www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-cars.pt-br.html malware...


From: GNUN
Subject: www/proprietary malware-cars.pt-br.html malware...
Date: Sun, 12 Jun 2022 12:30:14 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     22/06/12 12:30:13

Modified files:
        proprietary    : malware-cars.pt-br.html 
                         malware-games.pt-br.html 
                         malware-in-online-conferencing.pt-br.html 
                         malware-webpages.pt-br.html 
                         malware-webpages.uk.html 
                         potential-malware.pt-br.html 
                         proprietary-addictions.pt-br.html 
                         proprietary-back-doors.pt-br.html 
                         proprietary-censorship.pt-br.html 
                         proprietary-coverups.pt-br.html 
                         proprietary-fraud.pt-br.html 
                         proprietary-obsolescence.pt-br.html 
                         proprietary-sabotage.pt-br.html 
                         proprietary-tyrants.pt-br.html 
        proprietary/po : proprietary-back-doors.pt-br-diff.html 
                         proprietary-censorship.pt-br-diff.html 
Added files:
        proprietary/po : malware-cars.pt-br-diff.html 
                         malware-games.pt-br-diff.html 
                         malware-in-online-conferencing.pt-br-diff.html 
                         malware-webpages.pt-br-diff.html 
                         malware-webpages.uk-diff.html 
                         potential-malware.pt-br-diff.html 
                         proprietary-addictions.pt-br-diff.html 
                         proprietary-coverups.pt-br-diff.html 
                         proprietary-fraud.pt-br-diff.html 
                         proprietary-obsolescence.pt-br-diff.html 
                         proprietary-sabotage.pt-br-diff.html 
                         proprietary-tyrants.pt-br-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.pt-br.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.pt-br.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-in-online-conferencing.pt-br.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.pt-br.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.uk.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.pt-br.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.pt-br.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.pt-br.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.pt-br.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.pt-br.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-fraud.pt-br.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-obsolescence.pt-br.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.pt-br.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.pt-br.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pt-br-diff.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.pt-br-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.uk-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.pt-br-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-cars.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.pt-br.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- malware-cars.pt-br.html     26 Jun 2021 14:59:55 -0000      1.1
+++ malware-cars.pt-br.html     12 Jun 2022 16:30:12 -0000      1.2
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-cars.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-cars.pt-br.po">
+ https://www.gnu.org/proprietary/po/malware-cars.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-cars.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-cars.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-cars.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -527,7 +533,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/06/26 14:59:55 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: malware-games.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.pt-br.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-games.pt-br.html    28 Dec 2021 07:40:26 -0000      1.2
+++ malware-games.pt-br.html    12 Jun 2022 16:30:12 -0000      1.3
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-games.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-games.pt-br.po">
+ https://www.gnu.org/proprietary/po/malware-games.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-games.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-games.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-games.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -596,7 +602,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/12/28 07:40:26 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: malware-in-online-conferencing.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/malware-in-online-conferencing.pt-br.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-in-online-conferencing.pt-br.html   28 Dec 2021 07:40:26 -0000      
1.2
+++ malware-in-online-conferencing.pt-br.html   12 Jun 2022 16:30:12 -0000      
1.3
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/malware-in-online-conferencing.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-in-online-conferencing.pt-br.po">
+ 
https://www.gnu.org/proprietary/po/malware-in-online-conferencing.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/malware-in-online-conferencing.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-in-online-conferencing.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-in-online-conferencing.en.html" 
-->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -35,6 +40,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -253,7 +259,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/12/28 07:40:26 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: malware-webpages.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.pt-br.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-webpages.pt-br.html 25 Jul 2021 14:31:52 -0000      1.2
+++ malware-webpages.pt-br.html 12 Jun 2022 16:30:12 -0000      1.3
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-webpages.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-webpages.pt-br.po">
+ https://www.gnu.org/proprietary/po/malware-webpages.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-webpages.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-webpages.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-webpages.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -386,7 +392,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/07/25 14:31:52 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: malware-webpages.uk.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.uk.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- malware-webpages.uk.html    10 Apr 2022 11:34:49 -0000      1.1
+++ malware-webpages.uk.html    12 Jun 2022 16:30:12 -0000      1.2
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-webpages.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-webpages.uk.po">
+ https://www.gnu.org/proprietary/po/malware-webpages.uk.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-webpages.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-webpages.uk-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-webpages.en.html" -->
 
 <!--#include virtual="/server/header.uk.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -35,6 +40,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.uk.html" -->
 <!--#include virtual="/server/top-addendum.uk.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -382,7 +388,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2022/04/10 11:34:49 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: potential-malware.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.pt-br.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- potential-malware.pt-br.html        25 Jul 2021 14:31:52 -0000      1.2
+++ potential-malware.pt-br.html        12 Jun 2022 16:30:12 -0000      1.3
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/potential-malware.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/potential-malware.pt-br.po">
+ https://www.gnu.org/proprietary/po/potential-malware.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/potential-malware.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/potential-malware.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/potential-malware.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -249,7 +255,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/07/25 14:31:52 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-addictions.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.pt-br.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-addictions.pt-br.html   28 Dec 2021 07:40:26 -0000      1.2
+++ proprietary-addictions.pt-br.html   12 Jun 2022 16:30:12 -0000      1.3
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-addictions.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-addictions.pt-br.po">
+ https://www.gnu.org/proprietary/po/proprietary-addictions.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-addictions.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-addictions.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-addictions.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -448,7 +454,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/12/28 07:40:26 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.pt-br.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-back-doors.pt-br.html   28 Dec 2021 07:40:26 -0000      1.8
+++ proprietary-back-doors.pt-br.html   12 Jun 2022 16:30:12 -0000      1.9
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-back-doors.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-back-doors.pt-br.po">
+ https://www.gnu.org/proprietary/po/proprietary-back-doors.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-back-doors.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-back-doors.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-back-doors.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -1210,7 +1216,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/12/28 07:40:26 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.pt-br.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary-censorship.pt-br.html   28 Dec 2021 07:40:26 -0000      1.4
+++ proprietary-censorship.pt-br.html   12 Jun 2022 16:30:12 -0000      1.5
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-censorship.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-censorship.pt-br.po">
+ https://www.gnu.org/proprietary/po/proprietary-censorship.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-censorship.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-censorship.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-censorship.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -271,7 +277,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/12/28 07:40:26 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-coverups.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.pt-br.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary-coverups.pt-br.html     26 Jun 2021 14:00:00 -0000      1.1
+++ proprietary-coverups.pt-br.html     12 Jun 2022 16:30:12 -0000      1.2
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-coverups.en.html" 
-->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-coverups.pt-br.po">
+ https://www.gnu.org/proprietary/po/proprietary-coverups.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary-coverups.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-coverups.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-coverups.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -160,7 +166,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/06/26 14:00:00 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-fraud.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-fraud.pt-br.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-fraud.pt-br.html        28 Dec 2021 07:40:27 -0000      1.3
+++ proprietary-fraud.pt-br.html        12 Jun 2022 16:30:12 -0000      1.4
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-fraud.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-fraud.pt-br.po">
+ https://www.gnu.org/proprietary/po/proprietary-fraud.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary-fraud.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-fraud.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-fraud.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -212,7 +218,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/12/28 07:40:27 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-obsolescence.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-obsolescence.pt-br.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary-obsolescence.pt-br.html 26 Jun 2021 14:00:00 -0000      1.1
+++ proprietary-obsolescence.pt-br.html 12 Jun 2022 16:30:12 -0000      1.2
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-obsolescence.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-obsolescence.pt-br.po">
+ https://www.gnu.org/proprietary/po/proprietary-obsolescence.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-obsolescence.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-obsolescence.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-obsolescence.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -270,7 +276,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/06/26 14:00:00 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-sabotage.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.pt-br.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-sabotage.pt-br.html     28 Dec 2021 07:40:29 -0000      1.2
+++ proprietary-sabotage.pt-br.html     12 Jun 2022 16:30:12 -0000      1.3
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-sabotage.en.html" 
-->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-sabotage.pt-br.po">
+ https://www.gnu.org/proprietary/po/proprietary-sabotage.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary-sabotage.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-sabotage.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-sabotage.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -1081,7 +1087,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/12/28 07:40:29 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-tyrants.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.pt-br.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary-tyrants.pt-br.html      26 Jun 2021 14:00:00 -0000      1.13
+++ proprietary-tyrants.pt-br.html      12 Jun 2022 16:30:12 -0000      1.14
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-tyrants.en.html" 
-->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-tyrants.pt-br.po">
+ https://www.gnu.org/proprietary/po/proprietary-tyrants.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary-tyrants.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-tyrants.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2022-04-13" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-tyrants.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -257,7 +263,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/06/26 14:00:00 $
+$Date: 2022/06/12 16:30:12 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-back-doors.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pt-br-diff.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary-back-doors.pt-br-diff.html   19 Dec 2021 09:08:32 -0000      
1.3
+++ po/proprietary-back-doors.pt-br-diff.html   12 Jun 2022 16:30:13 -0000      
1.4
@@ -109,7 +109,8 @@
     &lt;p id="InternetCameraBackDoor"&gt;Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
     accounts with hard-coded passwords, which can't be changed, and &lt;a
-    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;
+    <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;</em></ins></span>
     there is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Since these accounts with hard-coded passwords are impossible
@@ -144,13 +145,15 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;</em></ins></span>
     remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
-    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2014/09/22/apple-data/"&gt;</em></ins></span>
     not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -159,7 +162,7 @@
 &lt;h3 id='alter-data'&gt;Altering user's data or settings&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li <span class="inserted"><ins><em>id="M202109220"&gt;
+  &lt;li id="M202109220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some Xiaomi phones &lt;a
@@ -173,7 +176,7 @@
     that can communicate with the company that made it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li</em></ins></span> id="M201905060"&gt;
+  &lt;li id="M201905060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;BlizzCon 2019 imposed a &lt;a
@@ -191,7 +194,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Android has a &lt;a
-    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
+    <span 
class="removed"><del><strong>href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;</em></ins></span>
     back door for remotely changing &ldquo;user&rdquo; 
settings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article suggests it might be a universal back door, but this
@@ -211,7 +215,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;</em></ins></span>
     spy on many sorts of data in the phone, and in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -220,11 +225,12 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+    <span 
class="removed"><del><strong>href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html"&gt;</em></ins></span>
     Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
     dlink of an eye.&lt;/p&gt;
 
-    &lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt; The 
TP-Link
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://sekurak.pl/tp-link-httptftp-backdoor/"&gt;</em></ins></span>
 The TP-Link
     router has a back door&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models of
@@ -235,7 +241,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google has long had &lt;a
-    
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a</em></ins></span>
     back door to remotely unlock an Android device&lt;/a&gt;, unless its disk
     is encrypted (possible since Android 5.0 Lollipop, but still not
     quite the default).&lt;/p&gt;
@@ -245,7 +252,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Caterpillar vehicles come with &lt;a
-    
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;
+    <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20201108113943/https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;</em></ins></span>
     a back door to shutoff the engine&lt;/a&gt; remotely.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -253,7 +261,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;</em></ins></span>
     collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
@@ -284,14 +293,16 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="swindle-eraser"&gt;The Amazon
     Kindle-Swindle has a back door that has been used to &lt;a
-    
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+    <span 
class="removed"><del><strong>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20220319193415/https://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;</em></ins></span>
     remotely erase books&lt;/a&gt;.  One of the books erased was
     &lt;cite&gt;1984&lt;/cite&gt;, by George Orwell.&lt;/p&gt;
 
     &lt;p&gt;Amazon responded to criticism by saying it
     would delete books only following orders from the
     state.  However, that policy didn't last.  In 2012 it &lt;a
-    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
+    <span 
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;</em></ins></span>
     wiped a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then
     offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
@@ -304,7 +315,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The iPhone has a back door for &lt;a
-    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+    <span 
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;</em></ins></span>
     remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
     enabling it without understanding.&lt;/p&gt;
   &lt;/li&gt;
@@ -314,7 +326,7 @@
 &lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li <span class="inserted"><ins><em>id="M202110130"&gt;
+  &lt;li id="M202110130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Adobe &lt;a
@@ -330,7 +342,7 @@
     of errors related to DMCA&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li</em></ins></span> id="M202108240"&gt;
