieving revision 1.579
diff -u -b -r1.578 -r1.579
--- es.po       4 Jun 2022 15:02:49 -0000       1.578
+++ es.po       4 Jun 2022 15:32:14 -0000       1.579
@@ -11531,6 +11531,14 @@
 "<a href=\"#SpywareInApplications\">Código espía en las aplicaciones</a>"
 
 #. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Aplicaciones para móviles</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr "<a href=\"#SpywareInDesktopApps\">Aplicaciones de escritorio</a>"
 
@@ -11882,6 +11890,28 @@
 "\">#SpywareInApplications</a>)</span>"
 
 #. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Aplicaciones para móviles"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr "Aplicaciones de escritorio"
 

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.700
retrieving revision 1.701
diff -u -b -r1.700 -r1.701
--- fr.po       4 Jun 2022 15:02:49 -0000       1.700
+++ fr.po       4 Jun 2022 15:32:15 -0000       1.701
@@ -11545,6 +11545,14 @@
 msgstr "<a href=\"#SpywareInApplications\">Espions dans les applications</a>"
 
 #. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Sur mobile</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr "<a href=\"#SpywareInDesktopApps\">Sur ordinateur de bureau</a>"
 
@@ -11896,6 +11904,28 @@
 "\">#SpywareInApplications</a>)</span>"
 
 #. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Sur mobile"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr "Sur ordinateur de bureau"
 

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- it.po       4 Jun 2022 15:02:49 -0000       1.396
+++ it.po       4 Jun 2022 15:32:15 -0000       1.397
@@ -11874,6 +11874,14 @@
 
 #. type: Content of: <div><div><div><ul><li>
 # | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
 # | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
 #, fuzzy
 #| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -12337,6 +12345,25 @@
 "\">#SpywareIniThings</a>)</span>"
 
 #. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr ""
 

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.404
retrieving revision 1.405
diff -u -b -r1.404 -r1.405
--- ja.po       4 Jun 2022 15:02:49 -0000       1.404
+++ ja.po       4 Jun 2022 15:32:16 -0000       1.405
@@ -9782,6 +9782,12 @@
 msgstr "<a href=\"#SpywareInApplications\">アプリのスパイウェア</a>"
 
 #. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a 
href=\"#SpywareInMobileApps\">モバイル・アプリのスパイウェア</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr ""
 
@@ -10165,6 +10171,24 @@
 "\">#SpywareInApplications</a>)</span>"
 
 #. type: Content of: <div><div><div><h4>
+#, fuzzy
+#| msgid "Spyware in Mobile Applications"
+msgid "All Apps"
+msgstr "モバイル・アプリのスパイウェア"
+
+#. type: Content of: <div><div><div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr ""
 

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.397
retrieving revision 1.398
diff -u -b -r1.397 -r1.398
--- nl.po       4 Jun 2022 15:02:50 -0000       1.397
+++ nl.po       4 Jun 2022 15:32:16 -0000       1.398
@@ -8749,6 +8749,18 @@
 
 #. type: Content of: <div><div><div><ul><li>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
+# | devices</a>-] {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
+#| "a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr ""
+"<a href=\"/proprietary/malware-mobiles.html\">Malware in mobiele apparaten</"
+"a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
 #, fuzzy
 #| msgid ""
@@ -9093,6 +9105,16 @@
 msgstr ""
 
 #. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr ""
 

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- pl.po       4 Jun 2022 15:02:50 -0000       1.396
+++ pl.po       4 Jun 2022 15:32:16 -0000       1.397
@@ -8014,6 +8014,17 @@
 
 #. type: Content of: <div><div><div><ul><li>
 # | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
+# | devices</a>-] {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/philosophy/malware-mobiles.html\">Malware in mobile devices</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr ""
+"<a href=\"/philosophy/malware-mobiles.html\">Malware w&nbsp;urządzeniach "
+"mobilnych</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
 #, fuzzy
 #| msgid ""
@@ -8346,6 +8357,16 @@
 msgstr ""
 
 #. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr ""
 

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.395
retrieving revision 1.396
diff -u -b -r1.395 -r1.396
--- pot 4 Jun 2022 15:02:50 -0000       1.395
+++ pot 4 Jun 2022 15:32:17 -0000       1.396
@@ -7602,6 +7602,10 @@
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr ""
 
@@ -7886,6 +7890,16 @@
 msgstr ""
 
 #. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr ""
 

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary-surveillance.de-diff.html       4 Jun 2022 15:02:50 -0000       
1.239
+++ proprietary-surveillance.de-diff.html       4 Jun 2022 15:32:17 -0000       
1.240
@@ -149,15 +149,16 @@
     &lt;ul&gt;</em></ins></span>
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInToys"&gt;Spyware in 
Toys&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
-    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareOnSmartWatches"&gt;Spyware on Smart 
Watches&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInAllApps"&gt;All 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareOnSmartWatches"&gt;Spyware on Smart 
Watches&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/a&gt;
-      &lt;ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/a&gt;&lt;/li&gt;
     &lt;/ul&gt;
-    <span class="removed"><del><strong>&lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareAtWork"&gt;Spyware at 
Work&lt;/a&gt;</strong></del></span>
-    <span class="inserted"><ins><em>&lt;h4&gt;&lt;a 
href="#SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/a&gt;&lt;/h4&gt;</em></ins></span>
+    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;Spyware at 
Work&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+    &lt;h4&gt;&lt;a href="#SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/a&gt;&lt;/h4&gt;</em></ins></span>
     &lt;ul&gt;
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;Spyware in 
Skype&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
@@ -741,7 +742,7 @@
   &lt;li id="M202101080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one</em></ins></span> of <span 
class="inserted"><ins><em>Facebook's subsidiaries) is &lt;a
+    &lt;p&gt;As</em></ins></span> of <span class="inserted"><ins><em>2021, 
WhatsApp (one of Facebook's subsidiaries) is &lt;a
     
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
     its</em></ins></span> users <span class="removed"><del><strong>may be 
unawarely subject</strong></del></span> to <span 
class="removed"><del><strong>poor security guarantees and abusive practices 
inflicted by
     VPN apps.&rdquo;&lt;/p&gt;
@@ -1522,6 +1523,11 @@
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInAllApps"&gt;All Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAllApps"&gt;#SpywareInAllApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202205240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-05&lt;/small&gt;'
@@ -2351,12 +2357,12 @@
 GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts</strong></del></span> <span class="inserted"><ins><em>intend to make 
these apps spy; on the contrary, it
-    worked</em></ins></span> in <span class="inserted"><ins><em>various ways 
to prevent that, and deleted these apps after
+    worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
+    therefore shares</em></ins></span> in <span class="inserted"><ins><em>the 
responsibility for the injustice of their being
     nonfree. It also distributes</em></ins></span> its own <span 
class="removed"><del><strong>malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -2595,20 +2601,20 @@
       five tracking libraries. Developers of</em></ins></span> this <span 
class="removed"><del><strong>code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app have confirmed that
       the non-premium version of the app does JavaScript injection for
       tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;
+    &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609210"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google's new voice messaging app &lt;a
     
href="https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
+  &lt;li id="M201606050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
@@ -3412,16 +3418,16 @@
   <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance"&gt;audio
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance"&gt;audio
     recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its</em></ins></span> users <span 
class="removed"><del><strong>identify themselves</strong></del></span> <span 
class="inserted"><ins><em>through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
@@ -3898,7 +3904,7 @@
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of</em></ins></span> that <span 
class="inserted"><ins><em>data, or that the software
+    hardware cannot collect any of that data, or</em></ins></span> that <span 
class="inserted"><ins><em>the software
     is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3980,8 +3986,8 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Oculus headsets &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
     users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
     free rein to pervasively snoop on Oculus users.&lt;/p&gt;
@@ -3989,8 +3995,8 @@
 
   &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;VR equipment, measuring every slight motion,
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;VR equipment, measuring every 
slight motion,
     creates the potential for the most intimate
     surveillance ever. All it takes to make this potential real &lt;a
     
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
@@ -4649,7 +4655,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/06/04 15:02:50 $
+$Date: 2022/06/04 15:32:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.431
retrieving revision 1.432
diff -u -b -r1.431 -r1.432
--- proprietary-surveillance.de.po      4 Jun 2022 15:02:50 -0000       1.431
+++ proprietary-surveillance.de.po      4 Jun 2022 15:32:18 -0000       1.432
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -270,6 +270,14 @@
 
 #. type: Content of: <div><div><div><ul><li>
 # | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">… in Anwendungssoftware</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
 # | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
 #, fuzzy
 #| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -2452,6 +2460,23 @@
 "\">#SpywareInApplications</a>)</span>"
 msgstr " "
 
+#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr " "
+
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A worldwide investigation found that most of the applications that school "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.288
retrieving revision 1.289
diff -u -b -r1.288 -r1.289
--- proprietary-surveillance.es.po      4 Jun 2022 15:02:51 -0000       1.288
+++ proprietary-surveillance.es.po      4 Jun 2022 15:32:19 -0000       1.289
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
 "PO-Revision-Date: 2022-04-19 00:42+0200\n"
 "Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
 "Language-Team: Spanish\n"
@@ -204,6 +204,14 @@
 "<a href=\"#SpywareInApplications\">Código espía en las aplicaciones</a>"
 
 #. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Aplicaciones para móviles</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr "<a href=\"#SpywareInDesktopApps\">Aplicaciones de escritorio</a>"
 
@@ -1789,6 +1797,28 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
 "\">#SpywareInApplications</a>)</span>"
 
+#. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Aplicaciones para móviles"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A worldwide investigation found that most of the applications that school "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.710
retrieving revision 1.711
diff -u -b -r1.710 -r1.711
--- proprietary-surveillance.fr.po      4 Jun 2022 15:02:51 -0000       1.710
+++ proprietary-surveillance.fr.po      4 Jun 2022 15:32:19 -0000       1.711
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
 "PO-Revision-Date: 2022-05-11 12:31+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -195,6 +195,14 @@
 msgstr "<a href=\"#SpywareInApplications\">Espions dans les applications</a>"
 
