www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po all.fr.po all.pot all.pt-br-...


From: GNUN
Subject: www/proprietary/po all.fr.po all.pot all.pt-br-...
Date: Wed, 15 Mar 2023 07:04:34 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     23/03/15 07:04:33

Modified files:
        proprietary/po : all.fr.po all.pot all.pt-br-diff.html 
                         all.pt-br.po all.ru.po de.po es.po fr.po it.po 
                         ja.po malware-microsoft.de-diff.html 
                         malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.pt-br-diff.html 
                         malware-microsoft.pt-br.po 
                         malware-microsoft.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.pt-br-diff.html 
                         proprietary-surveillance.pt-br.po 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br-diff.html 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.tr.po proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.433&r2=1.434
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.668&r2=1.669
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.765&r2=1.766
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.433&r2=1.434
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.441&r2=1.442
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pt-br-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pt-br.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.297&r2=1.298
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.434&r2=1.435
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.433&r2=1.434
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.432&r2=1.433
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.445&r2=1.446
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.739&r2=1.740
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.317&r2=1.318
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.457&r2=1.458
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.335&r2=1.336
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.438&r2=1.439
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.377&r2=1.378
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.811&r2=1.812
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.362&r2=1.363
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.656&r2=1.657
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.653&r2=1.654
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.372&r2=1.373
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.387&r2=1.388
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.377&r2=1.378
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.370&r2=1.371
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.373&r2=1.374
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.361&r2=1.362
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.390&r2=1.391
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.353&r2=1.354
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.350&r2=1.351
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.523&r2=1.524
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.666&r2=1.667
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.318&r2=1.319
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.392&r2=1.393
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.352&r2=1.353
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.340&r2=1.341
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.520&r2=1.521
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.911&r2=1.912
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.345&r2=1.346
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.433&r2=1.434

Patches:
Index: all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- all.fr.po   21 Feb 2023 11:38:22 -0000      1.183
+++ all.fr.po   15 Mar 2023 11:04:17 -0000      1.184
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2023-02-21 12:37+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -90,6 +91,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "

Index: all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- all.pot     21 Feb 2023 11:03:10 -0000      1.99
+++ all.pot     15 Mar 2023 11:04:17 -0000      1.100
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -81,6 +81,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a "
+"href=\"https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html\";>Windows
 "
+"11 starts to send data to online servers.</a> The user's personal details, "
+"location or hardware information are reported to Microsoft and other "
+"companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a "
 
"href=\"https://www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-millions-gamers-bereft\";>
 "
 "World of Warcraft to go offline in China</a>. The shutdown may not be "

Index: all.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- all.pt-br-diff.html 21 Feb 2023 11:03:10 -0000      1.51
+++ all.pt-br-diff.html 15 Mar 2023 11:04:17 -0000      1.52
@@ -62,7 +62,17 @@
   to detect once 
installed...&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;</em></ins></span>
 
 &lt;ul class="blurbs"&gt;
-&lt;!--#set var='ADD' <span class="inserted"><ins><em>value='2023-01-29' 
--&gt;&lt;!--#set var='PUB' value='2023-01-23' --&gt;&lt;li&gt;&lt;small 
class='date-tag'&gt;Added: &lt;span 
class="gnun-split"&gt;&lt;/span&gt;&lt;!--#echo encoding='none' var='ADD' 
--&gt;&lt;span class="gnun-split"&gt;&lt;/span&gt; &mdash; Latest reference: 
&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!--#echo encoding='none' 
var='PUB' --&gt;&lt;/small&gt;
+&lt;!--#set var='ADD' <span class="inserted"><ins><em>value='2023-03-15' 
--&gt;&lt;!--#set var='PUB' value='2023-02-08' --&gt;&lt;li&gt;&lt;small 
class='date-tag'&gt;Added: &lt;span 
class="gnun-split"&gt;&lt;/span&gt;&lt;!--#echo encoding='none' var='ADD' 
--&gt;&lt;span class="gnun-split"&gt;&lt;/span&gt; &mdash; Latest reference: 
&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!--#echo encoding='none' 
var='PUB' --&gt;&lt;/small&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
+&lt;!--#set var='ADD' value='2023-01-29' --&gt;&lt;!--#set var='PUB' 
value='2023-01-23' --&gt;&lt;li&gt;&lt;small class='date-tag'&gt;Added: 
&lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!--#echo encoding='none' 
var='ADD' --&gt;&lt;span class="gnun-split"&gt;&lt;/span&gt; &mdash; Latest 
reference: &lt;span class="gnun-split"&gt;&lt;/span&gt;&lt;!--#echo 
encoding='none' var='PUB' --&gt;&lt;/small&gt;
     &lt;p&gt;A dispute between Blizzard and one of its partners caused &lt;a
     
href="https://www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-millions-gamers-bereft"&gt;
     World of Warcraft to go offline in China&lt;/a&gt;. The shutdown may not be
@@ -3067,7 +3077,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/02/21 11:03:10 $
+$Date: 2023/03/15 11:04:17 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- all.pt-br.po        21 Feb 2023 11:03:10 -0000      1.101
+++ all.pt-br.po        15 Mar 2023 11:04:17 -0000      1.102
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -88,6 +88,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "

Index: all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- all.ru.po   21 Feb 2023 11:33:34 -0000      1.176
+++ all.ru.po   15 Mar 2023 11:04:17 -0000      1.177
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2021-04-27 13:06+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -95,6 +96,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "

Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.433
retrieving revision 1.434
diff -u -b -r1.433 -r1.434
--- de.po       4 Mar 2023 17:02:30 -0000       1.433
+++ de.po       15 Mar 2023 11:04:17 -0000      1.434
@@ -317,6 +317,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -6030,6 +6041,13 @@
 "Wie diese Auflistungen zeigen, ist die erste zu löschende Software, sofern "
 "man seinen Rechner von Schadsoftware befreien möchte,  Windows."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014-] {+2014-2023+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Deception-] {+Manipulation+} - GNU Project - Free Software
 # | Foundation
@@ -15401,9 +15419,9 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2022,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+550+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 670 references to
+# | As of [-April, 2017,-] {+March, 2023,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+550+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 680 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -15411,9 +15429,9 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
 "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt sind "
@@ -17755,6 +17773,20 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten 
"
+#~ "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt "
+#~ "sind (Stand 2017-04)."
+
+#, fuzzy
+#~| msgid ""
 #~| "Many web sites report all their visitors to Google by using the Google "
 #~| "Analytics service, which <a href=\"http://www.pcworld.idg.com.au/";
 #~| "article/434164/"

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.668
retrieving revision 1.669
diff -u -b -r1.668 -r1.669
--- es.po       5 Mar 2023 11:30:39 -0000       1.668
+++ es.po       15 Mar 2023 11:04:18 -0000      1.669
@@ -257,6 +257,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -7108,6 +7119,10 @@
 "<cite>malware</cite> de su ordenador, lo primero que tiene que eliminar es "
 "Windows."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
 msgstr ""
@@ -13660,10 +13675,19 @@
 "radiocomunicaciones antes que al software concreto que utilizan."
 
 #. type: Content of: <div><p>
-msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+# | As of [-September, 2022,-] {+March, 2023,+} the pages in this directory
+# | list around 550 instances of malicious functionalities (with more than
+# | 6[-7-]{+8+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2022, the pages in this directory list around 550 "
+#| "instances of malicious functionalities (with more than 670 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "En septiembre de 2022, las páginas de este directorio ofrecen una lista de "
 "alrededor de 550 ejemplos de funcionalidades maliciosas (con más de 670 "
@@ -15125,3 +15149,13 @@
 #. type: Content of: <div><div><dl><dd><ul><li>
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "En septiembre de 2022, las páginas de este directorio ofrecen una lista "
+#~ "de alrededor de 550 ejemplos de funcionalidades maliciosas (con más de "
+#~ "670 referencias de apoyo), pero seguramente hay miles más que "
+#~ "desconocemos."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.765
retrieving revision 1.766
diff -u -b -r1.765 -r1.766
--- fr.po       4 Mar 2023 17:24:10 -0000       1.765
+++ fr.po       15 Mar 2023 11:04:19 -0000      1.766
@@ -248,6 +248,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -7104,6 +7115,10 @@
 "Comme le montre cette page, si vous voulez débarrasser votre ordinateur des "
 "logiciels malveillants, le premier à supprimer est Windows."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
 msgstr ""
@@ -13677,10 +13692,19 @@
 "téléphones."
 
 #. type: Content of: <div><p>
-msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+# | As of [-September, 2022,-] {+March, 2023,+} the pages in this directory
+# | list around 550 instances of malicious functionalities (with more than
+# | 6[-7-]{+8+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2022, the pages in this directory list around 550 "
+#| "instances of malicious functionalities (with more than 670 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "En septembre 2022, les pages de ce répertoire dénombraient à peu près 550 
"
 "cas de fonctionnalités malveillante (appuyés par plus de 670 références), 
"
@@ -15138,3 +15162,12 @@
 #. type: Content of: <div><div><dl><dd><ul><li>
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "En septembre 2022, les pages de ce répertoire dénombraient à peu près 
550 "
+#~ "cas de fonctionnalités malveillante (appuyés par plus de 670 
références), "
+#~ "mais il y en a sûrement des milliers d'autres dont nous ne savons rien."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.433
retrieving revision 1.434
diff -u -b -r1.433 -r1.434
--- it.po       4 Mar 2023 17:02:32 -0000       1.433
+++ it.po       15 Mar 2023 11:04:20 -0000      1.434
@@ -319,6 +319,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -5801,6 +5812,13 @@
 "Come mostrato da questa pagina, se si vuole ripulire il proprio computer dal "
 "malware, il primo programma da disinstallare è Windows."
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2014-] {+2014-2023+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-DRM-] {+Manipulation+} - GNU Project - Free Software
 # | Foundation
@@ -14105,9 +14123,9 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2022,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+550+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 670 references to
+# | As of [-April, 2017,-] {+March, 2023,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+550+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 680 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -14115,9 +14133,9 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
 "ma sicuramente ce ne sono altre migliaia che ancora non conosciamo."
@@ -16284,6 +16302,20 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità "
+#~ "malevole, ma sicuramente ce ne sono altre migliaia che ancora non "
+#~ "conosciamo."
+
+#, fuzzy
+#~| msgid ""
 #~| "Many web sites report all their visitors to Google by using the Google "
 #~| "Analytics service, which <a href=\"http://www.pcworld.idg.com.au/";
 #~| "article/434164/"

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.441
retrieving revision 1.442
diff -u -b -r1.441 -r1.442
--- ja.po       4 Mar 2023 17:02:33 -0000       1.441
+++ ja.po       15 Mar 2023 11:04:21 -0000      1.442
@@ -270,6 +270,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -5234,6 +5245,12 @@
 
"このページが示すように、もし、コンピュータからマルウェアをキレイにしたいなら"
 "ば、最初に削除するソフトウェアはウィンドウズです。"
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2014 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
 msgstr ""
@@ -11696,9 +11713,9 @@
 #| "instances of malicious functionalities, but there are surely thousands "
 #| "more we don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 
"2017年1月時点で、ここには、約260の異なる悪意のある機能の実例が掲載されていま"
 
"すが、確実にわたしたちが知らない何千もの例があるでしょう。"
@@ -13199,6 +13216,19 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "As of January, 2017, the files in this directory list around 260 "
+#~| "instances of malicious functionalities, but there are surely thousands "
+#~| "more we don't know about."
+#~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ 
"2017年1月時点で、ここには、約260の異なる悪意のある機能の実例が掲載されてい"
+#~ 
"ますが、確実にわたしたちが知らない何千もの例があるでしょう。"
+
+#, fuzzy
+#~| msgid ""
 #~| "Many web sites report all their visitors to Google by using the Google "
 #~| "Analytics service, which <a href=\"http://www.pcworld.idg.com.au/";
 #~| "article/434164/"

Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- malware-microsoft.de-diff.html      13 Dec 2022 16:03:50 -0000      1.97
+++ malware-microsoft.de-diff.html      15 Mar 2023 11:04:22 -0000      1.98
@@ -741,7 +741,7 @@
 
 &lt;h3 <span class="removed"><del><strong>id="interference"&gt;Microsoft 
Interference&lt;/h3&gt;
 
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span> <span 
class="inserted"><ins><em>id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the</strong></del></span> 
<span class="inserted"><ins><em>id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201507150"&gt;
@@ -749,12 +749,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft Office forces users &lt;a
     
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
-    subscribe</em></ins></span> to <span class="removed"><del><strong>qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Microsoft is planning</strong></del></span> <span 
class="inserted"><ins><em>Office 365</em></ins></span> to <span 
class="removed"><del><strong>make Windows</strong></del></span> <span 
class="inserted"><ins><em>be able to create/edit documents&lt;/a&gt;.&lt;/p&gt;
+    subscribe to Office 365 to be able to create/edit 
documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -762,6 +757,23 @@
 &lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The</em></ins></span> 
user's <span class="removed"><del><strong>system. They are like sabotage, but 
they</strong></del></span> <span class="inserted"><ins><em>personal
+    details, location or hardware information</em></ins></span> are <span 
class="removed"><del><strong>not grave enough</strong></del></span> <span 
class="inserted"><ins><em>reported</em></ins></span> to <span 
class="removed"><del><strong>qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</strong></del></span> <span 
class="inserted"><ins><em>Microsoft</em></ins></span> and <span 
class="removed"><del><strong>wrong. This section describes 
examples</strong></del></span>
+    <span class="inserted"><ins><em>other companies to be used as telemetry 
data. All</em></ins></span> of <span class="removed"><del><strong>Microsoft 
committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> is <span 
class="removed"><del><strong>planning</strong></del></span> <span 
class="inserted"><ins><em>done is
+    the background, and users have no easy way</em></ins></span> to <span 
class="removed"><del><strong>make Windows</strong></del></span> <span 
class="inserted"><ins><em>prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -810,7 +822,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;As</em></ins></span> of <span class="removed"><del><strong>the 
File Explorer&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>2019-2020, Minecraft players are &lt;a
     
href="https://www.minecraft.net/en-us/article/java-edition-moving-house"&gt;being
-    forced</em></ins></span> to <span 
class="removed"><del><strong>nag</strong></del></span> <span 
class="inserted"><ins><em>move to Microsoft servers&lt;/a&gt;, which results in
+    forced to move</em></ins></span> to <span 
class="removed"><del><strong>nag</strong></del></span> <span 
class="inserted"><ins><em>Microsoft servers&lt;/a&gt;, which results in
     privacy violation. Microsoft publishes a program so</em></ins></span> 
users <span class="inserted"><ins><em>can run
     their own server, but the program is proprietary and it's another &lt;a
     
href="/philosophy/free-software-even-more-important.html"&gt;injustice</em></ins></span>
@@ -1300,7 +1312,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2014, 2015, 2016, 
2017, 2018</strong></del></span> <span 
class="inserted"><ins><em>2014-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2014, 2015, 2016, 
2017, 2018</strong></del></span> <span 
class="inserted"><ins><em>2014-2023</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -1311,7 +1323,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/12/13 16:03:50 $
+$Date: 2023/03/15 11:04:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- malware-microsoft.de.po     13 Dec 2022 16:03:50 -0000      1.187
+++ malware-microsoft.de.po     15 Mar 2023 11:04:22 -0000      1.188
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-12-13 15:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1262,6 +1262,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft's Office 365 suite enables employers <a href=\"https://www.";
 "theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-"
 "criticised-workplace-surveillance\">to snoop on each employee</a>. After a "
@@ -2143,10 +2154,10 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014-] {+2014-2022+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2014-] {+2014-2023+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2014 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- malware-microsoft.es.po     15 Mar 2023 10:55:31 -0000      1.271
+++ malware-microsoft.es.po     15 Mar 2023 11:04:22 -0000      1.272
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2022-12-13 15:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 "X-Generator: Poedit 2.4.2\n"
 
 #. type: Content of: <title>
@@ -1019,6 +1020,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft's Office 365 suite enables employers <a href=\"https://www.";
 "theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-"
 "criticised-workplace-surveillance\">to snoop on each employee</a>. After a "
@@ -1622,8 +1634,8 @@
 "coordinación y el envío de traducciones de las páginas de este sitio web."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1648,6 +1660,5 @@
 msgid "Updated:"
 msgstr "Última actualización:"
 
-#. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+#~ msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2014-2022 Free Software Foundation, Inc."

Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- malware-microsoft.fr.po     15 Mar 2023 10:55:31 -0000      1.265
+++ malware-microsoft.fr.po     15 Mar 2023 11:04:22 -0000      1.266
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2022-12-13 15:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2022-12-14 14:55+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -1010,6 +1011,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft's Office 365 suite enables employers <a href=\"https://www.";
 "theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-"
 "criticised-workplace-surveillance\">to snoop on each employee</a>. After a "
@@ -1610,8 +1622,8 @@
 "traduction</a> les infos nécessaires."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1635,6 +1647,5 @@
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
 
-#. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+#~ msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2014-2022 Free Software Foundation, Inc."

Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-microsoft.it-diff.html      13 Dec 2022 16:03:50 -0000      1.94
+++ malware-microsoft.it-diff.html      15 Mar 2023 11:04:22 -0000      1.95
@@ -135,10 +135,10 @@
   &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a <span class="removed"><del><strong>href="#drm"&gt;Digital 
restrictions
     management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data in their computers.&lt;/li&gt;
-&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application 
programs.&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#tethers"&gt;Tethers&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    to restrict what users can do with the data in their 
computers.&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#tethers"&gt;Tethers&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application programs.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#tyrants"&gt;Tyrants&lt;/a&gt;&lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
@@ -742,7 +742,7 @@
 
 &lt;h3 <span class="removed"><del><strong>id="interference"&gt;Microsoft 
Interference&lt;/h3&gt;
 
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span> <span 
class="inserted"><ins><em>id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the</strong></del></span> 
<span class="inserted"><ins><em>id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201507150"&gt;
@@ -750,8 +750,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft Office forces users &lt;a
     
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
-    subscribe</em></ins></span> to <span class="removed"><del><strong>qualify 
-for</strong></del></span> <span class="inserted"><ins><em>Office 365 to be 
able to create/edit documents&lt;/a&gt;.&lt;/p&gt;
+    subscribe to Office 365 to be able to create/edit 
documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -759,13 +758,31 @@
 &lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The</em></ins></span> 
user's <span class="removed"><del><strong>system. They are like sabotage, but 
they</strong></del></span> <span class="inserted"><ins><em>personal
+    details, location or hardware information</em></ins></span> are <span 
class="removed"><del><strong>not grave enough</strong></del></span> <span 
class="inserted"><ins><em>reported</em></ins></span> to <span 
class="removed"><del><strong>qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</strong></del></span> <span 
class="inserted"><ins><em>Microsoft</em></ins></span> and <span 
class="removed"><del><strong>wrong. This section describes 
examples</strong></del></span>
+    <span class="inserted"><ins><em>other companies to be used as telemetry 
data. All</em></ins></span> of <span class="removed"><del><strong>Microsoft 
committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Windows displays</strong></del></span> <span 
class="inserted"><ins><em>this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
-    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
+    &lt;p&gt;Microsoft's Office 365 suite enables employers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
+       intrusive ads for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
     snoop on each employee&lt;/a&gt;. After
-    a public outburst, Microsoft stated that &lt;a
+    a public outburst,</em></ins></span> Microsoft <span 
class="removed"><del><strong>products and</strong></del></span> <span 
class="inserted"><ins><em>stated that &lt;a
     
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
     would remove this capability&lt;/a&gt;. Let's hope so.&lt;/p&gt;
   &lt;/li&gt;
@@ -773,37 +790,31 @@
   &lt;li id="M202010221"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft is imposing its
-    surveillance on</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples</strong></del></span> <span 
class="inserted"><ins><em>game</em></ins></span> of <span 
class="removed"><del><strong>Microsoft committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Windows displays</strong></del></span> <span 
class="inserted"><ins><em>Minecraft by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
-       intrusive ads for</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
-    every player to open an account on Microsoft's 
network&lt;/a&gt;.</em></ins></span> Microsoft <span 
class="removed"><del><strong>products</strong></del></span>
-    <span class="inserted"><ins><em>has bought the game</em></ins></span> and 
<span class="inserted"><ins><em>will merge all accounts into</em></ins></span> 
its
+    &lt;p&gt;Microsoft is imposing</em></ins></span> its
        <span class="removed"><del><strong>partners' 
products&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article's author starts from the 
premise</strong></del></span> <span class="inserted"><ins><em>network,
-    which will give them access to people's data.&lt;/p&gt;
-
-    &lt;p&gt;Minecraft players &lt;a
-    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
-    instead. The essential advantage of Minetest is</em></ins></span> that 
<span class="removed"><del><strong>Microsoft
-      has</strong></del></span> <span class="inserted"><ins><em>it is free
-    software, meaning it respects the user's computer freedom. 
As</em></ins></span> a <span class="removed"><del><strong>right to control what 
Windows does to users, as long as</strong></del></span> <span 
class="inserted"><ins><em>bonus,</em></ins></span>
-    it
-      <span class="removed"><del><strong>doesn't go &ldquo;too far&rdquo;. We 
disagree.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;The article's author starts from</strong></del></span>
+    <span class="inserted"><ins><em>surveillance on</em></ins></span> the 
<span class="removed"><del><strong>premise that</strong></del></span> <span 
class="inserted"><ins><em>game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's 
network&lt;/a&gt;.</em></ins></span> Microsoft
+    has <span class="removed"><del><strong>a right to control what Windows 
does</strong></del></span> <span class="inserted"><ins><em>bought the game and 
will merge all accounts into its network,
+    which will give them access</em></ins></span> to <span 
class="removed"><del><strong>users, as long as it
+      doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Microsoft inserts &lt;a
 
href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
-      annoying advertisements inside</strong></del></span> <span 
class="inserted"><ins><em>offers more options.&lt;/p&gt;
+      annoying advertisements inside</strong></del></span> <span 
class="inserted"><ins><em>people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage</em></ins></span> of <span 
class="inserted"><ins><em>Minetest is that it is free
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>File Explorer&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202010210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As</em></ins></span> of <span class="removed"><del><strong>the 
File Explorer&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>2019-2020, Minecraft players are &lt;a
+    &lt;p&gt;As of 2019-2020, Minecraft players are &lt;a
     
href="https://www.minecraft.net/en-us/article/java-edition-moving-house"&gt;being
     forced</em></ins></span> to <span 
class="removed"><del><strong>nag</strong></del></span> <span 
class="inserted"><ins><em>move to Microsoft servers&lt;/a&gt;, which results in
     privacy violation. Microsoft publishes a program so</em></ins></span> 
users <span class="inserted"><ins><em>can run
@@ -1289,7 +1300,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2014, 2015, 2016, 
2017</strong></del></span> <span 
class="inserted"><ins><em>2014-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2014, 2015, 2016, 
2017</strong></del></span> <span 
class="inserted"><ins><em>2014-2023</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -1300,7 +1311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/12/13 16:03:50 $
+$Date: 2023/03/15 11:04:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- malware-microsoft.it.po     13 Dec 2022 16:03:51 -0000      1.192
+++ malware-microsoft.it.po     15 Mar 2023 11:04:22 -0000      1.193
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2022-12-13 15:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:06+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -1171,6 +1171,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft's Office 365 suite enables employers <a href=\"https://www.";
 "theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-"
 "criticised-workplace-surveillance\">to snoop on each employee</a>. After a "
@@ -1951,10 +1962,10 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-# | Copyright &copy; [-2014-] {+2014-2022+} Free Software Foundation, Inc.
+# | Copyright &copy; [-2014-] {+2014-2023+} Free Software Foundation, Inc.
 #, fuzzy
 #| msgid "Copyright &copy; 2014 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- malware-microsoft.ja-diff.html      13 Dec 2022 16:03:51 -0000      1.109
+++ malware-microsoft.ja-diff.html      15 Mar 2023 11:04:22 -0000      1.110
@@ -80,13 +80,13 @@
 basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
 that power to the detriment of</em></ins></span> the users <span 
class="removed"><del><strong>have control</strong></del></span> <span 
class="inserted"><ins><em>they ought to serve.&lt;/p&gt;
 
-&lt;p&gt;This typically takes the form</em></ins></span> of <span 
class="inserted"><ins><em>malicious functionalities.&lt;/p&gt;
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
 &lt;hr class="full-width" /&gt;
 &lt;/div&gt;
 
 &lt;div class="article"&gt;
 &lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought to be in this page but isn't
+&lt;p&gt;If you know</em></ins></span> of <span class="inserted"><ins><em>an 
example that ought to be in this page but isn't
 here, please write
 to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
 to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>program or vice versa&lt;/a&gt;.  It's
@@ -141,10 +141,10 @@
   &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a <span class="removed"><del><strong>href="#drm"&gt;Digital 
restrictions
     management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data in their 
computers.&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#tethers"&gt;Tethers&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application programs.&lt;/li&gt;
-&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+    to restrict what users can do with the data in their computers.&lt;/li&gt;
+&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+    that impose censorship on application 
programs.&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#tethers"&gt;Tethers&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#tyrants"&gt;Tyrants&lt;/a&gt;&lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
@@ -626,10 +626,7 @@
   Microsoft is</strong></del></span> <span class="inserted"><ins><em>8 cease 
to function on certain new computers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
   repeatedly nagging many users</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-US/troubleshoot/windows-client/deployment/processor-not-supported-together-with-windows-version"&gt;effectively
-    forcing their owners to switch</em></ins></span> to <span 
class="removed"><del><strong>install</strong></del></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt;.&lt;/p&gt;
+    forcing their owners</em></ins></span> to <span 
class="removed"><del><strong>install</strong></del></span> <span 
class="inserted"><ins><em>switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704134"&gt;
@@ -637,7 +634,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft &lt;a
     
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
-    has dropped support for Windows 7 and 8 on recent processors&lt;/a&gt;
+    has dropped support for</em></ins></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>7 
and 8 on recent processors&lt;/a&gt;
     in a big hurry.&lt;/p&gt;
 
     &lt;p&gt;It makes no difference what legitimate reasons</em></ins></span> 
Microsoft <span class="removed"><del><strong>was</strong></del></span> <span 
class="inserted"><ins><em>might
@@ -664,9 +664,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
     universal back door&lt;/a&gt;. Not only did the unwanted downloads &lt;a
     
href="https://www.theregister.com/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
-    jeopardize important operations in regions of the world with poor
+    jeopardize important operations</em></ins></span> in <span 
class="inserted"><ins><em>regions of the world with poor
     connectivity&lt;/a&gt;, but many of the people who let installation proceed
-    found out that this &ldquo;upgrade&rdquo; was</em></ins></span> in <span 
class="inserted"><ins><em>fact a &lt;a
+    found out that this &ldquo;upgrade&rdquo; was in fact a &lt;a
     
href="https://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     downgrade&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -738,7 +738,7 @@
 
 &lt;h3 <span class="removed"><del><strong>id="interference"&gt;Microsoft 
Interference&lt;/h3&gt;
 
-&lt;p&gt;Various proprietary programs often mess up</strong></del></span> 
<span class="inserted"><ins><em>id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the</strong></del></span> 
<span class="inserted"><ins><em>id="subscriptions"&gt;Subscriptions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201507150"&gt;
@@ -754,6 +754,19 @@
 &lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The</em></ins></span> 
user's <span class="removed"><del><strong>system. They are like sabotage, but 
they</strong></del></span> <span class="inserted"><ins><em>personal
+    details, location or hardware information</em></ins></span> are <span 
class="removed"><del><strong>not grave enough</strong></del></span> <span 
class="inserted"><ins><em>reported</em></ins></span> to <span 
class="removed"><del><strong>qualify 
+for</strong></del></span> <span class="inserted"><ins><em>Microsoft and
+    other companies to be used as telemetry data. All of this is done 
is</em></ins></span>
+    the <span class="removed"><del><strong>word &ldquo;sabotage&rdquo;. 
Nonetheless, they are nasty</strong></del></span> <span 
class="inserted"><ins><em>background,</em></ins></span> and <span 
class="removed"><del><strong>wrong. This section describes 
examples</strong></del></span> <span class="inserted"><ins><em>users have no 
easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -769,76 +782,75 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft is imposing its
-    surveillance on the game of Minecraft by &lt;a
+    surveillance on the game</em></ins></span> of <span 
class="inserted"><ins><em>Minecraft by &lt;a
     
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
-    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought the game and will merge all accounts into its network,
+    every player to open an account on Microsoft's 
network&lt;/a&gt;.</em></ins></span> Microsoft <span 
class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+
+&lt;li&gt;In order</strong></del></span>
+    <span class="inserted"><ins><em>has bought the game and will merge all 
accounts into its network,
     which will give them access to people's data.&lt;/p&gt;
 
     &lt;p&gt;Minecraft players &lt;a
     href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
     instead. The essential advantage of Minetest is that it is free
-    software, meaning it respects</em></ins></span> the user's <span 
class="removed"><del><strong>system. They</strong></del></span> <span 
class="inserted"><ins><em>computer freedom. As a bonus,
+    software, meaning it respects the user's computer freedom. As a bonus,
     it offers more options.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202010210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2019-2020, Minecraft players</em></ins></span> are <span 
class="removed"><del><strong>like sabotage,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;As of 2019-2020, Minecraft players are &lt;a
     
href="https://www.minecraft.net/en-us/article/java-edition-moving-house"&gt;being
-    forced to move to Microsoft servers&lt;/a&gt;, which results in
+    forced to move</em></ins></span> to <span 
class="removed"><del><strong>increase Windows 10's install 
base,</strong></del></span> Microsoft <span 
class="inserted"><ins><em>servers&lt;/a&gt;, which results in
     privacy violation. Microsoft publishes a program so users can run
-    their own server,</em></ins></span> but <span 
class="removed"><del><strong>they are not grave enough</strong></del></span> 
<span class="inserted"><ins><em>the program is proprietary and it's another 
&lt;a
-    
href="/philosophy/free-software-even-more-important.html"&gt;injustice</em></ins></span>
-    to <span class="removed"><del><strong>qualify 
-for</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
+    their own server, but the program is proprietary and it's 
another</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
+blatantly disregards user choice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;injustice
+    to users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;People can play &lt;a
     href="https://directory.fsf.org/wiki/Minetest"&gt;Minetest&lt;/a&gt;
-    instead. Minetest is free software and respects</em></ins></span> the 
<span class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, 
they are nasty</strong></del></span> <span class="inserted"><ins><em>user's 
computer
-    freedom.&lt;/p&gt;
+    instead. Minetest is free software</em></ins></span> and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>respects the user's computer
+    freedom.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202004301"&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Microsoft has
+started</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202004301"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Proprietary programs Google Meet, Microsoft 
Teams,</em></ins></span> and <span class="removed"><del><strong>wrong. This 
section describes examples</strong></del></span> <span 
class="inserted"><ins><em>WebEx &lt;a
-    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/"&gt;are
+    &lt;p&gt;Proprietary programs Google Meet, Microsoft Teams, and 
WebEx</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/"&gt;are
     collecting user's personal and identifiable data&lt;/a&gt; including how 
long
-    a call lasts, who's participating in the call, and the IP 
addresses</em></ins></span>
-    of <span class="removed"><del><strong>Microsoft committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-
-&lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>everyone taking part. From experience, this can even 
harm users
-    physically if those companies hand over data</em></ins></span> to <span 
class="removed"><del><strong>increase Windows 10's install 
base,</strong></del></span> <span 
class="inserted"><ins><em>governments.&lt;/p&gt;
+    a call lasts, who's participating in the call, and the IP addresses
+    of everyone taking part. From experience, this can even 
harm</em></ins></span> users <span 
class="removed"><del><strong>obnoxiously</strong></del></span>
+    <span class="inserted"><ins><em>physically if those companies hand over 
data to governments.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202004131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google, Apple, and</em></ins></span> Microsoft <span 
class="inserted"><ins><em>(and probably some other companies)</em></ins></span>
-    &lt;a
-<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-blatantly disregards user choice</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.lifewire.com/wifi-positioning-system-1683343"&gt;are
-    collecting people's access points</em></ins></span> and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>GPS coordinates (which can
+    &lt;p&gt;Google, Apple,</em></ins></span> and <span 
class="removed"><del><strong>repeatedly</strong></del></span> <span 
class="inserted"><ins><em>Microsoft (and probably some other companies)
+    &lt;a 
href="https://www.lifewire.com/wifi-positioning-system-1683343"&gt;are
+    collecting people's access points and GPS coordinates (which can
     identify people's precise location) even if their GPS is turned
     off&lt;/a&gt;, without the person's consent, using proprietary software
     implemented in person's smartphone. Though merely asking for permission
-    would not necessarily legitimize this.&lt;/p&gt;</em></ins></span>
+    would not necessarily legitimize this.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Microsoft has
-started</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201912160"&gt;
+  &lt;li id="M201912160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking</em></ins></span>
-    users <span class="removed"><del><strong>obnoxiously and 
repeatedly</strong></del></span> <span class="inserted"><ins><em>to create an 
account on their network&lt;/a&gt; to be able</em></ins></span> to install
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be 
able</em></ins></span> to install
     <span class="inserted"><ins><em>and use the</em></ins></span> Windows 
<span class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Microsoft
@@ -1262,7 +1274,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2014, 2015, 
2016</strong></del></span> <span 
class="inserted"><ins><em>2014-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span class="removed"><del><strong>2014, 2015, 
2016</strong></del></span> <span 
class="inserted"><ins><em>2014-2023</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 <span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
@@ -1273,7 +1285,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/12/13 16:03:51 $
+$Date: 2023/03/15 11:04:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- malware-microsoft.ja.po     13 Dec 2022 16:03:51 -0000      1.171
+++ malware-microsoft.ja.po     15 Mar 2023 11:04:22 -0000      1.172
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2022-12-13 15:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -959,6 +959,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft's Office 365 suite enables employers <a href=\"https://www.";
 "theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-"
 "criticised-workplace-surveillance\">to snoop on each employee</a>. After a "
@@ -1549,7 +1560,7 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "Copyright &copy; 2014 Free Software Foundation, Inc."
-msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- malware-microsoft.pot       13 Dec 2022 16:03:51 -0000      1.129
+++ malware-microsoft.pot       15 Mar 2023 11:04:22 -0000      1.130
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2022-12-13 15:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -689,6 +689,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a "
+"href=\"https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html\";>Windows
 "
+"11 starts to send data to online servers.</a> The user's personal details, "
+"location or hardware information are reported to Microsoft and other "
+"companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft's Office 365 suite enables employers <a "
 
"href=\"https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance\";>to
 "
 "snoop on each employee</a>. After a public outburst, Microsoft stated that "
@@ -1084,7 +1095,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: malware-microsoft.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pt-br-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- malware-microsoft.pt-br-diff.html   13 Dec 2022 16:03:51 -0000      1.6
+++ malware-microsoft.pt-br-diff.html   15 Mar 2023 11:04:22 -0000      1.7
@@ -655,7 +655,19 @@
 &lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202011260"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
@@ -1072,7 +1084,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2021</strong></del></span> <span 
class="inserted"><ins><em>2014-2022</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2014-2021</strong></del></span> <span 
class="inserted"><ins><em>2014-2023</em></ins></span> Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
@@ -1082,7 +1094,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2022/12/13 16:03:51 $
+$Date: 2023/03/15 11:04:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pt-br.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-microsoft.pt-br.po  15 Mar 2023 10:55:30 -0000      1.24
+++ malware-microsoft.pt-br.po  15 Mar 2023 11:04:22 -0000      1.25
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2022-12-13 15:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -1100,6 +1100,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft's Office 365 suite enables employers <a href=\"https://www.";
 "theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-"
 "criticised-workplace-surveillance\">to snoop on each employee</a>. After a "
@@ -1781,8 +1792,8 @@
 "contribuição com traduções das páginas deste site."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1809,9 +1820,8 @@
 msgid "Updated:"
 msgstr "Última atualização:"
 
-#. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+#~ msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
 
 #~ msgid "Copyright &copy; 2014-2021 Free Software Foundation, Inc."
 #~ msgstr "Copyright &copy; 2014-2021 Free Software Foundation, Inc."

Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -b -r1.297 -r1.298
--- malware-microsoft.ru.po     15 Mar 2023 10:55:31 -0000      1.297
+++ malware-microsoft.ru.po     15 Mar 2023 11:04:23 -0000      1.298
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-12-13 15:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -1012,6 +1013,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft's Office 365 suite enables employers <a href=\"https://www.";
 "theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-"
 "criticised-workplace-surveillance\">to snoop on each employee</a>. After a "
@@ -1606,8 +1618,8 @@
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -1633,9 +1645,8 @@
 msgid "Updated:"
 msgstr "Обновлено:"
 
-#. type: Content of: <div><p>
-msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+#~ msgid "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2014-2022 Free Software Foundation, Inc."
 