+  &lt;li id="M202108240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Recent Samsung TVs have a back door with which Samsung can &lt;a
@@ -511,7 +523,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The iPhone has a back door &lt;a
-    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+    <span 
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</em></ins></span>
     that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
     &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
     this power because of course we can trust Apple.&lt;/p&gt;
@@ -522,7 +535,7 @@
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li <span class="inserted"><ins><em>id="M202111201"&gt;
+  &lt;li id="M202111201"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;NordicTrack, a company that sells
@@ -533,7 +546,7 @@
     probably involved a universal back door.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li</em></ins></span> id="M202106220"&gt;
+  &lt;li id="M202106220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Peloton company which produces treadmills recently &lt;a
@@ -620,7 +633,7 @@
   &lt;li id="M202004130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The &lt;a 
href="https://www.google.com/mobile/android/market-tos.html"&gt;
+    &lt;p&gt;The &lt;a <span 
class="removed"><del><strong>href="https://www.google.com/mobile/android/market-tos.html"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://play.google.com/about/play-terms/"&gt;</em></ins></span>
     Google Play Terms of Service&lt;/a&gt; insist that the user of Android 
accept
     the presence of universal back doors in apps released by Google.&lt;/p&gt;
 
@@ -675,7 +688,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;ChromeBooks are programmed for obsolescence:
     ChromeOS has a universal back door that is used for updates and &lt;a
-    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
+    <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;</em></ins></span>
     ceases to operate at a predefined date&lt;/a&gt;. From then on, there
     appears to be no support whatsoever for the computer.&lt;/p&gt;
 
@@ -687,7 +701,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
-    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    <span 
class="removed"><del><strong>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;</em></ins></span>
     near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
     connected to the cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
@@ -714,7 +729,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    <span 
class="removed"><del><strong>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;</em></ins></span>
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;
@@ -749,7 +765,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs &lt;a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
+    <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;</em></ins></span>
     have a universal back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -771,7 +788,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p id="windows-update"&gt;Microsoft
     Windows has a universal back door through which &lt;a
-    
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
+    <span 
class="removed"><del><strong>href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.informationweek.com/government/microsoft-updates-windows-without-user-permission-apologizes"&gt;</em></ins></span>
     any change whatsoever can be imposed on the users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This was &lt;a
@@ -783,7 +801,8 @@
 
     &lt;p&gt;In Windows 10, the universal back door
     is no longer hidden; all &ldquo;upgrades&rdquo; will be &lt;a
-    
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;</em></ins></span>
     forcibly and immediately imposed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -803,7 +822,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;</em></ins></span>
     A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
     all models of mobile phones have a &lt;a 
href="#universal-back-door-phone-modem"&gt;
     universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
@@ -833,8 +853,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In addition to its &lt;a href="#swindle-eraser"&gt;book
     eraser&lt;/a&gt;, the Kindle-Swindle has a &lt;a
-    <span 
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;</em></ins></span>
+    
href="https://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
     universal back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -858,7 +877,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Intel's intentional &ldquo;management engine&rdquo; back door has 
&lt;a
-    
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/"&gt;
+    <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2017/11/20/intel_flags_firmware_flaws/"&gt;</em></ins></span>
     unintended back doors&lt;/a&gt; too.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -866,10 +886,12 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A Capcom's Street Fighter V update &lt;a
-    
href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;
+    <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2016/09/23/capcom_street_fighter_v/"&gt;</em></ins></span>
     installed a driver that could be used as a back door by
     any application installed on a Windows computer&lt;/a&gt;, but was &lt;a
-    
href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack"&gt;
+    <span 
class="removed"><del><strong>href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/street-fighter-v-removes-new-anti-crack"&gt;</em></ins></span>
     immediately rolled back&lt;/a&gt; in response to public outcry.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -878,7 +900,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Dell computers, shipped with
     Windows, had a bogus root certificate that &lt;a
-    
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;
+    <span 
class="removed"><del><strong>href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;</em></ins></span>
     allowed anyone (not just Dell) to remotely authorize any software to
     run&lt;/a&gt; on the computer.&lt;/p&gt;
   &lt;/li&gt;
@@ -914,7 +937,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Here is a big problem whose details are still secret: &lt;a
-    href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/"&gt;
+    <span 
class="removed"><del><strong>href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://mashable.com/archive/fbi-microsoft-bitlocker-backdoor"&gt;</em></ins></span>
     The FBI asks lots of companies to put back doors in proprietary
     programs&lt;/a&gt;. We don't know of specific cases where this was done,
     but every proprietary program for encryption is a possibility.&lt;/p&gt;
@@ -924,7 +948,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The German government &lt;a
-    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/"&gt;veers
+    <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/"&gt;veers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2013/08/23/nsa_germany_windows_8/"&gt;veers</em></ins></span>
     away from Windows 8 computers with TPM 2.0&lt;/a&gt; (&lt;a
     
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa"&gt;original
     article in German&lt;/a&gt;), due to potential back
@@ -994,7 +1019,7 @@
 of this article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; 2014-2021 Free Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2021</strong></del></span> <span 
class="inserted"><ins><em>2014-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
@@ -1004,7 +1029,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/12/19 09:08:32 $
+$Date: 2022/06/12 16:30:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-censorship.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.pt-br-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary-censorship.pt-br-diff.html   11 Dec 2021 07:42:32 -0000      
1.1
+++ po/proprietary-censorship.pt-br-diff.html   12 Jun 2022 16:30:13 -0000      
1.2
@@ -92,7 +92,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Google &lt;a
-    
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts"&gt;
+    <span 
class="removed"><del><strong>href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts"&gt;</em></ins></span>
     offers censorship software&lt;/a&gt;, ostensibly for parents to put into
     their children's computers.&lt;/p&gt;
   &lt;/li&gt;
@@ -115,7 +116,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"&gt;
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"&gt;</em></ins></span>
     Google censored installation of Samsung's ad-blocker&lt;/a&gt; on Android
     phones, saying that blocking ads is &ldquo;interference&rdquo; with
     the sites that advertise (and surveil users through ads).&lt;/p&gt;
@@ -159,16 +161,27 @@
     events and censoring users&lt;/a&gt; to serve the agenda of 
governments.&lt;/p&gt;
 
     &lt;p&gt;Freedom respecting programs such as &lt;a
-    href="https://directory.fsf.org/wiki/Jitsi"&gt;Jitsi&lt;/a&gt; or <span 
class="removed"><del><strong>BigBlueButton</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://directory.fsf.org/wiki/BigBlueButton"&gt;BigBlueButton&lt;/a&gt;</em></ins></span>
+    href="https://directory.fsf.org/wiki/Jitsi"&gt;Jitsi&lt;/a&gt; or &lt;a
+    
href="https://directory.fsf.org/wiki/BigBlueButton"&gt;BigBlueButton&lt;/a&gt;
     can be used instead, better still if installed in a server controlled
     by its users.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="inserted"><ins><em>&lt;h3 id="other"&gt;Other&lt;/h3&gt;
+&lt;h3 id="other"&gt;Other&lt;/h3&gt;
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202109220"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202204040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;New Amazon worker chat app &lt;a
+    
href="https://theintercept.com/2022/04/04/amazon-union-living-wage-restrooms-chat-app/"&gt;would
+    ban specific words Amazon doesn't like&lt;/a&gt;, such as
+    &ldquo;union&rdquo;, &ldquo;restrooms&rdquo;, and &ldquo;pay
+    raise&rdquo;. If the app was free, workers could modify the program
+    so it acts as they wish, not how Amazon wants it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M202109220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some Xiaomi phones &lt;a
@@ -181,7 +194,7 @@
     &lt;p&gt;This is the natural result of having nonfree software in a device
     that can communicate with the company that made it.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 &lt;/div&gt;
 
@@ -233,7 +246,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014-2021 Free Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2021</strong></del></span> <span 
class="inserted"><ins><em>2014-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
@@ -243,7 +256,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/12/11 07:42:32 $
+$Date: 2022/06/12 16:30:13 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-cars.pt-br-diff.html
===================================================================
RCS file: po/malware-cars.pt-br-diff.html
diff -N po/malware-cars.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-cars.pt-br-diff.html     12 Jun 2022 16:30:13 -0000      1.1
@@ -0,0 +1,461 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-cars.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Malware In Cars
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-cars.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By product&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Malware In Cars&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="column-limit" id="malware-cars"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202008181"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;New Toyotas will &lt;a
+    href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
+    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
+    based on driver behaviour.&lt;/p&gt;
+
+    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
+    disconnect its cellular antenna and its GPS antenna.  If you want
+    GPS navigation, get a separate navigator which runs free software
+    and works with Open Street Map.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202007010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BMW will remotely &lt;a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/"&gt;
+    enable and disable functionality in cars&lt;/a&gt; through a universal
+    back door.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201912171"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201909160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tesla users claim Tesla &lt;a
+    
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW"&gt;force-installed
+    software to cut down on battery range&lt;/a&gt;, rather than replace the
+    defective batteries. Tesla did this to avoid having to run their
+    warranty.&lt;/p&gt;
+
+    &lt;p&gt;This means that proprietary software can potentially be a way to
+    commit perjury with impunity.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
+    <span 
class="removed"><del><strong>href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://petri.com/volkswagen-used-software-to-cheat-on-emissions/"&gt;</em></ins></span>
+    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.&lt;/p&gt;
+
+    &lt;p&gt;Former executives of Volkswagen are being &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    sued over this fraud&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
+    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to a junkyard the driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902011"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
+    <span 
class="removed"><del><strong>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;</em></ins></span>
+    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
+    connected to the cellular phone network and sends Ford a lot of data,
+    including car location. This feature operates even when the ignition
+    key is removed, and users report that they can't disable it.&lt;/p&gt;
+
+    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
+    connectivity by disconnecting the cellular modem, or wrapping the
+    antenna in aluminum foil?&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201812300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;New GM cars &lt;a
+    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
+    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Every nonfree program offers the user zero security against its
+    developer. With this malfeature, GM has explicitly made things even
+    worse.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars to be equipped with a terminal that &lt;a
+    <span 
class="removed"><del><strong>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca"&gt;</em></ins></span>
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;AI-powered driving apps can &lt;a
+    
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201709290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Bad security in some cars makes it possible to &lt;a
+    href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
+    remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201709090.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tesla used software to limit the part of the battery
+    that was available to customers in some cars, and &lt;a
+    
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
+    a universal back door in the software&lt;/a&gt; to temporarily increase
+    this limit.&lt;/p&gt;
+
+    &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
+    whole battery capacity did not do them any harm, the same back
+    door would permit Tesla (perhaps under the command of some
+    government) to remotely order the car to use none of its battery. Or
+    perhaps to drive its passenger to a torture prison.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The mobile apps for communicating &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
+    a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This is in addition to the fact that the car contains a cellular
+    modem that tells big brother all the time where it is.  If you own
+    such a car, it would be wise to disconnect the modem so as to turn
+    off the tracking.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    <span 
class="removed"><del><strong>href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969"&gt;</em></ins></span>
+    Audi's proprietary software used a simple method to cheat on emissions
+    tests&lt;/a&gt;: to activate a special low-emission gearshifting mode until
+    the first time the car made a turn.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201608110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Due to weak security, &lt;a
+    <span 
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it</em></ins></span>
+    is easy to open the doors of 100 million cars built by
+    Volkswagen&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201607160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201602240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
+    cell phone modem which allows effectively anyone to &lt;a
+    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely and make changes in various
+    settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in the car is proprietary, &lt;a
+    href="/philosophy/free-software-even-more-important.html"&gt;which means
+    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+    enables the phone company to track the car's movements all the time;
+    it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511194"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Caterpillar vehicles come with &lt;a
+    <span 
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20201108113943/https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;</em></ins></span>
+    a back door to shutoff the engine&lt;/a&gt; remotely.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201508120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Security researchers discovered a &lt;a
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text"&gt;</em></ins></span>
+    vulnerability in diagnostic dongles used for vehicle tracking and
+    insurance&lt;/a&gt; that let them take remote control of a car or lorry
+    using an SMS.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201507214"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Crackers were able to &lt;a
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"&gt;</em></ins></span>
+    take remote control of the Jeep&lt;/a&gt; &ldquo;connected car&rdquo;. They
+    could track the car, start or stop the engine, and activate or
+    deactivate the brakes, and more.&lt;/p&gt;
+
+    &lt;p&gt;We expect that Chrysler and the NSA can do this too.&lt;/p&gt;
+
+    &lt;p&gt;If you own a car that contains a phone modem, it would be a good
+    idea to deactivate this.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201311130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy"&gt;
+    DRM in cars will drive consumers crazy&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201306140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tesla cars allow the company to extract
+    data remotely and determine the car's location
+    at any time. (See Section 2, paragraphs b and c of the &lt;a
+    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't store this
+    information, but if the state orders it to get the data and hand it
+    over, the state can store it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201303250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
+    <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;</em></ins></span>
+    records information about drivers' movements&lt;/a&gt;, which is made
+    available to car manufacturers, insurance companies, and others.&lt;/p&gt;
+
+    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
+    is not really a matter of proprietary surveillance. These systems
+    are an intolerable invasion of privacy, and should be replaced with
+    anonymous payment systems, but the invasion isn't done by malware. The
+    other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201103110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;It is possible to &lt;a
+    <span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/"&gt;</em></ins></span>
  
+    take control of some car computers through malware in music 
files&lt;/a&gt;. 