 #. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Sur mobile</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr "<a href=\"#SpywareInDesktopApps\">Sur ordinateur de bureau</a>"
 
@@ -1783,6 +1791,28 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
 "\">#SpywareInApplications</a>)</span>"
 
+#. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Sur mobile"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A worldwide investigation found that most of the applications that school "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- proprietary-surveillance.it-diff.html       4 Jun 2022 15:02:51 -0000       
1.303
+++ proprietary-surveillance.it-diff.html       4 Jun 2022 15:32:20 -0000       
1.304
@@ -141,12 +141,13 @@
     <span class="inserted"><ins><em>&lt;h4&gt;&lt;a</em></ins></span> 
href="#SpywareOnMobiles"&gt;Spyware on <span 
class="removed"><del><strong>Mobiles&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Mobiles&lt;/a&gt;&lt;/h4&gt;</em></ins></span>
     &lt;ul&gt;
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;Spyware in 
iThings&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInTelephones"&gt;All 
&ldquo;Smart&rdquo; Phones&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareIniThings"&gt;iThings&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;Android 
Telephones&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;E-Readers&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;Spyware 
in</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareIniThings"&gt;iThings&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInAndroid"&gt;Android</em></ins></span> 
Telephones&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;E-Readers&lt;/a&gt;&lt;/li&gt;
      &lt;/ul&gt;
-    &lt;h4&gt;&lt;a href="#SpywareInApplications"&gt;Spyware</em></ins></span> 
in <span 
class="removed"><del><strong>Games&lt;/a&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>Applications&lt;/a&gt;&lt;/h4&gt;
+    &lt;h4&gt;&lt;a href="#SpywareInApplications"&gt;Spyware</em></ins></span> 
in <span class="removed"><del><strong>Mobile 
Applications&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>Applications&lt;/a&gt;&lt;/h4&gt;
     &lt;ul&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;Spyware in 
Games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInAllApps"&gt;All 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInToys"&gt;Spyware in 
Toys&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
     &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -1409,14 +1410,19 @@
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInAllApps"&gt;All Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAllApps"&gt;#SpywareInAllApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202205240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A worldwide investigation found</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
         pre-install on some</strong></del></span>
-    <span class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give Verizon the same
-   information about</strong></del></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>applications</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
+    <span class="inserted"><ins><em>most</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give 
Verizon</strong></del></span> the <span class="removed"><del><strong>same
+   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>applications</em></ins></span> that <span 
class="removed"><del><strong>Google normally gets when
    they use its search engine.&lt;/p&gt;
 
    &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>school districts
@@ -1867,10 +1873,11 @@
     
     &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>own pregnancy choices. Don't use
     these apps, even if someone offers you a reward to do so. A
-    free-software app</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>does more or less</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>same thing without
-    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
+    free-software app</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>does more or less</em></ins></span> the <span 
class="removed"><del><strong>vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>same thing without
+    spying on you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
     
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2943,8 +2950,8 @@
 
   &lt;li id="M201901070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio TVs &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;Vizio <span class="inserted"><ins><em>TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
     collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
@@ -2957,7 +2964,7 @@
     and there is no guarantee that all future updates will leave the
     settings unchanged.&lt;/p&gt;
 
-    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
+    &lt;p&gt;If you already own a Vizio</em></ins></span> &ldquo;smart&rdquo; 
<span class="inserted"><ins><em>TV (or any &ldquo;smart&rdquo; TV, for that
     matter), the easiest way to make sure it isn't spying on you is
     to disconnect it from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
@@ -2976,16 +2983,16 @@
 
     &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</em></ins></span>
     report everything that is viewed on them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
     the TV reports what it is. The existence of a way to disable the
@@ -3072,20 +3079,20 @@
       watching</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
     snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
-  &lt;li id="M201504300"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &lt;a
     
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
+  &lt;li id="M201502090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The</em></ins></span> Samsung &ldquo;Smart&rdquo; TV &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits</strong></del></span>
@@ -3801,8 +3808,8 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Oculus headsets &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
     users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
     free rein to pervasively snoop on Oculus users.&lt;/p&gt;
@@ -3810,8 +3817,8 @@
 
   &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;VR equipment, measuring every 
slight motion,
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;VR equipment, measuring every slight motion,
     creates the potential for the most intimate
     surveillance ever. All it takes to make this potential real &lt;a
     
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
@@ -4003,8 +4010,8 @@
 
   &lt;li id="M201807190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;British Airways used &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
     JavaScript on its web site to give other companies personal data on
     its customers&lt;/a&gt;.&lt;/p&gt;
@@ -4020,8 +4027,8 @@
 
   &lt;li id="M201711150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Some websites send
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some websites send
     JavaScript code to collect all the user's input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
     can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
@@ -4447,7 +4454,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/06/04 15:02:51 $
+$Date: 2022/06/04 15:32:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.443
retrieving revision 1.444
diff -u -b -r1.443 -r1.444
--- proprietary-surveillance.it.po      4 Jun 2022 15:02:51 -0000       1.443
+++ proprietary-surveillance.it.po      4 Jun 2022 15:32:21 -0000       1.444
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -261,6 +261,14 @@
 
 #. type: Content of: <div><div><div><ul><li>
 # | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
 # | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
 #, fuzzy
 #| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -2331,6 +2339,25 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareIniThings"
 "\">#SpywareIniThings</a>)</span>"
 
+#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A worldwide investigation found that most of the applications that school "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.321
retrieving revision 1.322
diff -u -b -r1.321 -r1.322
--- proprietary-surveillance.ja-diff.html       4 Jun 2022 15:02:51 -0000       
1.321
+++ proprietary-surveillance.ja-diff.html       4 Jun 2022 15:32:21 -0000       
1.322
@@ -141,12 +141,13 @@
     <span class="inserted"><ins><em>&lt;h4&gt;&lt;a</em></ins></span> 
href="#SpywareOnMobiles"&gt;Spyware on <span 
class="removed"><del><strong>Mobiles&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Mobiles&lt;/a&gt;&lt;/h4&gt;</em></ins></span>
     &lt;ul&gt;
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;Spyware in 
iThings&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInTelephones"&gt;All 
&ldquo;Smart&rdquo; Phones&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareIniThings"&gt;iThings&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;Android 
Telephones&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;E-Readers&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;Spyware 
in</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareIniThings"&gt;iThings&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInAndroid"&gt;Android</em></ins></span> 
Telephones&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;E-Readers&lt;/a&gt;&lt;/li&gt;
      &lt;/ul&gt;
-    &lt;h4&gt;&lt;a href="#SpywareInApplications"&gt;Spyware</em></ins></span> 
in <span 
class="removed"><del><strong>Games&lt;/a&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>Applications&lt;/a&gt;&lt;/h4&gt;
+    &lt;h4&gt;&lt;a href="#SpywareInApplications"&gt;Spyware</em></ins></span> 
in <span class="removed"><del><strong>Mobile 
Applications&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>Applications&lt;/a&gt;&lt;/h4&gt;
     &lt;ul&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;Spyware in 
Games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInAllApps"&gt;All 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInToys"&gt;Spyware in 
Toys&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
     &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -187,15 +188,15 @@
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;JavaScript&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInVR"&gt;Spyware In 
VR&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInFlash"&gt;Flash&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
     <span class="inserted"><ins><em>&lt;h4&gt;&lt;a 
href="#SpywareInNetworks"&gt;Spyware in 
Networks&lt;/a&gt;&lt;/h4&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div <span class="removed"><del><strong>style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;!-- #Introduction --&gt;</strong></del></span>
+&lt;!-- #Introduction --&gt;
 
-&lt;div class="big-section"&gt;
+&lt;div</strong></del></span> class="big-section"&gt;
   &lt;h3 id="Introduction"&gt;Introduction&lt;/h3&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1150,15 +1151,15 @@
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> location <span 
class="inserted"><ins><em>data while in
+    &lt;p&gt;An Android phone was observed to track</em></ins></span> location 
<span class="inserted"><ins><em>even while
+    in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
     it saved up the data,</em></ins></span> and <span 
class="removed"><del><strong>web
@@ -1237,55 +1238,149 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:</strong></del></span>
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware is present in some Android devices when they are
+    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
+      the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable 
phones</strong></del></span>
+    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
+&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A Motorola phone &lt;a
-    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens</em></ins></span> for <span 
class="removed"><del><strong>surveillance is inadequate as a protection against 
massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new</strong></del></span> voice <span 
class="removed"><del><strong>messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs</strong></del></span>
 all <span class="removed"><del><strong>conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201302150"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="inserted"><ins><em>not 
enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>use of 
data on</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>collects on users, instead of
-    hiding</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
-
-    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other</strong></del></span> 
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
+    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share the picture you take according to who
+      is in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>wire to Facebook's servers and 
face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>users that install</em></ins></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; of</em></ins></span> users 
<span class="removed"><del><strong>submit to increased snooping&lt;/a&gt;, and 
some
+      are starting to realize that it</strong></del></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way</strong></del></span> 
<span class="inserted"><ins><em>not enough</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo;</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most</em></ins></span> users <span 
class="removed"><del><strong>better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example of
+      the attitude of the proprietary software industry towards
+      those they</strong></del></span> have <span 
class="removed"><del><strong>subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+    apps</strong></del></span> <span class="inserted"><ins><em>stopped
+    reading</em></ins></span> the <span class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;Terms</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad 
as</strong></del></span> <span class="inserted"><ins><em>Conditions&rdquo; that 
spell out</em></ins></span> what
+    <span class="inserted"><ins><em>they are &ldquo;consenting&rdquo; to.  
Google should clearly and
+    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>information it collects</em></ins></span> on <span 
class="removed"><del><strong>the user&lt;/a&gt;. This is</strong></del></span> 
<span class="inserted"><ins><em>users, instead of
+    hiding it</em></ins></span> in <span 
class="removed"><del><strong>addition</strong></del></span> <span 
class="inserted"><ins><em>an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However,</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span class="inserted"><ins><em>truly protect 
people's privacy, we must prevent Google</em></ins></span>
+    and <span class="removed"><del><strong>perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized</strong></del></span> <span 
class="inserted"><ins><em>other companies from getting</em></ins></span> this 
<span class="removed"><del><strong>app because it asked the user to
+      approve sending</strong></del></span> personal <span 
class="removed"><del><strong>data to the app developer but did not
+      ask about sending it to other companies.  This shows the
+      weakness of</strong></del></span> <span 
class="inserted"><ins><em>information in</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span>
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
+    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
     hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -1293,223 +1388,298 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps that include</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and the NSA takes advantage to spy through it 
too&lt;/a&gt;.
+      Here's information</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sometimes this code snoops</em></ins></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+&lt;ul&gt;
+
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span>
+    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take 
according</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed</em></ins></span> to <span class="removed"><del><strong>who
-      is</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
+    send</em></ins></span> lots of <span class="removed"><del><strong>personal 
information about how
+    people use it&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;The company's statement that it anonymizes the data may be
+        true, but it doesn't really matter. If it sells 
the</strong></del></span> data to <span class="removed"><del><strong>a
+        data broker, the data broker can figure out who the user is.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201212030"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A computerized
+        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across the wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
+      &lt;p&gt;The app reports the temperature of the vibrator minute by
+      minute (thus, indirectly, whether it is surrounded by a person's
+      body), and the vibration frequency.&lt;/p&gt;
 