 #~ msgid "Copyright &copy; 2014-2021 Free Software Foundation, Inc."
 #~ msgstr "Copyright &copy; 2014-2021 Free Software Foundation, Inc."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.434
retrieving revision 1.435
diff -u -b -r1.434 -r1.435
--- nl.po       4 Mar 2023 17:02:37 -0000       1.434
+++ nl.po       15 Mar 2023 11:04:23 -0000      1.435
@@ -286,6 +286,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -4945,6 +4956,14 @@
 "first software to delete is Windows."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2015, 2016-] {+2014-2023+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Manipulation+} - GNU Project - Free Software
 # | Foundation
@@ -10367,9 +10386,9 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | As of [-April, 2019,-] {+September, 2022,+} the [-files-] {+pages+} in
-# | this directory list around [-400-] {+550+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 670 references to
+# | As of [-April, 2019,-] {+March, 2023,+} the [-files-] {+pages+} in this
+# | directory list around [-400-] {+550+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 680 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -10377,9 +10396,9 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
 "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
@@ -11882,6 +11901,20 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft-malware</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the files in this directory list around 400 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
+#~ "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
+#~ "gevallen waar we niks van weten."
+
 # type: Content of: <div><p>
 #, fuzzy
 #~| msgid "Copyright &copy; 2011 Free Software Foundation, Inc."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.433
retrieving revision 1.434
diff -u -b -r1.433 -r1.434
--- pl.po       4 Mar 2023 17:02:37 -0000       1.433
+++ pl.po       15 Mar 2023 11:04:23 -0000      1.434
@@ -276,6 +276,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -4781,6 +4792,14 @@
 "first software to delete is Windows."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015-] {+2014-2023+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Manipulation+} - GNU Project - Free Software
 # | Foundation
@@ -9625,9 +9644,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.432
retrieving revision 1.433
diff -u -b -r1.432 -r1.433
--- pot 4 Mar 2023 17:02:37 -0000       1.432
+++ pot 15 Mar 2023 11:04:23 -0000      1.433
@@ -203,6 +203,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -4588,6 +4599,10 @@
 "first software to delete is Windows."
 msgstr ""
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr ""
+
 #. type: Content of: <title>
 msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
 msgstr ""
@@ -9076,9 +9091,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- proprietary-surveillance.de-diff.html       4 Mar 2023 17:02:42 -0000       
1.253
+++ proprietary-surveillance.de-diff.html       15 Mar 2023 11:04:23 -0000      
1.254
@@ -271,6 +271,18 @@
   &lt;li&gt;&lt;p&gt;Windows</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1671,9 +1683,9 @@
   &lt;li id="M202201270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The</em></ins></span> data <span class="inserted"><ins><em>broker 
X-Mode &lt;a
+    &lt;p&gt;The data broker X-Mode &lt;a
     
href="https://themarkup.org/privacy/2022/01/27/gay-bi-dating-app-muslim-prayer-apps-sold-data-on-peoples-location-to-a-controversial-data-broker"&gt;bought
-    location data about 20,000 people collected by around 100 different
+    location</em></ins></span> data <span class="inserted"><ins><em>about 
20,000 people collected by around 100 different
     malicious apps&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1838,41 +1850,30 @@
     snooping and sabotage capabilities&lt;/a&gt; if they install their own
     software</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>device.  Many 
employers demand</em></ins></span> to <span class="inserted"><ins><em>do this.  
For</em></ins></span> the <span class="removed"><del><strong>snooping done by 
the phone company,</strong></del></span>
     <span class="inserted"><ins><em>employee, this is simply nonfree software, 
as fundamentally unjust</em></ins></span>
-    and <span class="removed"><del><strong>perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>as dangerous as 
any other nonfree software.&lt;/p&gt;
+    and <span class="removed"><del><strong>perhaps by the OS 
in</strong></del></span> <span class="inserted"><ins><em>as dangerous as any 
other nonfree software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201910130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
-    the <span class="inserted"><ins><em>Great Nation&rdquo;</em></ins></span> 
app <span class="removed"><del><strong>developers get</strong></del></span> 
<span class="inserted"><ins><em>requires</em></ins></span> users to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+    the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
 
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>grant</em></ins></span> it <span 
class="removed"><del><strong>asked the user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>Great Nation&rdquo; app requires users to grant it 
&lt;a
     
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access</em></ins></span> to the <span class="removed"><del><strong>app 
developer but did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
-    internet history&lt;/a&gt;, and the Android version was 
found</em></ins></span> to <span class="removed"><del><strong>other companies.  
This shows</strong></del></span> <span class="inserted"><ins><em>contain a
-    back-door allowing developers to run any code they wish 
in</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>users'
+    access to</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
     phone, as &ldquo;superusers.&rdquo; Downloading and using this
     app is mandatory at some workplaces.&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version</em></ins></span> of the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in</em></ins></span> a <span 
class="removed"><del><strong>flashlight</strong></del></span> <span 
class="inserted"><ins><em>text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according to Apple, &ldquo;this kind of
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android 
version</em></ins></span>
+    of <span class="removed"><del><strong>whether</strong></del></span> the 
<span class="inserted"><ins><em>app, and that, according to Apple, &ldquo;this 
kind of
     &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
@@ -1880,10 +1881,10 @@
   &lt;li id="M201909091"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Facebook app &lt;a
+    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>developers get</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving the</em></ins></span> app <span 
class="inserted"><ins><em>broad permissions in order to use one of its
+    tracks</em></ins></span> users <span class="inserted"><ins><em>even when 
it is turned off&lt;/a&gt;, after tricking them
+    into giving the app broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. 
That</strong></del></span> <span class="inserted"><ins><em>use one of its
     functionalities.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1891,68 +1892,57 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;</em></ins></span>
-    send <span class="removed"><del><strong>any 
information</strong></del></span> <span class="inserted"><ins><em>intimate 
details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
-    program is a form of surveillance.  There is a
-    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
-    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;</em></ins></span>
-    A <span class="inserted"><ins><em>US prosecutor has demanded the list of 
all the 10,000 or more people
+    program</em></ins></span> is <span class="removed"><del><strong>no 
excuse</strong></del></span> <span class="inserted"><ins><em>a form of 
surveillance.  There is a
+    proprietary program</em></ins></span> for <span 
class="removed"><del><strong>malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a</em></ins></span> free <span 
class="removed"><del><strong>software flashlight
-      app</strong></del></span> <span class="inserted"><ins><em>program 
there</em></ins></span> would <span 
class="removed"><del><strong>not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not be a list of who has installed
+    &lt;p&gt;With a free program there would not be a list of who has installed
     it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201907081"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span 
class="removed"><del><strong>make</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features</em></ins></span>
-    of the <span class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>operating system, in order to gather as much private 
data as
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
     they possibly can.&lt;/p&gt;
 
     &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
-    having control over the software we run.&lt;/p&gt;</em></ins></span>
+    having control over the software we run.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
+  &lt;li id="M201907080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
+    users' movements even when the</em></ins></span> user <span 
class="removed"><del><strong>data, including geolocation, for 
use</strong></del></span> <span class="inserted"><ins><em>says &lt;a
     
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This involves an apparently unintentional weakness in Android,
-    exploited intentionally by malicious apps.&lt;/p&gt;
+    exploited intentionally</em></ins></span> by <span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span class="inserted"><ins><em>Femm 
&ldquo;fertility&rdquo;</em></ins></span> app <span 
class="removed"><del><strong>because it asked the user</strong></del></span> 
<span class="inserted"><ins><em>is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
@@ -1965,15 +1955,15 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;BlizzCon 2019 imposed a &lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>run</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based 
in</strong></del></span> <span class="inserted"><ins><em>proprietary phone 
app&lt;/a&gt; to be allowed into</em></ins></span>
-    the <span class="removed"><del><strong>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>event.&lt;/p&gt;
+    requirement</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>run a proprietary 
phone app&lt;/a&gt;</em></ins></span> to <span class="inserted"><ins><em>be 
allowed into</em></ins></span>
+    the <span class="inserted"><ins><em>event.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware that</em></ins></span> can <span 
class="removed"><del><strong>remotely control</strong></del></span> <span 
class="inserted"><ins><em>snoop on a lot of
+    &lt;p&gt;This</em></ins></span> app <span 
class="removed"><del><strong>developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>is a spyware that can snoop on a lot of
     sensitive data, including user's location and contact list, and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>toys with</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
@@ -1982,55 +1972,68 @@
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
     available to employers and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
+    data is &ldquo;anonymized and aggregated,&rdquo;</em></ins></span> it 
<span class="inserted"><ins><em>can easily be
+    traced back</em></ins></span> to <span class="removed"><del><strong>other 
companies.  This shows</strong></del></span> the
+      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>surveillance: 
why should</strong></del></span> <span class="inserted"><ins><em>equal 
employment
     and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>listen in</strong></del></span> <span 
class="inserted"><ins><em>do so. A
-    free-software app that does more or less the same thing without
-    spying</em></ins></span> on <span class="inserted"><ins><em>you is 
available from &lt;a
+    these apps, even if someone offers you</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>reward</em></ins></span> to <span 
class="removed"><del><strong>anyone?</strong></del></span> <span 
class="inserted"><ins><em>do so.</em></ins></span> A <span 
class="removed"><del><strong>free software flashlight</strong></del></span>
+    <span class="inserted"><ins><em>free-software</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that does more or less the same thing without
+    spying on you is available from &lt;a
     href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
-    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;</em></ins></span>
-    a <span class="removed"><del><strong>child's speech,</strong></del></span> 
<span class="inserted"><ins><em>new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
 
-  &lt;li id="M201904130"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201904130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google tracks the movements of Android phones</em></ins></span> 
and <span class="removed"><del><strong>even speak
-      into</strong></del></span> <span class="inserted"><ins><em>iPhones
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;Nonfree software</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
+&lt;ul&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>the phone has</em></ins></span> to <span 
class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span> <span class="inserted"><ins><em>be 
responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903251"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    &lt;p&gt;Many Android phones come with a huge number</em></ins></span> of 
<span class="inserted"><ins><em>&lt;a
+    
href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
     preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> <span 
class="inserted"><ins><em>to user-installed apps that have access to
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data, or pass it on to user-installed apps that have 
access to
     the network but no direct access to the data. This results in massive
-    surveillance on which</em></ins></span> the <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
+    surveillance on which the user has absolutely no 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201903211"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903211"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The MoviePass dis-service &lt;a
-    
href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/"&gt;
-    is planning to use face recognition to track people's eyes&lt;/a&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>MoviePass dis-service</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/"&gt;
+    is planning</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,
+      a speech</strong></del></span> <span class="inserted"><ins><em>use 
face</em></ins></span> recognition <span class="removed"><del><strong>company 
based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>to track 
people's eyes&lt;/a&gt;
     to make sure they won't put their phones down or look away during
     ads&mdash;and trackers.&lt;/p&gt;
   &lt;/li&gt;
@@ -2040,7 +2043,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
     
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    send sensitive personal data to third parties&lt;/a&gt;, 
which</em></ins></span> can <span class="removed"><del><strong>remotely control 
the toys with</strong></del></span> <span class="inserted"><ins><em>use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
@@ -2052,18 +2055,25 @@
   &lt;li id="M201902230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>library for building mobile apps, which 
also &lt;a
+    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="inserted"><ins><em>convenient proprietary
+    library for building</em></ins></span> mobile <span 
class="removed"><del><strong>phone. This</strong></del></span> <span 
class="inserted"><ins><em>apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
     sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
     way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
+    data they collected</em></ins></span> would
+      <span class="removed"><del><strong>enable crackers</strong></del></span> 
<span class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>listen in on</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not</em></ins></span> even <span 
class="removed"><del><strong>speak
+      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902140"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator
+      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
     &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
@@ -2743,8 +2753,8 @@
 
     &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting</em></ins></span>
-    to <span class="inserted"><ins><em>realize that it is nasty.&lt;/p&gt;
+    demanded users submit</em></ins></span> to <span 
class="inserted"><ins><em>increased snooping&lt;/a&gt;, and some are starting
+    to realize that it is nasty.&lt;/p&gt;
 
     &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/"&gt;
@@ -3145,8 +3155,8 @@
 
   &lt;li id="M201901070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;Vizio <span class="inserted"><ins><em>TVs &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Vizio TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
     collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
     CTO, and this data is sold to third parties. This is in return for
@@ -3159,7 +3169,7 @@
     and there is no guarantee that all future updates will leave the
     settings unchanged.&lt;/p&gt;
 
-    &lt;p&gt;If you already own a Vizio</em></ins></span> &ldquo;smart&rdquo; 
<span class="inserted"><ins><em>TV (or any &ldquo;smart&rdquo; TV, for that
+    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
     matter), the easiest way to make sure it isn't spying on you is
     to disconnect it from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
@@ -3172,8 +3182,8 @@
   &lt;li id="M201804010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We link to the article for the facts it presents. It
@@ -3185,9 +3195,9 @@
 
   &lt;li id="M201702060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
-    
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</em></ins></span>
     report everything that is viewed on them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
     the TV reports what it is. The existence of a way to disable the
@@ -3903,7 +3913,7 @@
     near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
     connected to the cellular phone network and sends Ford a lot of data,
     including car location. This feature operates even when the ignition
-    key is removed, and users report</em></ins></span> that <span 
class="inserted"><ins><em>they can't disable it.&lt;/p&gt;
+    key is removed, and users report that they can't disable it.&lt;/p&gt;
 
     &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
     connectivity by disconnecting the cellular modem, or wrapping the
@@ -3914,7 +3924,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with a terminal that &lt;a
+    cars to be equipped with a terminal</em></ins></span> that <span 
class="inserted"><ins><em>&lt;a
     
href="https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
     to a government-run platform&lt;/a&gt;. In practice, &lt;a
@@ -4703,7 +4713,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/03/04 17:02:42 $
+$Date: 2023/03/15 11:04:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.445
retrieving revision 1.446
diff -u -b -r1.445 -r1.446
--- proprietary-surveillance.de.po      4 Mar 2023 17:02:43 -0000       1.445
+++ proprietary-surveillance.de.po      15 Mar 2023 11:04:24 -0000      1.446
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2023-03-04 16:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -541,6 +541,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- proprietary-surveillance.es.po      5 Mar 2023 10:59:55 -0000       1.320
+++ proprietary-surveillance.es.po      15 Mar 2023 11:04:24 -0000      1.321
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2023-03-04 16:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2022-08-25 10:47+0200\n"
 "Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.4.2\n"
 
@@ -400,6 +401,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.739
retrieving revision 1.740
diff -u -b -r1.739 -r1.740
--- proprietary-surveillance.fr.po      4 Mar 2023 17:24:11 -0000       1.739
+++ proprietary-surveillance.fr.po      15 Mar 2023 11:04:24 -0000      1.740
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2023-03-04 16:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2023-03-04 18:23+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -389,6 +390,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- proprietary-surveillance.it-diff.html       4 Mar 2023 17:02:44 -0000       
1.317
+++ proprietary-surveillance.it-diff.html       15 Mar 2023 11:04:24 -0000      
1.318
@@ -271,6 +271,18 @@
   files</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -302,11 +314,11 @@
     
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law/"&gt;
     by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The &lt;a
-    
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
+    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
     &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
-    engineers to access, among other things, registry keys</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"&gt;
+    engineers to access, among other things, registry keys &lt;a
+    
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"&gt;
     which can contain sensitive information like administrator's login
     password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1860,35 +1872,31 @@
     &lt;p&gt;This app is</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
       enable crackers to listen in</strong></del></span> <span 
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>lot of
     sensitive data, including user's location</em></ins></span> and <span 
class="removed"><del><strong>even speak
-      into</strong></del></span> <span class="inserted"><ins><em>contact list, 
and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phone.&lt;/p&gt;</em></ins></span>
+      into the toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>contact list, and has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201904131"&gt;
+  &lt;li id="M201904131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>vibrator minute 
by
-      minute (thus, indirectly, whether</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo;</em></ins></span> it <span class="removed"><del><strong>was 
surrounded by a person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>can easily be
-    traced back to</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>woman 
who uses</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
-      standard with which manufacturers would</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
 
     &lt;p&gt;This has harmful implications for women's rights to equal 
employment
-    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>statements about</strong></del></span> their <span 
class="removed"><del><strong>products, rather than free</strong></del></span> 
<span class="inserted"><ins><em>own pregnancy choices. Don't use
+    and freedom to make their own pregnancy choices. Don't use
     these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
+    free-software</em></ins></span> app <span class="removed"><del><strong>was 
reporting</strong></del></span> <span class="inserted"><ins><em>that does more 
or less</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>same thing without
     spying on you is available from &lt;a
     href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
     
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
@@ -1898,46 +1906,51 @@
   &lt;li id="M201904130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    &lt;p&gt;Google tracks the movements</em></ins></span> of <span 
class="inserted"><ins><em>Android phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+    saves</em></ins></span> the <span class="removed"><del><strong>vibrator 
minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users could</strong></del></span> <span 
class="inserted"><ins><em>in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>phone 
has to be responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>location data 
to Google.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903251"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard</strong></del></span> <span class="inserted"><ins><em>huge 
number of &lt;a
     
href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that</em></ins></span> have
-      <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps</em></ins></span> that 
<span class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>have access to</em></ins></span>
-    the <span class="removed"><del><strong>vibrator</strong></del></span> 
<span class="inserted"><ins><em>network but no direct access to the data. This 
results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call 
home</em></ins></span> with
+    <span class="inserted"><ins><em>the data, or pass it on to user-installed 
apps that have access to
+    the network but no direct access to the data. This results in massive
+    surveillance on</em></ins></span> which <span 
class="removed"><del><strong>manufacturers would</strong></del></span> <span 
class="inserted"><ins><em>the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903211"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The MoviePass dis-service</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/"&gt;
+    &lt;p&gt;The MoviePass dis-service &lt;a
+    
href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/"&gt;
     is planning to use face recognition to track people's eyes&lt;/a&gt;
-    to make sure they won't put their phones down or look away during
+    to</em></ins></span> make <span class="removed"><del><strong>statements 
about</strong></del></span> <span class="inserted"><ins><em>sure they won't 
put</em></ins></span> their <span class="removed"><del><strong>products, rather 
than free software which users could have
+      checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>phones down or look away during
     ads&mdash;and trackers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found</em></ins></span> 
that <span class="removed"><del><strong>made the vibrator</strong></del></span> 
<span class="inserted"><ins><em>19 of them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
     send sensitive personal data to third parties&lt;/a&gt;, which can use 
it</em></ins></span>
     for <span class="removed"><del><strong>collecting 
lots</strong></del></span> <span class="inserted"><ins><em>invasive advertising 
or discriminating against people in poor
     medical condition.&lt;/p&gt;
@@ -1953,9 +1966,9 @@
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent</em></ins></span> personal <span class="inserted"><ins><em>data to 
Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all 
the</em></ins></span> personal
+    <span class="inserted"><ins><em>data they collected would go to Facebook 
as well.&lt;/p&gt;
 
     &lt;p&gt;It shows that no one can trust a nonfree program, not even the
     developers of other nonfree programs.&lt;/p&gt;
@@ -2241,12 +2254,12 @@
 GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts</strong></del></span> <span class="inserted"><ins><em>intend to make 
these apps spy; on the contrary, it
-    worked in various ways to prevent that, and deleted these apps after
+    worked</em></ins></span> in <span class="inserted"><ins><em>various ways 
to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares</em></ins></span> in <span class="inserted"><ins><em>the 
responsibility for the injustice of their being
+    therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes</em></ins></span> its own <span 
class="removed"><del><strong>malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -3498,17 +3511,17 @@
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to
-    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
-    at home, not only in</em></ins></span> the 
-      <span 
class="removed"><del><strong>internet&lt;/a&gt;&mdash;</strong></del></span> 
<span class="inserted"><ins><em>present, but in the past (and, who knows,
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
     in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands</em></ins></span> to the 
+      <span 
class="removed"><del><strong>internet&lt;/a&gt;&mdash;</strong></del></span> 
<span class="inserted"><ins><em>Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
     recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
@@ -3640,7 +3653,7 @@
 
       &lt;p&gt;Even nastier, they do it through ad 
networks</strong></del></span> <span class="inserted"><ins><em>spoof messages 
to and from the watch, possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="inserted"><ins><em>word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -3678,8 +3691,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390"&gt;Ford
-    is planning to force ads on drivers in cars&lt;/a&gt;, with the ability 
for</em></ins></span>
-    the <span class="inserted"><ins><em>owner to pay extra to turn them off. 
The system probably imposes
+    is planning to force ads on drivers in cars&lt;/a&gt;, with the ability for
+    the owner to pay extra to turn them off. The system probably imposes
     surveillance on drivers too.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -4060,8 +4073,8 @@
 
   &lt;li id="M201807190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;British Airways used &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
     JavaScript on its web site to give other companies personal data on
     its customers&lt;/a&gt;.&lt;/p&gt;
@@ -4086,11 +4099,11 @@
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
     code.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInChrome"&gt;Spyware in 
Chrome&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -4105,16 +4118,16 @@
 
   &lt;li id="M201003010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Flash Player's &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Flash Player's &lt;a
     