+    Also &lt;a
+    <span 
class="removed"><del><strong>href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2011/03/10/business/10hack.html"&gt;</em></ins></span>
+    by radio&lt;/a&gt;. More information in &lt;a
+    href="http://www.autosec.org/faq.html"&gt; Automotive Security And
+    Privacy Center&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2017-2021</strong></del></span> <span 
class="inserted"><ins><em>2017-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/malware-games.pt-br-diff.html
===================================================================
RCS file: po/malware-games.pt-br-diff.html
diff -N po/malware-games.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-games.pt-br-diff.html    12 Jun 2022 16:30:13 -0000      1.1
@@ -0,0 +1,529 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-games.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Malware in Games
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-games.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By product&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Malware in Games&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;p&gt;Among the numerous malicious functionalities that are found in games,
+&lt;a href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
+addictiveness&lt;/a&gt; may be the worst, because it doesn't only affect users
+materially, but also psychologically.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="column-limit" id="malware-games"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202010220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
+    
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
+    players to spend money by overwhelming the game play with loot
+    boxes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202010210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As of 2019-2020, Minecraft players are &lt;a
+    
href="https://www.minecraft.net/en-us/article/java-edition-moving-house"&gt;being
+    forced to move to Microsoft servers&lt;/a&gt;, which results in
+    privacy violation. Microsoft publishes a program so users can run
+    their own server, but the program is proprietary and it's another &lt;a
+    href="/philosophy/free-software-even-more-important.html"&gt;injustice
+    to users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;People can play &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;Minetest&lt;/a&gt;
+    instead. Minetest is free software and respects the user's computer
+    freedom.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202004150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Riot Games' new anti-cheat is malware; &lt;a
+    
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver"&gt;runs
+    on system boot at kernel level&lt;/a&gt; on Windows. It is insecure 
software
+    that increases the attack surface of the operating system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202003110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Roblox (among many other games)
+    created anti-features which sucker children into &lt;a
+    
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
+    utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
+    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
+    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201907090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Resourceful children figured out how to &lt;a
+    href="https://www.bbc.co.uk/news/technology-48908766"&gt; empty their
+    parents' bank account&lt;/a&gt; buying packs of special players for an
+    Electronic Arts soccer game.&lt;/p&gt;
+
+    &lt;p&gt;The random element of these packs (also called &ldquo;loot
+    boxes&rdquo;) makes the game &lt;a
+    href="/proprietary/proprietary-addictions#addictiveness"&gt;
+    strongly addictive&lt;/a&gt;, but the fact that players
+    are pressured to spend more in order to get ahead of their
+    competitors further qualifies it as &lt;em&gt;predatory&lt;/em&gt;. 
+    Note that Belgium &lt;a
+    <span 
class="removed"><del><strong>href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/fifa-ultimate-team-packs-blocked-in-belgium"&gt;</em></ins></span>
+    made these loot boxes illegal&lt;/a&gt; in 2018.&lt;/p&gt;
+
+    &lt;p&gt;The only good reason to have a copy of such a proprietary
+    game is to study it for free software development.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201809210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Clash of Clans is a good example of a gratis mobile game that its
+    developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
+    made very addictive&lt;/a&gt; for a large proportion of its users&mdash;and
+    turned into a cash machine for themselves&mdash;by using &lt;a
+    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
+    psychological manipulation techniques&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(The article uses &ldquo;free&rdquo; to mean 
&ldquo;zero
+    price,&rdquo; which is a usage we should avoid. We recommend saying
+    &ldquo;gratis&rdquo; instead.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807310"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A nonfree video game, available through the nonfree Steam client, 
&lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-cryptocurrency-miners"&gt;</em></ins></span>
+    included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
+    the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201806250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The game Metal Gear Rising for
+    MacOS was tethered to a server.  The company &lt;a
+    <span 
class="removed"><del><strong>href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;</em></ins></span>
+    shut down the server, and all copies stopped working&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201806240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Red Shell is a spyware that
+    is found in many proprietary games. It &lt;a
+    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804144"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;ArenaNet surreptitiously installed a spyware
+    program along with an update to the massive
+    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
+    <span 
class="removed"><del><strong>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201712060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Learn how &lt;a
+    
href="https://web.archive.org/web/20170319013045/https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html"&gt;
+    gratis-to-play-and-not-win-much games manipulate their useds
+    psychologically&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;These manipulative behaviors are malicious functionalities, and 
they
+    are possible because the game is proprietary. If it were free, people
+    could publish a non-manipulative version and play that instead.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
+    a high score. The player gets coins at the end of each game, and can
+    buy more coins with real money.&lt;/p&gt;
+
+    &lt;p&gt;Getting a higher score once leads the player to desire higher
+    score again later. But the higher score resulting from the boost &lt;a
+    
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/"&gt;does
+    not give the player more coins, and does not help the player get
+    a higher score in subsequent games&lt;/a&gt;. To get that, the player
+    will need a boost frequently, and usually has to pay real money
+    for that. Since boosts are exciting and entertaining, the player is
+    subtly pushed to purchase more coins with real money to get boosts,
+    and it can develop into a costly habit.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;nVidia's proprietary GeForce Experience &lt;a
+    <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</em></ins></span>
+    users identify themselves and then sends personal data about them to
+    nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A Capcom's Street Fighter V update &lt;a
+    <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2016/09/23/capcom_street_fighter_v/"&gt;</em></ins></span>
+    installed a driver that could be used as a back door by
+    any application installed on a Windows computer&lt;/a&gt;, but was &lt;a
+    <span 
class="removed"><del><strong>href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/street-fighter-v-removes-new-anti-crack"&gt;</em></ins></span>
+    immediately rolled back&lt;/a&gt; in response to public outcry.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Oculus Rift games now have &lt;a
+    
href="https://www.vice.com/en/article/vv77ea/new-oculus-drm-cross-platform"&gt;
+    DRM meant to prevent running them on other systems&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201604040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
+    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li <span class="inserted"><ins><em>id="M201603060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Electronic Arts &lt;a
+    
href="https://techraptor.net/gaming/news/darkspore-servers-shut-down"&gt;made
+    one of its games permanently unplayable&lt;/a&gt; by shutting down its
+    servers. This game was heavily reliant on the company's servers,
+    and because the software is proprietary, users can't modify it to
+    make it connect to some other server. If the game were free, people
+    could still play what they purchased.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201512290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many &lt;a
+    <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html"&gt;</em></ins></span>
+    video game consoles snoop on their users and report to the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
+
+    &lt;p&gt;A game console is a computer, and you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
+    <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;</em></ins></span>
+    collect a wide range of data about their users and their users'
+    friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+    collected by various cr&hellip;apps and sites made by different
+    companies.&lt;/p&gt;
+
+    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
+
+    &lt;p&gt;While the article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201507290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Game Of War: Fire Age is an iPhone game with &lt;a
+    
href="https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"&gt;
+    addictive features&lt;/a&gt; which are based on &lt;a
+    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;behavioral
+    manipulation techniques&lt;/a&gt;, compounded with group emulation. After a
+    fairly easy start, the game slows down and becomes more difficult,
+    so gamers are led to spend more and more money in order to keep up
+    with their group. And if they stop playing for a while, the equipment
+    they invested in gets destroyed by the &ldquo;enemy&rdquo; unless
+    they buy an expensive &ldquo;shield&rdquo; to protect it. This game
+    is also deceptive, as it uses confusing menus and complex stats to
+    obfuscate true monetary costs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201504210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Runescape is a popular online game with some &lt;a
+    
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
+    addictive features&lt;/a&gt; derived from &lt;a
+    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
+    behavioral manipulation techniques&lt;/a&gt;. Certain
+    repetitive aspects of the game, like &lt;a
+    href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
+    grinding&lt;/a&gt;, can be minimised by becoming a paying member, and can
+    thus encourage children and impressionable people to spend money on
+    the game.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms"&gt;Nintendo
+    remotely sabotaged all Wiis, making them refuse to work unless the
+    user agrees to a new EULA&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We can be quite sure this EULA is unjust because injustice is the
+    only motive for imposing an EULA.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Angry Birds &lt;a
+    <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;</em></ins></span>
+    spies for companies, and the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    more spyware apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some proprietary &lt;a
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases"&gt;</em></ins></span>
+    games lure children to spend their parents' money&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201105070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a href="https://www.defectivebydesign.org/sony"&gt;The 
Playstation
+    3 is a tyrant&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201003300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Sony &lt;a
+    
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3"&gt;sabotaged
+    the Playstation 3&lt;/a&gt; with a firmware downgrade that removed the
+    feature that allowed users to run GNU/Linux on it.&lt;/p&gt;
+
+    &lt;p&gt;Sony subsequently sent police after Geohot, after he cracked the
+    code that blocked users from changing the firmware, and we responded by
+    calling for a &lt;a href="http://boycottsony.org"&gt;boycott of 
Sony&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In a court settlement Sony is &lt;a
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/"&gt;</em></ins></span>
+    now paying for the sabotage&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200510200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Blizzard Warden is a hidden
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on a gamer's computer and sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities which
+    have nothing to do with cheating.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2016-2021</strong></del></span> <span 
class="inserted"><ins><em>2016-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/malware-in-online-conferencing.pt-br-diff.html
===================================================================
RCS file: po/malware-in-online-conferencing.pt-br-diff.html
diff -N po/malware-in-online-conferencing.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-in-online-conferencing.pt-br-diff.html   12 Jun 2022 16:30:13 
-0000      1.1
@@ -0,0 +1,233 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-in-online-conferencing.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!-- This page is derived from /server/standards/boilerplate.html --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~-
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~-
+--&gt; 
+&lt;title&gt;Malware in Online Conferencing 
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include 
virtual="/proprietary/po/malware-in-online-conferencing.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By product&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Malware in Online Conferencing&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="column-limit" 
id="malware-in-online-conferencing"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202104090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A zero-day vulnerability in Zoom which &lt;a
+    
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/"&gt;can
+    be used to launch remote code execution (RCE) attacks&lt;/a&gt; has been
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, all this without
+    any form of user interaction.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202012190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/"&gt;
+    A Zoom executive carried out snooping and censorship for
+    China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This abuse of Zoom's power shows how dangerous that power is. The
+    root problem is not the surveillance and censorship, but rather the
+    power that Zoom has. It gets that power partly from the use of its
+    server, but also partly from the nonfree client program.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202011090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;According to FTC, the
+    company behind the Zoom conferencing software &lt;a
+    
href="https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-users-about-end-to-end-encryption-for-years-ftc-says/"&gt;has
+    lied to users about its end-to-end encryption&lt;/a&gt; for years, at least
+    since 2016.&lt;/p&gt;
+
+    &lt;p&gt;People can use free (as in freedom) programs such as &lt;a
+    href="https://directory.fsf.org/wiki/Jitsi"&gt;Jitsi&lt;/a&gt; or &lt;a
+    
href="https://directory.fsf.org/wiki/BigBlueButton"&gt;BigBlueButton&lt;/a&gt;,
+    better still if installed in a server controlled by the users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202009270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many employers are using nonfree
+    software, including videoconference software, to &lt;a
+    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
+    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
+    surveillance feature.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The company behind Zoom does not only deny
+    users' computer freedom by developing this piece
+    of nonfree software, it also violates users' civil rights by &lt;a
+    
href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship"&gt;banning
+    events and censoring users&lt;/a&gt; to serve the agenda of 
governments.&lt;/p&gt;
+
+    &lt;p&gt;Freedom respecting programs such as &lt;a
+    href="https://directory.fsf.org/wiki/Jitsi"&gt;Jitsi&lt;/a&gt; or &lt;a
+    
href="https://directory.fsf.org/wiki/BigBlueButton"&gt;BigBlueButton&lt;/a&gt;
+    can be used instead, better still if installed in a server controlled
+    by its users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202004301"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Proprietary programs Google Meet, Microsoft Teams, and WebEx &lt;a
+    <span 
class="removed"><del><strong>href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/"&gt;are</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/"&gt;are</em></ins></span>