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users 
can</strong></del></span> <span class="inserted"><ins><em>Adobe&lt;/a&gt;.  
Adobe's &ldquo;excuse&rdquo;: it's
+    needed to</em></ins></span> check
+      <span class="removed"><del><strong>and 
change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>DRM!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtLowLevel"&gt;Spyware 
at Low Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInApplications"&gt;Spyware in 
Applications&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAllApps"&gt;All 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAllApps"&gt;#SpywareInAllApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;/div&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202205240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A worldwide investigation found that</em></ins></span>
-    most <span class="removed"><del><strong>&ldquo;music screaming&rdquo; 
disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize</strong></del></span> <span 
class="inserted"><ins><em>of the applications</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
+    &lt;p&gt;A worldwide investigation found</em></ins></span> that
+    <span class="inserted"><ins><em>most of</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span 
class="inserted"><ins><em>applications that school districts
+    recommended for remote education during the COVID-19 
pandemic</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>school districts
-    recommended for remote education during</em></ins></span> the <span 
class="inserted"><ins><em>COVID-19 pandemic</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping</strong></del></span>
+      &lt;p&gt;Specifically, it can</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/"&gt;track
-    and collect personal data from children</em></ins></span> as <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>young as below the age of
-    five&lt;/a&gt;. These applications, and their websites,  send the collected
-    information</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether</strong></del></span> <span class="inserted"><ins><em>ad giants 
such as Facebook and Goodle, and</em></ins></span> they <span 
class="removed"><del><strong>want that. This is a typical example 
of</strong></del></span> <span class="inserted"><ins><em>are
-    still being used in</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>classrooms even after some</em></ins></span> of the 
<span class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
+    and</em></ins></span> collect <span class="inserted"><ins><em>personal 
data from children as young as below</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>age</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span>
+    <span class="inserted"><ins><em>five&lt;/a&gt;. These applications, and 
their websites,  send the collected
+    information to ad giants such as Facebook and Goodle, 
and</em></ins></span> they <span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>schools
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>are
+    still being used</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the classrooms even after some of the schools
     reopened.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
-    apps the user has
-    installed.</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft's Office 365 suite enables employers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in</strong></del></span>
+    &lt;p&gt;Microsoft's Office 365 suite enables employers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
-    snoop on each employee&lt;/a&gt;. After</em></ins></span>
-    a <span class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>public outburst, Microsoft stated</em></ins></span> 
that <span class="removed"><del><strong>at least is visible and
-    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    snoop on each employee&lt;/a&gt;. After
+    a public outburst,</em></ins></span> Microsoft <span 
class="removed"><del><strong>changed Skype</strong></del></span> <span 
class="inserted"><ins><em>stated that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
     would remove this capability&lt;/a&gt;. Let's hope 
so.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+&lt;!-- #SpywareOnTheRoad</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201912190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some Avast and AVG extensions
-    for Firefox and Chrome were found to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;</em></ins></span>
-    snoop on <span class="removed"><del><strong>the user&lt;/a&gt;. This is in 
addition to
-      the snooping done by the phone company,</strong></del></span> <span 
class="inserted"><ins><em>users' detailed browsing habits&lt;/a&gt;. 
Mozilla</em></ins></span> and <span class="removed"><del><strong>perhaps by the 
OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>Google
-    removed</em></ins></span> the <span class="removed"><del><strong>app 
developers get
-      users</strong></del></span> <span class="inserted"><ins><em>problematic 
extensions from their stores, but this shows
-    once more how unsafe nonfree software can be. Tools that are 
supposed</em></ins></span>
-    to <span class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is 
no excuse for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protect a proprietary system are, instead, infecting 
it with
-    additional malware (the system itself being the original 
malware).&lt;/p&gt;</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Some Avast and AVG extensions
+    for Firefox and Chrome were found</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection</strong></del></span> <span class="inserted"><ins><em>users' 
detailed browsing habits&lt;/a&gt;. Mozilla and Google
+    removed the problematic extensions from their stores, but this shows
+    once more how unsafe nonfree software can be. Tools that are supposed
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being the original 
malware).&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201811020"&gt;
+  &lt;li id="M201811020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running 
it&lt;/a&gt;.</em></ins></span> The <span 
class="removed"><del><strong>Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>result is
     often a legal threat demanding a lot of money.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The <span class="removed"><del><strong>FTC 
criticized</strong></del></span> <span class="inserted"><ins><em>fact 
that</em></ins></span> this <span class="removed"><del><strong>app 
because</strong></del></span> <span class="inserted"><ins><em>is used for 
repression of forbidden sharing
-    makes</em></ins></span> it <span class="removed"><del><strong>asked the 
user to
-      approve sending personal data to the app developer but 
did</strong></del></span> <span class="inserted"><ins><em>even more 
vicious.&lt;/p&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera</strong></del></span> <span 
class="inserted"><ins><em>fact that this</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>used for repression of forbidden sharing
+    makes it</em></ins></span> even <span 
class="removed"><del><strong>when</strong></del></span> <span 
class="inserted"><ins><em>more vicious.&lt;/p&gt;
 
     &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is</em></ins></span> not
-      <span class="removed"><del><strong>ask about sending it to other 
companies.  This shows</strong></del></span> <span class="inserted"><ins><em>a 
cure for</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it 
<span class="removed"><del><strong>to outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202204040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;New Amazon worker chat app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
+    &lt;p&gt;New Amazon worker chat app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://theintercept.com/2022/04/04/amazon-union-living-wage-restrooms-chat-app/"&gt;would
     ban specific words Amazon doesn't like&lt;/a&gt;, such as
-    &ldquo;union&rdquo;, &ldquo;restrooms&rdquo;,</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;pay
-    raise&rdquo;. If the app was free, workers could modify the program
+    &ldquo;union&rdquo;, &ldquo;restrooms&rdquo;, and &ldquo;pay
+    raise&rdquo;. If</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>app was free, workers could modify</em></ins></span> 
the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>program
     so it acts as they wish, not how Amazon wants 
it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M202203010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The nonfree app &ldquo;Along,&rdquo;
-    developed by a company controlled by Zuckerberg,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span>
+    developed</em></ins></span> by <span class="removed"><del><strong>most US 
libraries,</strong></del></span> <span class="inserted"><ins><em>a company 
controlled by Zuckerberg,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://kappanonline.org/dont-go-along-with-corporate-schemes-to-gather-up-student-data/"&gt;
-    leads students to reveal to their teacher personal information&lt;/a&gt;
-    about themselves and their families. Conversations are 
recorded</em></ins></span> 
-    and the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>collected data 
sent</em></ins></span> to <span class="removed"><del><strong>spy through it 
too&lt;/a&gt;.
-      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>the company, which grants itself the
-    right to sell it. See also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/education/educational-malware-app-along.html#content"&gt;Educational
 Malware App &ldquo;Along&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    leads students</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>reveal</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>their teacher 
personal information&lt;/a&gt;
+    about themselves and their families. Conversations</em></ins></span> are
+  <span class="removed"><del><strong>&lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>recorded</em></ins></span> 
+    and <span class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because the system has no authentication when
+    accessed through the modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software in the car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
+    modem enables</strong></del></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>collected data sent</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>company, which grants itself</em></ins></span> the 
<span class="removed"><del><strong>time; it is possible</strong></del></span>
+    <span class="inserted"><ins><em>right</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sell it. See also &lt;a
+    
href="/education/educational-malware-app-along.html#content"&gt;Educational 
Malware App &ldquo;Along&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202201270"&gt;
@@ -1517,31 +1687,34 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The data broker X-Mode &lt;a
     