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
     cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInChrome"&gt;Spyware in 
Chrome&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -4504,7 +4517,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/03/04 17:02:44 $
+$Date: 2023/03/15 11:04:24 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.457
retrieving revision 1.458
diff -u -b -r1.457 -r1.458
--- proprietary-surveillance.it.po      4 Mar 2023 17:02:44 -0000       1.457
+++ proprietary-surveillance.it.po      15 Mar 2023 11:04:24 -0000      1.458
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2023-03-04 16:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -533,6 +533,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- proprietary-surveillance.ja-diff.html       4 Mar 2023 17:02:44 -0000       
1.335
+++ proprietary-surveillance.ja-diff.html       15 Mar 2023 11:04:25 -0000      
1.336
@@ -270,6 +270,18 @@
   &lt;li&gt;&lt;p&gt;By</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201912160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1253,177 +1265,127 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command and users cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
+      remote command and users cannot stop them:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
-      the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
+    &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
-      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
+    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable 
phones</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens</em></ins></span> for <span 
class="removed"><del><strong>surveillance is inadequate as a protection against 
massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new</strong></del></span> voice <span 
class="removed"><del><strong>messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs</strong></del></span>
 all <span class="removed"><del><strong>conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+  &lt;li id="M201302150"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you to share</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>picture you take according to who
-      is in</strong></del></span> <span class="inserted"><ins><em>personal 
details of users that install</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span class="removed"><del><strong>be
-      sent across</strong></del></span>
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="inserted"><ins><em>not 
enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
     <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>wire to 
Facebook's servers</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures</strong></del></span> 
<span class="inserted"><ins><em>Conditions&rdquo; that spell out what
-    they</em></ins></span> are <span class="removed"><del><strong>private
-      anymore, even if the user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should clearly 
and
-    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span 
class="inserted"><ins><em>information it collects</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
-      2015</strong></del></span> <span class="inserted"><ins><em>users, 
instead of
-    hiding</em></ins></span> it <span class="removed"><del><strong>&lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
-
-    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>truly 
protect people's privacy, we must prevent Google</em></ins></span>
-    and <span class="removed"><del><strong>some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>other companies from getting this personal 
information in</em></ins></span> the
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;
+    reading</em></ins></span> the <span class="removed"><del><strong>use of 
data on</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>collects on users, instead of
+    hiding</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other</strong></del></span> 
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some manufacturers add a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such</em></ins></span> as <span 
class="removed"><del><strong>a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is a typical example 
of</strong></del></span> <span class="inserted"><ins><em>Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some manufacturers add a &lt;a
+    
href="https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
-    
href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
+        for surveillance is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201410080"&gt;
+  &lt;li&gt;&lt;p&gt;Apps that include</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>attitude</strong></del></span> 
<span class="inserted"><ins><em>e-reader used by most US libraries, &lt;a
-    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of <span class="inserted"><ins><em>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed to check DRM!&lt;/p&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries,</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take 
according</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed</em></ins></span> to <span class="removed"><del><strong>who
+      is</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>proprietary software industry towards
-      those</strong></del></span> <span class="inserted"><ins><em>Kindle: &lt;a
-    
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</em></ins></span>
 they <span class="removed"><del><strong>have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile 
devices</strong></del></span>
-    report <span class="inserted"><ins><em>even</em></ins></span> which <span 
class="removed"><del><strong>other
-    apps</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> the user <span 
class="removed"><del><strong>has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that</strong></del></span> <span 
class="inserted"><ins><em>reads</em></ins></span> at <span 
class="removed"><del><strong>least is visible and
-    optional&lt;/a&gt;. Not as bad as</strong></del></span> what <span 
class="removed"><del><strong>the others do.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database,</strong></del></span> <span 
class="inserted"><ins><em>Kindle: &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report even</em></ins></span> which <span 
class="removed"><del><strong>means</strong></del></span> <span 
class="inserted"><ins><em>page</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
+      sent across</strong></del></span> <span class="inserted"><ins><em>user 
reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-      the snooping done by the phone company, and perhaps by the 
OS</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>Applications&lt;/h3&gt;
+  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1433,112 +1395,102 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A worldwide investigation found that
-    most</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> the <span 
class="removed"><del><strong>app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span> <span 
class="inserted"><ins><em>applications that school districts
-    recommended</em></ins></span> for <span class="removed"><del><strong>use 
by companies.&lt;/a&gt;&lt;/p&gt;
+    most of</em></ins></span> the <span class="removed"><del><strong>wire to 
Facebook's servers</strong></del></span> <span 
class="inserted"><ins><em>applications that school districts
+    recommended for remote education during the COVID-19 pandemic &lt;a
+    
href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/"&gt;track</em></ins></span>
+    and <span class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
 
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span> <span class="inserted"><ins><em>remote education 
during</em></ins></span> the <span class="removed"><del><strong>user to
-      approve sending</strong></del></span> <span 
class="inserted"><ins><em>COVID-19 pandemic &lt;a
-    
href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/"&gt;track
-    and collect</em></ins></span> personal data <span 
class="removed"><del><strong>to the app developer but did not
-      ask about sending it to other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>from children as 
young as below</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>age</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app</strong></del></span>
-    <span class="inserted"><ins><em>five&lt;/a&gt;. These applications, and 
their websites,</em></ins></span>  send <span 
class="removed"><del><strong>any</strong></del></span> <span 
class="inserted"><ins><em>the collected</em></ins></span>
-    information to <span class="removed"><del><strong>anyone?  A free software 
flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ad giants such as Facebook and Google, and they are
-    still being used in the classrooms even after some of the schools
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>collect personal data from children as young as below 
the age</em></ins></span> of
+    <span class="inserted"><ins><em>five&lt;/a&gt;. These applications, and 
their websites,  send the collected
+    information to ad giants such as</em></ins></span> Facebook <span 
class="removed"><del><strong>users' pictures</strong></del></span> <span 
class="inserted"><ins><em>and Google, and they</em></ins></span> are <span 
class="removed"><del><strong>private
+      anymore, even if</strong></del></span>
+    <span class="inserted"><ins><em>still being used in</em></ins></span> the 
<span class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>classrooms even after 
some of</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>schools
     reopened.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202011260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft's Office 365 suite enables employers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
-    snoop on each employee&lt;/a&gt;. After
-    a public outburst, Microsoft stated that &lt;a
-    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
+    &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
+    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
+    snoop</em></ins></span> on <span class="removed"><del><strong>proprietary 
malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>each 
employee&lt;/a&gt;. After
+    a public outburst, Microsoft stated that</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
     would remove this capability&lt;/a&gt;. Let's hope so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201912190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some Avast</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about 
them</strong></del></span> <span class="inserted"><ins><em>AVG extensions
-    for Firefox and Chrome were found</em></ins></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Some Avast and AVG extensions
+    for Firefox and Chrome were found</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop on users' detailed browsing habits&lt;/a&gt;. 
Mozilla</em></ins></span> and <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>Google
+    removed the problematic extensions from their stores, but this shows
+    once more how unsafe nonfree software can be. Tools that</em></ins></span> 
are <span class="removed"><del><strong>starting</strong></del></span> <span 
class="inserted"><ins><em>supposed</em></ins></span>
+    to <span class="removed"><del><strong>realize that</strong></del></span> 
<span class="inserted"><ins><em>protect a proprietary system are, instead, 
infecting</em></ins></span> it <span class="removed"><del><strong>is 
nasty.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
-    snoop on users' detailed browsing habits&lt;/a&gt;. 
Mozilla</em></ins></span> and <span class="inserted"><ins><em>Google
-    removed</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>problematic 
extensions from their stores, but this shows
-    once more how unsafe nonfree software can be. Tools that are 
supposed</em></ins></span>
-    to <span class="removed"><del><strong>spy through</strong></del></span> 
<span class="inserted"><ins><em>protect a proprietary system are, instead, 
infecting</em></ins></span> it <span class="removed"><del><strong>too&lt;/a&gt;.
-      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>with
-    additional malware (the system itself being the original 
malware).&lt;/p&gt;
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>with
+    additional malware (the system itself being</em></ins></span> the <span 
class="inserted"><ins><em>original malware).&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201811020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
+    reports information</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>identify who</em></ins></span> is <span 
class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    often</em></ins></span> a <span class="removed"><del><strong>typical 
example</strong></del></span> <span class="inserted"><ins><em>legal threat 
demanding a lot</em></ins></span> of
+      <span class="removed"><del><strong>the attitude</strong></del></span> 
<span class="inserted"><ins><em>money.&lt;/p&gt;
 
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even</em></ins></span> more <span 
class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>vicious.&lt;/p&gt;
+    &lt;p&gt;The fact that this is used for repression</em></ins></span> of 
<span class="removed"><del><strong>the proprietary</strong></del></span> <span 
class="inserted"><ins><em>forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of 
nonfree</em></ins></span> software <span class="removed"><del><strong>industry 
towards
+      those they have subjugated.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
-    is not a cure for the injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span>
+    <span class="inserted"><ins><em>is not a cure</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
+    apps</strong></del></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInToys"&gt;Spyware in 
Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-
-   &lt;li&gt;&lt;p&gt;A</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202206020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Canada has fined the</em></ins></span> company <span 
class="removed"><del><strong>that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued</strong></del></span> <span class="inserted"><ins><em>Tim 
Hortons</em></ins></span> for <span class="removed"><del><strong>collecting 
lots of personal information about how
-    people use it&lt;/a&gt;.&lt;/p&gt;
-
-       &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>making &lt;a
-    
href="https://arstechnica.com/tech-policy/2022/06/tim-hortons-coffee-app-broke-law-by-constantly-recording-users-movements/"&gt;
-    an app</em></ins></span> that <span class="removed"><del><strong>it 
anonymizes the data may be
-        true, but it</strong></del></span> <span 
class="inserted"><ins><em>tracks people's movements&lt;/a&gt; to learn things 
such as
-    where they live, where they work, and when they visit competitors'
+    &lt;p&gt;Canada</em></ins></span> has
+    <span class="removed"><del><strong>installed.</strong></del></span> <span 
class="inserted"><ins><em>fined the company Tim Hortons for 
making</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/tech-policy/2022/06/tim-hortons-coffee-app-broke-law-by-constantly-recording-users-movements/"&gt;
+    an app</em></ins></span> that <span class="removed"><del><strong>at least 
is visible and
+    optional&lt;/a&gt;. Not</strong></del></span> <span 
class="inserted"><ins><em>tracks people's movements&lt;/a&gt; to learn things 
such</em></ins></span> as <span 
class="removed"><del><strong>bad</strong></del></span>
+    <span class="inserted"><ins><em>where they live, where they work, and when 
they visit competitors'
     stores.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1547,91 +1499,223 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;New Amazon worker chat app &lt;a
     
href="https://theintercept.com/2022/04/04/amazon-union-living-wage-restrooms-chat-app/"&gt;would
-    ban specific words Amazon</em></ins></span> doesn't <span 
class="removed"><del><strong>really matter.</strong></del></span> <span 
class="inserted"><ins><em>like&lt;/a&gt;, such as
-    &ldquo;union&rdquo;, &ldquo;restrooms&rdquo;, and &ldquo;pay
-    raise&rdquo;.</em></ins></span> If <span class="inserted"><ins><em>the app 
was free, workers could modify the program
-    so</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>acts as they wish, not how Amazon wants it.&lt;/p&gt;
+    ban specific words Amazon doesn't like&lt;/a&gt;, such</em></ins></span> 
as <span class="removed"><del><strong>what</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;union&rdquo;, 
&ldquo;restrooms&rdquo;, and &ldquo;pay
+    raise&rdquo;. If</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>app was free, workers could modify the program
+    so it acts as they wish, not how Amazon wants 
it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202203010"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202203010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The nonfree app &ldquo;Along,&rdquo;
-    developed by a company controlled by Zuckerberg, &lt;a
-    
href="https://kappanonline.org/dont-go-along-with-corporate-schemes-to-gather-up-student-data/"&gt;
-    leads students to reveal to their teacher personal information&lt;/a&gt;
+    developed by a company controlled by Zuckerberg,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://kappanonline.org/dont-go-along-with-corporate-schemes-to-gather-up-student-data/"&gt;
+    leads students to reveal</em></ins></span> to <span 
class="inserted"><ins><em>their teacher personal information&lt;/a&gt;
     about themselves and their families. Conversations are recorded 
-    and</em></ins></span> the <span 
class="inserted"><ins><em>collected</em></ins></span> data <span 
class="inserted"><ins><em>sent</em></ins></span> to <span 
class="removed"><del><strong>a
-        data broker,</strong></del></span> the <span 
class="inserted"><ins><em>company, which grants itself the
-    right to sell it. See also &lt;a
+    and</em></ins></span> the <span class="removed"><del><strong>snooping done 
by</strong></del></span> <span class="inserted"><ins><em>collected data sent 
to</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span> company, <span 
class="removed"><del><strong>and perhaps by</strong></del></span> <span 
class="inserted"><ins><em>which grants itself</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span>
+    <span class="inserted"><ins><em>right to sell it. See also &lt;a
     
href="/education/educational-malware-app-along.html#content"&gt;Educational 
Malware App &ldquo;Along&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202201270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The</em></ins></span> data broker <span 
class="removed"><del><strong>can figure out who the user 
is.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>X-Mode &lt;a
+    &lt;p&gt;The data broker X-Mode &lt;a
     
href="https://themarkup.org/privacy/2022/01/27/gay-bi-dating-app-muslim-prayer-apps-sold-data-on-peoples-location-to-a-controversial-data-broker"&gt;bought
     location data about 20,000 people collected by around 100 different
-    malicious apps&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    malicious apps&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202111090"&gt;
+  &lt;li id="M202111090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A building in LA, with a supermarket in it,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;The</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app"&gt;demands
-    customers load a particular</em></ins></span> app <span 
class="removed"><del><strong>reports the temperature of</strong></del></span> 
<span class="inserted"><ins><em>to pay for parking in</em></ins></span> the 
<span class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it is surrounded by a person's
-      body),</strong></del></span> <span class="inserted"><ins><em>parking
-    lot&lt;/a&gt;,</em></ins></span> and <span 
class="inserted"><ins><em>accept pervasive surveillance. They also 
have</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
-
-      &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements 
about</strong></del></span>
-    <span class="inserted"><ins><em>option of entering</em></ins></span> their 
<span class="removed"><del><strong>products, rather than free software which 
users can check</strong></del></span> <span class="inserted"><ins><em>license 
plate numbers in a kiosk. That is
-    an injustice, too.&lt;/p&gt;
+    &lt;p&gt;A building in LA, with a supermarket in it, &lt;a
+    
href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app"&gt;demands
+    customers load a particular app to pay for parking</em></ins></span> in the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>parking
+    lot&lt;/a&gt;, and accept pervasive surveillance. They also 
have</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span>
+    <span class="inserted"><ins><em>option</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
+      users to say &ldquo;I agree&rdquo;.</strong></del></span> <span 
class="inserted"><ins><em>entering their license plate numbers in a 
kiosk.</em></ins></span> That is <span class="removed"><del><strong>no excuse 
for malware.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>an injustice, 
too.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202106030"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202106030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/"&gt;TikTok
     apps collect biometric identifiers and biometric information from
-    users' smartphones&lt;/a&gt;. The company behind it does whatever it 
wants</em></ins></span>
-    and <span 
class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>collects whatever data it 
can.&lt;/p&gt;</em></ins></span>
+    users' smartphones&lt;/a&gt;. The company behind it does whatever it wants
+    and collects whatever data it can.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M202104060"&gt;
+  &lt;li id="M202104060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire</em></ins></span>
+    app <span class="removed"><del><strong>because it asked the user to
+      approve sending personal</strong></del></span> <span 
class="inserted"><ins><em>saves people's wedding photos forever and hands 
over</em></ins></span> data
+    to <span class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>others&lt;/a&gt;, giving users no control over their 
personal 
+    information/data. The</em></ins></span> app <span 
class="removed"><del><strong>developer but did not
+      ask about sending it to other companies.  This</strong></del></span> 
<span class="inserted"><ins><em>also sometimes</em></ins></span> shows <span 
class="removed"><del><strong>the
+      weakness of the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>old photos and
+    memories</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
+      app send</strong></del></span> <span class="inserted"><ins><em>users, 
without giving them</em></ins></span> any <span 
class="removed"><del><strong>information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>control over this
+    either.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
-    app saves people's wedding photos forever and hands over 
data</em></ins></span>
-    to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span 
class="inserted"><ins><em>others&lt;/a&gt;, giving users no control over their 
personal 
-    information/data. The app also sometimes shows old 
photos</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Many cr&hellip;apps, developed by various
+    companies for various organizations, do</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown</em></ins></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>those companies</em></ins></span> and <span 
class="inserted"><ins><em>those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that 
do</em></ins></span>
+    the <span class="removed"><del><strong>NSA takes advantage to spy through 
it too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span class="inserted"><ins><em>memories</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>users, without 
giving them any control over this
-    either.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+
+   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is</em></ins></span> that <span 
class="removed"><del><strong>makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued</strong></del></span> <span 
class="inserted"><ins><em>proprietary software developer A tricks
+    proprietary software developers B1 &hellip; B50 into making 
platforms</em></ins></span> for <span class="removed"><del><strong>collecting 
lots of personal information about how
+    people use it&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;The company's statement that it anonymizes the data may be
+        true, but it doesn't really matter. If it sells</strong></del></span>
+    <span class="inserted"><ins><em>A to mistreat</em></ins></span> the <span 
class="inserted"><ins><em>end user.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M202102010"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+  &lt;li id="M202003260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users'</em></ins></span> data to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt; even if the user doesn't 
have</em></ins></span>
+    a
+        <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>Facebook account. According 
to</em></ins></span> the <span class="removed"><del><strong>data broker can 
figure out who</strong></del></span> <span class="inserted"><ins><em>article, 
Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202003010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Alipay Health Code app
+    estimates whether</em></ins></span> the user <span 
class="removed"><del><strong>is.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span> <span class="inserted"><ins><em>has 
Covid-19 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on its users through</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells</em></ins></span> the <span class="removed"><del><strong>proprietary 
control app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cops directly&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202001290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>Amazon Ring</em></ins></span> 
app <span class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>does &lt;a
+    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201912220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
+    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>government</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it is surrounded by a person's
+      body),</strong></del></span> <span class="inserted"><ins><em>United Arab 
Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this,</em></ins></span> and <span 
class="removed"><del><strong>the vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note the totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>that 
is</em></ins></span> a <span class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than</strong></del></span> <span 
class="inserted"><ins><em>good
+    reason to use</em></ins></span> free software <span 
class="removed"><del><strong>which users can check
+      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
+    the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>the device.  Many employers demand to do this.  For 
the
+    employee, this is simply nonfree software, as fundamentally 
unjust</em></ins></span>
+    and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>as dangerous as any other nonfree 
software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The Chinese Communist Party's 
&ldquo;Study
+    the Great Nation&rdquo; app requires users</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+&lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -1644,34 +1728,31 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Many cr&hellip;apps, developed by 
various
-    companies for various organizations, do</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>grant it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
-    location tracking unknown to those companies</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>those
-    organizations&lt;/a&gt;.  It's actually some widely used 
libraries</em></ins></span> that <span 
class="inserted"><ins><em>do</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>tracking.&lt;/p&gt;
-
-    &lt;p&gt;What's unusual here</em></ins></span> is <span 
class="removed"><del><strong>not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
+    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>Android 
version was found to contain</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span>
+    <span class="inserted"><ins><em>back-door allowing developers to run any 
code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app</em></ins></span> is <span class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>mandatory at 
some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>that proprietary software developer A tricks
-    proprietary software developers B1 &hellip; B50 into making platforms for
-    A</em></ins></span> to <span class="removed"><del><strong>place new items 
on top under each subsection</strong></del></span> <span 
class="inserted"><ins><em>mistreat the end user.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202003260"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>a text editor) includes a clarification
+    saying that the tests were only performed</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+&lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -1679,24 +1760,19 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The Apple iOS version of 
Zoom</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending users' data to Facebook&lt;/a&gt; even if</em></ins></span> the 
<span class="removed"><del><strong>emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>user doesn't 
have
-    a Facebook account. According to the article, Zoom and Facebook
-    don't even mention</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>Android version</em></ins></span>
+    of <span class="removed"><del><strong>Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>surveillance on their privacy policy page,
-    making this an obvious violation of people's privacy 
even</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP 
phones:
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>their
-    own terms.&lt;/p&gt;</em></ins></span>
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1705,36 +1781,25 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202003010"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Alipay Health Code app
-    estimates whether the user has Covid-19 and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M202001290"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
-    surveillance</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>other companies as well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each 
subsection</strong></del></span>
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the app, and that, according</em></ins></span> to 
<span class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be 
conducted</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection</strong></del></span>
+    <span class="inserted"><ins><em>Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
+  &lt;li id="M201909091"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
 
 <span class="removed"><del><strong>&lt;div class="big-section"&gt;
@@ -1750,17 +1815,17 @@
 