+    collecting user's personal and identifiable data&lt;/a&gt; including how 
long
+    a call lasts, who's participating in the call, and the IP addresses
+    of everyone taking part. From experience, this can even harm users
+    physically if those companies hand over data to governments.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202003260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2020, <span 
class="removed"><del><strong>2021</strong></del></span> <span 
class="inserted"><ins><em>2021, 2022</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/malware-webpages.pt-br-diff.html
===================================================================
RCS file: po/malware-webpages.pt-br-diff.html
diff -N po/malware-webpages.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-webpages.pt-br-diff.html 12 Jun 2022 16:30:13 -0000      1.1
@@ -0,0 +1,355 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-webpages.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Malware in Webpages
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+&lt;!--#include virtual="/proprietary/po/malware-webpages.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By product&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Malware in Webpages&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;p&gt;This page lists web sites containing proprietary JavaScript programs 
that spy
+on users or mislead them. They make use of what we call
+the &lt;a href="/philosophy/javascript-trap.html"&gt;JavaScript 
Trap&lt;/a&gt;. Of course,
+many sites collect information that the user sends, via forms or otherwise, but
+here we're not talking about that.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="column-limit" id="malware-webpages"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202204280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The US government &lt;a
+    
href="https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you"&gt;sent
+    personal data to Facebook&lt;/a&gt; for every college student that applied
+    for US government student aid. It justified this as being for a
+    &ldquo;campaign.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The data included name, phone number and email address.  This 
shows
+    the agency didn't even make a handwaving attempt to anonymize the
+    student.  Not that anonymization usually does much good&mdash;but
+    the failure to even try shows that the agency was completely blind
+    to the issue of respecting students' privacy.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201811270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites use JavaScript code &lt;a
+    <span 
class="removed"><del><strong>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
+    to snoop on information that users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
+    
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+
+    &lt;p&gt;The chat facilities of some customer services use the same sort of
+    malware to &lt;a
+    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
+    read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;British Airways used &lt;a
+    
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
+    JavaScript on its web site to give other companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201805170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Storyful program &lt;a
+    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
+    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201805080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
+    <span 
class="removed"><del><strong>href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.pcmag.com/news/400-websites-secretly-served-cryptocurrency-miners-to-visitors"&gt;</em></ins></span>
+    inject a &ldquo;miner&rdquo; in web pages&lt;/a&gt; served to visitors. 
This
+    type of malware hijacks the computer's processor to mine a
+    cryptocurrency.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that the article refers to the infected 
software
+    as &ldquo;content management system&rdquo;. A better term would be
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#Content"&gt;website
+    revision system&lt;/a&gt;&rdquo;.)&lt;/small&gt;&lt;/p&gt;
+
+    &lt;p&gt;Since the miner was a nonfree JavaScript program,
+    visitors wouldn't have been affected if they had used &lt;a
+    href="/software/librejs/index.html"&gt;LibreJS&lt;/a&gt;. Some
+    browser extensions that &lt;a
+    
href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/"&gt;
+    specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201712300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some websites send
+    JavaScript code to collect all the user's input, &lt;a
+    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
+    code.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;When a page uses Disqus
+    for comments, the proprietary Disqus software &lt;a
+    <span 
class="removed"><del><strong>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook/"&gt;loads</em></ins></span>
+    a Facebook software package into the browser of every anonymous visitor
+    to the page, and makes the page's URL available to 
Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612064"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Online sales, with tracking and surveillance of customers, &lt;a
+    
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+    businesses to show different people different prices&lt;/a&gt;. Most of
+    the tracking is done by recording interactions with servers, but
+    proprietary software contributes.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611160.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A &lt;a
+    <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;</em></ins></span>
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
+    apps&mdash;millions of users may be unawarely subject to poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Here are two examples, taken from the research paper, of 
+    proprietary VPN apps that use JavaScript to track users and infringe
+    their privacy:&lt;/p&gt;
+
+    &lt;dl class="compact"&gt;
+      &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display ads. Uses
+      roughly five tracking libraries. Also, it redirects the user's
+      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
+
+      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
+    &lt;/dl&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201603080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;</em></ins></span>
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201310110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Flash and JavaScript are used for &lt;a
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;</em></ins></span>
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201210240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites rat their visitors to advertising
+    networks that track users.  Of the top 1000 web sites, &lt;a
+    
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+    (as of 5/17/2012) fed their visitors third-party cookies, allowing
+    other sites to track them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201208210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites report all their visitors
+    to Google by using the Google Analytics service, which &lt;a
+    <span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;</em></ins></span>
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201200000"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
+    of other people's phone numbers or email addresses).  This violates
+    the privacy of those other people.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201110040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
+    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
+    that don't have Facebook accounts.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201003010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Flash Player's &lt;a
+    
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
+    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2017-2021</strong></del></span> <span 
class="inserted"><ins><em>2017-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/malware-webpages.uk-diff.html
===================================================================
RCS file: po/malware-webpages.uk-diff.html
diff -N po/malware-webpages.uk-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-webpages.uk-diff.html    12 Jun 2022 16:30:13 -0000      1.1
@@ -0,0 +1,355 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-webpages.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Malware in Webpages
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+&lt;!--#include virtual="/proprietary/po/malware-webpages.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By product&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Malware in Webpages&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;p&gt;This page lists web sites containing proprietary JavaScript programs 
that spy
+on users or mislead them. They make use of what we call
+the &lt;a href="/philosophy/javascript-trap.html"&gt;JavaScript 
Trap&lt;/a&gt;. Of course,
+many sites collect information that the user sends, via forms or otherwise, but
+here we're not talking about that.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="column-limit" id="malware-webpages"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202204280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The US government &lt;a
+    
href="https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you"&gt;sent
+    personal data to Facebook&lt;/a&gt; for every college student that applied
+    for US government student aid. It justified this as being for a
+    &ldquo;campaign.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The data included name, phone number and email address.  This 
shows
+    the agency didn't even make a handwaving attempt to anonymize the
+    student.  Not that anonymization usually does much good&mdash;but
+    the failure to even try shows that the agency was completely blind
+    to the issue of respecting students' privacy.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201811270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites use JavaScript code &lt;a
+    <span 
class="removed"><del><strong>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;</em></ins></span>
+    to snoop on information that users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
+    
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+
+    &lt;p&gt;The chat facilities of some customer services use the same sort of
+    malware to &lt;a
+    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
+    read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;British Airways used &lt;a
+    
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
+    JavaScript on its web site to give other companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201805170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Storyful program &lt;a
+    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
+    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201805080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
+    <span 
class="removed"><del><strong>href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.pcmag.com/news/400-websites-secretly-served-cryptocurrency-miners-to-visitors"&gt;</em></ins></span>
+    inject a &ldquo;miner&rdquo; in web pages&lt;/a&gt; served to visitors. 
This
+    type of malware hijacks the computer's processor to mine a
+    cryptocurrency.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that the article refers to the infected 
software
+    as &ldquo;content management system&rdquo;. A better term would be
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#Content"&gt;website
+    revision system&lt;/a&gt;&rdquo;.)&lt;/small&gt;&lt;/p&gt;
+
+    &lt;p&gt;Since the miner was a nonfree JavaScript program,
+    visitors wouldn't have been affected if they had used &lt;a
+    href="/software/librejs/index.html"&gt;LibreJS&lt;/a&gt;. Some
+    browser extensions that &lt;a
+    
href="https://www.cnet.com/tech/computing/how-to-stop-sites-from-using-your-cpu-to-mine-coins/"&gt;
+    specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201712300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some websites send
+    JavaScript code to collect all the user's input, &lt;a
+    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
+    code.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;When a page uses Disqus
+    for comments, the proprietary Disqus software &lt;a
+    <span 
class="removed"><del><strong>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook/"&gt;loads</em></ins></span>
+    a Facebook software package into the browser of every anonymous visitor
+    to the page, and makes the page's URL available to 
Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612064"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Online sales, with tracking and surveillance of customers, &lt;a
+    
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+    businesses to show different people different prices&lt;/a&gt;. Most of
+    the tracking is done by recording interactions with servers, but
+    proprietary software contributes.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611160.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A &lt;a
+    <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;</em></ins></span>
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
+    apps&mdash;millions of users may be unawarely subject to poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Here are two examples, taken from the research paper, of 
+    proprietary VPN apps that use JavaScript to track users and infringe
+    their privacy:&lt;/p&gt;
+
+    &lt;dl class="compact"&gt;
+      &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display ads. Uses
+      roughly five tracking libraries. Also, it redirects the user's
+      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
+
+      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
+    &lt;/dl&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201603080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;</em></ins></span>
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201310110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Flash and JavaScript are used for &lt;a
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;</em></ins></span>
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201210240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites rat their visitors to advertising
+    networks that track users.  Of the top 1000 web sites, &lt;a
+    
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+    (as of 5/17/2012) fed their visitors third-party cookies, allowing
+    other sites to track them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201208210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites report all their visitors
+    to Google by using the Google Analytics service, which &lt;a
+    <span 
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;</em></ins></span>
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201200000"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
+    of other people's phone numbers or email addresses).  This violates
+    the privacy of those other people.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201110040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
+    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
+    that don't have Facebook accounts.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201003010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Flash Player's &lt;a
+    
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
+    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2017-2021</strong></del></span> <span 
class="inserted"><ins><em>2017-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/potential-malware.pt-br-diff.html
===================================================================
RCS file: po/potential-malware.pt-br-diff.html
diff -N po/potential-malware.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/potential-malware.pt-br-diff.html        12 Jun 2022 16:30:13 -0000      
1.1
@@ -0,0 +1,229 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/potential-malware.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Potential Malware
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/potential-malware.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By type&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Potential Malware&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+  &lt;p&gt;This page describes malicious techniques that proprietary
+  software might use in the future for malicious purposes.  We don't
+  have any evidence that they are in use yet.&lt;/p&gt;
+&lt;div class="column-limit" id="potential-malware"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202107050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/media/2021/jul/05/advertisers-targeted-dream-incubation"&gt;
+    Advertising companies are experimenting to manipulate people's
+    minds&lt;/a&gt;, and impose a new way of advertising by altering their
+    dreams. This &ldquo;targeted dream incubation&rdquo; would trigger
+    &ldquo;refreshing dreams&rdquo; of the product, according to the
+    companies.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Car companies are coming up with a list of clever reasons why 
&lt;a
+    
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html"&gt;
+    they &ldquo;have to&rdquo; put cameras and microphones in the
+    car&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;BMW says its software does not store any driver-monitoring
+    information.  If this means none of the data that come out of the
+    cameras and microphones can be seen by anyone else, the cameras and
+    microphones are not dangerous.  But should we trust this claim?
