www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-back-doors.fr.html ...


From: GNUN
Subject: www/proprietary proprietary-back-doors.fr.html ...
Date: Tue, 12 Oct 2021 04:33:57 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/10/12 04:33:57

Modified files:
        proprietary    : proprietary-back-doors.fr.html 
                         proprietary-censorship.fr.html 
        proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po 
                         es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-back-doors.fr-en.html 
                         proprietary-censorship.fr-en.html 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.es.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.pt-br.po 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.tr.po 
                         proprietary.zh-cn.po 
                         proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po tr.po 
                         zh-cn.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.fr.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.342&r2=1.343
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.490&r2=1.491
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.606&r2=1.607
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.342&r2=1.343
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.350&r2=1.351
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.343&r2=1.344
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.342&r2=1.343
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.341&r2=1.342
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr-en.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.404&r2=1.405
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.657&r2=1.658
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.416&r2=1.417
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.294&r2=1.295
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.397&r2=1.398
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.336&r2=1.337
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.734&r2=1.735
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.316&r2=1.317
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.522&r2=1.523
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.540&r2=1.541
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.309&r2=1.310
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.325&r2=1.326
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.308&r2=1.309
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.288&r2=1.289
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.456&r2=1.457
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.557&r2=1.558
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.258&r2=1.259
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.426&r2=1.427
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.717&r2=1.718
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.342&r2=1.343

Patches:
Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary-back-doors.fr.html      1 Sep 2021 19:32:58 -0000       1.106
+++ proprietary-back-doors.fr.html      12 Oct 2021 08:33:24 -0000      1.107
@@ -170,6 +170,23 @@
 <h3 id='alter-data'>Altérer les données ou préférences de 
l'utilisateur</h3>
 
 <ul class="blurbs">
+  <li id="M202109220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Certains téléphones Xiaomi ont une malfonction qui <a
+href="https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns";>supprime
+par un blip les phrases exprimant des opinions politiques mal considérées en
+Chine</a>. Cet outil de censure est désactivé par défaut dans les 
téléphones
+vendus en Europe, mais Xiaomi a une porte dérobée qui lui permet de
+l'activer.</p>
+
+    <p>Voilà à quoi on peut s'attendre quand un appareil est équipé de 
logiciel
+privateur qui peut communiquer avec son fabricant.</p>
+  </li>
+
   <li id="M201905060">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1169,7 +1186,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/09/01 19:32:58 $
+$Date: 2021/10/12 08:33:24 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.fr.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary-censorship.fr.html      1 Jun 2021 09:43:55 -0000       1.49
+++ proprietary-censorship.fr.html      12 Oct 2021 08:33:24 -0000      1.50
@@ -175,6 +175,27 @@
 utilisateurs.</p>
   </li>
 </ul>
+
+<h3 id="other">Autres</h3>
+<ul class="blurbs">
+  <li id="M202109220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Certains téléphones Xiaomi ont une malfonction qui <a
+href="https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns";>supprime
+par un blip les phrases exprimant des opinions politiques mal considérées en
+Chine</a>. Cet outil de censure est désactivé par défaut dans les 
téléphones
+vendus en Europe, mais Xiaomi a une porte dérobée qui lui permet de
+l'activer.</p>
+
+    <p>Voilà à quoi on peut s'attendre quand un appareil est équipé de 
logiciel
+privateur qui peut communiquer avec son fabricant.</p>
+  </li>
+</ul>
+
 </div>
 
 <div class="translators-notes">
@@ -251,7 +272,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2021/06/01 09:43:55 $
+$Date: 2021/10/12 08:33:24 $
 
 <!-- timestamp end -->
 </p>

Index: po/all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- po/all.fr.po        12 Oct 2021 08:10:18 -0000      1.63
+++ po/all.fr.po        12 Oct 2021 08:33:26 -0000      1.64
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2021-10-12 10:09+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -102,6 +103,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- po/all.pot  12 Oct 2021 07:33:24 -0000      1.33
+++ po/all.pot  12 Oct 2021 08:33:26 -0000      1.34
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -89,6 +89,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a "
+"href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/\";>El
 "
+"Salvador Dictatorship's Chivo wallet is spyware</a>, it's a proprietary "
+"program that breaks users' freedom and spies on people; demands personal "
+"data such as the national ID number and does face recognition, and it as bad "
+"security for its data. It also asks for almost every malware permission in "
+"people's smart phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a "
 
"href=\"https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/\";>
 "
 "added a surveillance API (idle detection API)</a> which lets websites ask "

Index: po/all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/all.pt-br.po     12 Oct 2021 07:33:24 -0000      1.31
+++ po/all.pt-br.po     12 Oct 2021 08:33:26 -0000      1.32
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:39-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -96,6 +96,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/all.ru.po        12 Oct 2021 08:04:09 -0000      1.60
+++ po/all.ru.po        12 Oct 2021 08:33:26 -0000      1.61
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2021-04-27 13:06+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -108,6 +109,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/de.po    12 Oct 2021 07:33:24 -0000      1.342
+++ po/de.po    12 Oct 2021 08:33:29 -0000      1.343
@@ -677,6 +677,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.490
retrieving revision 1.491
diff -u -b -r1.490 -r1.491
--- po/es.po    12 Oct 2021 07:33:24 -0000      1.490
+++ po/es.po    12 Oct 2021 08:33:30 -0000      1.491
@@ -631,6 +631,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.606
retrieving revision 1.607
diff -u -b -r1.606 -r1.607
--- po/fr.po    12 Oct 2021 08:10:18 -0000      1.606
+++ po/fr.po    12 Oct 2021 08:33:32 -0000      1.607
@@ -525,6 +525,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/it.po    12 Oct 2021 07:33:25 -0000      1.342
+++ po/it.po    12 Oct 2021 08:33:34 -0000      1.343
@@ -643,6 +643,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.350
retrieving revision 1.351
diff -u -b -r1.350 -r1.351
--- po/ja.po    12 Oct 2021 07:33:25 -0000      1.350
+++ po/ja.po    12 Oct 2021 08:33:36 -0000      1.351
@@ -486,6 +486,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.343
retrieving revision 1.344
diff -u -b -r1.343 -r1.344
--- po/nl.po    12 Oct 2021 07:33:25 -0000      1.343
+++ po/nl.po    12 Oct 2021 08:33:36 -0000      1.344
@@ -464,6 +464,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/pl.po    12 Oct 2021 07:33:25 -0000      1.342
+++ po/pl.po    12 Oct 2021 08:33:38 -0000      1.343
@@ -453,6 +453,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.341
retrieving revision 1.342
diff -u -b -r1.341 -r1.342
--- po/pot      12 Oct 2021 07:33:25 -0000      1.341
+++ po/pot      12 Oct 2021 08:33:40 -0000      1.342
@@ -383,6 +383,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- po/proprietary-back-doors.fr-en.html        1 Sep 2021 19:33:00 -0000       
1.96
+++ po/proprietary-back-doors.fr-en.html        12 Oct 2021 08:33:42 -0000      
1.97
@@ -147,6 +147,20 @@
 <h3 id='alter-data'>Altering user's data or settings</h3>
 
 <ul class="blurbs">
+  <li id="M202109220">
+    <!--#set var="DATE" value='<small class="date-tag">2021-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some Xiaomi phones <a
+    
href="https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns";>have
+    a malfeature to bleep out phrases that express political views
+    China does not like</a>. In phones sold in Europe, Xiaomi leaves
+    this deactivated by default, but has a back door to activate the
+    censorship.</p>
+
+    <p>This is the natural result of having nonfree software in a device
+    that can communicate with the company that made it.</p>
+  </li>
+
   <li id="M201905060">
     <!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -950,7 +964,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/09/01 19:33:00 $
+$Date: 2021/10/12 08:33:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-censorship.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr-en.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- po/proprietary-censorship.fr-en.html        15 Jul 2021 09:33:32 -0000      
1.38
+++ po/proprietary-censorship.fr-en.html        12 Oct 2021 08:33:44 -0000      
1.39
@@ -152,6 +152,24 @@
     by its users.</p>
   </li>
 </ul>
+
+<h3 id="other">Other</h3>
+<ul class="blurbs">
+  <li id="M202109220">
+    <!--#set var="DATE" value='<small class="date-tag">2021-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some Xiaomi phones <a
+    
href="https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns";>have
+    a malfeature to bleep out phrases that express political views
+    China does not like</a>. In phones sold in Europe, Xiaomi leaves
+    this deactivated by default, but has a back door to activate the
+    censorship.</p>
+
+    <p>This is the natural result of having nonfree software in a device
+    that can communicate with the company that made it.</p>
+  </li>
+</ul>
+
 </div>
 
 </div>
@@ -212,7 +230,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 09:33:32 $
+$Date: 2021/10/12 08:33:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- po/proprietary-surveillance.de-diff.html    8 Oct 2021 19:34:57 -0000       
1.212
+++ po/proprietary-surveillance.de-diff.html    12 Oct 2021 08:33:44 -0000      
1.213
@@ -638,24 +638,11 @@
 
   &lt;p&gt;Google did not intend to make these apps spy;</strong></del></span> 
<span class="inserted"><ins><em>spyware via
     BIOS&lt;/a&gt;</em></ins></span> on <span 
class="inserted"><ins><em>Windows installs.  Note that</em></ins></span> the 
<span class="removed"><del><strong>contrary, it
-    worked in various ways to prevent that, and deleted these apps
-    after discovering what they did. So we cannot blame Google
-    specifically for the snooping of these apps.&lt;/p&gt;
-
-  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares</strong></del></span> <span 
class="inserted"><ins><em>specific
+    worked</strong></del></span> <span class="inserted"><ins><em>specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility 
for the injustice of their
-    being nonfree. It also distributes</strong></del></span> its
-    own <span class="removed"><del><strong>nonfree apps, such as
-    Google
-    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-      are malicious&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating?  There is no systematic way for Google, or Android
-    users, to inspect executable</strong></del></span> <span 
class="inserted"><ins><em>malware&lt;/a&gt;.&lt;/p&gt;
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span class="removed"><del><strong>various ways to 
prevent that,</strong></del></span> <span class="inserted"><ins><em>its
+    own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -673,6 +660,35 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202106250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/"&gt;El
+    Salvador Dictatorship's Chivo wallet is spyware&lt;/a&gt;, it's a
+    proprietary program that breaks users' freedom</em></ins></span> and <span 
class="removed"><del><strong>deleted these apps
+    after discovering what they did. So we cannot blame Google
+    specifically for the snooping of these apps.&lt;/p&gt;
+
+  &lt;p&gt;On</strong></del></span> <span class="inserted"><ins><em>spies on 
people;
+    demands personal data such as</em></ins></span> the <span 
class="removed"><del><strong>other hand, Google redistributes nonfree Android 
apps,</strong></del></span> <span class="inserted"><ins><em>national ID 
number</em></ins></span> and
+    <span class="removed"><del><strong>therefore shares in the 
responsibility</strong></del></span> <span class="inserted"><ins><em>does face
+    recognition, and it as bad security</em></ins></span> for <span 
class="removed"><del><strong>the injustice of their
+    being nonfree.</strong></del></span> <span class="inserted"><ins><em>its 
data.</em></ins></span> It also <span class="removed"><del><strong>distributes 
its own nonfree apps, such as
+    Google
+    Play,</strong></del></span> <span class="inserted"><ins><em>asks for
+    almost every malware permission in people's smart phones.&lt;/p&gt;
+
+    &lt;p&gt;The article criticizes it for faults in &ldquo;data
+    protection&rdquo;, though</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+      are malicious&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating?  There</strong></del></span> <span 
class="inserted"><ins><em>href=""&gt;&ldquo;data 
protection&rdquo;</em></ins></span>
+    is <span class="removed"><del><strong>no systematic way for Google, or 
Android
+    users,</strong></del></span> <span class="inserted"><ins><em>the wrong 
approach</em></ins></span> to <span class="removed"><del><strong>inspect 
executable</strong></del></span> <span class="inserted"><ins><em>privacy 
anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202106170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1295,22 +1311,22 @@
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
     upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201811230"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201811230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;An Android phone was observed to track location even while
     in airplane mode. It didn't send the location data while in
     airplane mode.  Instead, &lt;a
     
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all 
later&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
+  &lt;li id="M201711210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Android</em></ins></span> tracks location for Google &lt;a
@@ -1554,21 +1570,51 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app</strong></del></span>
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the 
same</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who is running it&lt;/a&gt;. The result is
-    often a legal threat demanding a lot of money.&lt;/p&gt;
+    reports</em></ins></span> information <span 
class="removed"><del><strong>about the users' searches that Google normally 
gets when
+   they use its search engine.&lt;/p&gt;
 