 &lt;ul&gt;
   &lt;li&gt;</strong></del></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>ToToc messaging app seems to be a</em></ins></span> 
&lt;a
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>Facebook app</em></ins></span> &lt;a
       <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>government of</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this, and that</em></ins></span> is 
<span class="removed"><del><strong>using it</strong></del></span> <span 
class="inserted"><ins><em>a good
-    reason</em></ins></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
+        watching&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users</em></ins></span> even when <span 
class="removed"><del><strong>the &ldquo;owner&rdquo; 
switches</strong></del></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>turned off&lt;/a&gt;, 
after tricking them
+    into giving the app broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>use 
one of its
+    functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
@@ -1768,123 +1833,28 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes</strong></del></span>
 <span class="inserted"><ins><em>use free software instead.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;Note:</em></ins></span> this <span 
class="removed"><del><strong>code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>article 
uses</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;free&rdquo; in</em></ins></span>
-    the <span class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iMonsters and Android phones,
-    when</em></ins></span> used
-      <span class="removed"><del><strong>by most US 
libraries,</strong></del></span> <span class="inserted"><ins><em>for work, give 
employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
-    snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software on the device.  Many employers demand</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with</strong></del></span> <span 
class="inserted"><ins><em>do this.  For the
-    employee, this is simply</em></ins></span> nonfree <span 
class="removed"><del><strong>software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software, as fundamentally unjust
-    and as dangerous as any other nonfree software.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo; app requires users to grant it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;</em></ins></span>
-    access <span class="removed"><del><strong>its computers remotely and make 
changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
-    internet history&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>Android version was found to contain a
-    back-door allowing developers to run any code they wish</em></ins></span> 
in the <span class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app</em></ins></span> is
-    <span class="removed"><del><strong>proprietary,</strong></del></span> 
<span class="inserted"><ins><em>mandatory at some workplaces.&lt;/p&gt;
-
-    &lt;p&gt;Note: The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car remotely,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that</em></ins></span> the <span class="removed"><del><strong>phone 
company to track</strong></del></span> <span class="inserted"><ins><em>tests 
were only performed on</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>Android version
-    of</em></ins></span> the <span class="removed"><del><strong>time; it is 
possible</strong></del></span> <span class="inserted"><ins><em>app, and that, 
according</em></ins></span> to <span class="removed"><del><strong>physically 
remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not be conducted on
-    Apple's operating system.&rdquo;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,</strong></del></span>
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201909091"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Facebook app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
-    tracks users even when it</em></ins></span> is <span 
class="removed"><del><strong>made available</strong></del></span> <span 
class="inserted"><ins><em>turned off&lt;/a&gt;, after tricking them
-    into giving the app broad permissions in order</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>use one of its
-    functionalities.&lt;/p&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span 
class="inserted"><ins><em>Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to 
Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201909090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only</strong></del></span>
 
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>users' lives to 
Facebook&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201909060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201909060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Keeping track of who downloads a proprietary
-    program</em></ins></span> is <span class="removed"><del><strong>not
-      really</strong></del></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>form</em></ins></span> of <span 
class="removed"><del><strong>proprietary</strong></del></span> surveillance. 
<span class="removed"><del><strong>These systems are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by malware. The other
-      cases mentioned are done by</strong></del></span>  <span 
class="inserted"><ins><em>There is a</em></ins></span>
-    proprietary <span class="removed"><del><strong>malware 
in</strong></del></span> <span class="inserted"><ins><em>program for adjusting 
a certain telescopic rifle sight. &lt;a
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
     
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>list of all</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
+    A US prosecutor has demanded</em></ins></span> the
+      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>list of all the 10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With a free program there would not be a list of who has installed
@@ -1894,161 +1864,164 @@
   &lt;li id="M201907081"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>extract data 
remotely and
-      determine the car's location at any time. (See</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span>
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
-    of</em></ins></span> the <span class="removed"><del><strong>state orders 
it</strong></del></span> <span class="inserted"><ins><em>operating system, in 
order</em></ins></span> to <span class="removed"><del><strong>get 
the</strong></del></span> <span class="inserted"><ins><em>gather as much 
private</em></ins></span> data
-      <span class="removed"><del><strong>and hand it over, the 
state</strong></del></span> <span class="inserted"><ins><em>as
-    they possibly can.&lt;/p&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data 
as</em></ins></span>
+    they <span class="removed"><del><strong>report even which 
page</strong></del></span> <span class="inserted"><ins><em>possibly 
can.&lt;/p&gt;
 
-    &lt;p&gt;Thus, we can't trust rules against spying.  What 
we</em></ins></span> can <span class="removed"><del><strong>store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>trust is
-    having control over the software we run.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>software we run.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtHome</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Many Android apps can track
-    users' movements even when the user says &lt;a
-    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
-    not</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>user says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span class="inserted"><ins><em>allow them 
access</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span 
class="removed"><del><strong>Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>allow them access</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>locations&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>Android,
     exploited intentionally by malicious apps.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201905300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
-    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
     programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf 
has</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;BlizzCon 2019 imposed</em></ins></span> a <span 
class="removed"><del><strong>built-in cell</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone app&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>be allowed into</em></ins></span>
-    the <span class="removed"><del><strong>other way.&rdquo; 
Evidently</strong></del></span> <span class="inserted"><ins><em>event.&lt;/p&gt;
-
-    &lt;p&gt;This app is a spyware</em></ins></span> that <span 
class="removed"><del><strong>was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+    requirement to run a proprietary</em></ins></span> phone <span 
class="removed"><del><strong>modem which allows
+  effectively
+  anyone</strong></del></span> <span class="inserted"><ins><em>app&lt;/a&gt; 
to be allowed into
+    the event.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More</strong></del></span> <span 
class="inserted"><ins><em>can snoop on a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
-    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    &lt;p&gt;This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
     near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    &lt;p&gt;Data collected by menstrual</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>pregnancy monitoring apps is often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available to employers and insurance companies&lt;/a&gt;. Even though the
-    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
-    traced back to the woman who uses the app.&lt;/p&gt;
+    available</em></ins></span> to <span class="removed"><del><strong>do 
because</strong></del></span> <span class="inserted"><ins><em>employers and 
insurance companies&lt;/a&gt;. Even though</em></ins></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span>
+    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>modem.  However,</strong></del></span> <span 
class="inserted"><ins><em>woman who uses the app.&lt;/p&gt;
 
     &lt;p&gt;This has harmful implications for women's rights to equal 
employment
     and freedom to make their own pregnancy choices. Don't use
-    these apps, even if someone offers you a reward to do so. A
-    free-software app that does more</em></ins></span> or less <span 
class="removed"><del><strong>all &ldquo;smart&rdquo; TVs</strong></del></span> 
<span class="inserted"><ins><em>the same thing without
-    spying on you is available from &lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, 
and</em></ins></span> &lt;a <span class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
-    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+    these apps,</em></ins></span> even if <span 
class="removed"><del><strong>it asked for
+    authentication,</strong></del></span> <span 
class="inserted"><ins><em>someone offers</em></ins></span> you <span 
class="removed"><del><strong>couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>a reward to do so. A
+    free-software app</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>does more or less</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>same thing without
+    spying on you</em></ins></span> is
+    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> from <span 
class="removed"><del><strong>its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new</em></ins></span> one <span class="removed"><del><strong>connects 
to</strong></del></span> <span class="inserted"><ins><em>is being 
developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>movements of Android phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+    saves</em></ins></span> the <span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>data 
for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
+    &lt;p&gt;Nonfree software in</em></ins></span> the phone <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>has</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> <span class="inserted"><ins><em>be responsible for 
sending</em></ins></span>
+    the <span class="removed"><del><strong>time; it is 
possible</strong></del></span> <span class="inserted"><ins><em>location 
data</em></ins></span> to <span class="removed"><del><strong>physically remove 
the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201903251"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sensitive data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home with
     the data, or pass it on to user-installed apps that have access to
     the network but no direct access to the data. This results in massive
-    surveillance</em></ins></span> on <span class="inserted"><ins><em>which 
the user has absolutely no control.&lt;/p&gt;
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903211"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The MoviePass dis-service &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>case</strong></del></span> 
<span class="inserted"><ins><em>MoviePass dis-service &lt;a
     
href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/"&gt;
     is planning to use face recognition to track people's eyes&lt;/a&gt;
-    to make sure they won't put</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phones down or look away during
+    to make sure they won't put their phones down or look away during
     ads&mdash;and trackers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    &lt;p&gt;A study</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>24 
&ldquo;health&rdquo; apps found that 19 of them &lt;a
     
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
     send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
+    for invasive advertising or discriminating against 
people</em></ins></span> in <span class="removed"><del><strong>this 
article,</strong></del></span> <span class="inserted"><ins><em>poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
     lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+    &ldquo;consent&rdquo;</em></ins></span> is not
+      <span class="removed"><del><strong>really</strong></del></span> <span 
class="inserted"><ins><em>sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also &lt;a
+    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="removed"><del><strong>matter of</strong></del></span> <span 
class="inserted"><ins><em>convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems</strong></del></span>
+    <span class="inserted"><ins><em>library for building mobile apps, which 
also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
     sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
     way and released them, apparently not realizing that all the personal
@@ -2060,8 +2033,8 @@
 
   &lt;li id="M201902140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>AppCensus database gives information on &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.io/"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
@@ -2073,8 +2046,9 @@
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed,</em></ins></span> was <span 
class="inserted"><ins><em>in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform</em></ins></span> are <span 
class="removed"><del><strong>an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
@@ -2091,16 +2065,16 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, 
such</em></ins></span> as <span class="inserted"><ins><em>&lt;a
+    be on Google Play had one or more malicious functionalities, such as &lt;a
     
href="https://www.androidpolice.com/2019/02/03/google-bans-29-beauty-camera-apps-from-the-play-store-that-steal-your-photos/"&gt;
-    stealing users' photos instead</em></ins></span> of <span 
class="removed"><del><strong>2014,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them&lt;/a&gt;,
-    pushing unwanted and often malicious ads on users, and redirecting
+    stealing users' photos instead</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them&lt;/a&gt;,
+    pushing unwanted</em></ins></span> and <span 
class="inserted"><ins><em>often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
     the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet,</em></ins></span> but <span class="removed"><del><strong>we 
don't expect this</strong></del></span> <span class="inserted"><ins><em>they 
should also stay away from nonfree apps in
+    haven't yet, but they</em></ins></span> should <span 
class="inserted"><ins><em>also stay away from nonfree apps in
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
@@ -2114,7 +2088,7 @@
     25% fail to protect their users' privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws were
+    potentially also</em></ins></span> be <span 
class="removed"><del><strong>replaced</strong></del></span> <span 
class="inserted"><ins><em>used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
@@ -2132,8 +2106,9 @@
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will do
-    with the data.&lt;/p&gt;
+    being sued, demanding that it notify the users of what it will 
do</em></ins></span>
+    with <span class="removed"><del><strong>anonymous
+      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>the data.&lt;/p&gt;
 
     &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
@@ -2156,9 +2131,9 @@
     Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
     the user's activities in the app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
+    using that app,</em></ins></span> but <span class="inserted"><ins><em>that 
alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the 
user</em></ins></span> has <span class="removed"><del><strong>got 
better.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
Facebook
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>invasion isn't done</strong></del></span> 
<span class="inserted"><ins><em>user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2179,7 +2154,7 @@
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+    tracking, but most users will be tricked</em></ins></span> by <span 
class="removed"><del><strong>malware.</strong></del></span> <span 
class="inserted"><ins><em>the misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
@@ -2187,9 +2162,9 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>makes them act as spies for licensing 
enforcement.&lt;/p&gt;
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
     &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
     a recording. But we can't be sure from the article.&lt;/p&gt;
@@ -2207,13 +2182,13 @@
     and collect information about its users&lt;/a&gt;.  40% of the apps were
     found to insecurely snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
+    source code they cannot look at.</em></ins></span>  The other
+      <span class="removed"><del><strong>cases mentioned</strong></del></span> 
<span class="inserted"><ins><em>apps might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>proprietary apps generally work against
+    &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
-    need</em></ins></span> to get <span class="removed"><del><strong>users' 
formal
-      consent</strong></del></span> <span class="inserted"><ins><em>rid of the 
proprietary software&mdash;both proprietary
+    need to get rid of the proprietary software&mdash;both proprietary
     Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
@@ -2240,7 +2215,7 @@
     &lt;p&gt;The moviepass app and dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel</em></ins></span> before <span 
class="removed"><del><strong>collecting personal</strong></del></span> <span 
class="inserted"><ins><em>and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
@@ -2250,9 +2225,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Spotify app &lt;a
     
href="https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm"&gt;harvests
-    users'</em></ins></span> data <span class="inserted"><ins><em>to 
personally identify and know people&lt;/a&gt; through music,
-    their mood, mindset, activities, and tastes. There</em></ins></span> are 
<span class="removed"><del><strong>totally inadequate.
-      And what happens</strong></del></span> <span 
class="inserted"><ins><em>over 150
+    users' data to personally identify and know people&lt;/a&gt; through music,
+    their mood, mindset, activities, and tastes. There</em></ins></span> are 
<span class="inserted"><ins><em>over 150
     billion events logged daily on the program which contains users'
     data and personal information.&lt;/p&gt;
   &lt;/li&gt;
@@ -2273,7 +2247,7 @@
     &lt;p&gt;&lt;a
     
href="https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/"&gt;Instagram
     is forcing users to give away their phone numbers&lt;/a&gt; and won't let
-    people continue using the app</em></ins></span> if <span 
class="inserted"><ins><em>they refuse.&lt;/p&gt;
+    people continue using the app if they refuse.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
@@ -2307,12 +2281,12 @@
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>better job of 
preventing apps from
+    &lt;p&gt;Could Google have</em></ins></span> done <span 
class="inserted"><ins><em>a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand the source code for these apps, and 
study</em></ins></span>
-    the <span class="inserted"><ins><em>source code somehow to determine 
whether they mistreat users in
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
     various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
@@ -2340,8 +2314,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by</em></ins></span> 
TV
-    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played</em></ins></span> by 
<span class="inserted"><ins><em>TV
+    programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
@@ -2382,8 +2356,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app</em></ins></span> will <span 
class="removed"><del><strong>say, &ldquo;Without</strong></del></span> <span 
class="inserted"><ins><em>give Verizon the same information
+    announced an opt-in</em></ins></span> proprietary <span 
class="removed"><del><strong>malware</strong></del></span> <span 
class="inserted"><ins><em>search app that it will&lt;/a&gt; pre-install
+    on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
@@ -2476,17 +2450,19 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans</em></ins></span> your <span 
class="removed"><del><strong>consent</strong></del></span> <span 
class="inserted"><ins><em>mobile phone's photo collections for known 
faces&lt;/a&gt;,
-    and suggests you circulate the picture you take 
according</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>who is
-    in the frame.&lt;/p&gt;
+    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+    and suggests you circulate the picture you take according to who 
is</em></ins></span>
+    in the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means the pictures are likely to be
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely</em></ins></span> to <span 
class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>be
     sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if</em></ins></span> the <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them to the service.&lt;/p&gt;
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
@@ -2504,7 +2480,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in the phone, and in server accounts,
+    spy on many sorts of</em></ins></span> data <span 
class="removed"><del><strong>remotely</strong></del></span> <span 
class="inserted"><ins><em>in the phone,</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>in server accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2513,7 +2490,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apps that include &lt;a
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio and</em></ins></span> 
TV <span class="inserted"><ins><em>programs
+    Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
     such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
@@ -2522,7 +2499,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was &lt;a
+    unrelated to</em></ins></span> the <span 
class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
     
href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
     found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -2541,7 +2518,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;hand 
over
-    personal, behavioral and location information&lt;/a&gt; of their users to
+    personal, behavioral and</em></ins></span> location <span 
class="removed"><del><strong>at</strong></del></span> <span 
class="inserted"><ins><em>information&lt;/a&gt; of their users to
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2572,7 +2549,7 @@
     spy on the user's own data&lt;/a&gt;&mdash;often many kinds.&lt;/p&gt;
 
     &lt;p&gt;Those companies know that snoop-phone usage trains people to say
-    yes to almost any snooping.&lt;/p&gt;
+    yes to almost</em></ins></span> any <span 
class="removed"><del><strong>time. (See</strong></del></span> <span 
class="inserted"><ins><em>snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506264"&gt;
@@ -2585,21 +2562,20 @@
     proprietary apps, it was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
+    &ldquo;free&rdquo;, but most of them are not in fact</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.  It also uses the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that</em></ins></span> will <span 
class="inserted"><ins><em>fit perfectly.&lt;/p&gt;
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Gratis Android apps (but</em></ins></span> not <span 
class="removed"><del><strong>work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Gratis Android apps (but not &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
-    
href="https://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+    
href="https://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
+    and <span class="removed"><del><strong>c.&lt;/a&gt;). The company 
says</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
@@ -2638,7 +2614,8 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
-    use of data on the user's computer, but it does surveillance too: &lt;a
+    use of data on the user's computer, but</em></ins></span> it <span 
class="removed"><del><strong>doesn't
+      store</strong></del></span> <span class="inserted"><ins><em>does 
surveillance too: &lt;a
     
href="https://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
     it tries to get the user's list of other people's phone
     numbers&lt;/a&gt;.&lt;/p&gt;
@@ -2651,12 +2628,12 @@
     
href="https://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
     sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve sending personal data to the app developer but did not ask
-    about sending it to other companies.  This shows the weakness of
+    &lt;p&gt;The FTC criticized</em></ins></span> this <span 
class="removed"><del><strong>information,</strong></del></span> <span 
class="inserted"><ins><em>app because it asked the user to
+    approve sending personal data to the app developer</em></ins></span> but 
<span class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>did not ask
+    about sending it to other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>weakness of
     the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
-    anyone? A free software flashlight app</em></ins></span> would <span 
class="inserted"><ins><em>not.&lt;/p&gt;
+    anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212100"&gt;
@@ -2678,11 +2655,11 @@
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype refuses to</em></ins></span> say <span 
class="inserted"><ins><em>whether it can &lt;a
+    &lt;p&gt;Skype refuses to say whether it can &lt;a
     
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
     on calls&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
+    &lt;p&gt;That almost certainly means</em></ins></span> it <span 
class="inserted"><ins><em>can do so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307110"&gt;
@@ -2709,8 +2686,8 @@
     &lt;p&gt;Microsoft is imposing its
     surveillance on the game of Minecraft by &lt;a
     
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
-    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
-    has bought the game and will merge all accounts into its network,
+    every player</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>open an account on Microsoft's network&lt;/a&gt;. 
Microsoft
+    has bought</em></ins></span> the <span class="inserted"><ins><em>game and 
will merge all accounts into its network,
     which will give them access to people's data.&lt;/p&gt;
 
     &lt;p&gt;Minecraft players &lt;a
@@ -2734,17 +2711,17 @@
   &lt;li id="M201806240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Red Shell is a spyware</em></ins></span> that
-    <span class="inserted"><ins><em>is found in many proprietary games. It 
&lt;a
+    &lt;p&gt;Red Shell is a spyware that
+    is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers</em></ins></span> and <span 
class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>to third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
+    program along with an update to</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
     to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
@@ -2783,20 +2760,25 @@
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    &ldquo;whales&rdquo; who</em></ins></span> can <span 
class="removed"><del><strong>store it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be led to spend a lot of money. They also
     use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
     &lt;p&gt;While the article describes gratis games, games that cost money
-    can use the same tactics.&lt;/p&gt;
+    can use the same tactics.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201401280"&gt;
+&lt;!-- #SpywareAtHome</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Angry Birds &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Angry Birds &lt;a
     
href="https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies, and the NSA takes advantage
-    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    spies for companies, and the NSA takes advantage</em></ins></span>
+    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>spy through it 
too&lt;/a&gt;.  Here's information</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -2807,25 +2789,29 @@
 