+    The only way it can deserve rational trust is if the software is
+    free.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Volvo plans to &lt;a
+    
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths"&gt;
+    install cameras inside cars&lt;/a&gt; to monitor the driver for signs of
+    impairment that could cause an accident.&lt;/p&gt;
+
+    &lt;p&gt;However, there is nothing to prevent these cameras from doing
+    other things, such as biometrically identifying the driver or
+    passengers, other than proprietary software which Volvo&mdash;or
+    various governments and criminals&mdash;could change at any time.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
+    
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
+    use the disk itself as a microphone to detect speech&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article refers to the &ldquo;Linux operating system&rdquo; but
+    seems to mean &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt;. 
That
+    hack would not require changing Linux itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some portable surveillance
+    devices (&ldquo;phones&rdquo;) now have &lt;a
+    
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g"&gt;
+    fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
+    take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201712130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Patent applications show that Google and Amazon are interested in 
&lt;a
+    <span 
class="removed"><del><strong>href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal"&gt;</em></ins></span>
+    making &ldquo;digital assistants&rdquo; study people's activities to
+    learn all about them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;AI programs would understand what people say to each other,
+    observe the clothing they wear and the objects they carry (including
+    the marketing messages on them), and use sound to track people's
+    activities, including in the toilet or in bed.&lt;/p&gt;
+
+    &lt;p&gt;It should be illegal to have such a device in your apartment
+    without getting signed consent from the people that live in the other
+    apartments in the building.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201708160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Any device that has a microphone and a speaker could be &lt;a
+    <span 
class="removed"><del><strong>href="http://www.washington.edu/news/2017/08/16/computer-scientists-use-music-to-covertly-track-body-movements-activity/"&gt;turned</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washington.edu/news/2017/08/16/computer-scientists-use-music-to-covertly-track-body-movements-activity/"&gt;turned</em></ins></span>
+    into a sonar system that would track the movements of people in the
+    same room or other rooms nearby&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2017-2021</strong></del></span> <span 
class="inserted"><ins><em>2017-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-addictions.pt-br-diff.html
===================================================================
RCS file: po/proprietary-addictions.pt-br-diff.html
diff -N po/proprietary-addictions.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-addictions.pt-br-diff.html   12 Jun 2022 16:30:13 -0000      
1.1
@@ -0,0 +1,431 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-addictions.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Proprietary Addictions
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-addictions.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By type&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Proprietary Addictions&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;p&gt;This page deals with malicious functionalities that are added to
+some programs for the sole purpose of luring users into more and more
+frequent and intensive use of the program, with the risk of getting
+addicted.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 id="addictiveness"&gt;How software is made addictive&lt;/h3&gt;
+
+&lt;h4 id="games"&gt;Games&lt;/h4&gt;
+
+ &lt;p id="M209900000"&gt;Many games are designed to
+    keep gamers compulsively playing&mdash;and spending
+    money on the game. To achieve this result, developers use &lt;a
+    <span 
class="removed"><del><strong>href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"&gt;</em></ins></span>
+    techniques that derive from behavioral and brain 
research&lt;/a&gt;:&lt;/p&gt;
+
+    &lt;dl class="compact"&gt;&lt;dt&gt;The Skinner Box&lt;/dt&gt;
+      &lt;dd&gt;An environment in which the user is trained
+      to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
+      over again in order to get a reward. This is also known as
+      &ldquo;grinding.&rdquo;&lt;/dd&gt;
+
+      &lt;dt&gt;Virtual food pellets&lt;/dt&gt;
+      &lt;dd&gt;Items that have nothing to do with the game itself, but are
+      valuable to gamers because of the work required to obtain them
+      (e.g., EverQuest); some people will end up collecting them for the
+      sake of collecting.&lt;/dd&gt;
+
+      &lt;dt&gt;Random rewards&lt;/dt&gt;
+      &lt;dd&gt;They turn the game into the equivalent of a slot machine (e.g.,
+      World of Warcraft, ZT Online).&lt;/dd&gt;
+
+      &lt;dt&gt;Elaborate cycles&lt;/dt&gt;
+      &lt;dd&gt;Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles
+      (progress from one level to the next) slower and slower, designing
+      complex tasks that are difficult to get out of (e.g. World of
+      Warcraft), or conversely dividing them up in small chunks to avoid
+      frustration (e.g., New Super Mario Bros.Wii).&lt;/dd&gt;
+
+      &lt;dt&gt;Decay of game assets&lt;/dt&gt;
+      &lt;dd&gt;This makes it necessary for a gamer to keep playing, without
+      vacations, simply to avoid losing what they have earned so far
+      (e.g., Farmville, Ultima Online, Animal Crossing).&lt;/dd&gt;
+    &lt;/dl&gt;
+
+ &lt;p&gt;Games such as World of Warcraft, which are considered very addictive,
+    use several of these techniques.&lt;/p&gt;
+
+ &lt;p&gt;There are even more elaborate ways to get users addicted to a 
game.&lt;/p&gt;
+ &lt;ul&gt;
+    &lt;li&gt;&ldquo;Loot boxes&rdquo; are a direct
+    application of the random reward mechanism, and their addictiveness
+    is enhanced by seductive animation. They are &lt;a
+    
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/"&gt;
+    akin to gambling&lt;/a&gt;.&lt;/li&gt;
+
+    &lt;li id="gacha"&gt;&lt;a
+    
href="https://wikipedia.org/wiki/Gacha_game"&gt;&lt;i&gt;Gacha&lt;/i&gt;&lt;/a&gt;
 systems,
+    widely used by Japanese games since 2010, may be considered the
+    ancestors of loot boxes. A &lt;i&gt;gacha&lt;/i&gt; is the virtual 
equivalent of
+    a capsule-toy vending machine. Its addictiveness is based on random
+    rewards, and also on the basic instinct of people to collect 
items.&lt;/li&gt;
+
+    &lt;li&gt;The developers of gratis
+    mobile games apply the techniques described above to &lt;a
+    href="https://www.psychguides.com/interact/the-psychology-of-freemium/"&gt;
+    turn their products into slot machines&lt;/a&gt;. This is clearly
+    described in an infographic. The revenue generated by these games
+    is directly related to the number of strongly addicted gamers
+    (called &ldquo;whales&rdquo;) and to the amount of money they are
+    willing to spend. Thus developers carefully study the behavior of
+    millions of users to increase the addictiveness of their games.&lt;/li&gt;
+ &lt;/ul&gt;
+
+ &lt;p&gt;&lt;small&gt;(Unfortunately, the last two articles use 
&ldquo;free&rdquo; to
+    mean &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
+    instead.)&lt;/small&gt;&lt;/p&gt;
+
+ &lt;p&gt;However, the addictiveness of a game is
+    only one of the determinants of addiction. Equally important are the
+    psychological make-up and life circumstances of the gamer. Gaming
+    addiction, like other addictions, is a form of mental escape from an
+    unrewarding life. The sad truth is that, in the long run, it leads
+    to an even worse life.&lt;/p&gt;
+
+ &lt;p&gt;&lt;small&gt;&lt;em&gt;Note:&lt;/em&gt;&nbsp;
+    We are not gamers. If you think we have misunderstood
+    some point, or have suggestions for making this text
+    clearer or more correct, please send them to &lt;&lt;a
+    
href="mailto:webmasters@gnu.org"&gt;webmasters@gnu.org&lt;/a&gt;&gt;.&lt;/small&gt;&lt;/p&gt;
+
+&lt;h4 id="gambling"&gt;Online gambling&lt;/h4&gt;
+
+ &lt;p id="M201902220"&gt;Online gambling services (and their nonfree
+    client programs) are &lt;a
+    
href="https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds"&gt;
+    designed to be addictive&lt;/a&gt;, much like on-line games. They achieve 
+    this with various different malfunctionalities, often in 
combination.&lt;/p&gt;
+
+    &lt;p&gt;Many of these malfunctionalities are implemented by the server and
+    the client program together. In some cases, there is no honest way that
+    the client program could counteract the nastiness&mdash;for instance,
+    when the server manipulates amounts won in order to get the user
+    addicted, the only way the client program could block that is to pretend
+    the win did not happen. But users would not want that 
modification.&lt;/p&gt;
+
+ &lt;p&gt;However, modification of the client program could cover up some
+    addictive behaviors without losing the user anything.&lt;/p&gt;
+
+&lt;h4 id="social-networks"&gt;Social networks&lt;/h4&gt;
+
+ &lt;p&gt;The major social networks are continuously optimizing their design 
to &lt;a
+    
href="https://medium.com/thrive-global/how-technology-hijacks-peoples-minds-from-a-magician-and-google-s-design-ethicist-56d62ef5edf3"&gt;
+    grab users' attention&lt;/a&gt; by taking advantage of the psychological
+    vulnerabilities described above, eventually leading some to addiction.
+    For these people, a phone becomes the equivalent of a slot machine.