-    &lt;p&gt;The fact</em></ins></span> that <span 
class="inserted"><ins><em>this is used for repression of forbidden sharing
-    makes</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
-        pre-install on some</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span class="removed"><del><strong>its phones. The 
app will give Verizon</strong></del></span> <span 
class="inserted"><ins><em>nonfree software
-    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
-    paying for</em></ins></span> the <span class="inserted"><ins><em>nasty 
thing, but cannot make it less nasty.&lt;/p&gt;
+   &lt;p&gt;Currently, the app</strong></del></span> <span 
class="inserted"><ins><em>to identify who</em></ins></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the
+    user must explicitly opt-in before the app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</strong></del></span> <span class="inserted"><ins><em>running 
it&lt;/a&gt;. The result</em></ins></span> is
+    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to</strong></del></span>
+    <span class="inserted"><ins><em>often</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts</strong></del></span> <span class="inserted"><ins><em>legal 
threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>data in the phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes</em></ins></span> it <span class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the 
ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;This <span 
class="removed"><del><strong>example</strong></del></span> illustrates <span 
class="removed"><del><strong>how &ldquo;getting the user's consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>that making unauthorized copies of nonfree 
software</em></ins></span>
+    is <span class="removed"><del><strong>inadequate as</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cure for the injustice of nonfree software. It may 
avoid
+    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1581,25 +1627,29 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/"&gt;TikTok
-    apps collect biometric identifiers and biometric information 
from</em></ins></span>
-    users' <span class="removed"><del><strong>searches that Google normally 
gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the app is</strong></del></span> <span 
class="inserted"><ins><em>smartphones&lt;/a&gt;. The company behind it does 
whatever it wants
-    and collects whatever data it can.&lt;/p&gt;
+    apps collect biometric identifiers</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>biometric information from
+    users' smartphones&lt;/a&gt;. The company behind it does whatever it 
wants</em></ins></span>
+    and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>collects whatever data it 
can.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202104060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202104060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span>
+    &lt;p&gt;The</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
-    app saves people's wedding photos forever</em></ins></span> and <span 
class="removed"><del><strong>the
-    user must explicitly opt-in before the</strong></del></span> <span 
class="inserted"><ins><em>hands over data
-    to others&lt;/a&gt;, giving users no control over their personal 
-    information/data. The</em></ins></span> app <span 
class="removed"><del><strong>takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>also sometimes shows old photos and
-    memories to users, without giving them any control over this
+    app saves people's wedding photos forever</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the picture you take 
according</strong></del></span> <span class="inserted"><ins><em>hands over 
data</em></ins></span>
+    to <span class="removed"><del><strong>who
+      is in the frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>others&lt;/a&gt;, giving users no control over their 
personal 
+    information/data. The app also sometimes shows old photos and
+    memories</em></ins></span> to <span class="removed"><del><strong>require 
online access</strong></del></span> <span class="inserted"><ins><em>users, 
without giving them any control over this
     either.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1609,33 +1659,34 @@
     &lt;p&gt;Many cr&hellip;apps, developed by various
     companies for various organizations, do &lt;a
     
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
-    location tracking unknown to those companies and those
-    organizations&lt;/a&gt;.  It's actually some widely used libraries that 
do</em></ins></span>
-    the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware</strong></del></span> <span 
class="inserted"><ins><em>tracking.&lt;/p&gt;
+    location tracking unknown</em></ins></span> to <span 
class="inserted"><ins><em>those companies and those
+    organizations&lt;/a&gt;.  It's actually</em></ins></span> some
+      <span class="removed"><del><strong>known-faces database, which 
means</strong></del></span> <span class="inserted"><ins><em>widely used 
libraries that do</em></ins></span>
+    the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>tracking.&lt;/p&gt;
 
-    &lt;p&gt;What's unusual here</em></ins></span> is
-    <span class="removed"><del><strong>still 
spyware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>that 
proprietary software developer A tricks
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
     proprietary software developers B1 &hellip; B50 into making platforms for
-    A to mistreat the end user.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    A</em></ins></span> to <span class="removed"><del><strong>be
+      sent across</strong></del></span> <span 
class="inserted"><ins><em>mistreat</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>end user.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M202003260"&gt;
+  &lt;li id="M202003260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Apple iOS version of Zoom</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
-    sending users'</em></ins></span> data to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt; even if the user doesn't 
have</em></ins></span>
-    a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;The Apple iOS version</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> <span 
class="inserted"><ins><em>Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending</em></ins></span> users' <span 
class="removed"><del><strong>pictures are private
+      anymore,</strong></del></span> <span class="inserted"><ins><em>data to 
Facebook&lt;/a&gt;</em></ins></span> even if the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>doesn't have
+    a Facebook account. According</em></ins></span> to the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>Facebook account. According to the article, 
Zoom and Facebook
-    don't even mention this surveillance</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>their privacy policy page,
-    making this an obvious violation</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>people's privacy even</em></ins></span> in <span 
class="inserted"><ins><em>their
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based</strong></del></span> <span class="inserted"><ins><em>article, 
Zoom and Facebook
+    don't even mention this surveillance</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM</strong></del></span> 
<span class="inserted"><ins><em>their privacy policy page,
+    making this an obvious violation of people's privacy even in their
     own terms.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1643,225 +1694,239 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Alipay Health Code app
-    estimates whether</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>user has Covid-19</em></ins></span> and <span 
class="removed"><del><strong>in server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+    estimates whether the user has Covid-19</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
+      2015 it</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting to realize that it is nasty.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
+      &lt;p&gt;This article shows</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
-    tells</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;
-        for</strong></del></span> <span class="inserted"><ins><em>cops 
directly&lt;/a&gt;.&lt;/p&gt;
+    tells</em></ins></span> the <span class="inserted"><ins><em>cops 
directly&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202001290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Amazon Ring app does &lt;a
-    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;</em></ins></span>
-    surveillance <span class="removed"><del><strong>is 
inadequate</strong></del></span> <span class="inserted"><ins><em>for other 
companies</em></ins></span> as <span class="removed"><del><strong>a protection 
against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>well as for 
Amazon&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The Amazon Ring app does</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+    surveillance for other companies</em></ins></span> as <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>well as for Amazon&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new 
voice</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201912220"&gt;
+  &lt;li id="M201912220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The ToToc</em></ins></span> messaging app <span 
class="inserted"><ins><em>seems to be a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The ToToc messaging app seems</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>be</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>government</em></ins></span> of the <span 
class="removed"><del><strong>proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+    apps the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is</strong></del></span> <span class="inserted"><ins><em>United Arab 
Emirates&lt;/a&gt;.
+    Any nonfree program could be</em></ins></span> doing <span 
class="removed"><del><strong>this in a way</strong></del></span> <span 
class="inserted"><ins><em>this, and</em></ins></span> that <span 
class="removed"><del><strong>at least</strong></del></span> is <span 
class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>a good
+    reason to use free software instead.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
-    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
-    Any nonfree program could be doing this, and</em></ins></span> that <span 
class="removed"><del><strong>include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance</strong></del></span> <span 
class="inserted"><ins><em>is a good
-    reason to use free</em></ins></span> software <span 
class="removed"><del><strong>snoop on what radio</strong></del></span> <span 
class="inserted"><ins><em>instead.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;Note: this article uses</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
-    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>word &ldquo;free&rdquo; in
+    the sense of 
&ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201912090"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201912090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;iMonsters</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>Android phones,
-    when used for work, give employers powerful &lt;a
-    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when</em></ins></span> used <span class="inserted"><ins><em>for work, give 
employers powerful</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
     snooping and sabotage capabilities&lt;/a&gt; if they install their own
-    software</em></ins></span> on <span class="removed"><del><strong>various 
sites 
-      such</strong></del></span> <span class="inserted"><ins><em>the device.  
Many employers demand to do this.  For the
-    employee, this is simply nonfree software,</em></ins></span> as <span 
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>fundamentally unjust</em></ins></span>
-    and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>as dangerous as any other nonfree 
software.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    software</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>device.  Many 
employers demand</em></ins></span> to <span class="inserted"><ins><em>do this.  
For</em></ins></span> the <span class="removed"><del><strong>snooping done by 
the phone company,</strong></del></span>
+    <span class="inserted"><ins><em>employee, this is simply nonfree software, 
as fundamentally unjust</em></ins></span>
+    and <span class="removed"><del><strong>perhaps by the OS in the
+      phone.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
+      &lt;p&gt;Don't be distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>as dangerous as 
any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201910130"&gt;
+  &lt;li id="M201910130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
-    the Great Nation&rdquo;</em></ins></span> app <span 
class="inserted"><ins><em>requires users to grant it</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
-    access to the</em></ins></span> phone's <span 
class="removed"><del><strong>photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>microphone, photos, text messages, contacts, and
-    internet history&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share</strong></del></span> the 
<span class="removed"><del><strong>picture you take 
according</strong></del></span> <span class="inserted"><ins><em>Android version 
was found</em></ins></span> to <span class="removed"><del><strong>who
-      is</strong></del></span> <span class="inserted"><ins><em>contain a
-    back-door allowing developers to run any code they wish</em></ins></span> 
in the <span class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online access 
to</strong></del></span> <span class="inserted"><ins><em>users'
-    phone, as &ldquo;superusers.&rdquo; Downloading and using this
-    app is mandatory at</em></ins></span> some
-      <span class="removed"><del><strong>known-faces database, which 
means</strong></del></span> <span 
class="inserted"><ins><em>workplaces.&lt;/p&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study</em></ins></span>
+    the <span class="inserted"><ins><em>Great Nation&rdquo;</em></ins></span> 
app <span class="removed"><del><strong>developers get</strong></del></span> 
<span class="inserted"><ins><em>requires</em></ins></span> users to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>grant</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts, 
and
+    internet history&lt;/a&gt;, and the Android version was 
found</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>contain a
+    back-door allowing developers</em></ins></span> to <span 
class="inserted"><ins><em>run any code they wish in</em></ins></span> the <span 
class="inserted"><ins><em>users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using 
this</em></ins></span>
+    app <span class="removed"><del><strong>developer</strong></del></span> 
<span class="inserted"><ins><em>is mandatory at some workplaces.&lt;/p&gt;
 
     &lt;p&gt;Note: The &lt;a
     
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
-    Washington Post version of</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>article&lt;/a&gt; (partly obfuscated, but
-    readable after copy-pasting in a text editor) includes a clarification
-    saying that the tests were only performed on the Android version
-    of the app, and that, according</em></ins></span> to <span 
class="inserted"><ins><em>Apple, &ldquo;this kind of
-    &lsquo;superuser&rsquo; surveillance could not</em></ins></span> be
-      <span class="removed"><del><strong>sent across</strong></del></span> 
<span class="inserted"><ins><em>conducted on
+    Washington Post version of the article&lt;/a&gt; (partly 
obfuscated,</em></ins></span> but <span class="removed"><del><strong>did not
+      ask about sending it to other companies.  This 
shows</strong></del></span>
+    <span class="inserted"><ins><em>readable after copy-pasting in a text 
editor) includes a clarification
+    saying that</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>tests were only performed on the Android 
version</em></ins></span>
+    of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app, and that, according</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a 
flashlight</strong></del></span> <span class="inserted"><ins><em>Apple, 
&ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
     Apple's operating system.&rdquo;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201909091"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Facebook app &lt;a
+    &lt;p&gt;The Facebook</em></ins></span> app <span 
class="removed"><del><strong>send any information to anyone?  A free software 
flashlight</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
     tracks users even when it is turned off&lt;/a&gt;, after tricking them
-    into giving</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>app broad permissions in order</em></ins></span> to 
<span class="removed"><del><strong>Facebook's servers</strong></del></span> 
<span class="inserted"><ins><em>use one of its
-    functionalities.&lt;/p&gt;
+    into giving the</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201909090"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>broad permissions</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
 
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>Maya &lt;a
-    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
-    send intimate details</em></ins></span> of <span 
class="removed"><del><strong>Facebook</strong></del></span> users' <span 
class="removed"><del><strong>pictures are private
-      anymore, even if the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span 
class="inserted"><ins><em>lives</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>order</em></ins></span> to <span 
class="removed"><del><strong>make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span> <span class="inserted"><ins><em>use 
one</em></ins></span> of <span class="removed"><del><strong>the conversation 
between two users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
+    functionalities.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201909060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201909090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Keeping track of who downloads a proprietary
-    program</em></ins></span> is <span class="removed"><del><strong>based 
on</strong></del></span> <span class="inserted"><ins><em>a form of 
surveillance.  There is a</em></ins></span>
-    proprietary <span class="removed"><del><strong>malware (DRM and snooping). 
In August
-      2015 it</strong></del></span> <span class="inserted"><ins><em>program 
for adjusting a certain telescopic rifle sight.</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
-    A US prosecutor has</em></ins></span> demanded <span 
class="removed"><del><strong>users submit</strong></del></span> <span 
class="inserted"><ins><em>the list of all the 10,000 or more people
+    &lt;p&gt;Some nonfree period-tracking apps including MIA 
Fem</em></ins></span> and <span class="removed"><del><strong>i-Que 
transmit</strong></del></span> <span 
class="inserted"><ins><em>Maya</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives</em></ins></span> to <span 
class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201909060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Keeping track of who downloads</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based 
in</strong></del></span> <span class="inserted"><ins><em>proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded</em></ins></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>list of all</em></ins></span> the <span 
class="removed"><del><strong>toys with</strong></del></span> <span 
class="inserted"><ins><em>10,000 or more people
     who have installed it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With a free program there would not be a list of who has installed
+    &lt;p&gt;With</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This</strong></del></span> <span 
class="inserted"><ins><em>free program there</em></ins></span> would
+      <span class="removed"><del><strong>enable crackers to listen in 
on</strong></del></span> <span class="inserted"><ins><em>not 
be</em></ins></span> a <span class="removed"><del><strong>child's 
speech,</strong></del></span> <span class="inserted"><ins><em>list of who has 
installed
     it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201907081"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many unscrupulous mobile-app developers keep finding 
ways</em></ins></span> to <span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
     
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
-    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="removed"><del><strong>some
-      are starting to realize that it is nasty.&lt;/p&gt;
+    bypass user's settings&lt;/a&gt;, regulations,</em></ins></span> and <span 
class="inserted"><ins><em>privacy-enhancing features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
 