href="https://themarkup.org/privacy/2022/01/27/gay-bi-dating-app-muslim-prayer-apps-sold-data-on-peoples-location-to-a-controversial-data-broker"&gt;bought
-    location data</em></ins></span> about <span 
class="removed"><del><strong>NSA app 
spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>20,000 people collected by around 100 different
+    location data about 20,000 people collected by around 100 different
     malicious apps&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary 
software</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M202111090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A building</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span> <span class="inserted"><ins><em>LA, with a 
supermarket in it,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued</strong></del></span>
+    &lt;p&gt;A building</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span> <span 
class="inserted"><ins><em>LA, with a supermarket in it,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app"&gt;demands
-    customers load a particular app to pay</em></ins></span> for <span 
class="removed"><del><strong>collecting lots</strong></del></span> <span 
class="inserted"><ins><em>parking in the parking
-    lot&lt;/a&gt;, and accept pervasive surveillance. They also have the
-    option</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>entering their license plate numbers in a kiosk. That 
is
-    an injustice, too.&lt;/p&gt;
+    customers load a particular app</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>pay for 
parking in the parking
+    lot&lt;/a&gt;,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>accept pervasive surveillance. They also have the
+    option</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>entering their 
license plate numbers</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
+      really</strong></del></span> a <span class="removed"><del><strong>matter 
of proprietary surveillance. These systems are</strong></del></span> <span 
class="inserted"><ins><em>kiosk. That is</em></ins></span>
+    an
+      <span class="removed"><del><strong>intolerable invasion of privacy, and 
should be replaced with anonymous
+      payment systems, but the invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
+      determine the car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>injustice, too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202106030"&gt;
@@ -1549,25 +1722,46 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/"&gt;TikTok
-    apps collect biometric identifiers and biometric</em></ins></span> 
information <span class="removed"><del><strong>about how
-    people use it&lt;/a&gt;.&lt;/p&gt;
-
-       &lt;p&gt;The company's statement that</strong></del></span> <span 
class="inserted"><ins><em>from
-    users' smartphones&lt;/a&gt;. The company behind</em></ins></span> it 
<span class="removed"><del><strong>anonymizes the data may be
-        true, but</strong></del></span> <span class="inserted"><ins><em>does 
whatever</em></ins></span> it <span class="removed"><del><strong>doesn't really 
matter. If</strong></del></span> <span class="inserted"><ins><em>wants
-    and collects whatever data</em></ins></span> it <span 
class="removed"><del><strong>sells the</strong></del></span> <span 
class="inserted"><ins><em>can.&lt;/p&gt;
+    apps collect biometric identifiers</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;).</strong></del></span> <span 
class="inserted"><ins><em>biometric information from
+    users' smartphones&lt;/a&gt;.</em></ins></span> The company <span 
class="removed"><del><strong>says</strong></del></span> <span 
class="inserted"><ins><em>behind</em></ins></span> it <span 
class="removed"><del><strong>doesn't
+      store this information, but if the state orders</strong></del></span> 
<span class="inserted"><ins><em>does whatever</em></ins></span> it <span 
class="removed"><del><strong>to get the data</strong></del></span> <span 
class="inserted"><ins><em>wants</em></ins></span>
+    and <span class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>collects whatever data</em></ins></span> it <span 
class="removed"><del><strong>over, the state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M202104060"&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202104060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The &lt;a
     
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
-    app saves people's wedding photos forever and hands over</em></ins></span> 
data
-    to <span class="removed"><del><strong>a
-        data broker,</strong></del></span> <span 
class="inserted"><ins><em>others&lt;/a&gt;, giving users no control over their 
personal 
-    information/data. The app also sometimes shows old photos and
-    memories to users, without giving them any control over this
+    app saves people's wedding photos forever and hands over 
data</em></ins></span>
+    to <span class="removed"><del><strong>spy on</strong></del></span> <span 
class="inserted"><ins><em>others&lt;/a&gt;, giving users no control 
over</em></ins></span> their <span 
class="removed"><del><strong>renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke:</strong></del></span> <span 
class="inserted"><ins><em>personal 
+    information/data.</em></ins></span> The <span 
class="removed"><del><strong>other day a woman came up</strong></del></span> 
<span class="inserted"><ins><em>app also sometimes shows old photos and
+    memories</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>users, without giving them any control over this
     either.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1577,232 +1771,170 @@
     &lt;p&gt;Many cr&hellip;apps, developed by various
     companies for various organizations, do &lt;a
     
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
-    location tracking unknown to those companies and those
-    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
-    the tracking.&lt;/p&gt;
+    location tracking unknown to those companies</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that 
do</em></ins></span>
+    the <span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span 
class="inserted"><ins><em>tracking.&lt;/p&gt;
 
-    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    &lt;p&gt;What's unusual here is</em></ins></span> that <span 
class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>proprietary software developer A tricks
     proprietary software developers B1 &hellip; B50 into making platforms for
-    A to mistreat</em></ins></span> the <span class="inserted"><ins><em>end 
user.&lt;/p&gt;
+    A to mistreat the end user.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202003260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>report was 
as</strong></del></span> <span class="inserted"><ins><em>Apple iOS 
version</em></ins></span> of <span class="removed"><del><strong>2014, but we 
don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to 
get</strong></del></span> <span class="inserted"><ins><em>Zoom &lt;a
     
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending users'</em></ins></span> data <span 
class="removed"><del><strong>broker can figure out who</strong></del></span> 
<span class="inserted"><ins><em>to Facebook&lt;/a&gt; even if</em></ins></span> 
the user <span class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>doesn't have
-    a Facebook account. According to the article, Zoom and Facebook
-    don't even mention this surveillance on their privacy policy page,
-    making this an obvious violation of people's privacy even in their
+    sending</em></ins></span> users' <span class="removed"><del><strong>formal
+      consent before collecting personal</strong></del></span> data <span 
class="removed"><del><strong>are totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> to <span class="removed"><del><strong>report 
what</strong></del></span> <span class="inserted"><ins><em>Facebook&lt;/a&gt; 
even if</em></ins></span> the user <span class="removed"><del><strong>watches 
&mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>doesn't have</em></ins></span>
+    a <span class="removed"><del><strong>step further than other TV 
manufacturers in spying</strong></del></span> <span 
class="inserted"><ins><em>Facebook account. According to the article, Zoom and 
Facebook
+    don't even mention this surveillance</em></ins></span> on their <span 
class="removed"><del><strong>users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn</strong></del></span> <span 
class="inserted"><ins><em>privacy policy page,
+    making</em></ins></span> this <span class="removed"><del><strong>off, but 
having it enabled by default
+      is</strong></del></span> an <span class="removed"><del><strong>injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obvious violation of people's privacy even in their
     own terms.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M202003010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells</em></ins></span> the <span class="removed"><del><strong>proprietary 
control app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cops directly&lt;/a&gt;.&lt;/p&gt;
+    estimates whether</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>user has 
Covid-19 and &lt;a
+    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells</em></ins></span> the <span class="removed"><del><strong>company 
already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>cops directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202001290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Amazon Ring</em></ins></span> 
app <span class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>does &lt;a
-    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all users to
+      new combined</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;</em></ins></span>
+    surveillance <span class="removed"><del><strong>by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible sounds to be
+      picked up by proprietary malware running on</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> other <span 
class="removed"><del><strong>devices in
+      range so</strong></del></span> <span 
class="inserted"><ins><em>companies</em></ins></span> as <span 
class="removed"><del><strong>to determine that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and
+      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
 
-  &lt;li id="M201912220"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
-    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>government</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it is surrounded by a person's
-      body),</strong></del></span> <span class="inserted"><ins><em>United Arab 
Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this,</em></ins></span> and <span 
class="removed"><del><strong>the vibration frequency.&lt;/p&gt;
-
-      &lt;p&gt;Note the totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>that 
is</em></ins></span> a <span class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than</strong></del></span> <span 
class="inserted"><ins><em>good
-    reason to use</em></ins></span> free software <span 
class="removed"><del><strong>which users can check
-      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
+    &lt;p&gt;The ToToc messaging app seems to be</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span> <span 
class="inserted"><ins><em>government of</em></ins></span> the <span 
class="removed"><del><strong>internet to another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this,</em></ins></span> and <span 
class="removed"><del><strong>would then have to
+      give it to the US or some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>a good
+    reason</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
+    by</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> free software <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
-    the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word 
&ldquo;free&rdquo;</em></ins></span> in <span class="removed"><del><strong>your 
own computer.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;iMonsters and Android phones,
-    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
+    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>the device.  Many employers demand to do this.  For 
the
-    employee, this is simply nonfree software, as fundamentally 
unjust</em></ins></span>
-    and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>as dangerous as any other nonfree 
software.&lt;/p&gt;</em></ins></span>
+    snooping</em></ins></span> and <span class="inserted"><ins><em>sabotage 
capabilities&lt;/a&gt; if they install their own
+    software on</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>device.  Many employers demand</em></ins></span> to 
<span class="removed"><del><strong>turn this off has no effect.  (The fact that 
the
+      transmission reports a 404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>do this.  
For</em></ins></span> the <span 
class="removed"><del><strong>server</strong></del></span>
+    <span class="inserted"><ins><em>employee, this is simply nonfree software, 
as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+  &lt;li id="M201910130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The Chinese Communist Party's 
&ldquo;Study
-    the Great Nation&rdquo; app requires users</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>grant it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
     access to the phone's microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>Android 
version was found to contain</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span>
-    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish in the users'
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
     phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app</em></ins></span> is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>mandatory at 
some workplaces.&lt;/p&gt;
+    app is mandatory at some workplaces.&lt;/p&gt;
 
-    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
     Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>a text editor) includes a clarification
-    saying that the tests were only performed</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>Android version</em></ins></span>
-    of <span class="removed"><del><strong>Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the app, and that, according</em></ins></span> to 
<span class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be 
conducted</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection</strong></del></span>
-    <span class="inserted"><ins><em>Apple's operating system.&rdquo;&lt;/p&gt;
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance</em></ins></span> could <span 
class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909091"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>Facebook app</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users</em></ins></span> even when <span 
class="removed"><del><strong>the &ldquo;owner&rdquo; 
switches</strong></del></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>turned off&lt;/a&gt;, 
after tricking them
-    into giving the app broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>use 
one of its
-    functionalities.&lt;/p&gt;</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Facebook app &lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when it is turned off&lt;/a&gt;, after tricking them
+    into giving the app broad permissions in order to use one of its
+    functionalities.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
+  &lt;li id="M201909090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span 
class="inserted"><ins><em>Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details of users' lives to 
Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909060"&gt;
+  &lt;li id="M201909060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
     program is a form of surveillance.  There is a
     proprietary program for adjusting a certain telescopic rifle sight. &lt;a
     