   &lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Blizzard Warden is a hidden
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
     spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202101050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -2833,7 +2819,7 @@
     
href="https://web.archive.org/web/20220129065321/https://foundation.mozilla.org/en/privacynotincluded/"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed to snoop on users&lt;/a&gt; even if they meet
+    designed</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
     design of the program running on some of these devices &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
@@ -2851,13 +2837,13 @@
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
     &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV</em></ins></span> 
Sets&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -2866,12 +2852,16 @@
 don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202204140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Today's &ldquo;smart&rdquo;</em></ins></span> TVs <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.techdirt.com/2022/04/14/its-still-stupidly-ridiculously-difficult-to-buy-a-dumb-tv/"&gt;
+    &lt;p&gt;Today's</em></ins></span> &ldquo;smart&rdquo; TVs &lt;a <span 
class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/2022/04/14/its-still-stupidly-ridiculously-difficult-to-buy-a-dumb-tv/"&gt;
     push people to surrender to tracking via internet&lt;/a&gt;. Some won't 
work
     unless they have a chance to download nonfree software. And they are
     designed for programmed obsolescence.&lt;/p&gt;
@@ -2882,30 +2872,36 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&ldquo;Smart&rdquo; TV producers &lt;a
     
href="https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data"&gt;are
-    spying on people using various methods&lt;/a&gt;, and harvest their
-    data. They are collecting audio, video, and TV usage data to profile
+    spying</em></ins></span> on <span class="inserted"><ins><em>people using 
various methods&lt;/a&gt;, and harvest</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows</strong></del></span>
+    <span class="inserted"><ins><em>data. They are collecting audio, video, 
and TV usage data to profile
     people.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202010282"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers</em></ins></span> are <span 
class="inserted"><ins><em>turning to produce only
-    &ldquo;Smart&rdquo; TV sets (which include spyware) that &lt;a
+    &lt;p&gt;TV manufacturers are turning to produce only
+    &ldquo;Smart&rdquo; TV sets (which include spyware)</em></ins></span> that 
<span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span class="inserted"><ins><em>&lt;a
     href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's now very
-    hard to find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
+    hard</em></ins></span> to <span class="removed"><del><strong>get users' 
formal
+      consent before collecting</strong></del></span> <span 
class="inserted"><ins><em>find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It appears that those manufacturers business model 
is</em></ins></span> not <span 
class="removed"><del><strong>allowed</strong></del></span> to <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>produce
-    TV and sell them for money, but to collect your personal data and
+    &lt;p&gt;It appears that those manufacturers business model is not to 
produce
+    TV and sell them for money, but to collect your</em></ins></span> personal 
data <span class="inserted"><ins><em>and
     (possibly) hand over them to others for benefit.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;TV manufacturers are able to &lt;a
+    &lt;p&gt;TV manufacturers</em></ins></span> are <span 
class="removed"><del><strong>totally inadequate.
+      And</strong></del></span> <span class="inserted"><ins><em>able to &lt;a
     
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
-    every second of</em></ins></span> what the user <span 
class="removed"><del><strong>watches &mdash;</strong></del></span> <span 
class="inserted"><ins><em>is watching&lt;/a&gt;. This is illegal due to
+    every second of</em></ins></span> what <span 
class="removed"><del><strong>happens if a</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> user <span 
class="removed"><del><strong>declines consent?  Probably</strong></del></span> 
<span class="inserted"><ins><em>is watching&lt;/a&gt;. This is illegal due to
     the Video Privacy Protection Act of 1988, but they're circumventing
     it through EULAs.&lt;/p&gt;
   &lt;/li&gt;
@@ -2915,21 +2911,25 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
+    collect &ldquo;whatever</em></ins></span> the TV
+      <span class="removed"><del><strong>will say, &ldquo;Without your 
consent</strong></del></span> <span 
class="inserted"><ins><em>sees,&rdquo;&lt;/a&gt; in the own words of the 
company's
+    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
     &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
+    is that it is opt-in in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>TV</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
     nonfree, we don't know what is actually happening behind the scenes,
-    and there is</em></ins></span> no <span 
class="removed"><del><strong>exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>guarantee that all future updates will leave the
+    and there is no guarantee that all future updates</em></ins></span> will
+      <span class="removed"><del><strong>not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>leave the
     settings unchanged.&lt;/p&gt;
 
-    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
+    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for</em></ins></span> that <span 
class="removed"><del><strong>TVs are</strong></del></span>
+    <span class="inserted"><ins><em>matter), the easiest way to make sure it 
isn't spying on you is
     to disconnect it from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
+    instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>allowed</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,
     if you are technically oriented, is to get your own router (which can
     be an old computer running completely free software), and set up a
     firewall to block connections to Vizio's servers. Or, as a last resort,
@@ -2945,25 +2945,25 @@
 
     &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    moral weakness of surrendering</em></ins></span> to <span 
class="inserted"><ins><em>Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
+  &lt;li id="M201702060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
-    
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
+    
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs</em></ins></span>
+    report <span class="inserted"><ins><em>everything that is viewed on them, 
and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports what it is. The existence of a way to disable the
-    surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
+    the TV reports</em></ins></span> what <span class="inserted"><ins><em>it 
is. The existence of a way to disable</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  &lt;li id="M201511130"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
@@ -3146,8 +3146,9 @@
     passes by, the user's front door.&lt;/p&gt;
 
     &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>their users and report</strong></del></span> <span 
class="inserted"><ins><em>how Ring used to let individual employees look
-    at the videos freely.  It appears Amazon has tried to prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="inserted"><ins><em>prevent that
+    secondary abuse, but</em></ins></span> the 
+      <span 
class="removed"><del><strong>internet&lt;/a&gt;&mdash;</strong></del></span> 
<span class="inserted"><ins><em>primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3161,8 +3162,7 @@
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the 
-      <span 
class="removed"><del><strong>internet&lt;/a&gt;&mdash;</strong></del></span> 
<span class="inserted"><ins><em>videos. That's not
+    manufacturers promise not to look at what's in the videos. That's not
     security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
@@ -3251,7 +3251,7 @@
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
     leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found</em></ins></span> a <span class="inserted"><ins><em>way to 
access the data&lt;/a&gt; collected by the
+    Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
@@ -3263,7 +3263,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="inserted"><ins><em>speech recognition
     company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
@@ -4116,8 +4116,8 @@
 
   &lt;li id="M201308040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Google Chrome &lt;a
     href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
     spies on browser history, affiliations&lt;/a&gt;, and other installed
     software.&lt;/p&gt;
@@ -4125,8 +4125,8 @@
 
   &lt;li id="M200809060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Google Chrome contains a key 
logger that &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome contains a key logger that &lt;a
     
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
     sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
   &lt;/li&gt;
@@ -4383,7 +4383,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/03/04 17:02:44 $
+$Date: 2023/03/15 11:04:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.438
retrieving revision 1.439
diff -u -b -r1.438 -r1.439
--- proprietary-surveillance.ja.po      4 Mar 2023 17:02:44 -0000       1.438
+++ proprietary-surveillance.ja.po      15 Mar 2023 11:04:25 -0000      1.439
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2023-03-04 16:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -430,6 +430,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.377
retrieving revision 1.378
diff -u -b -r1.377 -r1.378
--- proprietary-surveillance.pot        4 Mar 2023 17:02:44 -0000       1.377
+++ proprietary-surveillance.pot        15 Mar 2023 11:04:25 -0000      1.378
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2023-03-04 16:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -329,6 +329,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a "
+"href=\"https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html\";>Windows
 "
+"11 starts to send data to online servers.</a> The user's personal details, "
+"location or hardware information are reported to Microsoft and other "
+"companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a "
 
"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\";>tricking
 "
 "users to create an account on their network</a> to be able to install and "

Index: proprietary-surveillance.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-surveillance.pt-br-diff.html    4 Mar 2023 17:02:44 -0000       
1.30
+++ proprietary-surveillance.pt-br-diff.html    15 Mar 2023 11:04:25 -0000      
1.31
@@ -214,7 +214,19 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201912160"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201912160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Microsoft is &lt;a
@@ -3832,7 +3844,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/03/04 17:02:44 $
+$Date: 2023/03/15 11:04:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary-surveillance.pt-br.po   4 Mar 2023 17:02:44 -0000       1.52
+++ proprietary-surveillance.pt-br.po   15 Mar 2023 11:04:25 -0000      1.53
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2023-03-04 16:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -396,6 +396,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.811
retrieving revision 1.812
diff -u -b -r1.811 -r1.812
--- proprietary-surveillance.ru.po      6 Mar 2023 08:01:35 -0000       1.811
+++ proprietary-surveillance.ru.po      15 Mar 2023 11:04:25 -0000      1.812
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2023-03-04 16:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -387,6 +388,17 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-";
 "setup-now-prevents-local-account-creation/\">tricking users to create an "
 "account on their network</a> to be able to install and use the Windows "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.362
retrieving revision 1.363
diff -u -b -r1.362 -r1.363
--- proprietary.de-diff.html    21 Feb 2023 11:03:13 -0000      1.362
+++ proprietary.de-diff.html    15 Mar 2023 11:04:25 -0000      1.363
@@ -28,8 +28,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -138,8 +138,8 @@
 them.&lt;/p&gt;
 &lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>September, 
2022,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>550</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 670 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>March, 
2023,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>550</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 680 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -262,6 +262,18 @@
   to detect once installed...&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202301230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -327,20 +339,6 @@
     to insist on encryption software that is (1) free software and (2)
     studied by experts.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202211300"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.techarp.com/mobile/apple-china-limit-airdrop/"&gt;
-    Obeying a demand by the Chinese government, Apple restricted the
-    use of AirDrop in China&lt;/a&gt;. It imposed a ten-minute time limit
-    during which users can receive files from non contacts. This makes
-    it nearly impossible to use AirDrop for its intended purpose, which
-    is to exchange files with strangers between iMonsters in physical
-    proximity. This happened after it became known that dissenters
-    were using the app to distribute digital anti-government fliers
-    anonymously.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -404,7 +402,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/02/21 11:03:13 $
+$Date: 2023/03/15 11:04:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- proprietary.de.po   21 Feb 2023 11:03:13 -0000      1.378
+++ proprietary.de.po   15 Mar 2023 11:04:25 -0000      1.379
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -165,9 +165,9 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2022,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+550+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 670 references to
+# | As of [-April, 2017,-] {+March, 2023,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+550+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 680 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -175,9 +175,9 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
 "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt sind "
@@ -571,6 +571,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -639,18 +650,6 @@
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.656
retrieving revision 1.657
diff -u -b -r1.656 -r1.657
--- proprietary.es.po   22 Feb 2023 09:33:55 -0000      1.656
+++ proprietary.es.po   15 Mar 2023 11:04:25 -0000      1.657
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 2.4.2\n"
 
@@ -154,10 +155,19 @@
 "radiocomunicaciones antes que al software concreto que utilizan."
 
 #. type: Content of: <div><p>
-msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+# | As of [-September, 2022,-] {+March, 2023,+} the pages in this directory
+# | list around 550 instances of malicious functionalities (with more than
+# | 6[-7-]{+8+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2022, the pages in this directory list around 550 "
+#| "instances of malicious functionalities (with more than 670 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "En septiembre de 2022, las páginas de este directorio ofrecen una lista de "
 "alrededor de 550 ejemplos de funcionalidades maliciosas (con más de 670 "
@@ -429,6 +439,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -536,27 +557,6 @@
 "sensato es reclamar un software que sea (1) software libre y (2) analizado "
 "por expertos."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/";
-"\">Obedeciendo un requerimiento del Gobierno chino, Apple ha restringido el "
-"uso de AirDrop en China</a>. Ha impuesto un límite temporal de diez minutos "
-"para que los usuarios puedan recibir archivos de personas que no están entre 
"
-"sus contactos. Esto hace casi imposible utilizar AirDrop para lo que está "
-"pensado, esto es, para intercambiar archivos con extraños mediante "
-"iMonstruos que se encuentren en las proximidades. Esto sucedió después de "
-"que se conociera que la disidencia estaba utilizando esa aplicación para "
-"distribuir folletos digitales antigubernamentales de forma anónima."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Ver más&hellip;</a>"
@@ -632,6 +632,27 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
+#~ "Obeying a demand by the Chinese government, Apple restricted the use of "
+#~ "AirDrop in China</a>. It imposed a ten-minute time limit during which "
+#~ "users can receive files from non contacts. This makes it nearly "
+#~ "impossible to use AirDrop for its intended purpose, which is to exchange "
+#~ "files with strangers between iMonsters in physical proximity. This "
+#~ "happened after it became known that dissenters were using the app to "
+#~ "distribute digital anti-government fliers anonymously."
+#~ msgstr ""
+#~ "<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/";
+#~ "\">Obedeciendo un requerimiento del Gobierno chino, Apple ha restringido "
+#~ "el uso de AirDrop en China</a>. Ha impuesto un límite temporal de diez "
+#~ "minutos para que los usuarios puedan recibir archivos de personas que no "
+#~ "están entre sus contactos. Esto hace casi imposible utilizar AirDrop para 
"
+#~ "lo que está pensado, esto es, para intercambiar archivos con extraños "
+#~ "mediante iMonstruos que se encuentren en las proximidades. Esto sucedió "
+#~ "después de que se conociera que la disidencia estaba utilizando esa "
+#~ "aplicación para distribuir folletos digitales antigubernamentales de "
+#~ "forma anónima."
+
+#~ msgid ""
 #~ "Xiaomi provides a tool to <a href=\"https://www.guidetoroot.com/unlock-";
 #~ "bootloader-on-any-xiaomi-phones/\"> unlock the bootloader of Xiaomi "
 #~ "smartphones and tablets</a>, but this requires creating an account on the "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.653
retrieving revision 1.654
diff -u -b -r1.653 -r1.654
--- proprietary.fr.po   21 Feb 2023 11:38:23 -0000      1.653
+++ proprietary.fr.po   15 Mar 2023 11:04:26 -0000      1.654
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2023-02-21 12:37+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -149,10 +150,19 @@
 "téléphones."
 
 #. type: Content of: <div><p>
-msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+# | As of [-September, 2022,-] {+March, 2023,+} the pages in this directory
+# | list around 550 instances of malicious functionalities (with more than
+# | 6[-7-]{+8+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2022, the pages in this directory list around 550 "
+#| "instances of malicious functionalities (with more than 670 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "En septembre 2022, les pages de ce répertoire dénombraient à peu près 550 
"
 "cas de fonctionnalités malveillante (appuyés par plus de 670 références), 
"
@@ -421,6 +431,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -528,27 +549,6 @@
 "judicieux d'exiger un logiciel de chiffrement qui soit (1) libre et (2) "
 "audité par des spécialistes."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/";
-"\">Obéissant à une injonction du gouvernement chinois, Apple a restreint "
-"l'usage d'AirDrop en Chine</a> en limitant à 10 minutes la période durant "
-"laquelle les utilisateurs peuvent recevoir des fichier de la part de "
-"personnes ne faisant pas partie de leurs contacts. Il est ainsi devenu "
-"presque impossible d'utiliser AirDrop dans le but prévu, qui est d'échanger 
"
-"des fichiers entre iMonstres physiquement proches. Cela s'est produit "
-"lorsqu'il devenu notoire que des dissidents utilisaient cette appli pour "
-"distribuer anonymement des tracts antigouvernementaux."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Voir plus&hellip;</a>"
@@ -623,6 +623,26 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
+#~ "Obeying a demand by the Chinese government, Apple restricted the use of "
+#~ "AirDrop in China</a>. It imposed a ten-minute time limit during which "
+#~ "users can receive files from non contacts. This makes it nearly "
+#~ "impossible to use AirDrop for its intended purpose, which is to exchange "
+#~ "files with strangers between iMonsters in physical proximity. This "
+#~ "happened after it became known that dissenters were using the app to "
+#~ "distribute digital anti-government fliers anonymously."
+#~ msgstr ""
+#~ "<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/";
+#~ "\">Obéissant à une injonction du gouvernement chinois, Apple a restreint 
"
+#~ "l'usage d'AirDrop en Chine</a> en limitant à 10 minutes la période 
durant "
+#~ "laquelle les utilisateurs peuvent recevoir des fichier de la part de "
+#~ "personnes ne faisant pas partie de leurs contacts. Il est ainsi devenu "
+#~ "presque impossible d'utiliser AirDrop dans le but prévu, qui est "
+#~ "d'échanger des fichiers entre iMonstres physiquement proches. Cela s'est "
+#~ "produit lorsqu'il devenu notoire que des dissidents utilisaient cette "
+#~ "appli pour distribuer anonymement des tracts antigouvernementaux."
+
+#~ msgid ""
 #~ "Xiaomi provides a tool to <a href=\"https://www.guidetoroot.com/unlock-";
 #~ "bootloader-on-any-xiaomi-phones/\"> unlock the bootloader of Xiaomi "
 #~ "smartphones and tablets</a>, but this requires creating an account on the "

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.372
retrieving revision 1.373
diff -u -b -r1.372 -r1.373
--- proprietary.it-diff.html    21 Feb 2023 11:03:13 -0000      1.372
+++ proprietary.it-diff.html    15 Mar 2023 11:04:26 -0000      1.373
@@ -28,8 +28,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -138,8 +138,8 @@
 them.&lt;/p&gt;
 &lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>September, 
2022,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>550</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 670 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>March, 
2023,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>550</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 680 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -165,19 +165,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coercion.html"&gt;Coercion&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coercion.html"&gt;Coercion&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -262,6 +262,18 @@
   to detect once installed...&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202301230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -327,20 +339,6 @@
     to insist on encryption software that is (1) free software and (2)
     studied by experts.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202211300"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.techarp.com/mobile/apple-china-limit-airdrop/"&gt;
-    Obeying a demand by the Chinese government, Apple restricted the
-    use of AirDrop in China&lt;/a&gt;. It imposed a ten-minute time limit
-    during which users can receive files from non contacts. This makes
-    it nearly impossible to use AirDrop for its intended purpose, which
-    is to exchange files with strangers between iMonsters in physical
-    proximity. This happened after it became known that dissenters
-    were using the app to distribute digital anti-government fliers
-    anonymously.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -404,7 +402,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/02/21 11:03:13 $
+$Date: 2023/03/15 11:04:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.387
retrieving revision 1.388
diff -u -b -r1.387 -r1.388
--- proprietary.it.po   21 Feb 2023 11:03:13 -0000      1.387
+++ proprietary.it.po   15 Mar 2023 11:04:26 -0000      1.388
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -161,9 +161,9 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2022,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+550+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 670 references to
+# | As of [-April, 2017,-] {+March, 2023,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+550+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 680 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -171,9 +171,9 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
 "ma sicuramente ce ne sono altre migliaia che ancora non conosciamo."
@@ -576,6 +576,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -644,18 +655,6 @@
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.377
retrieving revision 1.378
diff -u -b -r1.377 -r1.378
--- proprietary.ja-diff.html    21 Feb 2023 11:03:13 -0000      1.377
+++ proprietary.ja-diff.html    15 Mar 2023 11:04:26 -0000      1.378
@@ -56,14 +56,14 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -135,8 +135,8 @@
 them.&lt;/p&gt;
 &lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;As of <span class="removed"><del><strong>January, 
2017,</strong></del></span> <span class="inserted"><ins><em>September, 
2022,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>260</strong></del></span> <span 
class="inserted"><ins><em>550</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 670 references to
+&lt;p&gt;As of <span class="removed"><del><strong>January, 
2017,</strong></del></span> <span class="inserted"><ins><em>March, 
2023,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>260</strong></del></span> <span 
class="inserted"><ins><em>550</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 680 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -200,8 +200,8 @@
    &lt;/ul&gt;
   &lt;/td&gt;
   &lt;td&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-edtech.html"&gt;EdTech&lt;/a&gt;&lt;/li&gt;
@@ -212,8 +212,8 @@
    &lt;/ul&gt;
    &lt;ul&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -236,10 +236,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -267,6 +267,18 @@
   to detect once installed...&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202301230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -332,20 +344,6 @@
     to insist on encryption software that is (1) free software and (2)
     studied by experts.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202211300"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.techarp.com/mobile/apple-china-limit-airdrop/"&gt;
-    Obeying a demand by the Chinese government, Apple restricted the
-    use of AirDrop in China&lt;/a&gt;. It imposed a ten-minute time limit
-    during which users can receive files from non contacts. This makes
-    it nearly impossible to use AirDrop for its intended purpose, which
-    is to exchange files with strangers between iMonsters in physical
-    proximity. This happened after it became known that dissenters
-    were using the app to distribute digital anti-government fliers
-    anonymously.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -409,7 +407,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/02/21 11:03:13 $
+$Date: 2023/03/15 11:04:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.370
retrieving revision 1.371
diff -u -b -r1.370 -r1.371
--- proprietary.ja.po   21 Feb 2023 11:03:13 -0000      1.370
+++ proprietary.ja.po   15 Mar 2023 11:04:26 -0000      1.371
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -147,9 +147,9 @@
 #| "instances of malicious functionalities, but there are surely thousands "
 #| "more we don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 
"2017年1月時点で、ここには、約260の異なる悪意のある機能の実例が掲載されていま"
 