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>privacy-enhancing features
-    of</em></ins></span> the <span class="removed"><del><strong>&lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way</strong></del></span> 
<span class="inserted"><ins><em>operating system, in order</em></ins></span> to 
<span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether</strong></del></span> <span class="inserted"><ins><em>gather as 
much private data as</em></ins></span>
-    they <span class="removed"><del><strong>want that. 
This</strong></del></span> <span class="inserted"><ins><em>possibly 
can.&lt;/p&gt;
-
-    &lt;p&gt;Thus, we can't trust rules against spying.  What we can 
trust</em></ins></span> is <span class="removed"><del><strong>a typical example 
of
-      the attitude of</strong></del></span>
-    <span class="inserted"><ins><em>having control over</em></ins></span> the 
<span class="removed"><del><strong>proprietary</strong></del></span> software 
<span class="removed"><del><strong>industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>we run.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201907080"&gt;
+  &lt;li id="M201907080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many Android</em></ins></span> apps <span 
class="inserted"><ins><em>can track
-    users' movements even when</em></ins></span> the user <span 
class="removed"><del><strong>has
-    installed.</strong></del></span> <span 
class="inserted"><ins><em>says</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements</em></ins></span> even <span 
class="removed"><del><strong>speak
+      into</strong></del></span> <span 
class="inserted"><ins><em>when</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
     not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This involves an apparently unintentional 
weakness</em></ins></span> in <span class="removed"><del><strong>a way that at 
least is visible and
-    optional&lt;/a&gt;. Not as bad as what the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Android,
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
     exploited intentionally by malicious apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps for children don't respect privacy:</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201905300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
     tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
     for contraception.&lt;/p&gt;
 
-    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
-    programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It snoops</em></ins></span> on <span 
class="removed"><del><strong>its users through the</strong></del></span> <span 
class="inserted"><ins><em>users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201905060"&gt;
+  &lt;li id="M201905060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;BlizzCon 2019 imposed a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
-    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
-    the event.&lt;/p&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run a</em></ins></span> proprietary <span 
class="removed"><del><strong>control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting</strong></del></span> <span 
class="inserted"><ins><em>phone app&lt;/a&gt; to be allowed 
into</em></ins></span>
+    the <span class="removed"><del><strong>temperature</strong></del></span> 
<span class="inserted"><ins><em>event.&lt;/p&gt;
 
-    &lt;p&gt;This app is a spyware that can</em></ins></span> snoop on <span 
class="inserted"><ins><em>a lot of
-    sensitive data, including user's location and contact list, and has &lt;a
+    &lt;p&gt;This app is a spyware that can snoop on a lot</em></ins></span> of
+    <span class="inserted"><ins><em>sensitive data, including user's location 
and contact list, and has &lt;a
     
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
-    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+    near-complete control&lt;/a&gt; over</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904131"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Data collected by menstrual and pregnancy monitoring 
apps</em></ins></span> is <span class="removed"><del><strong>in 
addition</strong></del></span> <span class="inserted"><ins><em>often &lt;a
+    &lt;p&gt;Data collected</em></ins></span> by
+      <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>menstrual and 
pregnancy monitoring apps is often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
-    available</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span 
class="inserted"><ins><em>employers</em></ins></span> and <span 
class="removed"><del><strong>perhaps by</strong></del></span> <span 
class="inserted"><ins><em>insurance companies&lt;/a&gt;. Even 
though</em></ins></span> the <span class="removed"><del><strong>OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span>
-    <span class="inserted"><ins><em>data is &ldquo;anonymized and 
aggregated,&rdquo; it can easily</em></ins></span> be <span 
class="removed"><del><strong>distracted by</strong></del></span>
-    <span class="inserted"><ins><em>traced back to</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>woman who uses</em></ins></span> the <span 
class="removed"><del><strong>app developers get
-      users</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo;</em></ins></span> it 
<span class="removed"><del><strong>was surrounded by a person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>can easily be
+    traced back to</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>woman 
who uses</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
+      standard with which manufacturers would</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    and freedom to</em></ins></span> make <span 
class="removed"><del><strong>statements about</strong></del></span> their <span 
class="removed"><del><strong>products, rather than free software which users 
could have
+      checked and changed.&lt;/p&gt;
 
-    &lt;p&gt;This has harmful implications for women's 
rights</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span class="inserted"><ins><em>equal 
employment
-    and freedom to make their own pregnancy choices. Don't use
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>own pregnancy choices. Don't use
     these apps, even if someone offers you a reward to do so. A
-    free-software app that does more or less the same thing without
-    spying on you</em></ins></span> is <span class="removed"><del><strong>no 
excuse</strong></del></span> <span class="inserted"><ins><em>available from 
&lt;a
-    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    free-software app</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>does more or less</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>same thing without
+    spying on you is available from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;,
 and &lt;a
     
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1869,30 +1934,33 @@
   &lt;li id="M201904130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    &lt;p&gt;Google tracks the movements</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android 
phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data</em></ins></span> for <span 
class="removed"><del><strong>malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>years&lt;/a&gt;.&lt;/p&gt;
+    saves</em></ins></span> the data <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Nonfree software in the phone has to</em></ins></span> be
+      <span class="removed"><del><strong>true, but it doesn't really matter. 
If it had sold</strong></del></span> <span 
class="inserted"><ins><em>responsible for sending</em></ins></span>
+    the <span class="inserted"><ins><em>location</em></ins></span> data to 
<span class="inserted"><ins><em>Google.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+  &lt;li id="M201903251"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the</em></ins></span> data, <span class="removed"><del><strong>including 
geolocation, for use by companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>or pass</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which</em></ins></span> the user <span 
class="inserted"><ins><em>has absolutely no control.&lt;/p&gt;
+    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="inserted"><ins><em>huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive</em></ins></span> 
data <span class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
+    the <span class="removed"><del><strong>data broker 
would</strong></del></span> <span class="inserted"><ins><em>data, or pass it on 
to user-installed apps that</em></ins></span> have <span 
class="removed"><del><strong>been able</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>figure out
+      who</strong></del></span>
+    the <span class="removed"><del><strong>user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>network but no direct access 
to</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
+    surveillance on which the user</em></ins></span> has <span 
class="removed"><del><strong>been ordered</strong></del></span> <span 
class="inserted"><ins><em>absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
@@ -1900,29 +1968,33 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
     
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data</em></ins></span> to
-      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+    lengthy terms</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902230"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent</em></ins></span> personal data to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>app developer but 
did</strong></del></span> <span class="inserted"><ins><em>personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree 
program,</em></ins></span> not
-      <span class="removed"><del><strong>ask about sending 
it</strong></del></span> <span class="inserted"><ins><em>even the
-    developers of other nonfree programs.&lt;/p&gt;
+    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps 
that</em></ins></span>
+    way <span class="removed"><del><strong>to access</strong></del></span> 
<span class="inserted"><ins><em>and released them, apparently not realizing 
that all</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal
+    data they</em></ins></span> collected <span 
class="removed"><del><strong>by</strong></del></span> <span 
class="inserted"><ins><em>would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>manufacturer's 
snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
@@ -1931,18 +2003,20 @@
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to other <span 
class="removed"><del><strong>companies.</strong></del></span> <span 
class="inserted"><ins><em>companies, and &lt;a
+    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>these conversations
+      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action.</em></ins></span> This 
<span class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
-    that</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies of a development platform are ineffective at
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
     preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
@@ -1950,195 +2024,211 @@
   &lt;li id="M201902060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
     recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
-    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>user interface of most of them was 
designed</em></ins></span> to <span class="removed"><del><strong>surveillance: 
why</strong></del></span> <span class="inserted"><ins><em>make uninstallation
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads on users, and redirecting
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
-    &lt;p&gt;Users</em></ins></span> should <span class="inserted"><ins><em>of 
course uninstall these dangerous apps if they
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
+
+&lt;!-- #SpywareOnSmartWatches</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was</strong></del></span> <span 
class="inserted"><ins><em>Google Play</em></ins></span> found <span 
class="inserted"><ins><em>that &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;An investigation of the 150 most 
popular
+    gratis VPN apps in Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span 
class="removed"><del><strong>make</strong></del></span> <span 
class="inserted"><ins><em>protect their users' privacy&lt;/a&gt; due to DNS 
leaks. In
+    25% fail</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>protect their 
users' privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws were
+    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of
-    the <span class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the</em></ins></span> top <span class="removed"><del><strong>under each 
subsection --&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
-      a speech recognition</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;. The</em></ins></span> 
company <span class="removed"><del><strong>based in</strong></del></span> <span 
class="inserted"><ins><em>is
-    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do
-    with</em></ins></span> the <span 
class="removed"><del><strong>toys</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+    &lt;p&gt;&lt;small&gt;(It</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;We think that lawsuit is about a side issue. What the company 
does</em></ins></span>
-    with <span class="inserted"><ins><em>the data is</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>secondary issue. The principal wrong here is that
+  &lt;li id="M201901050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>someone else</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.&lt;/p&gt;
+
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="removed"><del><strong>to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>WeatherBug, are
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with 
an</strong></del></span>
 
-  &lt;li id="M201812290"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Around 40% of gratis Android apps &lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Around 40% of gratis</em></ins></span> Android <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>on a child's speech, and even speak
-      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
+    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this</strong></del></span> <span 
class="inserted"><ins><em>the app; others only say that the 
user</em></ins></span> is <span class="removed"><del><strong>a back 
door,</strong></del></span>
+    <span class="inserted"><ins><em>using that app,</em></ins></span> but that 
<span class="removed"><del><strong>could be</strong></del></span> <span 
class="inserted"><ins><em>alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This spying occurs regardless of whether the user 
has</em></ins></span> a
+      <span class="removed"><del><strong>misunderstanding.  
However,</strong></del></span> <span class="inserted"><ins><em>Facebook
+    account.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+  &lt;li id="M201810244"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
     track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>Android &lt;a
+    &lt;p&gt;Some Google apps on Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when</em></ins></span> users <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>disable &ldquo;location
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
+    &lt;p&gt;There are other ways to turn off the other kinds of location
     tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Spanish football 
streaming</em></ins></span> app <span class="removed"><del><strong>was 
reporting</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>temperature 
of</strong></del></span> <span class="inserted"><ins><em>user's movements and 
listens through</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;We expect</em></ins></span> it <span 
class="removed"><del><strong>was surrounded by</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no way to 
save</em></ins></span>
-    a <span class="removed"><del><strong>person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>recording. But we can't be sure 
from</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;We expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>certainly 
surveillance, at
+      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>no way to save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+    many ways. This is one more.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
 
-  &lt;li id="M201804160"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More than &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
-      standard with which manufacturers would make 
statements</strong></del></span> <span class="inserted"><ins><em>5,855 Android 
apps studied by researchers were found to snoop
-    and collect information</em></ins></span> about <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
+    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work 
against</em></ins></span>
-    their <span class="removed"><del><strong>products, rather 
than</strong></del></span> <span class="inserted"><ins><em>users.  To protect 
their privacy and freedom, Android users
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the</em></ins></span> free 
software
-    <span class="inserted"><ins><em>only &lt;a 
href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that &lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on 
Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the proprietary 
apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="inserted"><ins><em>&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did</strong></del></span> <span class="inserted"><ins><em>user if an app 
contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;</em></ins></span>
-    which users <span class="removed"><del><strong>could</strong></del></span> 
<span class="inserted"><ins><em>are HIV-positive, then provides the information 
to
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not</em></ins></span> have
-      <span class="removed"><del><strong>checked</strong></del></span> <span 
class="inserted"><ins><em>so much information about its users.
+    &lt;p&gt;Grindr should</em></ins></span> not <span 
class="removed"><del><strong>affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install 
is</strong></del></span> <span class="inserted"><ins><em>have so much 
information about its users.
     It could be designed so that users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;
+    other but</em></ins></span> not <span class="removed"><del><strong>really
+clean since</strong></del></span> <span class="inserted"><ins><em>to the 
server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The moviepass app</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>dis-service
-    spy on users even more than users expected. It &lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
@@ -2147,7 +2237,11 @@
   &lt;li id="M201711240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tracking software in popular Android apps
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
@@ -2156,43 +2250,60 @@
 
   &lt;li id="M201708270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>Sarahah app &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.&lt;/p&gt;
+    book</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection</strong></del></span> <span 
class="inserted"><ins><em>developer's server.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>words
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued</strong></del></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;20 dishonest Android apps 
recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google 
specifically</em></ins></span>
-    for <span class="removed"><del><strong>collecting</strong></del></span> 
<span class="inserted"><ins><em>the snooping of these apps.&lt;/p&gt;
+    &lt;p&gt;Google did not intend to make these apps spy; on the 
contrary,</em></ins></span> it <span class="removed"><del><strong>can 
collect</strong></del></span>
+    <span class="inserted"><ins><em>worked in various ways to prevent that, 
and deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for</em></ins></span> the <span 
class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
+    therefore shares in the responsibility for the injustice</em></ins></span> 
of <span class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
+    to inspect executable proprietary apps to see what</em></ins></span> they 
<span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
+    the source code somehow to determine whether they mistreat 
users</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP 
phones:</strong></del></span>
+    <span class="inserted"><ins><em>various ways. If it did a good job of 
this, it could more or less
     prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
@@ -2204,85 +2315,119 @@
   &lt;li id="M201705230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Apps for BART &lt;a
-    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201705040"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
+    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Faceapp appears to do</em></ins></span> lots of <span 
class="removed"><del><strong>personal information about</strong></del></span> 
<span class="inserted"><ins><em>surveillance, judging by &lt;a
-    
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;</em></ins></span>
-    how
-       <span class="removed"><del><strong>people used 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
-    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its headphones&lt;/a&gt;.  Specifically,
     the app would record the names of the audio files users listen to
-    along with the headphone's unique serial 
number.&lt;/p&gt;</em></ins></span>
+    along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>company's 
statement</strong></del></span> <span class="inserted"><ins><em>suit 
accuses</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> was <span 
class="removed"><del><strong>anonymizing</strong></del></span> <span 
class="inserted"><ins><em>done without</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter.</strong></del></span> <span 
class="inserted"><ins><em>users' consent.</em></ins></span>
-    If <span class="inserted"><ins><em>the fine print of the app said that 
users gave consent for this,
-    would that make</em></ins></span> it <span 
class="removed"><del><strong>had sold</strong></del></span> <span 
class="inserted"><ins><em>acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to 
design</em></ins></span>
-    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
 