+    Many of the addictive features (menu, &ldquo;likes,&rdquo; photo tagging,
+    autoplay, etc.) are built into the client software, and can't be
+    removed because the software is proprietary.&lt;/p&gt;
+   
+ &lt;p id="M201803210"&gt;Thus, some social networking apps &lt;a
+    href="https://www.jeffbullas.com/facebook-creates-addiction/"&gt;try to
+    merge into your daily
+    routine&lt;/a&gt; by exploiting social pressure and your natural desire for
+    socialization, converting habitual gestures into thorough addiction. As
+    already noted for games, addictiveness is essentially based on random
+    rewards. In the present case, the rewards are messages from friends
+    and followers, &ldquo;likes,&rdquo; news, interesting videos, etc. The
+    software is designed to trigger users' desire for these rewards,
+    and keep this desire alive as long as possible.&lt;/p&gt;
+
+ &lt;ul&gt;
+      &lt;li&gt;By default, notifications are sent every time a new item comes
+      in, instead of, say, once a day. They are associated with sounds or
+      vibrations which make them even more compelling. (Remember Pavlov's
+      experiments with rats.) These triggers are often opt-out, and many
+      users don't try to turn them off. They are most effective when the
+      app is installed on a mobile device which is always on and never
+      leaves the user. As a side effect, they may contribute to the &lt;a
+      
href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction"&gt;
+      addictiveness of &ldquo;smart&rdquo; phones&lt;/a&gt;.&lt;/li&gt;
+
+      &lt;li&gt;Users are served selected material
+      that is likely to interest   them, based on &lt;a
+      
href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611"&gt;
+      profiling&lt;/a&gt;. (This paves the way to &lt;a
+      
href="/proprietary/proprietary-manipulation.html"&gt;manipulation&lt;/a&gt;,
+      by the way.)&lt;/li&gt;
+
+      &lt;li&gt;The app interface is designed to make   users
+      stay on the site as long as possible, using &lt;a
+      
href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1"&gt;
+      infinite scrolling&lt;/a&gt; for example.&lt;/li&gt;
+
+      &lt;li&gt;The company that owns the social network tries
+      to cover   users' needs as extensively as possible, by &lt;a
+      
href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook"&gt;
+      acquiring other companies&lt;/a&gt; if needed. Once users
+      have concentrated   most of their online activities and
+      a lot of their personal data on   a single platform (or
+      a set of platforms that belong to the same   group), they find it &lt;a
+      
href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram"&gt;
+      almost impossible to leave&lt;/a&gt;. And even if they wanted to, they
+      would have a hard time digging out the relevant options, and the
+      app would aggressively nag them to stay.&lt;/li&gt;
+    &lt;/ul&gt;
+
+ &lt;p&gt;A good way to minimize the risk of addiction, short of avoiding
+    social media altogether, is to turn off notifications and leave as
+    little as possible of your own data on the platform.&lt;/p&gt;
+
+
+&lt;h3 id="proprietary-addictions"&gt;Examples of addictive software&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202010220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The addictive Genshin Impact relentlessly &lt;a
+    
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"&gt;coerces
+    players to spend money by overwhelming the game play with loot
+    boxes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202003110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Roblox (among many other games)
+    created anti-features which sucker children into &lt;a
+    
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge"&gt;
+    utilizing third-party payment services without 
authorization.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201907090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Resourceful children figured out how to &lt;a
+    href="https://www.bbc.co.uk/news/technology-48908766"&gt; empty their
+    parents' bank account&lt;/a&gt; buying packs of special players for an
+    Electronic Arts soccer game.&lt;/p&gt;
+
+    &lt;p&gt;The random element of these packs (also called &ldquo;loot
+    boxes&rdquo;) makes the game &lt;a
+    href="/proprietary/proprietary-addictions#addictiveness"&gt;
+    strongly addictive&lt;/a&gt;, but the fact that players
+    are pressured to spend more in order to get ahead of their
+    competitors further qualifies it as &lt;em&gt;predatory&lt;/em&gt;. 
+    Note that Belgium &lt;a
+    <span 
class="removed"><del><strong>href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/fifa-ultimate-team-packs-blocked-in-belgium"&gt;</em></ins></span>
+    made these loot boxes illegal&lt;/a&gt; in 2018.&lt;/p&gt;
+
+    &lt;p&gt;The only good reason to have a copy of such a proprietary
+    game is to study it for free software development.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201809210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Clash of Clans is a good example of a gratis mobile game that its
+    developers &lt;a href="https://gamerant.com/clash-of-clans-addiction/"&gt;
+    made very addictive&lt;/a&gt; for a large proportion of its users&mdash;and
+    turned into a cash machine for themselves&mdash;by using &lt;a
+    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
+    psychological manipulation techniques&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(The article uses &ldquo;free&rdquo; to mean 
&ldquo;zero
+    price,&rdquo; which is a usage we should avoid. We recommend saying
+    &ldquo;gratis&rdquo; instead.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
+    a high score. The player gets coins at the end of each game, and can
+    buy more coins with real money.&lt;/p&gt;
+
+    &lt;p&gt;Getting a higher score once leads the player to desire higher
+    score again later. But the higher score resulting from the boost &lt;a
+    
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/"&gt;does
+    not give the player more coins, and does not help the player get
+    a higher score in subsequent games&lt;/a&gt;. To get that, the player
+    will need a boost frequently, and usually has to pay real money
+    for that. Since boosts are exciting and entertaining, the player is
+    subtly pushed to purchase more coins with real money to get boosts,
+    and it can develop into a costly habit.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201604040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many popular mobile games include a random-reward system called
+    &lt;a href="#gacha"&gt;&lt;i&gt;gacha&lt;/i&gt;&lt;/a&gt; which is 
especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still &lt;a
+    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/"&gt;
+    luring players into compulsively spending&lt;/a&gt; inordinate amounts of
+    money on virtual toys.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201507290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Game Of War: Fire Age is an iPhone game with &lt;a
+    
href="https://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"&gt;
+    addictive features&lt;/a&gt; which are based on &lt;a
+    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;behavioral
+    manipulation techniques&lt;/a&gt;, compounded with group emulation. After a
+    fairly easy start, the game slows down and becomes more difficult,
+    so gamers are led to spend more and more money in order to keep up
+    with their group. And if they stop playing for a while, the equipment
+    they invested in gets destroyed by the &ldquo;enemy&rdquo; unless
+    they buy an expensive &ldquo;shield&rdquo; to protect it. This game
+    is also deceptive, as it uses confusing menus and complex stats to
+    obfuscate true monetary costs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201504210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Runescape is a popular online game with some &lt;a
+    
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"&gt;
+    addictive features&lt;/a&gt; derived from &lt;a
+    href="/proprietary/proprietary-addictions.html#addictiveness"&gt;
+    behavioral manipulation techniques&lt;/a&gt;. Certain
+    repetitive aspects of the game, like &lt;a
+    href="https://en.wikipedia.org/wiki/Grinding_(video_games)"&gt;
+    grinding&lt;/a&gt;, can be minimised by becoming a paying member, and can
+    thus encourage children and impressionable people to spend money on
+    the game.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2019, 2020, <span 
class="removed"><del><strong>2021</strong></del></span> <span 
class="inserted"><ins><em>2021, 2022</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-coverups.pt-br-diff.html
===================================================================
RCS file: po/proprietary-coverups.pt-br-diff.html
diff -N po/proprietary-coverups.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-coverups.pt-br-diff.html     12 Jun 2022 16:30:13 -0000      
1.1
@@ -0,0 +1,156 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-coverups.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Proprietary Coverups
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-coverups.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By type&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Proprietary Coverups&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;p&gt;This page lists instances where proprietary software had a bug,
+and the developers converted it into a malicious functionality by
+trying to cover up the existence of the bug.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="column-limit" id="proprietary-coverups"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201612120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Price Waterhouse Coopers tried
+    to suppress knowledge of a security flaw by &lt;a
+    <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/"&gt;</em></ins></span>
+    making legal threats against the security company that found
+    it&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2017-2021</strong></del></span> <span 
class="inserted"><ins><em>2017-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-fraud.pt-br-diff.html
===================================================================
RCS file: po/proprietary-fraud.pt-br-diff.html
diff -N po/proprietary-fraud.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-fraud.pt-br-diff.html        12 Jun 2022 16:30:13 -0000      
1.1
@@ -0,0 +1,198 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-fraud.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Proprietary Fraud - GNU Project - Free Software 
Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-fraud.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By type&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Proprietary Fraud&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+  &lt;p&gt;Here are some examples of proprietary software that defrauds
+  users&mdash;taking their money by trickery.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="column-limit" id="proprietary-fraud"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202110160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Canon's all-in-one printer, scanner, and fax machine &lt;a
+    
href="https://www.bleepingcomputer.com/news/legal/canon-sued-for-disabling-scanner-when-printers-run-out-of-ink/"&gt;will
+    stop you from using any of its features if it's out of ink&lt;/a&gt;! Since
+    there's no need for ink to use scan or fax, Canon is sued by its
+    customers for this malicious behavior. The proprietary software
+    installed on Canon machines arbitrarily restricts users from using
+    their device as they wish.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202106220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Peloton company which produces treadmills recently &lt;a
+    
href="https://www.bleepingcomputer.com/news/technology/peloton-tread-owners-now-forced-into-monthly-subscription-after-recall/"&gt;locked
+    people out of basic features of people's treadmills by a software
+    update&lt;/a&gt;. The company now asks people for a membership/subscription
+    for what people already paid for.&lt;/p&gt;
+
+    &lt;p&gt;The software used in the treadmill is proprietary and probably
+    includes back doors to force software updates. It teaches the lesson
+    that if a product talks to external networks, you must expect it to
+    take in new malware.&lt;/p&gt;
+
+    &lt;p&gt;Please note that the company behind this product said they
+    are working to reverse the changes so people will no longer need
+    subscription to use the locked feature.&lt;/p&gt;
+
+    &lt;p&gt;Apparently public anger made the company back down. If we want 
that
+    to be our safety, we need to build up the anger against malicious
+    features (and the proprietary software that is their entry path)
+    to the point that even the most powerful companies don't dare.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A game published on Facebook &lt;a
+    <span 
class="removed"><del><strong>href="https://www.revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/"&gt;aimed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/"&gt;aimed</em></ins></span>
+    at leading children to spend&lt;/a&gt; large amounts of their parents'
+    money without explaining it to them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some proprietary &lt;a
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases"&gt;</em></ins></span>
+    games lure children to spend their parents' money&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2019, 2020, <span 
class="removed"><del><strong>2021</strong></del></span> <span 
class="inserted"><ins><em>2021, 2022</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-obsolescence.pt-br-diff.html
===================================================================
RCS file: po/proprietary-obsolescence.pt-br-diff.html
diff -N po/proprietary-obsolescence.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-obsolescence.pt-br-diff.html 12 Jun 2022 16:30:13 -0000      
1.1
@@ -0,0 +1,263 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-obsolescence.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Proprietary Obsolescence - GNU Project - Free Software 
Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-obsolescence.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By type&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Proprietary Obsolescence&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;p&gt;Programmed obsolescence is one of the malicious functionalities that
+may be designed into proprietary software.&lt;/p&gt;
+
+&lt;p&gt;Computer technology inevitably has an environmental impact, but
+proprietary software makes it worse because it is often designed to lead
+or pressure users to discard devices sooner because support for them has
+ceased, or to discard defective hardware which could have been made
+repairable.&lt;/p&gt;
+
+&lt;p&gt;Here are examples of proprietary programs that make hardware devices
+prematurely obsolete.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="column-limit" id="proprietary-obsolescence"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202101040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The personal finance management software &ldquo;Quicken&rdquo; 
&lt;a
+    href="https://www.quicken.com/support/quicken-discontinuation-policy"&gt;
+    has a discontinuation policy, a.k.a. planned obsolescence&lt;/a&gt;, which 
is
+    an injustice to users. A free (as in freedom) program would let users
+    control the software. But when you use a proprietary software,
+    you won't be in control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;ChromeBooks are programmed for obsolescence:
+    ChromeOS has a universal back door that is used for updates and &lt;a
+    <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;</em></ins></span>
+    ceases to operate at a predefined date&lt;/a&gt;. From then on, there
+    appears to be no support whatsoever for the computer.&lt;/p&gt;
+
+    &lt;p&gt;In other words, when you stop getting screwed by the back door,
+    you start getting screwed by the obsolescence.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The British supermarket Tesco sold tablets which were tethered
+    to Tesco's server for reinstalling default settings.  Tesco &lt;a
+    
href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix"&gt;
+    turned off the server for old models&lt;/a&gt;, so now if you try to
+    reinstall the default settings, it bricks them instead.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple and Samsung deliberately &lt;a
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force users to buy their newer
+    phones&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201706060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple will stop &lt;a
+    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
+    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
+    that's the nature of proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201604050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
+    temperature, etc.  Its proprietary software depends on a remote server
+    to do these tasks.  On May 15th, 2016, Google/Alphabet &lt;a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;intentionally
+    broke it by shutting down the server&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If it were free software, users would have the ability to make it
+    work again, differently, and then have a freedom-respecting home
+    instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
+    control your devices and turn them into $300 out-of-warranty
+    bricks. Insist on self-contained computers that run free 
software!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li <span class="inserted"><ins><em>id="M201603060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Electronic Arts &lt;a
+    
href="https://techraptor.net/gaming/news/darkspore-servers-shut-down"&gt;made
+    one of its games permanently unplayable&lt;/a&gt; by shutting down its
+    servers. This game was heavily reliant on the company's servers,
+    and because the software is proprietary, users can't modify it to
+    make it connect to some other server. If the game were free, people
+    could still play what they purchased.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201601100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The &lt;a
+    <span 
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://michaelweinberg.org/post/137045828005/free-the-cube"&gt;</em></ins></span>
+    &ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it
+    won't accept third-party printing materials.  It is the Keurig of
+    printers.  Now it is being discontinued, which means that eventually
+    authorized materials won't be available and the printers may become
+    unusable.&lt;/p&gt;
+
+    &lt;p&gt;With a &lt;a
+    <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;</em></ins></span>
+    printer that gets the Respects Your Freedom&lt;/a&gt;, this problem would
+    not even be a remote possibility.&lt;/p&gt;
+
+    &lt;p&gt;How pitiful that the author of that article says that there was
+    &ldquo;nothing wrong&rdquo; with designing the device to restrict
+    users in the first place.  This is like putting a &ldquo;cheat me and
+    mistreat me&rdquo; sign on your chest.  We should know better: we
+    should condemn all companies that take advantage of people like him. 