"すが、確実にわたしたちが知らない何千もの例があるでしょう。"
@@ -418,6 +418,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -486,18 +497,6 @@
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.373
retrieving revision 1.374
diff -u -b -r1.373 -r1.374
--- proprietary.nl-diff.html    21 Feb 2023 11:03:13 -0000      1.373
+++ proprietary.nl-diff.html    15 Mar 2023 11:04:26 -0000      1.374
@@ -28,8 +28,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -138,8 +138,8 @@
 them.&lt;/p&gt;
 &lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>September, 
2022,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>550</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 670 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>March, 
2023,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>550</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 680 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -165,20 +165,20 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coercion.html"&gt;Coercion&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coercion.html"&gt;Coercion&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -262,6 +262,18 @@
   to detect once installed...&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202301230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -327,20 +339,6 @@
     to insist on encryption software that is (1) free software and (2)
     studied by experts.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202211300"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.techarp.com/mobile/apple-china-limit-airdrop/"&gt;
-    Obeying a demand by the Chinese government, Apple restricted the
-    use of AirDrop in China&lt;/a&gt;. It imposed a ten-minute time limit
-    during which users can receive files from non contacts. This makes
-    it nearly impossible to use AirDrop for its intended purpose, which
-    is to exchange files with strangers between iMonsters in physical
-    proximity. This happened after it became known that dissenters
-    were using the app to distribute digital anti-government fliers
-    anonymously.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -404,7 +402,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/02/21 11:03:13 $
+$Date: 2023/03/15 11:04:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.361
retrieving revision 1.362
diff -u -b -r1.361 -r1.362
--- proprietary.nl.po   21 Feb 2023 11:03:13 -0000      1.361
+++ proprietary.nl.po   15 Mar 2023 11:04:26 -0000      1.362
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -163,9 +163,9 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | As of [-April, 2019,-] {+September, 2022,+} the [-files-] {+pages+} in
-# | this directory list around [-400-] {+550+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 670 references to
+# | As of [-April, 2019,-] {+March, 2023,+} the [-files-] {+pages+} in this
+# | directory list around [-400-] {+550+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 680 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -173,9 +173,9 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
 "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
@@ -479,6 +479,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -547,18 +558,6 @@
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
 # | {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.390
retrieving revision 1.391
diff -u -b -r1.390 -r1.391
--- proprietary.pl-diff.html    21 Feb 2023 11:03:13 -0000      1.390
+++ proprietary.pl-diff.html    15 Mar 2023 11:04:27 -0000      1.391
@@ -57,13 +57,13 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -125,8 +125,8 @@
 
 &lt;p&gt;However, most online services require the user to run a nonfree
 app.  The app &lt;em&gt;is&lt;/em&gt; released software, so we do list 
malicious
-functionalities</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>these apps.  Mistreatment by the service 
itself is
-imposed by use of the app, so sometimes we mention those mistreatments
+functionalities of these apps.  Mistreatment by the service itself is
+imposed by use</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>the app, so sometimes we mention those 
mistreatments
 too&mdash;but we try to state explicitly what is done by the app and
 what is done by the dis-service.&lt;/p&gt;
 
@@ -143,8 +143,8 @@
 them.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;As of September, 2022, the pages in this directory list around 550
-instances of malicious functionalities (with more than 670 references to
+&lt;p&gt;As of March, 2023, the pages in this directory list around 550
+instances of malicious functionalities (with more than 680 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;p&gt;Ideally we would list every instance.  If you come across an
@@ -195,19 +195,19 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-edtech.html"&gt;EdTech&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-edtech.html"&gt;EdTech&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
     
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -261,6 +261,18 @@
   to detect once installed...&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202301230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -326,20 +338,6 @@
     to insist on encryption software that is (1) free software and (2)
     studied by experts.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202211300"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.techarp.com/mobile/apple-china-limit-airdrop/"&gt;
-    Obeying a demand by the Chinese government, Apple restricted the
-    use of AirDrop in China&lt;/a&gt;. It imposed a ten-minute time limit
-    during which users can receive files from non contacts. This makes
-    it nearly impossible to use AirDrop for its intended purpose, which
-    is to exchange files with strangers between iMonsters in physical
-    proximity. This happened after it became known that dissenters
-    were using the app to distribute digital anti-government fliers
-    anonymously.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -403,7 +401,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/02/21 11:03:13 $
+$Date: 2023/03/15 11:04:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.353
retrieving revision 1.354
diff -u -b -r1.353 -r1.354
--- proprietary.pl.po   21 Feb 2023 11:03:13 -0000      1.353
+++ proprietary.pl.po   15 Mar 2023 11:04:27 -0000      1.354
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -182,9 +182,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -641,6 +641,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -709,18 +720,6 @@
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.350
retrieving revision 1.351
diff -u -b -r1.350 -r1.351
--- proprietary.pot     21 Feb 2023 11:03:13 -0000      1.350
+++ proprietary.pot     15 Mar 2023 11:04:27 -0000      1.351
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -109,9 +109,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -334,6 +334,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a "
+"href=\"https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html\";>Windows
 "
+"11 starts to send data to online servers.</a> The user's personal details, "
+"location or hardware information are reported to Microsoft and other "
+"companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a "
 
"href=\"https://www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-millions-gamers-bereft\";>
 "
 "World of Warcraft to go offline in China</a>. The shutdown may not be "
@@ -406,18 +417,6 @@
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr ""

Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary.pt-br-diff.html 21 Feb 2023 11:03:13 -0000      1.71
+++ proprietary.pt-br-diff.html 15 Mar 2023 11:04:27 -0000      1.72
@@ -137,8 +137,8 @@
 them.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;p&gt;As of <span class="removed"><del><strong>December, 
2021,</strong></del></span> <span class="inserted"><ins><em>September, 
2022,</em></ins></span> the pages in this directory list around 550
-instances of malicious functionalities (with more than <span 
class="removed"><del><strong>630</strong></del></span> <span 
class="inserted"><ins><em>670</em></ins></span> references to
+&lt;p&gt;As of <span class="removed"><del><strong>December, 
2021,</strong></del></span> <span class="inserted"><ins><em>March, 
2023,</em></ins></span> the pages in this directory list around 550
+instances of malicious functionalities (with more than <span 
class="removed"><del><strong>630</strong></del></span> <span 
class="inserted"><ins><em>680</em></ins></span> references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 <span class="inserted"><ins><em>&lt;p&gt;Ideally we would list every instance. 
 If you come across an
@@ -235,25 +235,33 @@
 
 &lt;h3 id="latest"&gt;Latest additions&lt;/h3&gt;
 
-<span class="removed"><del><strong>&lt;ul class="blurbs"&gt;
-  &lt;li id="M202111201"&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p style="margin-bottom: 
.5em"&gt;</em></ins></span>
-  &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-11&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2022-07&lt;/small&gt;'</em></ins></span>
-  --&gt;&lt;!--#echo encoding="none" var="DATE" <span 
class="removed"><del><strong>--&gt;
-    &lt;p&gt;NordicTrack, a company that sells
-    exercise machines with ability</strong></del></span> <span 
class="inserted"><ins><em>--&gt;&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;p style="margin-bottom: .5em"&gt;
+  &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-07&lt;/small&gt;'
+  --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;&lt;/p&gt;
 &lt;p id="uefi-rootkit" class="important" style="margin-top: 0"&gt;
   &lt;strong&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html#uefi-rootkit"&gt;
-  UEFI makes computers vulnerable</em></ins></span> to <span 
class="removed"><del><strong>show videos &lt;a
-    
href="https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/"&gt;limits
-    what people can watch, and recently disabled a 
feature&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>advanced persistent threats</em></ins></span> that 
<span class="removed"><del><strong>was
-    originally functional. This happened through automatic update and
-    probably involved a universal back door.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span> <span class="inserted"><ins><em>are almost 
impossible
-  to detect once installed...&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
+  UEFI makes computers vulnerable to advanced persistent threats that are 
almost impossible
+  to detect once 
installed...&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;</em></ins></span>
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="M202111201"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202302080"&gt;</em></ins></span>
+    &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-11&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2023-02&lt;/small&gt;'</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    <span class="removed"><del><strong>&lt;p&gt;NordicTrack, a company that 
sells
+    exercise machines with ability to show videos</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;As soon as it boots, and without 
asking any permission,</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/"&gt;limits
+    what people can watch,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to 
Microsoft</em></ins></span> and <span class="removed"><del><strong>recently 
disabled a feature&lt;/a&gt; that was
+    originally functional. This happened through automatic 
update</strong></del></span>
+    <span class="inserted"><ins><em>other companies to be used as telemetry 
data. All of this is done is
+    the background,</em></ins></span> and
+    <span class="removed"><del><strong>probably involved a universal back 
door.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;ul class="blurbs"&gt;</em></ins></span>
   &lt;li <span 
class="removed"><del><strong>id="M202111200"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202301230"&gt;</em></ins></span>
     &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-11&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2023-01&lt;/small&gt;'</em></ins></span>
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -268,8 +276,8 @@
     outage&lt;/a&gt;, which happened because</strong></del></span> <span 
class="inserted"><ins><em>playing</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>game illustrates the
     injustice of requiring the use of a specific server.&lt;/p&gt;
 
-    &lt;p&gt;We expect that users must pay to use that server, but whether 
that</em></ins></span>
-    is <span class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>the case is a side issue.  Even if use of that server 
is gratis,
+    &lt;p&gt;We expect that users must pay to use that server, but whether that
+    is the case</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>a side issue.  Even if use of that server is gratis,
     the harm comes from the fact that the program doesn't allow 
people</em></ins></span>
     to <span class="removed"><del><strong>company's
     servers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>make and use other servers for that job.&lt;/p&gt;
@@ -291,15 +299,15 @@
   <span class="removed"><del><strong>a media outlet and a pro-democracy labor 
and political group</strong></del></span> <span class="inserted"><ins><em>many 
brands
     of automobiles&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Security</em></ins></span> in <span 
class="removed"><del><strong>Hong
+    &lt;p&gt;Security in the usual narrow sense means security against unknown
+    third parties. We are more concerned with security</em></ins></span> in 
<span class="removed"><del><strong>Hong
   Kong.&lt;/p&gt;
 
-  &lt;p&gt;&lt;small&gt;Please note</strong></del></span> <span 
class="inserted"><ins><em>the usual narrow sense means security against unknown
-    third parties. We are more concerned with security in the broader
+  &lt;p&gt;&lt;small&gt;Please note</strong></del></span> <span 
class="inserted"><ins><em>the broader
     sense&mdash;against the manufacturer as well as against unknown
-    third parties. It is clear that each of these vulnerabilities can
-    be exploited by the manufacturer too, and by any 
government</em></ins></span> that
-    <span class="inserted"><ins><em>can threaten</em></ins></span> the <span 
class="removed"><del><strong>article wrongly refers</strong></del></span> <span 
class="inserted"><ins><em>manufacturer enough</em></ins></span> to <span 
class="removed"><del><strong>crackers as &ldquo;&lt;a 
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>compel the manufacturer's
+    third parties. It is clear</em></ins></span> that <span 
class="inserted"><ins><em>each of these vulnerabilities can
+    be exploited by</em></ins></span> the <span 
class="removed"><del><strong>article wrongly refers</strong></del></span> <span 
class="inserted"><ins><em>manufacturer too, and by any government that
+    can threaten the manufacturer enough</em></ins></span> to <span 
class="removed"><del><strong>crackers as &ldquo;&lt;a 
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>compel the manufacturer's
     cooperation.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -319,46 +327,33 @@
     the <span class="removed"><del><strong>problem. All</strong></del></span> 
<span class="inserted"><ins><em>user activates them: Apple keeps on 
collecting</em></ins></span> data <span class="removed"><del><strong>acquired
     in a school about any student, teacher, or employee 
must</strong></del></span> <span class="inserted"><ins><em>for itself,
     although it claims</em></ins></span> not <span 
class="removed"><del><strong>leave
-    the school,</strong></del></span> <span class="inserted"><ins><em>to share 
it with third parties.&lt;/p&gt;
+    the school, and must be kept in computers that 
belong</strong></del></span> to <span class="removed"><del><strong>the school
+    and run free (as in freedom) software. That way, the school district
+    and/or parents can control what is done</strong></del></span> <span 
class="inserted"><ins><em>share it</em></ins></span> with <span 
class="removed"><del><strong>those data.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://www.theregister.com/2022/11/14/apple_data_collection_lawsuit/"&gt;
-    Apple is being sued&lt;/a&gt; for that.&lt;/p&gt;
+    Apple is being sued&lt;/a&gt; for that.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202210140"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-10&lt;/small&gt;'
+  &lt;li <span 
class="removed"><del><strong>id="M202111090"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202210140"&gt;</em></ins></span>
+    &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-11&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2022-10&lt;/small&gt;'</em></ins></span>
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a
+    <span class="removed"><del><strong>&lt;p&gt;A building in LA, with a 
supermarket in it, &lt;a
+    
href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app"&gt;demands
+    customers load a particular app to pay for parking in the parking
+    lot&lt;/a&gt;,</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;&lt;a
     
href="https://www.bleepingcomputer.com/news/security/microsoft-office-365-email-encryption-could-expose-message-content/"&gt;
-    The Microsoft Office encryption is weak&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>must be kept in computers that 
belong</strong></del></span> <span 
class="inserted"><ins><em>susceptible</em></ins></span> to <span 
class="removed"><del><strong>the school</strong></del></span>
-    <span class="inserted"><ins><em>attack.&lt;/p&gt;
+    The Microsoft Office encryption is weak&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>accept pervasive surveillance. They also 
have the
+    option of entering their license plate numbers in</strong></del></span> 
<span class="inserted"><ins><em>susceptible to
+    attack.&lt;/p&gt;
 
-    &lt;p&gt;Encryption is a tricky field,</em></ins></span> and <span 
class="removed"><del><strong>run free (as in freedom) software. That way, the 
school district
-    and/or parents can control what</strong></del></span> <span 
class="inserted"><ins><em>easy to mess up. It</em></ins></span> is <span 
class="removed"><del><strong>done with those 
data.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>wise
+    &lt;p&gt;Encryption is</em></ins></span> a <span 
class="removed"><del><strong>kiosk. That</strong></del></span> <span 
class="inserted"><ins><em>tricky field, and easy to mess up. 
It</em></ins></span> is
+    <span class="removed"><del><strong>an injustice, 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>wise
     to insist on encryption software that is (1) free software and (2)
     studied by experts.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  &lt;li <span 
class="removed"><del><strong>id="M202111090"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M202211300"&gt;</em></ins></span>
-    &lt;!--#set var="DATE" value='&lt;small <span 
class="removed"><del><strong>class="date-tag"&gt;2021-11&lt;/small&gt;'</strong></del></span>
 <span 
class="inserted"><ins><em>class="date-tag"&gt;2022-11&lt;/small&gt;'</em></ins></span>
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    <span class="removed"><del><strong>&lt;p&gt;A building in LA, 
with</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;&lt;a 
href="https://www.techarp.com/mobile/apple-china-limit-airdrop/"&gt;
-    Obeying</em></ins></span> a <span class="removed"><del><strong>supermarket 
in it, &lt;a
-    
href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app"&gt;demands
-    customers load a particular app to pay for parking 
in</strong></del></span> <span class="inserted"><ins><em>demand 
by</em></ins></span> the <span class="removed"><del><strong>parking
-    lot&lt;/a&gt;, and accept pervasive surveillance. They also 
have</strong></del></span> <span class="inserted"><ins><em>Chinese government, 
Apple restricted</em></ins></span> the
-    <span class="removed"><del><strong>option</strong></del></span>
-    <span class="inserted"><ins><em>use</em></ins></span> of <span 
class="removed"><del><strong>entering their license plate 
numbers</strong></del></span> <span 
class="inserted"><ins><em>AirDrop</em></ins></span> in <span 
class="inserted"><ins><em>China&lt;/a&gt;. It imposed</em></ins></span> a <span 
class="removed"><del><strong>kiosk. That</strong></del></span> <span 
class="inserted"><ins><em>ten-minute time limit
-    during which users can receive files from non contacts. This makes
-    it nearly impossible to use AirDrop for its intended purpose, 
which</em></ins></span>
-    is
-    <span class="removed"><del><strong>an injustice, 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>to 
exchange files with strangers between iMonsters in physical
-    proximity. This happened after it became known that dissenters
-    were using the app to distribute digital anti-government fliers
-    anonymously.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -421,7 +416,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/02/21 11:03:13 $
+$Date: 2023/03/15 11:04:27 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.523
retrieving revision 1.524
diff -u -b -r1.523 -r1.524
--- proprietary.pt-br.po        21 Feb 2023 11:03:14 -0000      1.523
+++ proprietary.pt-br.po        15 Mar 2023 11:04:28 -0000      1.524
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2021-06-13 12:11-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -157,9 +157,9 @@
 #| "instances of malicious functionalities (with more than 630 references to "
 #| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "Até dezembro de 2021, as páginas neste diretório listam quase 550 exemplos 
"
 "de funcionalidades maliciosas (com mais de 630 referências para confirmá-"
@@ -422,6 +422,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -490,18 +501,6 @@
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Mais itens…</a>"

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.666
retrieving revision 1.667
diff -u -b -r1.666 -r1.667
--- proprietary.ru.po   21 Feb 2023 11:33:34 -0000      1.666
+++ proprietary.ru.po   15 Mar 2023 11:04:28 -0000      1.667
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -155,10 +156,19 @@
 "они работают."
 
 #. type: Content of: <div><p>
+# | As of [-September, 2022,-] {+March, 2023,+} the pages in this directory
+# | list around 550 instances of malicious functionalities (with more than
+# | 6[-7-]{+8+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2022, the pages in this directory list around 550 "
+#| "instances of malicious functionalities (with more than 670 references to "
+#| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "На август 2022&nbsp;года на страницах этого 
каталога перечислено около 550 "
 "примеров вредоносных функций (и более 670 
ссылок, подкрепляющих их), но "
@@ -426,6 +436,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -532,27 +553,6 @@
 "люди настаивают на программах шифрования, 
которые (1) свободны и (2) "
 "исследованы экспертами."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Подчиняясь требованию китайского 
правительства, компания Apple ограничила "
-"AirDrop в Китае</a>. Компания наложила 
десятиминутное ограничение по "
-"времени, в течение которого пользователи 
могут получать файлы от незнакомых "
-"людей. Это делает почти невозможным 
применение AirDrop по назначению, т.е. "
-"для обмена файлами с незнакомцами между 
ай-чудищами в физических "
-"окрестностях. Это произошло после того, 
как стало известно, что диссиденты "
-"пользуются приложением для анонимного 
распространения антиправительственных "
-"листовок."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Далее...</a>"
@@ -630,6 +630,26 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
+#~ "Obeying a demand by the Chinese government, Apple restricted the use of "
+#~ "AirDrop in China</a>. It imposed a ten-minute time limit during which "
+#~ "users can receive files from non contacts. This makes it nearly "
+#~ "impossible to use AirDrop for its intended purpose, which is to exchange "
+#~ "files with strangers between iMonsters in physical proximity. This "
+#~ "happened after it became known that dissenters were using the app to "
+#~ "distribute digital anti-government fliers anonymously."
+#~ msgstr ""
+#~ "<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
+#~ "Подчиняясь требованию китайского 
правительства, компания Apple ограничила "
+#~ "AirDrop в Китае</a>. Компания наложила 
десятиминутное ограничение по "
+#~ "времени, в течение которого 
пользователи могут получать файлы от "
+#~ "незнакомых людей. Это делает почти 
невозможным применение AirDrop по "
+#~ "назначению, т.е. для обмена файлами с 
незнакомцами между ай-чудищами в "
+#~ "физических окрестностях. Это произошло 
после того, как стало известно, "
+#~ "что диссиденты пользуются приложением 
для анонимного распространения "
+#~ "антиправительственных листовок."
+
+#~ msgid ""
 #~ "Xiaomi provides a tool to <a href=\"https://www.guidetoroot.com/unlock-";
 #~ "bootloader-on-any-xiaomi-phones/\"> unlock the bootloader of Xiaomi "
 #~ "smartphones and tablets</a>, but this requires creating an account on the "

Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.318
retrieving revision 1.319
diff -u -b -r1.318 -r1.319
--- proprietary.tr.po   7 Mar 2023 22:00:07 -0000       1.318
+++ proprietary.tr.po   15 Mar 2023 11:04:28 -0000      1.319
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2023-03-07 22:25+0100\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Poedit 3.1.1\n"
 
@@ -152,10 +153,15 @@
 "izlemeyi</a> listeliyoruz."
 