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the
-      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>list of all the 10,000 or more people
+    A US prosecutor has demanded the list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With a free program there would not be a list of who has installed
@@ -1812,115 +1944,86 @@
   &lt;li id="M201907081"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
     bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
-    of the operating system, in order to gather as much private data 
as</em></ins></span>
-    they <span class="removed"><del><strong>report even which 
page</strong></del></span> <span class="inserted"><ins><em>possibly 
can.&lt;/p&gt;
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software we run.&lt;/p&gt;</em></ins></span>
+    having control over the software we run.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
+  &lt;li id="M201907080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>allow them 
access</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span 
class="removed"><del><strong>Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>Android,
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
     &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+    programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf 
has</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+  &lt;li id="M201905060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>built-in cell</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary</em></ins></span> phone <span 
class="removed"><del><strong>modem which allows
-  effectively
-  anyone</strong></del></span> <span class="inserted"><ins><em>app&lt;/a&gt; 
to be allowed into
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
     the event.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware that can snoop on a lot of
-    sensitive data, including user's location and contact list, and 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    &lt;p&gt;This app is a spyware</em></ins></span> that <span 
class="inserted"><ins><em>can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often &lt;a
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to <span class="removed"><del><strong>do 
because</strong></del></span> <span class="inserted"><ins><em>employers and 
insurance companies&lt;/a&gt;. Even though</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily be
-    traced back to</em></ins></span> the <span 
class="removed"><del><strong>modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though 
the</em></ins></span>
+    data <span class="removed"><del><strong>anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="inserted"><ins><em>can 
easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
 
     &lt;p&gt;This has harmful implications for women's rights to equal 
employment
     and freedom to make their own pregnancy choices. Don't use
-    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>it asked for
-    authentication,</strong></del></span> <span 
class="inserted"><ins><em>someone offers</em></ins></span> you <span 
class="removed"><del><strong>couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>a reward to do so. A
-    free-software app</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>does more or less</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>same thing without
-    spying on you</em></ins></span> is
-    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
     
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
-    a new</em></ins></span> one <span class="removed"><del><strong>connects 
to</strong></del></span> <span class="inserted"><ins><em>is being 
developed&lt;/a&gt;.&lt;/p&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>movements of Android phones and iPhones
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>data 
for years&lt;/a&gt;.&lt;/p&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in</em></ins></span> the phone <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>has</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
-    the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>location data to 
Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
@@ -1929,26 +2032,18 @@
     &lt;p&gt;Many Android phones come with a huge number of &lt;a
     
href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>data, or pass</em></ins></span> it <span 
class="removed"><del><strong>is possible</strong></del></span> <span 
class="inserted"><ins><em>on to user-installed apps that have 
access</em></ins></span> to <span class="removed"><del><strong>physically 
remove</strong></del></span>
-    the <span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Proprietary software</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to the data. This 
results</em></ins></span> in <span class="removed"><del><strong>cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>massive
-    surveillance on</em></ins></span> which <span 
class="inserted"><ins><em>the user has absolutely no control.&lt;/p&gt;
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the data, or pass it</em></ins></span> on <span 
class="inserted"><ins><em>to user-installed apps that have access to
+    the network but no direct access to the data. This results in massive
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903211"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The MoviePass dis-service &lt;a
-    
href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/"&gt;</em></ins></span>
-    is <span class="removed"><del><strong>made available</strong></del></span> 
<span class="inserted"><ins><em>planning</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>use face recognition to track people's eyes&lt;/a&gt;
+    
href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/"&gt;
+    is planning to use face recognition to track people's eyes&lt;/a&gt;
     to make sure they won't put their phones down or look away during
     ads&mdash;and trackers.&lt;/p&gt;
   &lt;/li&gt;
@@ -1956,50 +2051,50 @@
   &lt;li id="M201903201"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
     
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
     send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against 
people</em></ins></span> in <span class="removed"><del><strong>this 
article,</strong></del></span> <span class="inserted"><ins><em>poor
+    for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
     lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo;</em></ins></span> is not
-      <span class="removed"><del><strong>really</strong></del></span> <span 
class="inserted"><ins><em>sufficient to legitimize snooping.&lt;/p&gt;
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="removed"><del><strong>matter of</strong></del></span> <span 
class="inserted"><ins><em>convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
-      intolerable invasion of privacy,</strong></del></span>
-    <span class="inserted"><ins><em>library for building mobile apps, which 
also &lt;a
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
     sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
     way and released them, apparently not realizing that all the personal
     data they collected would go to Facebook as well.&lt;/p&gt;
 
     &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
+    developers of</em></ins></span> other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
+    &lt;p&gt;The AppCensus database gives information</em></ins></span> on 
<span class="inserted"><ins><em>&lt;a
     href="https://www.appcensus.io/"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>user's local 
network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/"&gt;
     18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
+    Google's policies. But</em></ins></span> it <span 
class="removed"><del><strong>had installed</strong></del></span> <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
     and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
+    that the policies of</em></ins></span> a <span 
class="removed"><del><strong>patch</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
@@ -2015,8 +2110,8 @@
   &lt;li id="M201902041.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>stop 
this,</strong></del></span>
+    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
@@ -2024,8 +2119,8 @@
     the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users</em></ins></span> should <span class="inserted"><ins><em>of 
course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet,</em></ins></span> but <span class="removed"><del><strong>any 
product</strong></del></span> <span class="inserted"><ins><em>they should also 
stay away from nonfree apps in
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
@@ -2038,8 +2133,10 @@
     
href="https://www.top10vpn.com/research/free-vpn-investigations/risk-index/"&gt;
     25% fail to protect their users' privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also</em></ins></span> be <span 
class="removed"><del><strong>replaced</strong></del></span> <span 
class="inserted"><ins><em>used to spy on users. Other technical flaws were
+    source code&mdash;often used for invasive 
advertising&mdash;that</em></ins></span> could
+    <span class="inserted"><ins><em>potentially also be used 
to</em></ins></span> spy <span class="removed"><del><strong>this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
@@ -2054,12 +2151,11 @@
   &lt;li id="M201901050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will 
do</em></ins></span>
-    with <span class="removed"><del><strong>anonymous
-      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>the data.&lt;/p&gt;
+    being sued, demanding that it notify the users of what it 
will</em></ins></span> do <span 
class="removed"><del><strong>lots</strong></del></span>
+    <span class="inserted"><ins><em>with the data.&lt;/p&gt;
 
     &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
@@ -2074,7 +2170,7 @@
   &lt;li id="M201812290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="inserted"><ins><em>gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
     report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
@@ -2082,9 +2178,9 @@
     Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
     the user's activities in the app; others only say that the user is
-    using that app,</em></ins></span> but <span class="inserted"><ins><em>that 
alone is often quite informative.&lt;/p&gt;
+    using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>invasion isn't done</strong></del></span> 
<span class="inserted"><ins><em>user has a Facebook
+    &lt;p&gt;This</em></ins></span> spying <span 
class="removed"><del><strong>anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>occurs regardless of whether the user has a 
Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2105,7 +2201,7 @@
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked</em></ins></span> by <span 
class="removed"><del><strong>malware.</strong></del></span> <span 
class="inserted"><ins><em>the misleading control.&lt;/p&gt;
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
@@ -2133,8 +2229,7 @@
     and collect information about its users&lt;/a&gt;.  40% of the apps were
     found to insecurely snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.</em></ins></span>  The other
-      <span class="removed"><del><strong>cases mentioned</strong></del></span> 
<span class="inserted"><ins><em>apps might be snooping
+    source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
@@ -2177,12 +2272,13 @@
     &lt;p&gt;Spotify app &lt;a
     
href="https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm"&gt;harvests
     users' data to personally identify and know people&lt;/a&gt; through music,
-    their mood, mindset, activities, and tastes. There</em></ins></span> are 
<span class="inserted"><ins><em>over 150
+    their mood, mindset, activities, and tastes. There are over 150
     billion events logged daily on the program which contains users'
-    data and personal information.&lt;/p&gt;
+    data and personal information.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201711240"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Tracking software in popular Android apps
@@ -2194,9 +2290,9 @@
 
   &lt;li id="M201709020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
-    
href="https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/"&gt;Instagram
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/"&gt;Instagram
     is forcing users to give away their phone numbers&lt;/a&gt; and won't let
     people continue using the app if they refuse.&lt;/p&gt;
   &lt;/li&gt;
@@ -2232,7 +2328,7 @@
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have</em></ins></span> done <span 
class="inserted"><ins><em>a better job of preventing apps from
+    &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
@@ -2263,10 +2359,10 @@
   &lt;li id="M201705040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study found 234 Android apps that track users</em></ins></span> 
by <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by</em></ins></span> 
TV <span class="removed"><del><strong>snoops</strong></del></span>
+    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
@@ -2307,7 +2403,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in</em></ins></span> proprietary <span 
class="removed"><del><strong>malware</strong></del></span> <span 
class="inserted"><ins><em>search app that it will&lt;/a&gt; pre-install
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
     on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
@@ -2402,13 +2498,11 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you circulate the picture you take according to who 
is</em></ins></span>
-    in the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+    and suggests you circulate the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely</em></ins></span> to <span 
class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>be
+    known-faces database, which means the pictures are likely to be
     sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
@@ -2421,7 +2515,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="https://www.independent.co.uk/tech/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
+    snoop</em></ins></span> on what <span 
class="removed"><del><strong>programs</strong></del></span> people <span 
class="removed"><del><strong>watch,</strong></del></span> <span 
class="inserted"><ins><em>are listening to or watching&lt;/a&gt;. In addition,
     it may be analyzing people's conversations to serve them with targeted
     advertisements.&lt;/p&gt;
   &lt;/li&gt;
@@ -2431,8 +2525,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of</em></ins></span> data <span 
class="removed"><del><strong>remotely</strong></del></span> <span 
class="inserted"><ins><em>in the phone,</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>in server accounts,
+    spy on many sorts of data in the phone,</em></ins></span> and <span 
class="removed"><del><strong>even</strong></del></span> <span 
class="inserted"><ins><em>in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2450,7 +2543,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to</em></ins></span> the <span 
class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
+    unrelated to the app's functionality, was &lt;a
     
href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
     found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -2460,7 +2553,7 @@
 