+    Indeed, it is the acceptance of their unjust practice that teaches
+    people to be doormats.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2019, 2020, <span 
class="removed"><del><strong>2021</strong></del></span> <span 
class="inserted"><ins><em>2021, 2022</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-sabotage.pt-br-diff.html
===================================================================
RCS file: po/proprietary-sabotage.pt-br-diff.html
diff -N po/proprietary-sabotage.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-sabotage.pt-br-diff.html     12 Jun 2022 16:30:13 -0000      
1.1
@@ -0,0 +1,928 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-sabotage.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Proprietary Sabotage - GNU Project - Free Software 
Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+&lt;!--#include virtual="/proprietary/po/proprietary-sabotage.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By type&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Proprietary Sabotage&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;p&gt;Some malicious functionalities mediate sabotage, i.e. abusive
+interference of the developer into the use of the software, with harmful
+consequences for the users. Examples of such situations are listed 
below.&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202111201"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;NordicTrack, a company that sells
+    exercise machines with ability to show videos &lt;a
+    
href="https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/"&gt;limits
+    what people can watch, and recently disabled a feature&lt;/a&gt; that was
+    originally functional. This happened through automatic update and
+    probably involved a universal back door.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202110130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Adobe &lt;a
+    
href="https://web.archive.org/web/20211014123717/https://pluralistic.net/2021/10/13/theres-an-app-for-that/#gnash"&gt;has
+    licensed its Flash Player to China's Zhong Cheng Network&lt;/a&gt; who is
+    offering the program bundled with spyware and a back door that can
+    remotely deactivate it.&lt;/p&gt;
+
+    &lt;p&gt;Adobe is responsible for this since they gave Zhong Cheng
+    Network permission to do this.  This injustice involves 
&ldquo;misuse&rdquo; of
+    the DMCA, but &ldquo;proper,&rdquo; intended use of the DMCA is a much 
bigger
+    injustice.  There is &lt;a href="/philosophy/right-to-read.html"&gt;a 
series
+    of errors related to DMCA&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202105040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A motorcycle company named Klim is selling airbag
+    vests with different payment methods, one of them is through a &lt;a
+    
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment"&gt;proprietary
+    subscription-based option that will block the vest from inflating if
+    the payments don't go through&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;They say there is a 30-days grace period if you miss a payment
+    but the grace period is no excuse to the insecurity.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202011120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has &lt;a
+    <span 
class="removed"><del><strong>href="https://sneak.berlin/20201112/your-computer-isnt-yours"&gt;implemented</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://sneak.berlin/20201112/your-computer-isnt-yours/"&gt;implemented</em></ins></span>
+    a malware in its computers that imposes surveillance&lt;/a&gt; on users
+    and reports users' computing to Apple.&lt;/p&gt;
+
+    &lt;p&gt;The reports are even unencrypted and they've been leaking this
+    data for two years already. This malware is reporting to Apple what
+    user opens what program at what time. It also gives Apple
+    power to sabotage users' computing.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202011060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A new app published by Google &lt;a
+    
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
+    banks and creditors deactivate people's Android devices&lt;/a&gt; if they
+    fail to make payments. If someone's device gets deactivated, it will
+    be limited to basic functionality, such as emergency calling and
+    access to settings.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202010120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Samsung is forcing its smartphone users in Hong Kong (and Macau) 
&lt;a
+    
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/"&gt;to
+    use a public DNS in Mainland China&lt;/a&gt;, using software update 
released
+    in September 2020, which causes many unease and privacy concerns.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202008182"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Oculus headsets &lt;a
+    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
+    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
+    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202007270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Mellow sous-vide cooker is
+    tethered to a server. The company suddenly &lt;a
+    
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"&gt;
+    turned this tethering into a subscription&lt;/a&gt;, forbidding users from
+    taking advantage of the &ldquo;advanced features&rdquo; of the cooker
+    unless they pay a monthly fee.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201912090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910071"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Adobe has &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/"&gt;
+    cancelled the software subscriptions of all users in
+    Venezuela&lt;/a&gt;. This demonstrates how a requirement for subscription 
can be
+    turned into a tool for sabotage.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201909160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tesla users claim Tesla &lt;a
+    
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW"&gt;force-installed
+    software to cut down on battery range&lt;/a&gt;, rather than replace the
+    defective batteries. Tesla did this to avoid having to run their
+    warranty.&lt;/p&gt;
+
+    &lt;p&gt;This means that proprietary software can potentially be a way to
+    commit perjury with impunity.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;When Apple suspects a user of fraud, it
+    judges the case secretly and presents the verdict
+    as a fait accompli.  The punishment to a user found guilty &lt;a
+    
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/"&gt;is
+    being cut off for life, which more-or-less cripples the user's Apple
+    devices forever&lt;/a&gt;.  There is no appeal.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904041"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft has been  &lt;a
+    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
+    force-installing a &ldquo;remediation&rdquo;
+    program&lt;/a&gt; on computers running certain
+    versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
+    <span 
class="removed"><del><strong>href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a"&gt;</em></ins></span>
+    tampering with users' settings and files&lt;/a&gt;, notably to
+    &ldquo;repair&rdquo; any components of the updating system that users
+    may have intentionally disabled, and thus regain full power over
+    them. Microsoft repeatedly pushed faulty versions of this program to
+    users' machines, causing numerous problems, some of which &lt;a
+    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
+    critical&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This exemplifies the arrogant and manipulative attitude
+    that proprietary software developers have learned to adopt
+    toward the people they are supposedly serving. Migrate to a &lt;a
+    href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
+    can!&lt;/p&gt;
+
+    &lt;p&gt;If your employer makes you run Windows, tell the financial
+    department how this wastes your time dealing with endless connections
+    and premature hardware failures.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
+    their DRM is valid by connecting to the store every time their
+    &ldquo;owner&rdquo; wants to read them. Microsoft is going to close
+    this store, &lt;a href="https://www.bbc.com/news/technology-47810367"&gt;
+    bricking all DRM'ed ebooks it has ever &ldquo;sold&rdquo;&lt;/a&gt;. (The
+    article additionally highlights the pitfalls of DRM.)&lt;/p&gt;
+
+    &lt;p&gt;This is another proof that a DRM-encumbered product doesn't belong
+    to the person who bought it. Microsoft said it will refund customers,
+    but this is no excuse for selling them restricted books.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The British supermarket Tesco sold tablets which were tethered
+    to Tesco's server for reinstalling default settings.  Tesco &lt;a
+    
href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix"&gt;
+    turned off the server for old models&lt;/a&gt;, so now if you try to
+    reinstall the default settings, it bricks them instead.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to be
+    on Google Play had one or more malicious functionalities, such
+    as stealing users' photos instead of &ldquo;beautifying&rdquo; them, &lt;a
+    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+    pushing unwanted and often malicious ads on users, and redirecting them
+    to phishing sites&lt;/a&gt; that stole their credentials. Furthermore, the
+    user interface of most of them was designed to make uninstallation
+    difficult.&lt;/p&gt;
+
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple and Samsung deliberately &lt;a
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force users to buy their newer
+    phones&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://www.vice.com/en/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
+    app.  In 2017, the company shut down and made the app stop working. &lt;a
+    
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
+    the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on a further nasty fillip, that sales of the
+    broken devices continued. But we think that is a secondary issue;
+    it made the nasty consequences extend to some additional people.
+    The fundamental wrong was to design the devices to depend on something
+    else that didn't respect users' freedom.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201806250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The game Metal Gear Rising for
+    MacOS was tethered to a server.  The company &lt;a
+    <span 
class="removed"><del><strong>href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;</em></ins></span>
+    shut down the server, and all copies stopped working&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201805310"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has &lt;a
+    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
+    Telegram in Russia.&lt;/p&gt;
+
+    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Logitech will sabotage
+    all Harmony Link household control devices by &lt;a
+    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
+    turning off the server through which the products' supposed owners
+    communicate with them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The owners suspect this is to pressure them to buy a newer model. 