-  &lt;li id="M201704074"&gt;
+&lt;!-- #SpywareOnTheRoad</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>to servers. &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Pairs of Android apps can 
collude</em></ins></span>
+    to <span class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>transmit 
users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Verizon &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets when they use
-    its search engine.&lt;/p&gt;
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install</em></ins></span>
+    on <span class="inserted"><ins><em>some of its phones.</em></ins></span> 
The <span class="removed"><del><strong>Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
-    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, 
if</strong></del></span> <span class="inserted"><ins><em>app will give Verizon 
the same information
+    about the users' searches that Google normally gets when they 
use</em></ins></span>
+    its <span class="removed"><del><strong>manufacturer can communicate with 
it,</strong></del></span> <span class="inserted"><ins><em>search 
engine.&lt;/p&gt;
+
+    &lt;p&gt;Currently, the app</em></ins></span> is <span 
class="removed"><del><strong>a surveillance device.</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before</em></ins></span> the <span 
class="inserted"><ins><em>app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
+    explicitly opt-in before the app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</em></ins></span> is <span class="removed"><del><strong>an 
example&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The Meitu photo-editing app &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>article describes 
wrongdoing by</strong></del></span> <span class="inserted"><ins><em>Meitu 
photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user</em></ins></span> data <span class="removed"><del><strong>broker 
would have been able</strong></del></span> to <span 
class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -2290,11 +2435,9 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This example illustrates how &ldquo;getting the user's
+    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>user's
     consent&rdquo; for surveillance is inadequate as a protection against
     massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
@@ -2302,58 +2445,79 @@
   &lt;li id="M201611160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered</strong></del></span> 
<span class="inserted"><ins><em>privacy and security of
+    &lt;p&gt;A &lt;a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt;</em></ins></span> that <span 
class="inserted"><ins><em>investigated</em></ins></span> the <span 
class="removed"><del><strong>device is tethered</strong></del></span> <span 
class="inserted"><ins><em>privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>poor security
+    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="inserted"><ins><em>poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research 
paper,</em></ins></span>
-    of <span class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>some proprietary VPN apps that track users and 
infringe their
+    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More 
about</strong></del></span> <span class="inserted"><ins><em>non-exhaustive 
list, taken from the research paper,
+    of some</em></ins></span> proprietary <span 
class="removed"><del><strong>tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>VPN 
apps that track users and infringe their
     privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant</em></ins></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>track users and show them targeted ads.&lt;/dd&gt;
+      meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full access to users'
+      permissions upon installation, meaning</em></ins></span> it <span 
class="inserted"><ins><em>has full access to users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps and also core system logs. TigerVPN developers have
+      for other apps and</em></ins></span> also <span 
class="removed"><del><strong>demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
       &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
-      may turn them over to the UK government if requested.&lt;/dd&gt;
+      may turn them over to</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>UK government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection is to display ads. Uses
+      &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>company
+      surveillance capability.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> <span 
class="inserted"><ins><em>HTML pages returned to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span>
+      <span class="inserted"><ins><em>users. The stated purpose 
of</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>JS injection</em></ins></span> is <span 
class="removed"><del><strong>using it</strong></del></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain</strong></del></span> <span 
class="inserted"><ins><em>display ads. Uses
       roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have confirmed that
+      &lt;dd&gt;Injects</em></ins></span> JavaScript <span 
class="removed"><del><strong>code,</strong></del></span> <span 
class="inserted"><ins><em>code into HTML pages,</em></ins></span> and <span 
class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes</strong></del></span>
 <span class="inserted"><ins><em>also uses roughly
+      five tracking libraries. Developers of</em></ins></span> this <span 
class="removed"><del><strong>code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app have confirmed that
       the non-premium version of the app does JavaScript injection for
       tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google's new voice messaging app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    &lt;p&gt;Google's new voice messaging app &lt;a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
     all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2363,68 +2527,69 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you circulate the picture you take 
according</em></ins></span> to <span class="inserted"><ins><em>who is
-    in</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
-
-    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="inserted"><ins><em>require online</em></ins></span> access <span 
class="inserted"><ins><em>to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely to be
-    sent across</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and 
<span class="inserted"><ins><em>face-recognition
+    and suggests you circulate the picture you take according to who 
is</em></ins></span>
+    in <span class="removed"><del><strong>many e-readers&mdash;not 
only</strong></del></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database,</em></ins></span> which <span 
class="removed"><del><strong>page</strong></del></span> <span 
class="inserted"><ins><em>means the pictures are likely to be
+    sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen</strong></del></span> <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>the service.&lt;/p&gt;
+    even if</em></ins></span> the user <span 
class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201605310"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    &lt;p&gt;Facebook's app listens all</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>time,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening</em></ins></span> to <span 
class="inserted"><ins><em>or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
+    snoop on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span class="inserted"><ins><em>or 
watching&lt;/a&gt;. In addition,
+    it may be analyzing people's conversations</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201604250"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span> <span 
class="inserted"><ins><em>serve them</em></ins></span> with <span 
class="removed"><del><strong>nonfree software are
+  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>targeted
+    advertisements.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201604250"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A pregnancy test controller application not only can &lt;a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;</em></ins></span>
-    spy on <span class="removed"><del><strong>children</strong></del></span> 
<span class="inserted"><ins><em>many sorts of data in the 
phone,</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A pregnancy test controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of data in the phone,</em></ins></span> and <span 
class="removed"><del><strong>make changes</strong></del></span> in <span 
class="inserted"><ins><em>server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;!-- #SpywareOnSmartWatches</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
+  &lt;li id="M201601130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Apps that include &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apps that include &lt;a
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    Symphony surveillance software snoop on what radio and TV programs
+    are playing nearby&lt;/a&gt;.  Also on what users post 
on</em></ins></span> various
+  <span class="removed"><del><strong>settings&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also</em></ins></span> on <span 
class="removed"><del><strong>&ldquo;Smart&rdquo; Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</strong></del></span> 
<span class="inserted"><ins><em>what users post on various sites
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>sites
     such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2432,46 +2597,51 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    unrelated</em></ins></span> to <span class="removed"><del><strong>do 
because</strong></del></span> the <span class="removed"><del><strong>system has 
no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
+    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in</em></ins></span> the <span class="removed"><del><strong>modem.  
However, even if it asked</strong></del></span> <span 
class="inserted"><ins><em>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
-    to <span class="removed"><del><strong>report its 
location</strong></del></span> <span class="inserted"><ins><em>say &ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that the usual analytics tools are
-    legitimate, but is that valid? Software developers have no 
right</em></ins></span> to <span class="removed"><del><strong>someone 
else</strong></del></span>
-    <span class="inserted"><ins><em>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools
+    &lt;p&gt;The article takes</em></ins></span> for
+    <span class="removed"><del><strong>authentication, you couldn't be 
confident</strong></del></span> <span 
class="inserted"><ins><em>granted</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software in</strong></del></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
+    legitimate, but</em></ins></span> is
+    <span class="removed"><del><strong>proprietary,</strong></del></span> 
<span class="inserted"><ins><em>that valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;More than 73%</em></ins></span> and <span 
class="inserted"><ins><em>47% of mobile applications, for Android and iOS
-    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;hand 
over
-    personal, behavioral and location information&lt;/a&gt; of their 
users</em></ins></span> to <span class="removed"><del><strong>transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>third parties.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;hand 
over
+    personal, behavioral and location information&lt;/a&gt; of their users to
+    third parties.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+  &lt;li id="M201508210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 
it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
-    to realize</em></ins></span> that <span 
class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>it is nasty.&lt;/p&gt;
+    based on proprietary malware (DRM and snooping). In August 
2015</em></ins></span> it <span class="removed"><del><strong>demands blind 
faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This article shows the &lt;a
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting</em></ins></span>
+    to <span class="inserted"><ins><em>realize that it is nasty.&lt;/p&gt;
+
+    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="removed"><del><strong>an unidentified site</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;serve&rdquo;
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude of the proprietary software industry
+    typical example of</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span 
class="inserted"><ins><em>attitude of</em></ins></span> the <span 
class="removed"><del><strong>phone company to track</strong></del></span> <span 
class="inserted"><ins><em>proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -2482,59 +2652,39 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
-    A study</em></ins></span> in <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>2015&lt;/a&gt; found that 90% of the top-ranked 
gratis proprietary
-    Android apps contained recognizable tracking libraries. For the paid
-    proprietary apps, it was only 60%.&lt;/p&gt;</em></ins></span>
+    A study in 2015&lt;/a&gt; found that 90% of</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>top-ranked gratis proprietary
+    Android apps contained recognizable tracking libraries. 
For</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>paid
+    proprietary apps,</em></ins></span> it <span class="inserted"><ins><em>was 
only 60%.&lt;/p&gt;
 
-    &lt;p&gt;The article <span class="removed"><del><strong>says this is a 
back door,</strong></del></span> <span class="inserted"><ins><em>confusingly 
describes gratis apps as
-    &ldquo;free&rdquo;,</em></ins></span> but <span 
class="inserted"><ins><em>most of them are not in fact &lt;a
+    &lt;p&gt;The article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement for</em></ins></span> 
that <span class="removed"><del><strong>could be a
-      misunderstanding.  However, it</strong></del></span> <span 
class="inserted"><ins><em>word</em></ins></span>
-    is <span class="removed"><del><strong>certainly surveillance, at
-      least.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
+    ugly word &ldquo;monetize&rdquo;. A good replacement for that 
word</em></ins></span>
+    is <span class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;!-- #SpywareAtLowLevel</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+  &lt;li id="M201505060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span class="removed"><del><strong>place new items 
on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>100</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
-    and <span class="removed"><del><strong>spyware via 
BIOS&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs,</em></ins></span> on 
<span class="removed"><del><strong>Windows installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>average.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span class="removed"><del><strong>physically 
remove</strong></del></span> <span class="inserted"><ins><em>100 &lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+    and advertising&lt;/a&gt; URLs, on</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>average.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504060"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201504060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Widely</em></ins></span> used <span 
class="removed"><del><strong>did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This</em></ins></span> 
is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>in addition 
to
-    the snooping done by the phone company, and perhaps by the OS in
-    the phone.&lt;/p&gt;
+    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This</em></ins></span> 
is <span class="removed"><del><strong>made available</strong></del></span> 
<span class="inserted"><ins><em>in addition</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span>
+    <span class="inserted"><ins><em>the snooping done by the phone 
company,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>perhaps by the 
OS</em></ins></span> in
+    <span class="inserted"><ins><em>the phone.&lt;/p&gt;
 
     &lt;p&gt;Don't be distracted by the question of whether the app developers
     get users to say &ldquo;I agree&rdquo;. That is no excuse for
@@ -2545,22 +2695,18 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.</em></ins></span>  &lt;a 
<span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</em></ins></span> in <span class="removed"><del><strong>its 
own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork</strong></del></span> <span class="inserted"><ins><em>a 
way that at least is visible and optional&lt;/a&gt;. Not
+    report which other apps the user has installed.  &lt;a
+    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing</em></ins></span> this <span 
class="removed"><del><strong>article,</strong></del></span> <span 
class="inserted"><ins><em>in a way that at least is visible and 
optional&lt;/a&gt;. Not
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401150.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The Simeji keyboard is a 
smartphone version of Baidu's &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Simeji keyboard</em></ins></span> is <span 
class="removed"><del><strong>not
+      really</strong></del></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>smartphone version</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>Baidu's &lt;a
     href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2568,24 +2714,12 @@
   &lt;li id="M201312270"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is</em></ins></span> 
to <span class="removed"><del><strong>place new items</strong></del></span> 
<span class="inserted"><ins><em>restrict the
-    use of data</em></ins></span> on <span class="removed"><del><strong>top 
under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>the user's 
computer, but it does surveillance too:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</em></ins></span>
-    it <span class="removed"><del><strong>can collect</strong></del></span> 
<span class="inserted"><ins><em>tries to get</em></ins></span> the <span 
class="removed"><del><strong>emails of members</strong></del></span> <span 
class="inserted"><ins><em>user's list</em></ins></span> of <span 
class="removed"><del><strong>Parliament</strong></del></span> <span 
class="inserted"><ins><em>other people's phone
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
+    use</em></ins></span> of <span class="removed"><del><strong>privacy, and 
should be replaced with anonymous
+      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>data on the user's computer,</em></ins></span> but 
<span class="inserted"><ins><em>it does surveillance too: &lt;a
+    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries to get</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. 
The</strong></del></span> <span class="inserted"><ins><em>user's list 
of</em></ins></span> other
+      <span class="removed"><del><strong>cases mentioned are 
done</strong></del></span> <span class="inserted"><ins><em>people's phone
     numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2594,14 +2728,19 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Brightest Flashlight app &lt;a
     