     &lt;p&gt;The article takes for granted that the usual analytics tools are
     legitimate, but is that valid? Software developers have no right to
-    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
+    analyze</em></ins></span> what <span class="inserted"><ins><em>users are 
doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2469,7 +2562,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;hand 
over
-    personal, behavioral and</em></ins></span> location <span 
class="inserted"><ins><em>information&lt;/a&gt; of their users to
+    personal, behavioral and location information&lt;/a&gt; of their users to
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2484,18 +2577,23 @@
 
     &lt;p&gt;This article shows the &lt;a
     
href="https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
+    twisted ways that</em></ins></span> they <span 
class="removed"><del><strong>wanted</strong></del></span> <span 
class="inserted"><ins><em>present snooping as a way</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
     typical example of the attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201506264"&gt;
+&lt;!-- #SpywareAtPlay</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
     A study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis 
proprietary
     Android apps contained recognizable tracking libraries. For the paid
@@ -2537,7 +2635,7 @@
     &lt;p&gt;Many proprietary apps for mobile devices
     report which other apps the user has installed.  &lt;a
     href="https://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that</em></ins></span> at <span 
class="inserted"><ins><em>least is visible and optional&lt;/a&gt;. Not
+    is doing this in a way that</em></ins></span> at <span 
class="removed"><del><strong>Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>least is visible and optional&lt;/a&gt;. Not
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2570,27 +2668,26 @@
     approve sending personal data to the app developer but did not ask
     about sending it to other companies.  This shows the weakness of
     the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
-    surveillance: why should a flashlight app send</em></ins></span> any <span 
class="removed"><del><strong>time. (See</strong></del></span> <span 
class="inserted"><ins><em>information to
+    surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
+    
href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
     
https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -2610,10 +2707,13 @@
     
href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
+&lt;div <span class="removed"><del><strong>style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
   &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -2626,15 +2726,14 @@
     surveillance on the game of Minecraft by &lt;a
     
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
     every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought the game</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;).</strong></del></span> <span 
class="inserted"><ins><em>will merge all accounts into its network,
+    has bought the game and will merge all accounts into its network,
     which will give them access to people's data.&lt;/p&gt;
 
     &lt;p&gt;Minecraft players &lt;a
     href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
-    instead.</em></ins></span> The <span class="removed"><del><strong>company 
says</strong></del></span> <span class="inserted"><ins><em>essential advantage 
of Minetest is that</em></ins></span> it <span 
class="removed"><del><strong>doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>is free
-    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>user's computer freedom. As a bonus,</em></ins></span>
-    it <span class="inserted"><ins><em>offers more options.&lt;/p&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201908210"&gt;
@@ -2642,7 +2741,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
     
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
-    human workers listen</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="inserted"><ins><em>recordings&lt;/a&gt;.&lt;/p&gt;
+    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Morally, we see no difference between having human workers listen 
and
     having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
@@ -2654,14 +2753,14 @@
     &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers</em></ins></span> and <span 
class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>to third parties&lt;/a&gt;.&lt;/p&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>massive
+    program along with an update to the massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
     to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
@@ -2670,8 +2769,8 @@
   &lt;li id="M201711070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    &lt;p&gt;The driver for a certain gaming keyboard</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
     information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2679,19 +2778,22 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many &lt;a
-    
href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html"&gt;
+    
href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html"&gt;</em></ins></span>
     video game consoles snoop on their users and report to the
-    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
+      <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; 
even</strong></del></span>
+    <span 
class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even</em></ins></span> what 
their users weigh.&lt;/p&gt;
 
     &lt;p&gt;A game console is a computer, and you can't trust a computer with
     a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201509160"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
-    
href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    &lt;p&gt;Modern</em></ins></span> gratis game cr&hellip;apps &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;</em></ins></span>
     collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
@@ -2700,25 +2802,20 @@
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who</em></ins></span> can <span 
class="removed"><del><strong>store it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be led to spend a lot of money. They also
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
     use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
     &lt;p&gt;While the article describes gratis games, games that cost money
-    can use the same tactics.&lt;/p&gt;</em></ins></span>
+    can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Angry Birds &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Angry Birds &lt;a
     
href="https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies, and the NSA takes advantage</em></ins></span>
-    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>spy through it 
too&lt;/a&gt;.  Here's information</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    spies for companies, and the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
     
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -2729,29 +2826,27 @@
 
   &lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Blizzard Warden is a hidden
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
     spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+  &lt;/li&gt;</em></ins></span>
+&lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- 
#SpywareOnTheWeb</strong></del></span>
 
 
-&lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+
+<span class="inserted"><ins><em>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202101050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -2759,7 +2854,7 @@
     
href="https://foundation.mozilla.org/en/privacynotincluded/"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt; even if they meet
+    designed to snoop on users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design of the program running on some of these devices &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
@@ -2769,21 +2864,21 @@
 
   &lt;li id="M201708280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;The bad security in many Internet 
of Stings devices allows &lt;a
     
href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/"&gt;ISPs
     to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV</em></ins></span> 
Sets&lt;/h4&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -2792,22 +2887,14 @@
 don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202201290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;Smart&rdquo; TV producers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data"&gt;are
-    spying</em></ins></span> on <span class="inserted"><ins><em>people using 
various methods&lt;/a&gt;, and harvest</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows</strong></del></span>
-    <span class="inserted"><ins><em>data. They are collecting audio, video, 
and TV usage data to profile
+    &lt;p&gt;&ldquo;Smart&rdquo; TV producers &lt;a
+    
href="https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data"&gt;are
+    spying on people using various methods&lt;/a&gt;, and harvest their
+    data. They are collecting audio, video, and TV usage data to profile
     people.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2815,23 +2902,21 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;TV manufacturers are turning to produce only
-    &ldquo;Smart&rdquo; TV sets (which include spyware)</em></ins></span> that 
<span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &ldquo;Smart&rdquo; TV sets (which include spyware) that &lt;a
     href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's now very
-    hard</em></ins></span> to <span class="removed"><del><strong>get users' 
formal
-      consent before collecting</strong></del></span> <span 
class="inserted"><ins><em>find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
+    hard to find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It appears that those manufacturers business model is not to 
produce
-    TV and sell them for money, but to collect your</em></ins></span> personal 
data <span class="inserted"><ins><em>and
+    TV and sell them for money, but to collect your personal data and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers</em></ins></span> are <span 
class="removed"><del><strong>totally inadequate.
-      And</strong></del></span> <span class="inserted"><ins><em>able to &lt;a
+    &lt;p&gt;TV manufacturers are able to &lt;a
     
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of</em></ins></span> what <span 
class="removed"><del><strong>happens if a</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> user <span 
class="removed"><del><strong>declines consent?  Probably</strong></del></span> 
<span class="inserted"><ins><em>is watching&lt;/a&gt;. This is illegal due to
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
     the Video Privacy Protection Act of 1988, but they're circumventing
     it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
@@ -2841,25 +2926,21 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the TV
-      <span class="removed"><del><strong>will say, &ldquo;Without your 
consent</strong></del></span> <span 
class="inserted"><ins><em>sees,&rdquo;&lt;/a&gt; in the own words of the 
company's
-    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
+    CTO, and this data is sold to third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
     &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>TV</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
+    is that it is opt-in in newer models. But since the Vizio software is
     nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates</em></ins></span> will
-      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>leave the
+    and there is no guarantee that all future updates will leave the
     settings unchanged.&lt;/p&gt;
 
-    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for</em></ins></span> that <span 
class="removed"><del><strong>TVs are</strong></del></span>
-    <span class="inserted"><ins><em>matter), the easiest way to make sure it 
isn't spying on you is
+    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
+    matter), the easiest way to make sure it isn't spying on you is
     to disconnect it from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>allowed</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,
+    instead. Unfortunately, this is not always possible. Another option,
     if you are technically oriented, is to get your own router (which can
     be an old computer running completely free software), and set up a
     firewall to block connections to Vizio's servers. Or, as a last resort,
@@ -2875,7 +2956,7 @@
 
     &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering</em></ins></span> to <span 
class="inserted"><ins><em>Netflix. The Netflix app &lt;a
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2884,16 +2965,15 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
-    
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</em></ins></span>
-    report <span class="inserted"><ins><em>everything that is viewed on them, 
and not just broadcasts and
+    
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports</em></ins></span> what <span class="inserted"><ins><em>it 
is. The existence of a way to disable</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
+  &lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
@@ -2908,9 +2988,9 @@
   &lt;li id="M201511060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio</em></ins></span> goes a step further than other TV
-    manufacturers in spying on their users: their &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</em></ins></span>
+    &lt;p&gt;Vizio goes a step further than other TV
+    manufacturers in spying on their users: their &lt;a
+    
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
     link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
@@ -2919,44 +2999,33 @@
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
+  &lt;li id="M201511020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tivo's</em></ins></span> alliance with Viacom adds 2.3 million 
households
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
     to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a 
<span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate</em></ins></span> TV advertisement with online 
purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible sounds to be
-      picked up by proprietary malware running on other devices in
-      range so as to determine that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>default.&lt;/p&gt;</em></ins></span>
+    information with online social media participation, Tivo can now &lt;a
+    
href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
+  &lt;li id="M201507240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; TVs recognize and 
&lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html"&gt;track</em></ins></span>
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
+    
href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html"&gt;track
     what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
+  &lt;li id="M201505290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon cable</em></ins></span> TV &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even what they wanted to
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they wanted to
     record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2966,34 +3035,32 @@
     &lt;p&gt;Vizio &lt;a
     
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
+  &lt;li id="M201502090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The</em></ins></span> Samsung &ldquo;Smart&rdquo; TV &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits</em></ins></span> users' voice on the internet to another 
company, Nuance&lt;/a&gt;.
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
     Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
     &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
 