If
+    they are wise, they will learn, rather, to distrust any product that
+    requires users to talk with them through some specialized 
service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201710044"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
+    <span 
class="removed"><del><strong>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/230582/apple-file-system-apfs-faq.html"&gt;</em></ins></span>
+    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201710040.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Canary home surveillance
+    camera has been sabotaged by its manufacturer, &lt;a
+    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+    turning off many features unless the user starts paying for a
+    subscription&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With manufacturers like these, who needs security 
breakers?&lt;/p&gt;
+
+    &lt;p&gt;The purchasers should learn the larger lesson and reject connected
+    appliances with embedded proprietary software. Every such product is
+    a temptation to commit sabotage.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201709090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tesla used software to limit customers to using just &lt;a
+    
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;part
+    of the battery of some cars&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201708230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Sonos &lt;a
+    <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;</em></ins></span>
+    told all its customers, &ldquo;Agree&rdquo;
+    to snooping or the product will stop working&lt;/a&gt;.  &lt;a
+    
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
+    Another article&lt;/a&gt; says they won't forcibly change the software, but
+    people won't be able to get any upgrades and eventually it will
+    stop working.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201706060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple will stop &lt;a
+    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
+    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
+    that's the nature of proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201705180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Bird and rabbit pets were implemented for Second
+    Life by a company that tethered their food to a server.  &lt;a
+    <span 
class="removed"><del><strong>href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/second-life-ozimals-pet-rabbits-dying"&gt;</em></ins></span>
+    It shut down the server and the pets more or less died&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704194"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft has made Windows 7
+    and 8 cease to function on certain new computers, &lt;a
+    <span 
class="removed"><del><strong>href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that"&gt;effectively</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-US/troubleshoot/windows-client/deployment/processor-not-supported-together-with-windows-version"&gt;effectively</em></ins></span>
+    forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704134"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft &lt;a
+    
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
+    has dropped support for Windows 7 and 8 on recent processors&lt;/a&gt;
+    in a big hurry.&lt;/p&gt;
+
+    &lt;p&gt;It makes no difference what legitimate reasons Microsoft might
+    have for not doing work to support them. If it doesn't want to do
+    this work, it should let users do the work.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Anova sabotaged users' cooking devices
+    with a downgrade that tethered them to a remote server. &lt;a
+    
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/"&gt;Unless
+    users create an account on Anova's servers, their cookers won't
+    function&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="iphone7-sabotage"&gt;The
+    iPhone 7 contains DRM specifically designed to &lt;a
+    
href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+    brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
+    &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(The article uses the term &ldquo;lock&rdquo;
+    to describe the DRM, but we prefer to use the term &lt;a
+    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
+    handcuffs&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The developer of Ham Radio Deluxe &lt;a
+    <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml"&gt;sabotaged</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/2016/12/22/software-company-shows-how-not-to-handle-negative-review/"&gt;sabotaged</em></ins></span>
+    a customer's installation as punishment for posting a negative
+    review&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Most proprietary software companies don't use their power so
+    harshly, but it is an injustice that they all &lt;em&gt;have&lt;/em&gt; 
such
+    power.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;HP's firmware downgrade &lt;a
+    
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update"&gt;imposed
+    DRM on some printers, which now refuse to function with third-party
+    ink cartridges&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201606270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="windows10-forcing"&gt;In its efforts to trick users of Windows
+    7 and 8 into installing all-spying Windows 10 against their
+    will, Microsoft forced their computers to &lt;a
+    
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
+    silently download&hellip; the whole of Windows 10&lt;/a&gt;! Apparently,
+    this was done through a &lt;a
+    href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
+    universal back door&lt;/a&gt;. Not only did the unwanted downloads &lt;a
+    <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2016/06/03/windows_10_upgrade_satellite_link/"&gt;</em></ins></span>
+    jeopardize important operations in regions of the world with poor
+    connectivity&lt;/a&gt;, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a &lt;a
+    <span 
class="removed"><del><strong>href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;</em></ins></span>
+    downgrade&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201606080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple &lt;a
+    <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2016/04/14/uninstall_quicktime_for_windows/"&gt;</em></ins></span>
+    stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
+    while refusing to fix them itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201606010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Once Microsoft has tricked a user
+    into accepting installation of Windows 10, &lt;a
+    <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.com/2016/06/01/windows_10_nagware_no_way_out/"&gt;they</em></ins></span>
+    find that they are denied the option to cancel or even postpone the
+    imposed date of installation&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This demonstrates what we've said for years: using proprietary
+    software means letting someone have power over you, and you're going
+    to get screwed sooner or later.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Apple Music client program &lt;a
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+    the user's file system for music files, copies them to an Apple server,
+    and deletes them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201604050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
+    temperature, etc.  Its proprietary software depends on a remote server
+    to do these tasks.  On May 15th, 2016, Google/Alphabet &lt;a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;intentionally
+    broke it by shutting down the server&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If it were free software, users would have the ability to make it
+    work again, differently, and then have a freedom-respecting home
+    instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
+    control your devices and turn them into $300 out-of-warranty
+    bricks. Insist on self-contained computers that run free 
software!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li <span class="inserted"><ins><em>id="M201603060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Electronic Arts &lt;a
+    
href="https://techraptor.net/gaming/news/darkspore-servers-shut-down"&gt;made
+    one of its games permanently unplayable&lt;/a&gt; by shutting down its
+    servers. This game was heavily reliant on the company's servers,
+    and because the software is proprietary, users can't modify it to
+    make it connect to some other server. If the game were free, people
+    could still play what they purchased.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201602050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iOS version 9 for iThings &lt;a
+    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if they were repaired by someone other than
+    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that this
+    was wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201601310"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;FTDI's proprietary driver
+    for its USB-to-serial chips has been designed to &lt;a
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage</em></ins></span>
+    alternative compatible chips&lt;/a&gt;
+    so that they no longer work. Microsoft is &lt;a
+    <span 
class="removed"><del><strong>href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing</em></ins></span>
+    this automatically&lt;/a&gt; as an &ldquo;upgrade&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201512140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs had initially been
+    designed to interact with other companies' smart light bulbs, but &lt;a
+    <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/2015/12/14/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update/"&gt;</em></ins></span>
+    later the company updated the firmware to disallow
+    interoperability&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build it,
+    it is cleverly serving its manufacturer &lt;em&gt;against 
you&lt;/em&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511244"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has long had &lt;a
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a</em></ins></span>
+    back door to remotely unlock an Android device&lt;/a&gt;, unless its disk
+    is encrypted (possible since Android 5.0 Lollipop, but still not
+    quite the default).&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Windows 10 &ldquo;upgrades&rdquo; &lt;a
+    
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
+    delete applications&lt;/a&gt; without asking permission.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201510020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple forced millions of iThings to &lt;a
+    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
+    a system upgrade without asking the users&lt;/a&gt;. Apple did not
+    forcibly install the upgrade but the downloading alone caused lots
+    of trouble.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+    Lenovo stealthily installed crapware and spyware via
+    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
+    sabotage method Lenovo used did not affect GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+    own malware&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201504300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Vizio &lt;a
+    <span 
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201504090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Mac OS X had an &lt;a
+    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+    intentional local back door for 4 years&lt;/a&gt;, which could be exploited
+    by attackers to gain root privileges.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201503260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20191205010621/https://www.computerworld.com/article/3423768/windows-xp--end-of-an-era--end-of-an-error.html"&gt;Microsoft
+    cut off security fixes for Windows XP, except to some big users that
+    pay exorbitantly&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft is going to &lt;a
+    
href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"&gt;
+    cut off support for some Internet Explorer versions&lt;/a&gt; in the same
+    way.&lt;/p&gt;
+
+    &lt;p&gt;A person or company has the right to cease to work on a particular
+    program; the wrong here is Microsoft does this after having made the
+    users dependent on Microsoft, because they are not free to ask anyone
+    else to work on the program for them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201503210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Amazon &lt;a
+    <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/"&gt;</em></ins></span>
+    downgraded the software in users' Swindles&lt;/a&gt; so that those already
+    rooted would cease to function at all.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201412040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple &lt;a
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;</em></ins></span>
+    deleted from iPods the music that users had got from internet music
+    stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms"&gt;Nintendo
+    remotely sabotaged all Wiis, making them refuse to work unless the
+    user agrees to a new EULA&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We can be quite sure this EULA is unjust because injustice is the
+    only motive for imposing an EULA.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201405200.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;LG &lt;a
+    <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/"&gt;</em></ins></span>
+    disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
+    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
+    to snoop on them and distribute their personal data.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some proprietary &lt;a
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases"&gt;</em></ins></span>
+    games lure children to spend their parents' money&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201309054"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    <span 
class="removed"><del><strong>href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;The</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;The</em></ins></span>
+    NSA has put back doors into nonfree encryption software&lt;/a&gt;. We don't
+    know which ones they are, but we can be sure they include some widely
+    used systems.  This reinforces the point that you can never trust
+    the security of nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201306220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;Microsoft
+    informs the NSA of bugs in Windows before fixing them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201305060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Adobe applications have time bombs: they &lt;a
+    <span 
class="removed"><del><strong>href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/"&gt;</em></ins></span>
+    stop working after a certain time&lt;/a&gt;, after which the user
+    must pay to extend the time.&lt;/p&gt;
+
+    &lt;p&gt;Once there was a problem with the servers
+    that these programs use to check who has paid, and &lt;a
+    
href="https://web.archive.org/web/20150120010845/http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out"&gt;
+    the applications refused to work for anyone&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201301280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Oracle's nonfree Java plug-in for browsers &lt;a
+    <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/"&gt;sneakily</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/"&gt;sneakily</em></ins></span>
+    installs other annoying proprietary software&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That article disregards all other bad things
+    about proprietary software.  For instance, it regards
+    the inclusion of proprietary Flash Player (which has a &lt;a
+    
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;surveillance
+    feature&lt;/a&gt; and DRM) in Chrome as a good thing.  Chrome is a
+    proprietary browser with a universal back door.&lt;/p&gt;
+
+    &lt;p&gt;We don't agree with the article's views on those issues, but we
+    present it as a factual reference.&lt;/p&gt;
+
+    &lt;p&gt;In 2014, &lt;a
+    
href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;
+    Oracle insisted on continuing this practice&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201003300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Sony &lt;a
+    
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3"&gt;sabotaged
+    the Playstation 3&lt;/a&gt; with a firmware downgrade that removed the
+    feature that allowed users to run GNU/Linux on it.&lt;/p&gt;
+
+    &lt;p&gt;Sony subsequently sent police after Geohot, after he cracked the
+    code that blocked users from changing the firmware, and we responded by
+    calling for a &lt;a href="http://boycottsony.org"&gt;boycott of 
Sony&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In a court settlement Sony is &lt;a
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/"&gt;</em></ins></span>
+    now paying for the sabotage&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200709270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2007-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+    unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
+    not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+    censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2013, <span 
class="removed"><del><strong>2015-2021</strong></del></span> <span 
class="inserted"><ins><em>2015-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-tyrants.pt-br-diff.html
===================================================================
RCS file: po/proprietary-tyrants.pt-br-diff.html
diff -N po/proprietary-tyrants.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-tyrants.pt-br-diff.html      12 Jun 2022 16:30:13 -0000      
1.1
@@ -0,0 +1,229 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-tyrants.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Proprietary Tyrants - GNU Project - Free Software 
Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/proprietary-tyrants.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By type&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Proprietary Tyrants&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;p&gt;A &lt;em&gt;tyrant&lt;/em&gt; is a malicious device that refuses to 
allow users to
+install a different operating system or a modified operating
+system.  These devices have measures to block execution of anything
+other than the &ldquo;approved&rdquo; system versions.  We also
+refer to this practice as &lt;em&gt;tivoization&lt;/em&gt;.
+&lt;/p&gt;
+
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="column-limit" id="proprietary-tyrants"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201607150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft accidentally left a way for users
+    to install GNU/Linux on Windows RT tablets, but now it has &lt;a
+    <span 
class="removed"><del><strong>href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/"&gt;</em></ins></span>
+    &ldquo;fixed&rdquo; the &ldquo;error&rdquo;&lt;/a&gt;. They have the gall
+    to call this &ldquo;protecting&rdquo; the users.  The article talks
+    of installing &ldquo;Linux&rdquo;, but the context shows it is really
+    &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt; that users 
install.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201412010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple arbitrarily &lt;a
+    <span 
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;blocks</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;blocks</em></ins></span>
+    users from installing old versions of iOS&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201403150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://soylentnews.org/article.pl?sid=14/03/15/1912255"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://soylentnews.org/article.pl?sid=14/03/15/1912255"&gt;</em></ins></span>
+    Intel processors will have tyrant software built in&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201304080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Motorola, then owned by Google, made &lt;a
+    
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html"&gt;
+    Android phones that are tyrants&lt;/a&gt; (though someone found a way to
+    crack the restriction).&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201212180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Samsung &ldquo;Smart&rdquo; TVs have &lt;a
+    
href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
+    turned Linux into the base for a tyrant system&lt;/a&gt; so as to impose
+    DRM.  What enables Samsung to do this is that Linux is released
+    under GNU GPL version 2, &lt;a
+    href="/licenses/rms-why-gplv3.html"&gt;not version 3&lt;/a&gt;, together 
with
+    a weak interpretation of GPL version 2.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201210020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some LG TVs &lt;a
+    
href="https://web.archive.org/web/20190917164647/http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;
+    are tyrants&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201205280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Apple iThings are tyrant devices.  There is a
+    port of Android to the iThings, but installing it requires &lt;a
+    
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status"&gt;
+    finding a bug or &ldquo;exploit&rdquo;&lt;/a&gt; to make it possible to
+    install a different system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201110110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;</em></ins></span>
+    Mobile devices that come with Windows 8 are tyrants&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201105070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a href="https://www.defectivebydesign.org/sony"&gt;The 
Playstation
+    3 is a tyrant&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2021</strong></del></span> <span 
class="inserted"><ins><em>2014-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2022/06/12 16:30:13 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]