 #. type: Content of: <div><p>
-msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+#, fuzzy
+#| msgid ""
+#| "As of September, 2022, the pages in this directory list around 550 "
+#| "instances of malicious functionalities (with more than 670 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "Eylül 2022 itibarıyla bu dizindeki sayfalar (destekleyen 670'ten fazla "
 "referansla birlikte) yaklaşık 550 kötücül işlevsellik örneğini 
listeliyor, "
@@ -422,6 +428,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -525,26 +542,6 @@
 "Şifreleme zor bir alan ve batırması kolay. Bu yüzden (1) özgür 
yazılım ve "
 "(2) uzmanlarca incelenmiş bir şifreleme yazılımında ısrar etmek 
mantıklıdır."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";>Çin "
-"hükümetinin bir talebine itaat eden Apple, Çin'de AirDrop kullanımını "
-"kısıtladı</a>. İnsanların bağlantıları olmayan kişilerden dosya 
alımı için "
-"on dakikalık bir zaman sınırı dayattı. Bu durum, AirDrop'un, yabancı 
kişiler "
-"için fiziksel yakınlıktaki iCanavarlar arasında dosya transferi 
yapmasını "
-"sağlama şeklindeki kullanım amacını neredeyse imkansız kılıyor. Bu "
-"değişiklik, muhaliflerin hükümet karşıtı dijital ilanlar 
dağıttığı "
-"öğrenildikten sonra gerçekleşti."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Daha fazlası&hellip;</a>"
@@ -626,6 +623,25 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
+#~ "Obeying a demand by the Chinese government, Apple restricted the use of "
+#~ "AirDrop in China</a>. It imposed a ten-minute time limit during which "
+#~ "users can receive files from non contacts. This makes it nearly "
+#~ "impossible to use AirDrop for its intended purpose, which is to exchange "
+#~ "files with strangers between iMonsters in physical proximity. This "
+#~ "happened after it became known that dissenters were using the app to "
+#~ "distribute digital anti-government fliers anonymously."
+#~ msgstr ""
+#~ "<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";>Çin 
"
+#~ "hükümetinin bir talebine itaat eden Apple, Çin'de AirDrop 
kullanımını "
+#~ "kısıtladı</a>. İnsanların bağlantıları olmayan kişilerden dosya 
alımı "
+#~ "için on dakikalık bir zaman sınırı dayattı. Bu durum, AirDrop'un, 
yabancı "
+#~ "kişiler için fiziksel yakınlıktaki iCanavarlar arasında dosya 
transferi "
+#~ "yapmasını sağlama şeklindeki kullanım amacını neredeyse imkansız 
kılıyor. "
+#~ "Bu değişiklik, muhaliflerin hükümet karşıtı dijital ilanlar 
dağıttığı "
+#~ "öğrenildikten sonra gerçekleşti."
+
+#~ msgid ""
 #~ "Xiaomi provides a tool to <a href=\"https://www.guidetoroot.com/unlock-";
 #~ "bootloader-on-any-xiaomi-phones/\"> unlock the bootloader of Xiaomi "
 #~ "smartphones and tablets</a>, but this requires creating an account on the "

Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.392
retrieving revision 1.393
diff -u -b -r1.392 -r1.393
--- proprietary.zh-cn.po        26 Feb 2023 00:59:54 -0000      1.392
+++ proprietary.zh-cn.po        15 Mar 2023 11:04:28 -0000      1.393
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2023-02-26 08:45+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2023-03-15 10:55+0000\n"
 "X-Generator: Poedit 2.3\n"
 
 #. type: Content of: <title>
@@ -136,10 +137,15 @@
 "层射频信号系统,而不是手机软件。"
 
 #. type: Content of: <div><p>
-msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+#, fuzzy
+#| msgid ""
+#| "As of September, 2022, the pages in this directory list around 550 "
+#| "instances of malicious functionalities (with more than 670 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "截至 2022 年 9 月,此目录的页面中列出了大约 550 
个恶意功能实例(有 670 多份证"
 "据支持),但是肯定还有数千个我们不知道情况。"
@@ -389,6 +395,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -482,23 +499,6 @@
 "加密是一个充满陷阱的领域,很容易弄乱。坚持使用是 (1) 
自由软件和 (2) 由专家研"
 "究过的加密软件是明智之选。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-"<a 
href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";>屈从中"
-"国政府的命令,苹果公司对在中国使用 AirDrop 
做了限制</a>。它强制用户从非联系人"
-"接收文件的时间不能超过 10 分钟。这让 AirDrop 几乎无
法完成它理应完成的作用——近"
-"距离和陌生人交换 iMonsters 
上的大文件。此事发生在持不同政见者通过 AirDrop 匿"
-"名分发反政府宣传为人所知之后。"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">更多内容&hellip;</a>"
@@ -574,6 +574,22 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
+#~ "Obeying a demand by the Chinese government, Apple restricted the use of "
+#~ "AirDrop in China</a>. It imposed a ten-minute time limit during which "
+#~ "users can receive files from non contacts. This makes it nearly "
+#~ "impossible to use AirDrop for its intended purpose, which is to exchange "
+#~ "files with strangers between iMonsters in physical proximity. This "
+#~ "happened after it became known that dissenters were using the app to "
+#~ "distribute digital anti-government fliers anonymously."
+#~ msgstr ""
+#~ "<a 
href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";>屈从"
+#~ "中国政府的命令,苹果公司对在中国使用 AirDrop 
做了限制</a>。它强制用户从非"
+#~ "联系人接收文件的时间不能超过 10 分钟。这让 AirDrop 几
乎无法完成它理应完成"
+#~ "的作用——近距离和陌生人交换 iMonsters 
上的大文件。此事发生在持不同政见者通"
+#~ "过 AirDrop 匿名分发反政府宣传为人所知之后。"
+
+#~ msgid ""
 #~ "Xiaomi provides a tool to <a href=\"https://www.guidetoroot.com/unlock-";
 #~ "bootloader-on-any-xiaomi-phones/\"> unlock the bootloader of Xiaomi "
 #~ "smartphones and tablets</a>, but this requires creating an account on the "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.352
retrieving revision 1.353
diff -u -b -r1.352 -r1.353
--- proprietary.zh-tw-diff.html 21 Feb 2023 11:03:14 -0000      1.352
+++ proprietary.zh-tw-diff.html 15 Mar 2023 11:04:28 -0000      1.353
@@ -28,8 +28,8 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
 table#TOC {
    display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
@@ -58,16 +58,16 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
@@ -138,8 +138,8 @@
 them.&lt;/p&gt;
 &lt;/div&gt;</em></ins></span>
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>September, 
2022,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>550</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 670 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>March, 
2023,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>550</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 680 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -262,6 +262,18 @@
   to detect once installed...&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202302080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As soon as it boots, and without asking any permission, &lt;a
+    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"&gt;Windows
+    11 starts to send data to online servers.&lt;/a&gt; The user's personal
+    details, location or hardware information are reported to Microsoft and
+    other companies to be used as telemetry data. All of this is done is
+    the background, and users have no easy way to prevent it&mdash;unless
+    they switch the computer offline.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202301230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2023-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -327,20 +339,6 @@
     to insist on encryption software that is (1) free software and (2)
     studied by experts.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202211300"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2022-11&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&lt;a 
href="https://www.techarp.com/mobile/apple-china-limit-airdrop/"&gt;
-    Obeying a demand by the Chinese government, Apple restricted the
-    use of AirDrop in China&lt;/a&gt;. It imposed a ten-minute time limit
-    during which users can receive files from non contacts. This makes
-    it nearly impossible to use AirDrop for its intended purpose, which
-    is to exchange files with strangers between iMonsters in physical
-    proximity. This happened after it became known that dissenters
-    were using the app to distribute digital anti-government fliers
-    anonymously.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -404,7 +402,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2023/02/21 11:03:14 $
+$Date: 2023/03/15 11:04:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.340
retrieving revision 1.341
diff -u -b -r1.340 -r1.341
--- proprietary.zh-tw.po        21 Feb 2023 11:03:14 -0000      1.340
+++ proprietary.zh-tw.po        15 Mar 2023 11:04:28 -0000      1.341
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2023-02-21 10:55+0000\n"
+"POT-Creation-Date: 2023-03-15 10:55+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -156,9 +156,9 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2022,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+550+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 670 references to
+# | As of [-April, 2017,-] {+March, 2023,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+550+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 680 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -166,9 +166,9 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "到2017年4月為止,此目錄列出的檔案已整理出約 300 
種惡意功能的實例,但是絕對還"
 "有上千種我們不瞭解的利用方式。"
@@ -549,6 +549,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -617,18 +628,6 @@
 "encryption software that is (1) free software and (2)  studied by experts."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.techarp.com/mobile/apple-china-limit-airdrop/\";> "
-"Obeying a demand by the Chinese government, Apple restricted the use of "
-"AirDrop in China</a>. It imposed a ten-minute time limit during which users "
-"can receive files from non contacts. This makes it nearly impossible to use "
-"AirDrop for its intended purpose, which is to exchange files with strangers "
-"between iMonsters in physical proximity. This happened after it became known "
-"that dissenters were using the app to distribute digital anti-government "
-"fliers anonymously."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.520
retrieving revision 1.521
diff -u -b -r1.520 -r1.521
--- pt-br.po    4 Mar 2023 17:02:45 -0000       1.520
+++ pt-br.po    15 Mar 2023 11:04:29 -0000      1.521
@@ -253,6 +253,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -7165,6 +7176,10 @@
 "Como mostra esta página, se você quiser limpar o <em>malware</em> do seu "
 "computador, o primeiro software a ser excluído é o Windows."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
 msgstr "Manipulação privativa - Projeto GNU - Free Software Foundation"
@@ -14405,9 +14420,9 @@
 #| "instances of malicious functionalities (with more than 630 references to "
 #| "back them up), but there are surely thousands more we don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "Até dezembro de 2021, as páginas neste diretório listam quase 550 exemplos 
"
 "de funcionalidades maliciosas (com mais de 630 referências para confirmá-"
@@ -16041,6 +16056,21 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "As of December, 2021, the pages in this directory list around 550 "
+#~| "instances of malicious functionalities (with more than 630 references to "
+#~| "back them up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Até dezembro de 2021, as páginas neste diretório listam quase 550 "
+#~ "exemplos de funcionalidades maliciosas (com mais de 630 referências para "
+#~ "confirmá-las), mas com certeza há mais milhares das quais nós não 
temos "
+#~ "conhecimento."
+
+#, fuzzy
+#~| msgid ""
 #~| "Many web sites report all their visitors to Google by using the Google "
 #~| "Analytics service, which <a href=\"http://www.pcworld.idg.com.au/";
 #~| "article/434164/"

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.911
retrieving revision 1.912
diff -u -b -r1.911 -r1.912
--- ru.po       6 Mar 2023 08:32:43 -0000       1.911
+++ ru.po       15 Mar 2023 11:04:30 -0000      1.912
@@ -258,6 +258,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -7061,6 +7072,10 @@
 "Как показано на этой странице, если вы х
отите очистить свой компьютер от "
 "вредоносных программ, прежде всего вам 
нужно удалить Windows."
 
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
 msgstr ""
@@ -13595,10 +13610,19 @@
 "они работают."
 
 #. type: Content of: <div><p>
-msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+# | As of [-September, 2022,-] {+March, 2023,+} the pages in this directory
+# | list around 550 instances of malicious functionalities (with more than
+# | 6[-7-]{+8+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2022, the pages in this directory list around 550 "
+#| "instances of malicious functionalities (with more than 670 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "На август 2022&nbsp;года на страницах этого 
каталога перечислено около 550 "
 "примеров вредоносных функций (и более 670 
ссылок, подкрепляющих их), но "
@@ -15056,6 +15080,15 @@
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
 #~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "На август 2022&nbsp;года на страницах этого 
каталога перечислено около "
+#~ "550 примеров вредоносных функций (и более 
670 ссылок, подкрепляющих их), "
+#~ "но есть, бесспорно, тысячи других, о 
которых мы не знаем."
+
+#~ msgid ""
 #~ "Many web sites report all their visitors to Google by using the Google "
 #~ "Analytics service, which <a href=\"https://www.pcworld.idg.com.au/";
 #~ "article/434164/"

Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- tr.po       4 Mar 2023 17:02:45 -0000       1.339
+++ tr.po       15 Mar 2023 11:04:32 -0000      1.340
@@ -261,6 +261,17 @@
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
+msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "A dispute between Blizzard and one of its partners caused <a href="
@@ -6140,6 +6151,12 @@
 "first software to delete is Windows."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2019, 2020 Free Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Addictions - GNU Project - Free Software Foundation"
@@ -10990,15 +11007,15 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""
-#| "As of August, 2022, the pages in this directory list around 550 instances "
-#| "of malicious functionalities (with more than 660 references to back them "
-#| "up), but there are surely thousands more we don't know about."
-msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+#| "As of September, 2022, the pages in this directory list around 550 "
+#| "instances of malicious functionalities (with more than 670 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
-"Ağustos 2022 itibarıyla bu dizindeki sayfalar (destekleyen 660'tan fazla "
+"Eylül 2022 itibarıyla bu dizindeki sayfalar (destekleyen 670'ten fazla "
 "referansla birlikte) yaklaşık 550 kötücül işlevsellik örneğini 
listeliyor, "
 "ancak muhakkak henüz bilmediğimiz binlercesi vardır."
 
@@ -12189,6 +12206,20 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "As of August, 2022, the pages in this directory list around 550 "
+#~| "instances of malicious functionalities (with more than 660 references to "
+#~| "back them up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Ağustos 2022 itibarıyla bu dizindeki sayfalar (destekleyen 660'tan fazla 
"
+#~ "referansla birlikte) yaklaşık 550 kötücül işlevsellik örneğini "
+#~ "listeliyor, ancak muhakkak henüz bilmediğimiz binlercesi vardır."
+
 #~ msgid ""
 #~ "A dispute between Blizzard and one of its partners caused <a href="
 #~ "\"https://www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-";

Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.345
retrieving revision 1.346
diff -u -b -r1.345 -r1.346
--- zh-cn.po    4 Mar 2023 17:02:46 -0000       1.345
+++ zh-cn.po    15 Mar 2023 11:04:32 -0000      1.346
@@ -274,6 +274,17 @@
 msgstr ""
 
 #. type: Content of: <div><ul><li><p>
+msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "A dispute between Blizzard and one of its partners caused <a href="
@@ -5795,6 +5806,16 @@
 "first software to delete is Windows."
 msgstr ""
 
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
+
 #. type: Content of: <title>
 #, fuzzy
 #| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -10507,15 +10528,15 @@
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""
-#| "As of August, 2022, the pages in this directory list around 550 instances "
-#| "of malicious functionalities (with more than 660 references to back them "
-#| "up), but there are surely thousands more we don't know about."
-msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+#| "As of September, 2022, the pages in this directory list around 550 "
+#| "instances of malicious functionalities (with more than 670 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
-"截至 2022 年 8 月,此目录的页面中列出了大约 550 
个恶意功能实例(有 660 多份证"
+"截至 2022 年 9 月,此目录的页面中列出了大约 550 
个恶意功能实例(有 670 多份证"
 "据支持),但是肯定还有数千个我们不知道情况。"
 
 #. type: Content of: <div><p>
@@ -11748,6 +11769,19 @@
 msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
 msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
 
+#, fuzzy
+#~| msgid ""
+#~| "As of August, 2022, the pages in this directory list around 550 "
+#~| "instances of malicious functionalities (with more than 660 references to "
+#~| "back them up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "截至 2022 年 8 月,此目录的页面中列出了大约 550 
个恶意功能实例(有 660 多"
+#~ "份证据支持),但是肯定还有数千个我们不知道情况。"
+
 #~ msgid ""
 #~ "A dispute between Blizzard and one of its partners caused <a href="
 #~ "\"https://www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-";

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.433
retrieving revision 1.434
diff -u -b -r1.433 -r1.434
--- zh-tw.po    4 Mar 2023 17:02:46 -0000       1.433
+++ zh-tw.po    15 Mar 2023 11:04:32 -0000      1.434
@@ -277,6 +277,17 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"As soon as it boots, and without asking any permission, <a href=\"https://";
+"www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html"
+"\">Windows 11 starts to send data to online servers.</a> The user's personal "
+"details, location or hardware information are reported to Microsoft and "
+"other companies to be used as telemetry data. All of this is done is the "
+"background, and users have no easy way to prevent it&mdash;unless they "
+"switch the computer offline."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "A dispute between Blizzard and one of its partners caused <a href=\"https://";
 "www.theguardian.com/world/2023/jan/23/world-of-warcraft-offline-china-"
 "millions-gamers-bereft\"> World of Warcraft to go offline in China</a>. The "
@@ -4784,6 +4795,18 @@
 "first software to delete is Windows."
 msgstr ""
 
+#. type: Content of: <div><p>
+# | Copyright &copy; [-2013, 2014, 2015, 2016, 2017, 2018-] {+2014-2023+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright &copy; 2014-2023 Free Software Foundation, Inc."
+msgstr ""
+"Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
 #. type: Content of: <title>
 # | Proprietary [-Software-] {+Manipulation+} - GNU Project - Free Software
 # | Foundation
@@ -9610,9 +9633,9 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2022,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+550+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 670 references to
+# | As of [-April, 2017,-] {+March, 2023,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+550+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 680 references to
 # | back them up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
@@ -9620,9 +9643,9 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2022, the pages in this directory list around 550 instances "
-"of malicious functionalities (with more than 670 references to back them "
-"up), but there are surely thousands more we don't know about."
+"As of March, 2023, the pages in this directory list around 550 instances of "
+"malicious functionalities (with more than 680 references to back them up), "
+"but there are surely thousands more we don't know about."
 msgstr ""
 "到2017年4月為止,此目錄列出的檔案已整理出約 300 
種惡意功能的實例,但是絕對還"
 "有上千種我們不瞭解的利用方式。"
@@ -11111,6 +11134,19 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of September, 2022, the pages in this directory list around 550 "
+#~ "instances of malicious functionalities (with more than 670 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "到2017年4月為止,此目錄列出的檔案已整理出約 300 
種惡意功能的實例,但是絕對"
+#~ "還有上千種我們不瞭解的利用方式。"
+
+#, fuzzy
+#~| msgid ""
 #~| "Copyright &copy; 1996-2002, 2004-2007, 2009, 2010, 2012 Free Software "
 #~| "Foundation, Inc."
 #~ msgid "Copyright &copy; 2013-2022 Free Software Foundation, Inc."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]