-    <span class="inserted"><ins><em>&lt;p&gt;In its privacy policy, Samsung 
explicitly confirms that &lt;a
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
     data containing sensitive information will be transmitted to third
-    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
+  &lt;li id="M201411090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3020,62 +3087,53 @@
   &lt;li id="M201405200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in</em></ins></span> LG &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;</em></ins></span>
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
     reports what the user watches, and the switch to turn this off has
-    no <span class="removed"><del><strong>effect.</strong></del></span> <span 
class="inserted"><ins><em>effect&lt;/a&gt;.</em></ins></span>  (The fact that 
the transmission reports a 404 error
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/"&gt;</em></ins></span>
-    snoops on other devices on the user's local <span 
class="removed"><del><strong>network.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>network&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even worse, it &lt;a
+    
href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/"&gt;</em></ins></span>
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
+  &lt;li id="M201212170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security</em></ins></span> on <span 
class="removed"><del><strong>what programs people watch,</strong></del></span> 
<span class="inserted"><ins><em>a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
-    and <span class="removed"><del><strong>even what they 
wanted</strong></del></span> <span class="inserted"><ins><em>use its 
camera</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtPlay 
--&gt;</strong></del></span>
 
-
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html"&gt;
-    send the</em></ins></span> video <span class="removed"><del><strong>game 
consoles snoop</strong></del></span> <span class="inserted"><ins><em>they 
capture to Amazon servers&lt;/a&gt;, which save it
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
     passes by, the user's front door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>their users and report</strong></del></span> <span 
class="inserted"><ins><em>how Ring used to let individual employees look
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
     at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
@@ -3091,8 +3149,7 @@
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the 
-      <span 
class="removed"><del><strong>internet&lt;/a&gt;&mdash;</strong></del></span> 
<span class="inserted"><ins><em>videos. That's not
+    manufacturers promise not to look at what's in the videos. That's not
     security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
@@ -3109,10 +3166,10 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="https://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,</em></ins></span>
-    even <span class="removed"><del><strong>what their users 
weigh.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>when the 
&ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;</em></ins></span>
+    href="https://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A <span class="removed"><del><strong>game 
console</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; device means the 
manufacturer</em></ins></span> is <span class="inserted"><ins><em>using it
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3127,7 +3184,7 @@
   &lt;li id="M201711244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>computer,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
@@ -3155,8 +3212,8 @@
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which users could have 
checked</em></ins></span>
-    and <span class="removed"><del><strong>you can't 
trust</strong></del></span> <span class="inserted"><ins><em>changed.&lt;/p&gt;
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;
 
     &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
@@ -3164,7 +3221,7 @@
     used it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data 
to</em></ins></span> a <span 
class="removed"><del><strong>computer</strong></del></span> <span 
class="inserted"><ins><em>data
+    true, but it doesn't really matter. If it had sold the data to a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
@@ -3177,11 +3234,11 @@
   &lt;li id="M201702280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="inserted"><ins><em>microphones &lt;a
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
     leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found</em></ins></span> a <span class="inserted"><ins><em>way to 
access the data&lt;/a&gt; collected by the
+    Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
@@ -3237,33 +3294,27 @@
   &lt;li id="M202009270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many employers are using</em></ins></span> nonfree <span 
class="removed"><del><strong>operating system.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>software, including videoconference 
software, to &lt;a
+    &lt;p&gt;Many employers are using nonfree
+    software, including videoconference software, to &lt;a
     
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
     surveil and monitor staff working at home&lt;/a&gt;. If the program reports
     whether you are &ldquo;active,&rdquo; that is in effect a malicious
-    surveillance feature.&lt;/p&gt;</em></ins></span>
+    surveillance feature.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202008030"&gt;
+  &lt;li id="M202008030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Nest</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
-    is taking over ADT&lt;/a&gt;. Google sent out</em></ins></span> a <span 
class="removed"><del><strong>wide range of data about</strong></del></span> 
<span class="inserted"><ins><em>software
-    update to its speaker devices using</em></ins></span> their <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>back door &lt;a
+    &lt;p&gt;Google Nest &lt;a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    is taking over ADT&lt;/a&gt;. Google sent out a software
+    update to its speaker devices using their back door &lt;a
     href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
-    listens for things like smoke alarms&lt;/a&gt;</em></ins></span> and <span 
class="inserted"><ins><em>then notifies your phone
+    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
     that an alarm is happening. This means the devices now listen for more
-    than just</em></ins></span> their <span 
class="removed"><del><strong>users' 
-      friends</strong></del></span> <span class="inserted"><ins><em>wake 
words. Google says the software update was sent
-    out prematurely</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>on accident and Google was planning on disclosing
-    this new feature and offering</em></ins></span> it <span 
class="inserted"><ins><em>to customers who pay for it.&lt;/p&gt;
+    than just their wake words. Google says the software update was sent
+    out prematurely and on accident and Google was planning on disclosing
+    this new feature and offering it to customers who pay for it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006300"&gt;
@@ -3287,8 +3338,8 @@
     &lt;p&gt;Internet-tethered Amazon Ring had
     a security vulnerability that enabled attackers to &lt;a
     
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
-    access the user's wifi password&lt;/a&gt;, and snoop on the 
household</em></ins></span>
-    through <span class="removed"><del><strong>ad 
networks</strong></del></span> <span class="inserted"><ins><em>connected 
surveillance devices.&lt;/p&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
 
     &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
     out any significant surveillance if the devices implemented proper
@@ -3311,7 +3362,7 @@
 
     &lt;p&gt;Rather than trying to better control the use of recordings, Google
     should not record or listen to the person's voice.  It should only
-    get commands</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> the <span 
class="inserted"><ins><em>user wants to send to some Google service.&lt;/p&gt;
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905061"&gt;
@@ -3322,20 +3373,17 @@
     recordings made without a legitimate prompt), and sends
     it to Amazon's servers, which store it indefinitely. Even
     worse, Amazon forwards it to third-party companies. Thus,
-    even if users request deletion of their</em></ins></span> data <span 
class="inserted"><ins><em>from Amazon's servers, &lt;a
+    even if users request deletion of their data from Amazon's servers, &lt;a
     
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
     the data remain on other servers&lt;/a&gt;, where they can be accessed by
     advertising companies and government agencies. In other words,
     deleting the collected information doesn't cancel the wrong of
     collecting it.&lt;/p&gt;
 
-    &lt;p&gt;Data</em></ins></span> collected by <span 
class="removed"><del><strong>various cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>devices such as the Nest thermostat, the Philips
-    Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span> 
and <span class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>the Sonos
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are</em></ins></span> made 
<span class="removed"><del><strong>by different 
-      companies.&lt;/p&gt;
-
-      &lt;p&gt;They use this</strong></del></span> <span 
class="inserted"><ins><em>available to
+    the devices are tethered to. Moreover, they are made available to
     Alexa. As a result, Amazon has a very precise picture of users' life
     at home, not only in the present, but in the past (and, who knows,
     in the future too?)&lt;/p&gt;
@@ -3353,11 +3401,11 @@
     
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
     location and other personal data&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Since the client program is nonfree, and</em></ins></span> data 
<span class="inserted"><ins><em>processing is done
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
     &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
     the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
-    tell you how and where it's done&rdquo;), users have no 
way</em></ins></span>
-    to <span class="removed"><del><strong>manipulate 
people</strong></del></span> <span class="inserted"><ins><em>know what 
happens</em></ins></span> to <span class="removed"><del><strong>buy 
things,</strong></del></span> <span class="inserted"><ins><em>the recordings 
unless human eavesdroppers &lt;a
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
     
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
     break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -3369,7 +3417,7 @@
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
     communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription,</em></ins></span> and <span 
class="removed"><del><strong>hunt</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+    paying for the subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
@@ -3383,7 +3431,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Crackers found a way to break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into a listening device&lt;/a&gt;</em></ins></span> for <span 
class="removed"><del><strong>&ldquo;whales&rdquo; who</strong></del></span> 
<span class="inserted"><ins><em>them.&lt;/p&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
     easier for Amazon. And if some government such as China or the US
@@ -3412,8 +3460,8 @@
     listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device that</em></ins></span> can <span class="inserted"><ins><em>obey 
your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could</em></ins></span> be <span 
class="removed"><del><strong>led</strong></del></span> <span 
class="inserted"><ins><em>saving up records
+    a device that can obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3430,7 +3478,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>spend</strong></del></span> <span 
class="inserted"><ins><em>spy on their renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -3462,8 +3510,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Internet-enabled watches with proprietary software
     are malware, violating people (specially children's)
-    privacy. In addition, they have</em></ins></span> a lot of <span 
class="removed"><del><strong>money.</strong></del></span> <span 
class="inserted"><ins><em>security flaws.</em></ins></span> They 
-      <span class="removed"><del><strong>also use</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    privacy. In addition, they have a lot of security flaws. They &lt;a
     
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
     permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
 
@@ -3481,7 +3528,7 @@
     
href="https://www.theregister.com/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is</em></ins></span> a back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>door, but that could be a
+    &lt;p&gt;The article says this is a back door, but that could be a
     misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3489,8 +3536,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
-    
href="https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>manipulate</strong></del></span> 
<span class="inserted"><ins><em>report its location to someone else and to 
transmit conversations
+    
href="https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else and to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3507,10 +3554,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390"&gt;Ford
-    is planning to force ads on drivers in cars&lt;/a&gt;, 
with</em></ins></span> the <span class="removed"><del><strong>game 
play</strong></del></span> <span 
class="inserted"><ins><em>ability</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
-
-      &lt;p&gt;While</strong></del></span>
-    the <span class="removed"><del><strong>article describes gratis games, 
games</strong></del></span> <span class="inserted"><ins><em>owner to pay extra 
to turn them off. The system probably imposes
+    is planning to force ads on drivers in cars&lt;/a&gt;, with the ability for
+    the owner to pay extra to turn them off. The system probably imposes
     surveillance on drivers too.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3556,7 +3601,7 @@
     near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
     connected to the cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
-    key is removed, and users report</em></ins></span> that <span 
class="removed"><del><strong>cost money</strong></del></span> <span 
class="inserted"><ins><em>they can't disable it.&lt;/p&gt;
+    key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
@@ -3588,11 +3633,11 @@
     sneaking it into the contract that users sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars</em></ins></span> can <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>also collect lots of other data: listening to you,
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following your movements, tracking passengers' cell
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
-    &lt;p&gt;But if you really want to be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>same 
tactics.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>car's
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
     hardware cannot collect any of that data, or that the software
     is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
@@ -3658,14 +3703,12 @@
     is not really a matter of proprietary surveillance. These systems
     are an intolerable invasion of privacy, and should be replaced with
     anonymous payment systems, but the invasion isn't done by malware. The
-    other cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;</em></ins></span>
+    other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- 
#SpywareOnTheWeb</strong></del></span>
-
 