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
+    sends user data, including geolocation, for use</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;The FTC criticized</em></ins></span> this <span 
class="removed"><del><strong>way,</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> because <span 
class="removed"><del><strong>they pass</strong></del></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>asked the user to
-    approve sending personal data to the app developer but did not ask
-    about sending it to other companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+    &lt;p&gt;The FTC criticized this app because it asked</em></ins></span> 
the <span class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> to <span 
class="removed"><del><strong>extract</strong></del></span>
+    <span class="inserted"><ins><em>approve sending personal</em></ins></span> 
data <span class="removed"><del><strong>remotely and
+      determine</strong></del></span> <span 
class="inserted"><ins><em>to</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information,</strong></del></span> <span 
class="inserted"><ins><em>app developer</em></ins></span> but <span 
class="removed"><del><strong>if the state orders</strong></del></span> <span 
class="inserted"><ins><em>did not ask
+    about sending</em></ins></span> it to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>data
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>weakness of</em></ins></span>
+    the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
     surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
@@ -2609,184 +2748,115 @@
   &lt;li id="M201212100"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
+    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
     
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
+<span class="removed"><del><strong>&lt;!-- #SpywareAtHome</strong></del></span>
+
+
+<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201908151"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype refuses to say whether it can &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
-    on calls&lt;/a&gt;.&lt;/p&gt;
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Skype refuses</em></ins></span> 
to <span class="removed"><del><strong>place new items</strong></del></span> 
<span class="inserted"><ins><em>say whether it can &lt;a
+    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop</em></ins></span>
+    on <span class="removed"><del><strong>top under each 
subsection</strong></del></span> <span 
class="inserted"><ins><em>calls&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.</em></ins></span>
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Skype contains &lt;a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-<span class="removed"><del><strong>&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Lots</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M202010221"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft</em></ins></span> is <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>imposing its</em></ins></span>
-    surveillance <span 
class="removed"><del><strong>device.</strong></del></span> <span 
class="inserted"><ins><em>on the game of Minecraft by</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera is</strong></del></span>
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game</em></ins></span> of <span 
class="removed"><del><strong>&ldquo;smart&rdquo; products are
+        designed</strong></del></span> <span 
class="inserted"><ins><em>Minecraft by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+        listen</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
-    every player to open</em></ins></span> an <span 
class="removed"><del><strong>example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, 
based</strong></del></span> <span 
class="inserted"><ins><em>account</em></ins></span> on <span 
class="inserted"><ins><em>Microsoft's network&lt;/a&gt;. Microsoft
-    has bought</em></ins></span> the <span class="removed"><del><strong>fact
-      that the device is tethered</strong></del></span> <span 
class="inserted"><ins><em>game and will merge all accounts into its network,
-    which will give them access</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>people's data.&lt;/p&gt;
+    every player</em></ins></span> to <span 
class="removed"><del><strong>everyone in</strong></del></span> <span 
class="inserted"><ins><em>open an account on Microsoft's network&lt;/a&gt;. 
Microsoft
+    has bought</em></ins></span> the <span 
class="removed"><del><strong>house,</strong></del></span> <span 
class="inserted"><ins><em>game and will merge</em></ins></span> all <span 
class="inserted"><ins><em>accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
 
     &lt;p&gt;Minecraft players &lt;a
     href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
-    instead. The essential advantage of Minetest is</em></ins></span> that 
<span class="removed"><del><strong>the device gives the company
-      surveillance capability.&lt;/p&gt;
-  &lt;/li&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
   
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span> 
<span class="inserted"><ins><em>it</em></ins></span> is <span 
class="removed"><del><strong>&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>free
-    software, meaning</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>respects</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>user's computer freedom. As a bonus,</em></ins></span>
-    it <span class="removed"><del><strong>to outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>offers more options.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Today's technological practice does not include any 
way</strong></del></span> <span class="inserted"><ins><em>user's computer 
freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201908210"&gt;
+  &lt;li id="M201908210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Microsoft recorded users of Xboxes</em></ins></span> and <span 
class="inserted"><ins><em>had</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    &lt;p&gt;Microsoft recorded users</em></ins></span> of
+    <span class="removed"><del><strong>making</strong></del></span> <span 
class="inserted"><ins><em>Xboxes and had &lt;a
+    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
     human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Morally, we see no difference between having human workers listen 
and
-    having speech-recognition systems listen.  Both intrude</em></ins></span> 
on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>privacy.&lt;/p&gt;</em></ins></span>
+    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201806240"&gt;
+  &lt;li id="M201806240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Red Shell is a spyware that
-    is found</em></ins></span> in many <span 
class="removed"><del><strong>e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks</em></ins></span> data <span class="inserted"><ins><em>on users' 
computers and sends it</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed to check DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Red Shell is</em></ins></span> a <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that <span 
class="removed"><del><strong>can obey your voice commands without
+    potentially spying</strong></del></span>
+    <span class="inserted"><ins><em>is found in many proprietary games. It 
&lt;a
+    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data</em></ins></span> on <span class="removed"><del><strong>you.  
Even if</strong></del></span> <span class="inserted"><ins><em>users' computers 
and sends</em></ins></span> it <span class="inserted"><ins><em>to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201804144"&gt;
+  &lt;li id="M201804144"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;ArenaNet surreptitiously installed</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>spyware
-    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed through the modem.  However, even if it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.</strong></del></span> <span class="inserted"><ins><em>massive
-    multiplayer game Guild Wars 2.</em></ins></span>  The <span 
class="removed"><del><strong>software in the car is
-    proprietary,</strong></del></span> <span class="inserted"><ins><em>spyware 
allowed ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>the car remotely, the cell phone
-    modem enables the phone company to track the car's 
movements</strong></del></span> <span class="inserted"><ins><em>snoop 
on</em></ins></span> all
-    <span class="removed"><del><strong>the time; it is possible to physically 
remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;ArenaNet surreptitiously installed a spyware
+    program along with an update to the massive
+    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201711070"&gt;
+  &lt;li id="M201711070"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends</em></ins></span>
-    information <span class="removed"><del><strong>about drivers' 
movements&lt;/a&gt;,
-      which is made available</strong></del></span> to <span 
class="removed"><del><strong>car manufacturers, insurance 
companies,</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
@@ -2794,58 +2864,48 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many &lt;a
     
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop on their users</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this 
article,</strong></del></span> <span class="inserted"><ins><em>report to the
+    video game consoles snoop on their users and report to the
     internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>not
-      really</strong></del></span> a <span class="removed"><del><strong>matter 
of proprietary surveillance. These systems are an
-      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>computer,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced</strong></del></span> <span 
class="inserted"><ins><em>you can't trust a computer</em></ins></span> with 
<span class="removed"><del><strong>anonymous
-      payment systems, but the invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to 
extract</strong></del></span>
-    <span class="inserted"><ins><em>a nonfree operating system.&lt;/p&gt;
+    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>air-gapped, it could be
+    saving up records about</strong></del></span> <span 
class="inserted"><ins><em>a computer, and</em></ins></span> you <span 
class="removed"><del><strong>for later 
examination.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201509160"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of</em></ins></span> data <span 
class="removed"><del><strong>remotely</strong></del></span> <span 
class="inserted"><ins><em>about their users</em></ins></span> and
-      <span class="removed"><del><strong>determine the car's location at any 
time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>their users'
-    friends</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if the state orders</strong></del></span> 
<span class="inserted"><ins><em>associates&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range</em></ins></span> of data about <span 
class="inserted"><ins><em>their users and their users'
+    friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do</em></ins></span> it <span 
class="removed"><del><strong>to get</strong></del></span> <span 
class="inserted"><ins><em>through ad networks that merge</em></ins></span> the 
data
-    <span class="inserted"><ins><em>collected by various 
cr&hellip;apps</em></ins></span> and <span class="removed"><del><strong>hand it 
over,</strong></del></span> <span class="inserted"><ins><em>sites made by 
different
+    &lt;p&gt;Even nastier, they do it through ad networks that 
merge</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>data
+    collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
     &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
-    use a back door to manipulate</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>game play for specific players.&lt;/p&gt;
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
-    &lt;p&gt;While the article describes gratis games, games that cost 
money</em></ins></span>
-    can <span class="removed"><del><strong>store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>use the 
same tactics.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;While the article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtHome</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;Angry Birds &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Angry Birds &lt;a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
     spies for companies, and the NSA takes advantage</em></ins></span>
-    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>spy through it 
too&lt;/a&gt;.  Here's information</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    to spy <span class="inserted"><ins><em>through it too&lt;/a&gt;.  Here's 
information</em></ins></span> on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -2856,64 +2916,46 @@
 
   &lt;li id="M200510200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Blizzard Warden is a hidden
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
     spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; products are
-        designed</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M202101050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Most Internet connected devices in Mozilla's</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-        listen</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
+    &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
+    
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
     Not Included&rdquo;&lt;/a&gt; list &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
-    designed</em></ins></span> to <span class="removed"><del><strong>everyone 
in the house, all the time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does not include any way of
-    making a device that can obey your voice commands without
-    potentially spying</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>you.  Even</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt; even</em></ins></span> if <span 
class="removed"><del><strong>it is air-gapped, it could be
-    saving up records about you for later examination.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot</strong></del></span> <span class="inserted"><ins><em>they meet
+    designed to snoop on users&lt;/a&gt; even if they meet
     Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
-    design</em></ins></span> of <span class="removed"><del><strong>data 
about</strong></del></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>program running on some of these devices &lt;a
+    design of the program running on some of these devices &lt;a
     
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
     the user susceptible to be snooped and exploited by crackers as
-    well&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    well&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
+  &lt;li id="M201708280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
@@ -3091,20 +3133,20 @@
       snooping all the time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
     snoops on what programs people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
+  &lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+    users watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
-  &lt;li id="M201502090"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The</em></ins></span> Samsung &ldquo;Smart&rdquo; TV &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits</strong></del></span>
@@ -3759,8 +3801,8 @@
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of</em></ins></span> that <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+    hardware cannot collect any of</em></ins></span> that <span 
class="inserted"><ins><em>data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711230"&gt;
@@ -3841,8 +3883,8 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Oculus headsets &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
     users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
     free rein to pervasively snoop on Oculus users.&lt;/p&gt;
@@ -3850,8 +3892,8 @@
 
   &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;VR equipment, measuring every slight motion,
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;VR equipment, measuring every 
slight motion,
     creates the potential for the most intimate
     surveillance ever. All it takes to make this potential real &lt;a
     
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
@@ -4469,7 +4511,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/10/08 19:34:57 $
+$Date: 2021/10/12 08:33:44 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.404
retrieving revision 1.405
diff -u -b -r1.404 -r1.405
--- po/proprietary-surveillance.de.po   8 Oct 2021 19:34:57 -0000       1.404
+++ po/proprietary-surveillance.de.po   12 Oct 2021 08:33:45 -0000      1.405
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1224,6 +1224,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-";
 "health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
 "health apps harvest users' data</a>, including sensitive health information, "

Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- po/proprietary-surveillance.es.po   9 Oct 2021 10:02:21 -0000       1.223
+++ po/proprietary-surveillance.es.po   12 Oct 2021 08:33:46 -0000      1.224
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2021-10-09 11:37+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 2.2.1\n"
 
@@ -891,6 +892,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-";
 "health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
 "health apps harvest users' data</a>, including sensitive health information, "

Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.657
retrieving revision 1.658
diff -u -b -r1.657 -r1.658
--- po/proprietary-surveillance.fr.po   8 Oct 2021 19:48:15 -0000       1.657
+++ po/proprietary-surveillance.fr.po   12 Oct 2021 08:33:46 -0000      1.658
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2021-10-08 21:47+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -886,6 +887,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-";
 "health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
 "health apps harvest users' data</a>, including sensitive health information, "

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- po/proprietary-surveillance.it-diff.html    8 Oct 2021 19:34:57 -0000       
1.276
+++ po/proprietary-surveillance.it-diff.html    12 Oct 2021 08:33:46 -0000      
1.277
@@ -648,165 +648,190 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M202106170"&gt;
+  &lt;li id="M202106250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/"&gt;El
+    Salvador Dictatorship's Chivo wallet is spyware&lt;/a&gt;, it's 
a</em></ins></span>
+    proprietary <span class="removed"><del><strong>Android apps contained 
recognizable tracking libraries. For</strong></del></span> <span 
class="inserted"><ins><em>program that breaks users' freedom and spies on 
people;
+    demands personal data such as</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary apps,</strong></del></span> <span 
class="inserted"><ins><em>national ID number and does face
+    recognition, and</em></ins></span> it <span 
class="removed"><del><strong>was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps</strong></del></span> 
as <span class="removed"><del><strong>&ldquo;free&rdquo;,
+  but most of them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.</strong></del></span> <span class="inserted"><ins><em>bad 
security for its data.</em></ins></span> It also <span 
class="removed"><del><strong>uses the ugly word &ldquo;monetize&rdquo;. A good 
replacement</strong></del></span> <span 
class="inserted"><ins><em>asks</em></ins></span> for <span 
class="removed"><del><strong>that word is &ldquo;exploit&rdquo;; nearly always 
that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apps</strong></del></span>
+    <span class="inserted"><ins><em>almost every malware permission in 
people's smart phones.&lt;/p&gt;
+
+    &lt;p&gt;The article criticizes it</em></ins></span> for <span 
class="removed"><del><strong>BART</strong></del></span> <span 
class="inserted"><ins><em>faults in &ldquo;data
+    protection&rdquo;, though</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href=""&gt;&ldquo;data protection&rdquo;
+    is the wrong approach to privacy 
anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202106170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows"&gt;Almost
-    all</em></ins></span> proprietary <span 
class="removed"><del><strong>Android</strong></del></span> <span 
class="inserted"><ins><em>health</em></ins></span> apps <span 
class="removed"><del><strong>contained recognizable</strong></del></span> <span 
class="inserted"><ins><em>harvest users' data&lt;/a&gt;, including
-    sensitive health information,</em></ins></span> tracking <span 
class="removed"><del><strong>libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>identifiers, and cookies to
-    track user activities. Some of these applications are tracking users
-    across different platforms.&lt;/p&gt;
+    all proprietary health</em></ins></span> apps <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>harvest users' data&lt;/a&gt;, including
+    sensitive health information, tracking identifiers, and cookies 
to</em></ins></span>
+    track <span class="inserted"><ins><em>user activities. Some of these 
applications are tracking</em></ins></span> users <span 
class="removed"><del><strong>by
+       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>across different 
platforms.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M202102200"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M202102200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>article confusingly 
describes gratis apps</strong></del></span> <span 
class="inserted"><ins><em>proprietary program Clubhouse
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The proprietary program Clubhouse
     is malware and a privacy disaster. Clubhouse &lt;a
     
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble"&gt;collects
-    people's personal data such</em></ins></span> as <span 
class="removed"><del><strong>&ldquo;free&rdquo;,
-  but most</strong></del></span> <span 
class="inserted"><ins><em>recordings</em></ins></span> of <span 
class="removed"><del><strong>them are</strong></del></span> <span 
class="inserted"><ins><em>people's
-    conversations&lt;/a&gt;, and, as a secondary problem, 
does</em></ins></span> not <span class="inserted"><ins><em>encrypt them,
+    people's personal data such as recordings</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude</strong></del></span> 
<span class="inserted"><ins><em>people's
+    conversations&lt;/a&gt;, and, as a secondary problem, does not encrypt 
them,
     which shows a bad security part of the issue.&lt;/p&gt;
 
-    &lt;p&gt;A user's unique Clubhouse ID number and chatroom ID are 
transmitted</em></ins></span>
-    in <span class="removed"><del><strong>fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span 
class="inserted"><ins><em>plaintext, and Agora (the company 
behind</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A</strong></del></span> <span 
class="inserted"><ins><em>app) would likely
-    have access to users' raw audio, potentially providing access to
+    &lt;p&gt;A user's unique Clubhouse ID number and chatroom ID are 
transmitted
+    in plaintext, and Agora (the company behind the app) would likely
+    have access</em></ins></span> to <span 
class="removed"><del><strong>transmit</strong></del></span> users' <span 
class="inserted"><ins><em>raw audio, potentially providing access to
     the Chinese government.&lt;/p&gt;
 
-    &lt;p&gt;Even with</em></ins></span> good <span 
class="removed"><del><strong>replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>security 
of data transmission, collecting personal
-    data of people</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>wrong and a violation of people's privacy 
rights.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Even with good security of data transmission, 
collecting</em></ins></span> personal
+    data <span class="removed"><del><strong>to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens</strong></del></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>people is wrong and a violation</em></ins></span> of 
<span class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>people's privacy rights.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M202101080"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
-    its users to hand over sensitive personal data&lt;/a&gt; to its parent
+    &lt;p&gt;As</em></ins></span> of <span class="removed"><del><strong>users 
that install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>2021, WhatsApp (one</em></ins></span> of <span 
class="inserted"><ins><em>Facebook's subsidiaries) is &lt;a
+    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
+    its</em></ins></span> users <span class="inserted"><ins><em>to hand over 
sensitive personal data&lt;/a&gt; to its parent
     company. This increases Facebook's power over users, and further
     jeopardizes people's privacy and security.&lt;/p&gt;
 
     &lt;p&gt;Instead of WhatsApp you can use &lt;a
-    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which 
is</em></ins></span>
-    free software <span 
class="removed"><del><strong>apps,</strong></del></span> <span 
class="inserted"><ins><em>and will not collect your data.&lt;/p&gt;
+    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, 
which</em></ins></span> is
+    <span class="inserted"><ins><em>free software and will</em></ins></span> 
not <span class="removed"><del><strong>enough
+to legitimize actions</strong></del></span> <span 
class="inserted"><ins><em>collect your data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M202006260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Most apps are malware, but
-    Trump's campaign app, like Modi's campaign app, is &lt;a
+    Trump's campaign app,</em></ins></span> like <span 
class="removed"><del><strong>this.  At this point, most</strong></del></span> 
<span class="inserted"><ins><em>Modi's campaign app, is &lt;a
     
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
-    especially nasty malware, helping companies snoop on</em></ins></span> 
users <span class="removed"><del><strong>could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span> <span class="inserted"><ins><em>as well
-    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says</em></ins></span> that <span 
class="removed"><del><strong>they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>Biden's app has a less manipulative overall
-    approach, but</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>does not tell us whether it has functionalities we
-    consider malicious, such as sending data the user has not explicitly
-    asked to send.&lt;/p&gt;</em></ins></span>
+    especially nasty malware, helping companies snoop on</em></ins></span> 
users <span class="removed"><del><strong>have
+stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects</strong></del></span> <span 
class="inserted"><ins><em>as well
+    as snooping</em></ins></span> on <span class="removed"><del><strong>users, 
instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>them 
itself&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says that Biden's app has a less manipulative overall
+    approach, but that does not tell us whether</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy,</strong></del></span> 
<span class="inserted"><ins><em>has functionalities</em></ins></span> we <span 
class="removed"><del><strong>must prevent Google</strong></del></span>
+    <span class="inserted"><ins><em>consider malicious, such as sending data 
the user has not explicitly
+    asked to send.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track 
users</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201809121"&gt;
+  &lt;li id="M201809121"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Tiny Lab Productions, along with online ad businesses 
run</em></ins></span>
-    by <span class="inserted"><ins><em>Google, Twitter and three other 
companies are facing a lawsuit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or 
played</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
-    violating people's privacy</em></ins></span> by <span 
class="removed"><del><strong>TV programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit users' 
personal</strong></del></span> <span class="inserted"><ins><em>collecting their 
data from mobile games
-    and handing over these</em></ins></span> data to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span> <span 
class="inserted"><ins><em>other companies/advertisers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
+    by Google, Twitter</em></ins></span> and <span 
class="inserted"><ins><em>three</em></ins></span> other companies <span 
class="inserted"><ins><em>are facing a lawsuit &lt;a
+    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
+    violating people's privacy by collecting their data</em></ins></span> from 
<span class="removed"><del><strong>getting this personal information in the 
first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>mobile 
games
+    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201601110"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones is &lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software to make sure they can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>monitoring
+    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software to make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
+  &lt;li id="M201510050"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;According to Edward Snowden,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
+    &lt;p&gt;According to Edward Snowden, &lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>phones on and 
off, listen to</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>GPS, take 
photographs, read
+    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>off, listen</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.</strong></del></span> <span 
class="inserted"><ins><em>microphone,
+    retrieve geo-location data from the GPS, take photographs, read
     text messages, read call, location and web browsing history, and
-    read the contact list. This malware</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
-    from investigation.&lt;/p&gt;
+    read the contact list.</em></ins></span> This <span 
class="inserted"><ins><em>malware</em></ins></span> is
+    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disguise itself
+    from investigation.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201311120"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that</em></ins></span> this <span 
class="removed"><del><strong>point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>does not 
operate via</em></ins></span>
-    the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> that <span 
class="removed"><del><strong>spell out
-what they</strong></del></span> <span class="inserted"><ins><em>we know nearly 
all portable
-    phones have. It may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of <span class="removed"><del><strong>hiding it in 
an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal 
information</strong></del></span> <span 
class="inserted"><ins><em>bugs</em></ins></span> in the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phones' 
radio software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    detail here, it seems that this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>most popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>universal back door 
that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral and location information&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the 
phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
+  &lt;li id="M201307000"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send</em></ins></span> their <span 
class="removed"><del><strong>permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and</strong></del></span> <span 
class="inserted"><ins><em>GPS</em></ins></span> location <span 
class="removed"><del><strong>tracking, you must
-    disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop
-    <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones
-    to have GPS.)&lt;/p&gt;
+    &lt;p&gt;Portable phones with GPS &lt;a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send</em></ins></span> their <span class="inserted"><ins><em>GPS 
location on remote command, and</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cannot 
stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
+    to have GPS.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -820,39 +845,31 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/"&gt;Apple
-    is moving its Chinese customers' iCloud data to a datacenter controlled
-    by</em></ins></span> the <span class="removed"><del><strong>tracking.  
This</strong></del></span> <span class="inserted"><ins><em>Chinese 
government&lt;/a&gt;. Apple</em></ins></span> is
-    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span> <span class="inserted"><ins><em>already 
storing the encryption
+    is moving its Chinese customers' iCloud data</em></ins></span> to <span 
class="inserted"><ins><em>a datacenter controlled
+    by</em></ins></span> the <span class="removed"><del><strong>app's 
functionality,
+  was</strong></del></span> <span class="inserted"><ins><em>Chinese 
government&lt;/a&gt;. Apple is already storing the encryption
     keys on these servers, obeying Chinese authority, making all Chinese
-    user data available</em></ins></span> to <span 
class="removed"><del><strong>obey</strong></del></span> the <span 
class="removed"><del><strong>user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>government.&lt;/p&gt;</em></ins></span>
+    user data available to the government.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M202009183"&gt;
+  &lt;li id="M202009183"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt; of their</strong></del></span>
+    &lt;p&gt;Facebook</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
-    on Instagram&lt;/a&gt;</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>by 
surreptitously turning on the device's
-    camera.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    on Instagram&lt;/a&gt; users by surreptitously turning 
on</em></ins></span> the <span class="removed"><del><strong>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated to</strong></del></span>
+  &lt;p&gt;The article should</strong></del></span> <span 
class="inserted"><ins><em>device's
+    camera.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M202004200"&gt;
+  &lt;li id="M202004200"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
-    made a practice of surreptitiously activating</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was</strong></del></span> <span class="inserted"><ins><em>Siri software 
to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
     record users' conversations when they had</em></ins></span> not <span 
class="removed"><del><strong>have described</strong></del></span> <span 
class="inserted"><ins><em>activated Siri&lt;/a&gt;.
     This was not just occasional, it was systematic practice.&lt;/p&gt;
 
@@ -1807,36 +1824,27 @@
     &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android 
phones and iPhones
     running Google apps, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves</em></ins></span> the data <span class="removed"><del><strong>may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>phone has</em></ins></span> to <span 
class="removed"><del><strong>a
-      data broker,</strong></del></span> <span class="inserted"><ins><em>be 
responsible for sending</em></ins></span>
-    the <span class="inserted"><ins><em>location</em></ins></span> data <span 
class="removed"><del><strong>broker would have been able to figure out
-      who the user was.&lt;/p&gt;
+    saves</em></ins></span> the data <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>for years&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total of 
C$4m&lt;/a&gt;</strong></del></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Nonfree software in the phone has to</em></ins></span> be
+      <span class="removed"><del><strong>true, but it doesn't really matter. 
If it had sold</strong></del></span> <span 
class="inserted"><ins><em>responsible for sending</em></ins></span>
+    the <span class="inserted"><ins><em>location</em></ins></span> data to 
<span class="inserted"><ins><em>Google.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201903251"&gt;
+  &lt;li id="M201903251"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many Android phones come</em></ins></span> with <span 
class="removed"><del><strong>microphones</strong></del></span> <span 
class="inserted"><ins><em>a huge number of</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access</em></ins></span> to <span 
class="inserted"><ins><em>sensitive data without
+    &lt;p&gt;Many Android phones come with</em></ins></span> a <span 
class="inserted"><ins><em>huge number of &lt;a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
+    preinstalled nonfree apps that have access to sensitive</em></ins></span> 
data <span class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span class="inserted"><ins><em>data, or 
pass it on</em></ins></span> to <span class="inserted"><ins><em>user-installed 
apps that have</em></ins></span> access <span 
class="inserted"><ins><em>to</em></ins></span>
-    the <span class="removed"><del><strong>data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
+    the <span class="removed"><del><strong>data broker 
would</strong></del></span> <span class="inserted"><ins><em>data, or pass it on 
to user-installed apps that</em></ins></span> have <span 
class="removed"><del><strong>been able</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> to <span 
class="removed"><del><strong>figure out
+      who</strong></del></span>
+    the <span class="removed"><del><strong>user was.&lt;/p&gt;
 
-    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>network but no direct access to</em></ins></span> the 
<span class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
-    surveillance on which</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely no control.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>network but no direct access 
to</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
+    surveillance on which the user</em></ins></span> has <span 
class="removed"><del><strong>been ordered</strong></del></span> <span 
class="inserted"><ins><em>absolutely no control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903201"&gt;
@@ -1844,88 +1852,95 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
     
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;, which can use it
     for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
     &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+    lengthy terms</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902230"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    library for building mobile apps, which also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>spy on children</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
-    way</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>released them, apparently not realizing that 
all the personal
-    data they collected would go to Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps 
that</em></ins></span>
+    way <span class="removed"><del><strong>to access</strong></del></span> 
<span class="inserted"><ins><em>and released them, apparently not realizing 
that all</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal
+    data they</em></ins></span> collected <span 
class="removed"><del><strong>by</strong></del></span> <span 
class="inserted"><ins><em>would go to Facebook as well.&lt;/p&gt;
 
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>manufacturer's 
snooping.&lt;/p&gt;
 