-<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
+&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInVR"&gt;Virtual Reality&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -3673,8 +3716,8 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Oculus headsets &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
     users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
     free rein to pervasively snoop on Oculus users.&lt;/p&gt;
@@ -3864,13 +3907,13 @@
     <span 
class="removed"><del><strong>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
     snooping</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop</em></ins></span> on <span class="inserted"><ins><em>information 
that users have typed into a
+    to snoop on information that users have typed into a
     form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
     
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
     getting sued&lt;/a&gt; for this.&lt;/p&gt;
 
-    &lt;p&gt;The chat facilities of some customer services 
use</em></ins></span> the <span class="removed"><del><strong>user's 
browsing&lt;/a&gt;, and many</strong></del></span> <span 
class="inserted"><ins><em>same sort</em></ins></span> of <span 
class="removed"><del><strong>them do so.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>malware to &lt;a
+    &lt;p&gt;The chat facilities of some customer services use the same sort of
+    malware to &lt;a
     
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
     read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -3880,7 +3923,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site to give other companies personal data on
+    JavaScript</em></ins></span> on <span class="inserted"><ins><em>its web 
site to give other companies personal data on
     its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3896,7 +3939,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some websites send
-    JavaScript code to collect all the user's input, &lt;a
+    JavaScript code to collect all</em></ins></span> the user's <span 
class="removed"><del><strong>browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
     can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
@@ -3947,14 +3990,14 @@
     &lt;p&gt;Google's proprietary Chrome web browser &lt;a
     
href="https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"&gt;
     added a surveillance API (idle detection API)&lt;/a&gt; which lets
-    websites ask Chrome to report when a user with a web page 
open</em></ins></span> is <span class="removed"><del><strong>also 
used</strong></del></span>
-    <span class="inserted"><ins><em>idle.&lt;/p&gt;
+    websites ask Chrome to report when a user with a web page open is
+    idle.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201906220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome is an &lt;a
+    &lt;p&gt;Google Chrome</em></ins></span> is <span 
class="removed"><del><strong>also used</strong></del></span> <span 
class="inserted"><ins><em>an &lt;a
     
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
     instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
     users' computers and report the sites they visit to advertising and
@@ -4303,7 +4346,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/06/04 15:02:51 $
+$Date: 2022/06/04 15:32:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.424
retrieving revision 1.425
diff -u -b -r1.424 -r1.425
--- proprietary-surveillance.ja.po      4 Jun 2022 15:02:52 -0000       1.424
+++ proprietary-surveillance.ja.po      4 Jun 2022 15:32:21 -0000       1.425
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -214,6 +214,12 @@
 msgstr "<a href=\"#SpywareInApplications\">アプリのスパイウェア</a>"
 
 #. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a 
href=\"#SpywareInMobileApps\">モバイル・アプリのスパイウェア</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr ""
 
@@ -1788,6 +1794,24 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
 "\">#SpywareInApplications</a>)</span>"
 
+#. type: Content of: <div><div><div><h4>
+#, fuzzy
+#| msgid "Spyware in Mobile Applications"
+msgid "All Apps"
+msgstr "モバイル・アプリのスパイウェア"
+
+#. type: Content of: <div><div><div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A worldwide investigation found that most of the applications that school "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.363
retrieving revision 1.364
diff -u -b -r1.363 -r1.364
--- proprietary-surveillance.pot        4 Jun 2022 15:02:52 -0000       1.363
+++ proprietary-surveillance.pot        4 Jun 2022 15:32:21 -0000       1.364
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -166,6 +166,10 @@
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr ""
 
@@ -1234,6 +1238,16 @@
 "href=\"#SpywareInApplications\">#SpywareInApplications</a>)</span>"
 msgstr ""
 
+#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a "
+"href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A worldwide investigation found that most of the applications that school "

Index: proprietary-surveillance.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-surveillance.pt-br-diff.html    4 Jun 2022 15:02:52 -0000       
1.16
+++ proprietary-surveillance.pt-br-diff.html    4 Jun 2022 15:32:21 -0000       
1.17
@@ -122,7 +122,8 @@
      &lt;/ul&gt;
     &lt;h4&gt;&lt;a href="#SpywareInApplications"&gt;Spyware in 
Applications&lt;/a&gt;&lt;/h4&gt;
     &lt;ul&gt;
-      &lt;li&gt;&lt;a href="#SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#SpywareInAllApps"&gt;All 
Apps&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a</em></ins></span> 
href="#SpywareInDesktopApps"&gt;Desktop Apps&lt;/a&gt;&lt;/li&gt;
       &lt;li&gt;&lt;a href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;
       &lt;li&gt;&lt;a href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;
       &lt;li&gt;&lt;a href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;
@@ -1142,7 +1143,12 @@
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 <span class="inserted"><ins><em>id="SpywareInAllApps"&gt;All 
Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAllApps"&gt;#SpywareInAllApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202205240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1156,10 +1162,10 @@
     still being used in the classrooms even after some of the schools
     reopened.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
+  &lt;h4</em></ins></span> id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -3772,7 +3778,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/06/04 15:02:52 $
+$Date: 2022/06/04 15:32:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-surveillance.pt-br.po   4 Jun 2022 15:02:52 -0000       1.37
+++ proprietary-surveillance.pt-br.po   4 Jun 2022 15:32:21 -0000       1.38
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -197,6 +197,12 @@
 "aplicativos</a>"
 
 #. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Aplicativos móveis</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr "<a href=\"#SpywareInDesktopApps\">Aplicativos de desktop</a>"
 
@@ -1974,6 +1980,24 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
 "\">#SpywareInApplications</a>)</span>"
 
+#. type: Content of: <div><div><div><h4>
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Aplicativos móveis"
+
+#. type: Content of: <div><div><div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A worldwide investigation found that most of the applications that school "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.781
retrieving revision 1.782
diff -u -b -r1.781 -r1.782
--- proprietary-surveillance.ru.po      4 Jun 2022 15:02:52 -0000       1.781
+++ proprietary-surveillance.ru.po      4 Jun 2022 15:32:21 -0000       1.782
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -194,6 +194,14 @@
 msgstr "<a href=\"#SpywareInApplications\">Прикладные 
программы</a>"
 
 #. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Мобильные 
приложения</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr "<a href=\"#SpywareInDesktopApps\">Программы 
настольных компьютеров</a>"
 
@@ -1767,6 +1775,28 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
 "\">#SpywareInApplications</a>)</span>"
 
+#. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Мобильные приложения"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "A worldwide investigation found that most of the applications that school "

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.483
retrieving revision 1.484
diff -u -b -r1.483 -r1.484
--- pt-br.po    4 Jun 2022 15:02:53 -0000       1.483
+++ pt-br.po    4 Jun 2022 15:32:22 -0000       1.484
@@ -12359,6 +12359,12 @@
 "aplicativos</a>"
 
 #. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Aplicativos móveis</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr "<a href=\"#SpywareInDesktopApps\">Aplicativos de desktop</a>"
 
@@ -12722,6 +12728,24 @@
 "\">#SpywareInApplications</a>)</span>"
 
 #. type: Content of: <div><div><div><h4>
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Aplicativos móveis"
+
+#. type: Content of: <div><div><div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr "Aplicativos de desktop"
 

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.829
retrieving revision 1.830
diff -u -b -r1.829 -r1.830
--- ru.po       4 Jun 2022 15:02:53 -0000       1.829
+++ ru.po       4 Jun 2022 15:32:22 -0000       1.830
@@ -11482,6 +11482,14 @@
 msgstr "<a href=\"#SpywareInApplications\">Прикладные 
программы</a>"
 
 #. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Мобильные 
приложения</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr "<a href=\"#SpywareInDesktopApps\">Программы 
настольных компьютеров</a>"
 
@@ -11832,6 +11840,28 @@
 "\">#SpywareInApplications</a>)</span>"
 
 #. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Мобильные приложения"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr "Программы настольных компьютеров"
 

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.290
retrieving revision 1.291
diff -u -b -r1.290 -r1.291
--- tr.po       4 Jun 2022 15:02:53 -0000       1.290
+++ tr.po       4 Jun 2022 15:32:22 -0000       1.291
@@ -9152,6 +9152,12 @@
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"/proprietary/malware-mobiles.html\">Mobil aygıtlar</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr ""
 
@@ -9448,6 +9454,16 @@
 msgstr ""
 
 #. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr ""
 

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- zh-cn.po    4 Jun 2022 15:02:54 -0000       1.294
+++ zh-cn.po    4 Jun 2022 15:32:23 -0000       1.295
@@ -8770,6 +8770,12 @@
 msgstr ""
 
 #. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"/proprietary/malware-mobiles.html\">手机</a>"
+
+#. type: Content of: <div><div><div><ul><li>
 msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
 msgstr ""
 
@@ -9066,6 +9072,16 @@
 msgstr ""
 
 #. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr ""
 

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- zh-tw.po    4 Jun 2022 15:02:54 -0000       1.396
+++ zh-tw.po    4 Jun 2022 15:32:23 -0000       1.397
@@ -8028,6 +8028,16 @@
 
 #. type: Content of: <div><div><div><ul><li>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
+# | devices</a>-] {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
+#| "a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a 
href=\"/proprietary/malware-mobiles.html\">行動裝置的惡意軟體</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
 #, fuzzy
 #| msgid ""
@@ -8348,6 +8358,16 @@
 msgstr ""
 
 #. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
 msgid "Desktop Apps"
 msgstr ""
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]