-&lt;!-- #SpywareAtLowLevel</strong></del></span>
+    &lt;p&gt;That</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+  &lt;li id="M201902140"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;The AppCensus database gives 
information</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>these conversations
+      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
     Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are 
ineffective</em></ins></span> at <span class="removed"><del><strong>Low 
Level&lt;/h3&gt;
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Many nonfree apps have a 
surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>preventing nonfree software developers 
from including malware</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>their programs.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902060"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902041.1"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
 Note</strong></del></span> <span class="inserted"><ins><em>users, and 
redirecting
@@ -2248,8 +2263,8 @@
   anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201705040"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2257,8 +2272,8 @@
   &lt;li id="M201704260"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
     how much</em></ins></span> access <span class="inserted"><ins><em>it 
demands to personal data in the device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2485,7 +2500,7 @@
     
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
     twisted ways that they present snooping as</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude</em></ins></span> of <span 
class="inserted"><ins><em>the</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
+    typical example</em></ins></span> of <span class="inserted"><ins><em>the 
attitude of the</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
       intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>software industry
     towards those they have subjugated.&lt;/p&gt;
 
@@ -2959,20 +2974,20 @@
       watching</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
     snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
+  &lt;li id="M201504300"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+    users watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
-  &lt;li id="M201502090"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The</em></ins></span> Samsung &ldquo;Smart&rdquo; TV &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits</strong></del></span>
@@ -3338,17 +3353,17 @@
     &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
     Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
     speakers are likewise stored longer than necessary on the servers
-    the devices are tethered to. Moreover, they are made 
available</em></ins></span> to
-    <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very 
precise picture of users' life
-    at home, not only in</em></ins></span> the 
-      <span 
class="removed"><del><strong>internet&lt;/a&gt;&mdash;</strong></del></span> 
<span class="inserted"><ins><em>present, but in the past (and, who knows,
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
     in the future too?)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201904240"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    &lt;p&gt;Some of users' commands</em></ins></span> to the 
+      <span 
class="removed"><del><strong>internet&lt;/a&gt;&mdash;</strong></del></span> 
<span class="inserted"><ins><em>Alexa service are &lt;a
     
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
     recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
     voice assistants do similar things.&lt;/p&gt;
@@ -3480,7 +3495,7 @@
 
       &lt;p&gt;Even nastier, they do it through ad 
networks</strong></del></span> <span class="inserted"><ins><em>spoof messages 
to and from the watch, possibly endangering the child.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="inserted"><ins><em>word &ldquo;&lt;a
+    &lt;p&gt;&lt;small&gt;(Note</em></ins></span> that <span 
class="removed"><del><strong>merge</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the word &ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
     to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -3518,7 +3533,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390"&gt;Ford
-    is planning to force ads on drivers in cars&lt;/a&gt;, with the ability for
+    is planning to force ads on drivers in cars&lt;/a&gt;, 
with</em></ins></span> the <span class="inserted"><ins><em>ability for
     the owner to pay extra to turn them off. The system probably imposes
     surveillance on drivers too.&lt;/p&gt;
   &lt;/li&gt;
@@ -4293,7 +4308,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/10/08 19:34:57 $
+$Date: 2021/10/12 08:33:46 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.416
retrieving revision 1.417
diff -u -b -r1.416 -r1.417
--- po/proprietary-surveillance.it.po   8 Oct 2021 19:34:58 -0000       1.416
+++ po/proprietary-surveillance.it.po   12 Oct 2021 08:33:47 -0000      1.417
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -1184,6 +1184,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-";
 "health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
 "health apps harvest users' data</a>, including sensitive health information, "

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- po/proprietary-surveillance.ja-diff.html    8 Oct 2021 19:34:58 -0000       
1.294
+++ po/proprietary-surveillance.ja-diff.html    12 Oct 2021 08:33:47 -0000      
1.295
@@ -608,25 +608,21 @@
 
 &lt;div class="big-subsection"&gt;
   <span class="inserted"><ins><em>&lt;span 
id="SpywareAtLowLevel"&gt;&lt;/span&gt;</em></ins></span>
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInAndroid"&gt;Spyware 
in Android&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInBIOS"&gt;BIOS&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInAndroid"&gt;Spyware</strong></del></span>
 <span class="inserted"><ins><em>id="SpywareInBIOS"&gt;BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More than 73% of</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201509220"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&lt;a
     
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note that</em></ins></span> the <span 
class="removed"><del><strong>most popular Android apps</strong></del></span> 
<span class="inserted"><ins><em>specific
+    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
-    &ldquo;clean&rdquo; Windows install is not really clean 
since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its
+    &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span 
class="removed"><del><strong>Android&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
     own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -634,10 +630,13 @@
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on 
Mobiles&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More than 73% of</strong></del></span>
+<span class="inserted"><ins><em>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInTelephones"&gt;All &ldquo;Smart&rdquo; Phones&lt;/h4&gt;
@@ -645,6 +644,23 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M202106250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/"&gt;El
+    Salvador Dictatorship's Chivo wallet is spyware&lt;/a&gt;, it's a
+    proprietary program that breaks users' freedom and spies on people;
+    demands personal data such as</em></ins></span> the <span 
class="removed"><del><strong>most popular Android apps</strong></del></span> 
<span class="inserted"><ins><em>national ID number and does face
+    recognition, and it as bad security for its data. It also asks for
+    almost every malware permission in people's smart phones.&lt;/p&gt;
+
+    &lt;p&gt;The article criticizes it for faults in &ldquo;data
+    protection&rdquo;, though</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span> <span 
class="inserted"><ins><em>href=""&gt;&ldquo;data protection&rdquo;
+    is the wrong approach to privacy anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202106170"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -1923,7 +1939,9 @@
     and, once informed, was in no hurry to take action. This proves
     that</em></ins></span> the <span class="removed"><del><strong>invasion 
isn't done by malware. The other
       cases mentioned</strong></del></span> <span 
class="inserted"><ins><em>policies of a development platform</em></ins></span> 
are <span class="removed"><del><strong>done by 
proprietary</strong></del></span> <span class="inserted"><ins><em>ineffective at
-    preventing nonfree software developers from including</em></ins></span> 
malware in
+    preventing nonfree software developers from including</em></ins></span> 
malware in <span class="removed"><del><strong>the car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the</strong></del></span>
     <span class="inserted"><ins><em>their programs.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1932,19 +1950,15 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>extract data 
remotely and
-      determine the car's location at any time. (See</strong></del></span>
-    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;).</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
@@ -1983,13 +1997,13 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's 
server&lt;/a&gt;.</em></ins></span> The company <span 
class="removed"><del><strong>says</strong></del></span> <span 
class="inserted"><ins><em>is
-    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>doesn't</strong></del></span> <span 
class="inserted"><ins><em>notify the users of what it will do
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
     &lt;p&gt;We think that lawsuit is about a side issue. What the company does
     with the data is a secondary issue. The principal wrong here is that
-    the company gets that data at all.&lt;/p&gt;
+    the</em></ins></span> company <span class="inserted"><ins><em>gets that 
data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"&gt;
@@ -2002,10 +2016,10 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Around 40% of gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+    report on the user's actions</em></ins></span> to <span 
class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same machine via
+    Facebook can correlate the</em></ins></span> data <span 
class="removed"><del><strong>remotely</strong></del></span> <span 
class="inserted"><ins><em>it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
     the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
@@ -2039,7 +2053,7 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+    the user's movements</em></ins></span> and <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
@@ -2102,7 +2116,7 @@
     &lt;p&gt;Tracking software in popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical</em></ins></span> store <span 
class="inserted"><ins><em>by noticing WiFi
+    follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2114,7 +2128,7 @@
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
     book to developer's server.&lt;/p&gt;
 
-    &lt;p&gt;&lt;small&gt;(Note that</em></ins></span> this <span 
class="removed"><del><strong>information, but</strong></del></span> <span 
class="inserted"><ins><em>article misuses the words
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.)&lt;/small&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -2142,9 +2156,9 @@
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
+    the source code somehow to</em></ins></span> determine <span 
class="inserted"><ins><em>whether they mistreat users in
     various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
+    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>car's location</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
@@ -2195,15 +2209,16 @@
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    the app to snoop</em></ins></span> at <span 
class="removed"><del><strong>any time. (See</strong></del></span> <span 
class="inserted"><ins><em>all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
-    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    to transmit users' personal data to servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2252,7 +2267,7 @@
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
-    for privacy, security, and anonymity given by the majority of VPN
+    for privacy, security,</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;).</strong></del></span> <span 
class="inserted"><ins><em>anonymity given by the majority of VPN
     apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
@@ -2277,17 +2292,18 @@
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
       &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
-      may turn them over to the UK government</em></ins></span> if <span 
class="inserted"><ins><em>requested.&lt;/dd&gt;
+      may turn them over to the UK government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>HTML pages returned to the
-      users. The stated purpose of the JS injection is to display ads. Uses
-      roughly five tracking libraries. Also,</em></ins></span> it <span 
class="inserted"><ins><em>redirects the user's
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users.</em></ins></span> The <span class="removed"><del><strong>company 
says</strong></del></span> <span class="inserted"><ins><em>stated purpose of 
the JS injection is to display ads. Uses
+      roughly five tracking libraries. Also,</em></ins></span> it <span 
class="removed"><del><strong>doesn't
+      store</strong></del></span> <span class="inserted"><ins><em>redirects 
the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have confirmed that
+      five tracking libraries. Developers of</em></ins></span> this <span 
class="removed"><del><strong>information, but</strong></del></span> <span 
class="inserted"><ins><em>app have confirmed that
       the non-premium version of the app does JavaScript injection for
       tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
@@ -2307,7 +2323,7 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you circulate the picture you take 
according</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>who is
+    and suggests you circulate the picture you take according to who is
     in the frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
@@ -2316,16 +2332,16 @@
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
+    even</em></ins></span> if the <span class="removed"><del><strong>state 
orders</strong></del></span> <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Facebook's app listens all</em></ins></span> the <span 
class="inserted"><ins><em>time, &lt;a
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
+    snoop on what people are listening to or watching&lt;/a&gt;. In 
addition,</em></ins></span>
+    it <span class="inserted"><ins><em>may be analyzing people's 
conversations</em></ins></span> to <span class="inserted"><ins><em>serve them 
with targeted
     advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2334,8 +2350,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of</em></ins></span> data <span 
class="inserted"><ins><em>in the phone,</em></ins></span> and <span 
class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>in server accounts,</em></ins></span>
-    it <span class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>can alter them too&lt;/a&gt;.&lt;/p&gt;
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
@@ -2352,7 +2368,7 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
+    unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
     found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -2428,8 +2444,8 @@
     the snooping done by the phone company, and perhaps by the OS in
     the phone.&lt;/p&gt;
 
-    &lt;p&gt;Don't be distracted by the question of whether the app developers
-    get users to say &ldquo;I agree&rdquo;. That is no excuse for
+    &lt;p&gt;Don't be distracted by the question of whether the app 
developers</em></ins></span>
+    get <span class="inserted"><ins><em>users to say &ldquo;I agree&rdquo;. 
That is no excuse for
     malware.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2437,9 +2453,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.  &lt;a
+    report which other apps</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>user has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
+    is doing this in a way that at least is visible</em></ins></span> and 
<span class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>optional&lt;/a&gt;. Not
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2455,9 +2471,9 @@
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
-    use of data on the user's computer, but it does surveillance too: &lt;a
+    use of data on the user's computer, but</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>does surveillance too: &lt;a
     
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries to get the user's list of other people's phone
+    it tries to get</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>user's list of other people's phone
     numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2751,7 +2767,7 @@
     instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>allowed</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,
     if you are technically oriented, is to get your own router (which can
     be an old computer running completely free software), and set up a
-    firewall</em></ins></span> to <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or, as a last resort,
+    firewall to block connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2764,7 +2780,7 @@
 
     &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    moral weakness of surrendering</em></ins></span> to <span 
class="inserted"><ins><em>Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2778,10 +2794,11 @@
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
     the TV reports</em></ins></span> what <span class="inserted"><ins><em>it 
is. The existence of a way to disable</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
+    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  &lt;li id="M201511130"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
@@ -2790,11 +2807,10 @@
     are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
+  &lt;li id="M201511060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Vizio</em></ins></span> goes a step further than other TV
@@ -2965,7 +2981,7 @@
     passes by, the user's front door.&lt;/p&gt;
 
     &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>their users and report</strong></del></span> <span 
class="inserted"><ins><em>how Ring used to let individual employees look
-    at the videos freely.  It appears Amazon has tried to prevent that
+    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="inserted"><ins><em>prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
@@ -2975,13 +2991,13 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
     
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
+    give</em></ins></span> the 
+      <span 
class="removed"><del><strong>internet&lt;/a&gt;&mdash;</strong></del></span> 
<span class="inserted"><ins><em>manufacturer an unencrypted copy of everything 
they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the 
-      <span 
class="removed"><del><strong>internet&lt;/a&gt;&mdash;</strong></del></span> 
<span class="inserted"><ins><em>videos. That's not
+    manufacturers promise not to look at what's in the videos. That's not
     security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
@@ -3066,11 +3082,11 @@
   &lt;li id="M201702280"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="inserted"><ins><em>microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
     leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    Crackers found</em></ins></span> a <span class="inserted"><ins><em>way to 
access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these
@@ -3086,7 +3102,7 @@
     company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys</em></ins></span> with a <span 
class="inserted"><ins><em>mobile phone. This would enable
+    can remotely control the toys with a mobile phone. This would enable
     crackers to listen in on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
@@ -3562,8 +3578,8 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M202008182"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Oculus headsets &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Oculus headsets &lt;a
     
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
     users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
     free rein to pervasively snoop on Oculus users.&lt;/p&gt;
@@ -3571,8 +3587,8 @@
 
   &lt;li id="M201612230"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;VR equipment, measuring every 
slight motion,
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;VR equipment, measuring every slight motion,
     creates the potential for the most intimate
     surveillance ever. All it takes to make this potential real &lt;a
     
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
@@ -3753,8 +3769,8 @@
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site to give other companies personal 
data</em></ins></span> on
-    <span class="inserted"><ins><em>its customers&lt;/a&gt;.&lt;/p&gt;
+    JavaScript</em></ins></span> on <span class="inserted"><ins><em>its web 
site to give other companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712300"&gt;
@@ -3901,8 +3917,8 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Google Chrome includes a module that &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Google Chrome includes a module 
that &lt;a
     
href="https://www.privateinternetaccess.com/blog/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
     activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -3918,8 +3934,8 @@
 
   &lt;li id="M200809060"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-09&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE"</em></ins></span> --&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Google Chrome contains a key 
logger that &lt;a
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome contains a key logger that &lt;a
     
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
     sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
   &lt;/li&gt;
@@ -4151,7 +4167,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/10/08 19:34:58 $
+$Date: 2021/10/12 08:33:47 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.397
retrieving revision 1.398
diff -u -b -r1.397 -r1.398
--- po/proprietary-surveillance.ja.po   8 Oct 2021 19:34:58 -0000       1.397
+++ po/proprietary-surveillance.ja.po   12 Oct 2021 08:33:48 -0000      1.398
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -902,6 +902,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-";
 "health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
 "health apps harvest users' data</a>, including sensitive health information, "

Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.336
retrieving revision 1.337
diff -u -b -r1.336 -r1.337
--- po/proprietary-surveillance.pot     8 Oct 2021 19:35:02 -0000       1.336
+++ po/proprietary-surveillance.pot     12 Oct 2021 08:33:48 -0000      1.337
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -661,6 +661,24 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<a "
+"href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/\";>El
 "
+"Salvador Dictatorship's Chivo wallet is spyware</a>, it's a proprietary "
+"program that breaks users' freedom and spies on people; demands personal "
+"data such as the national ID number and does face recognition, and it as bad "
+"security for its data. It also asks for almost every malware permission in "
+"people's smart phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<a "
 
"href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows\";>Almost
 "
 "all proprietary health apps harvest users' data</a>, including sensitive "
 "health information, tracking identifiers, and cookies to track user "

Index: po/proprietary-surveillance.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-surveillance.pt-br.po        8 Oct 2021 19:35:02 -0000       
1.7
+++ po/proprietary-surveillance.pt-br.po        12 Oct 2021 08:33:48 -0000      
1.8
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2021-06-26 09:40-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -881,6 +881,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-";
 "health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
 "health apps harvest users' data</a>, including sensitive health information, "

Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.734
retrieving revision 1.735
diff -u -b -r1.734 -r1.735
--- po/proprietary-surveillance.ru.po   10 Oct 2021 06:31:57 -0000      1.734
+++ po/proprietary-surveillance.ru.po   12 Oct 2021 08:33:48 -0000      1.735
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -878,6 +879,24 @@
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
 "<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-";
 "health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
 "health apps harvest users' data</a>, including sensitive health information, "

Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- po/proprietary.de-diff.html 12 Oct 2021 07:33:26 -0000      1.299
+++ po/proprietary.de-diff.html 12 Oct 2021 08:33:48 -0000      1.300
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,17 +58,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -137,19 +137,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -200,10 +200,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -238,6 +238,22 @@
     that can communicate with the company that made it.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202106250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/"&gt;El
+    Salvador Dictatorship's Chivo wallet is spyware&lt;/a&gt;, it's a
+    proprietary program that breaks users' freedom and spies on people;
+    demands personal data such as the national ID number and does face
+    recognition, and it as bad security for its data. It also asks for
+    almost every malware permission in people's smart phones.&lt;/p&gt;
+
+    &lt;p&gt;The article criticizes it for faults in &ldquo;data
+    protection&rdquo;, though &lt;a href=""&gt;&ldquo;data protection&rdquo;
+    is the wrong approach to privacy anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202109210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,14 +287,6 @@
     affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202108240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Recent Samsung TVs have a back door with which Samsung can &lt;a
-    
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide"&gt;
-    brick them remotely&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -342,7 +350,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.316
retrieving revision 1.317
diff -u -b -r1.316 -r1.317
--- po/proprietary.de.po        12 Oct 2021 07:33:26 -0000      1.316
+++ po/proprietary.de.po        12 Oct 2021 08:33:48 -0000      1.317
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <www-de-translators@gnu.org>\n"
@@ -495,6 +495,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -523,13 +541,6 @@
 "attackers access to live feeds</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.522
retrieving revision 1.523
diff -u -b -r1.522 -r1.523
--- po/proprietary.es.po        12 Oct 2021 07:33:26 -0000      1.522
+++ po/proprietary.es.po        12 Oct 2021 08:33:48 -0000      1.523
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
 "Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -357,6 +357,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -400,16 +418,6 @@
 "iot-bug-video-feeds/\">están afectados por una vulnerabilidad que puede "
 "permitir a posibles atacantes acceder a los registros en vivo</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"Los últimos televisores de Samsung tienen una puerta trasera que permite a "
-"Samsung <a href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-";
-"any-of-its-tvs-worldwide\">inutilizarlos de forma remota</a>."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Ver más&hellip;</a>"
@@ -490,6 +498,15 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-";
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "Los últimos televisores de Samsung tienen una puerta trasera que permite "
+#~ "a Samsung <a href=\"https://www.pcmag.com/news/samsung-can-remotely-";
+#~ "disable-any-of-its-tvs-worldwide\">inutilizarlos de forma remota</a>."
+
+#~ msgid ""
 #~ "The Russian communications watchdog <a href=\"https://www.reuters.com/";
 #~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
 #~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "

Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.540
retrieving revision 1.541
diff -u -b -r1.540 -r1.541
--- po/proprietary.fr.po        12 Oct 2021 08:10:19 -0000      1.540
+++ po/proprietary.fr.po        12 Oct 2021 08:33:49 -0000      1.541
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2021-10-12 10:09+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -361,6 +362,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -406,16 +425,6 @@
 "feeds/\">faille de sécurité qui permettrait à des attaquant d'espionner le 
"
 "flux vidéo</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"Les téléviseurs récents de Samsung ont une porte dérobée qui permet au "
-"fabricant de <a href=\"https://www.pcmag.com/news/samsung-can-remotely-";
-"disable-any-of-its-tvs-worldwide\">les flinguer à distance</a>."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Voir plus&hellip;</a>"
@@ -490,6 +499,15 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-";
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "Les téléviseurs récents de Samsung ont une porte dérobée qui permet 
au "
+#~ "fabricant de <a href=\"https://www.pcmag.com/news/samsung-can-remotely-";
+#~ "disable-any-of-its-tvs-worldwide\">les flinguer à distance</a>."
+
+#~ msgid ""
 #~ "The Russian communications watchdog <a href=\"https://www.reuters.com/";
 #~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
 #~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "

Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.309
retrieving revision 1.310
diff -u -b -r1.309 -r1.310
--- po/proprietary.it-diff.html 12 Oct 2021 07:33:26 -0000      1.309
+++ po/proprietary.it-diff.html 12 Oct 2021 08:33:49 -0000      1.310
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,17 +58,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -137,19 +137,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -237,6 +237,22 @@
     that can communicate with the company that made it.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202106250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/"&gt;El
+    Salvador Dictatorship's Chivo wallet is spyware&lt;/a&gt;, it's a
+    proprietary program that breaks users' freedom and spies on people;
+    demands personal data such as the national ID number and does face
+    recognition, and it as bad security for its data. It also asks for
+    almost every malware permission in people's smart phones.&lt;/p&gt;
+
+    &lt;p&gt;The article criticizes it for faults in &ldquo;data
+    protection&rdquo;, though &lt;a href=""&gt;&ldquo;data protection&rdquo;
+    is the wrong approach to privacy anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202109210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -270,14 +286,6 @@
     affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202108240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Recent Samsung TVs have a back door with which Samsung can &lt;a
-    
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide"&gt;
-    brick them remotely&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -341,7 +349,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.325
retrieving revision 1.326
diff -u -b -r1.325 -r1.326
--- po/proprietary.it.po        12 Oct 2021 07:33:26 -0000      1.325
+++ po/proprietary.it.po        12 Oct 2021 08:33:49 -0000      1.326
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
 "Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -500,6 +500,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -528,13 +546,6 @@
 "attackers access to live feeds</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- po/proprietary.ja-diff.html 12 Oct 2021 07:33:26 -0000      1.314
+++ po/proprietary.ja-diff.html 12 Oct 2021 08:33:52 -0000      1.315
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -63,8 +63,8 @@
    color: #004caa;
    text-decoration: none;
 }
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -129,7 +129,8 @@
   &lt;li&gt;&lt;a href="/proprietary/malware-mobiles.html"&gt;Malware in 
mobile devices&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="/proprietary/malware-kindle-swindle.html"&gt;Malware 
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
 subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+      Swindle&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="/proprietary/malware-games.html"&gt;Malware in 
games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
 href="https://lists.gnu.org/mailman/listinfo/www-malware-commits"&gt;mailing 
list
 &lt;www-malware-commits@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
 
@@ -141,8 +142,7 @@
  &lt;tr&gt;
   &lt;td&gt;
    &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-appliances.html"&gt;Malware in 
appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -176,11 +176,11 @@
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
@@ -205,10 +205,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -242,6 +242,22 @@
     that can communicate with the company that made it.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202106250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/"&gt;El
+    Salvador Dictatorship's Chivo wallet is spyware&lt;/a&gt;, it's a
+    proprietary program that breaks users' freedom and spies on people;
+    demands personal data such as the national ID number and does face
+    recognition, and it as bad security for its data. It also asks for
+    almost every malware permission in people's smart phones.&lt;/p&gt;
+
+    &lt;p&gt;The article criticizes it for faults in &ldquo;data
+    protection&rdquo;, though &lt;a href=""&gt;&ldquo;data protection&rdquo;
+    is the wrong approach to privacy anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202109210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -275,14 +291,6 @@
     affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202108240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Recent Samsung TVs have a back door with which Samsung can &lt;a
-    
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide"&gt;
-    brick them remotely&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -346,7 +354,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.308
retrieving revision 1.309
diff -u -b -r1.308 -r1.309
--- po/proprietary.ja.po        12 Oct 2021 07:33:26 -0000      1.308
+++ po/proprietary.ja.po        12 Oct 2021 08:33:52 -0000      1.309
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
 "Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -358,6 +358,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -386,13 +404,6 @@
 "attackers access to live feeds</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"

Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- po/proprietary.nl-diff.html 12 Oct 2021 07:33:26 -0000      1.310
+++ po/proprietary.nl-diff.html 12 Oct 2021 08:33:52 -0000      1.311
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,17 +58,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -137,20 +137,20 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -237,6 +237,22 @@
     that can communicate with the company that made it.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202106250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/"&gt;El
+    Salvador Dictatorship's Chivo wallet is spyware&lt;/a&gt;, it's a
+    proprietary program that breaks users' freedom and spies on people;
+    demands personal data such as the national ID number and does face
+    recognition, and it as bad security for its data. It also asks for
+    almost every malware permission in people's smart phones.&lt;/p&gt;
+
+    &lt;p&gt;The article criticizes it for faults in &ldquo;data
+    protection&rdquo;, though &lt;a href=""&gt;&ldquo;data protection&rdquo;
+    is the wrong approach to privacy anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202109210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -270,14 +286,6 @@
     affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202108240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Recent Samsung TVs have a back door with which Samsung can &lt;a
-    
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide"&gt;
-    brick them remotely&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -341,7 +349,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- po/proprietary.nl.po        12 Oct 2021 07:33:26 -0000      1.299
+++ po/proprietary.nl.po        12 Oct 2021 08:33:52 -0000      1.300
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
 "Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -403,6 +403,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -431,13 +449,6 @@
 "attackers access to live feeds</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
 # | {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- po/proprietary.pl-diff.html 12 Oct 2021 07:33:26 -0000      1.326
+++ po/proprietary.pl-diff.html 12 Oct 2021 08:33:53 -0000      1.327
@@ -28,10 +28,10 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
 #about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -56,14 +56,14 @@
 #TOC ul { padding-top: .5em; margin: 0; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom: 
.5em; margin: 0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
 #TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration: 
none; }
 #TOC a:hover { text-decoration: underline;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
@@ -166,18 +166,18 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html"&gt;Conferencing&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -199,10 +199,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -236,6 +236,22 @@
     that can communicate with the company that made it.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202106250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/"&gt;El
+    Salvador Dictatorship's Chivo wallet is spyware&lt;/a&gt;, it's a
+    proprietary program that breaks users' freedom and spies on people;
+    demands personal data such as the national ID number and does face
+    recognition, and it as bad security for its data. It also asks for
+    almost every malware permission in people's smart phones.&lt;/p&gt;
+
+    &lt;p&gt;The article criticizes it for faults in &ldquo;data
+    protection&rdquo;, though &lt;a href=""&gt;&ldquo;data protection&rdquo;
+    is the wrong approach to privacy anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202109210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -269,14 +285,6 @@
     affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202108240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Recent Samsung TVs have a back door with which Samsung can &lt;a
-    
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide"&gt;
-    brick them remotely&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -340,7 +348,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- po/proprietary.pl.po        12 Oct 2021 07:33:26 -0000      1.291
+++ po/proprietary.pl.po        12 Oct 2021 08:33:53 -0000      1.292
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -584,6 +584,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -612,13 +630,6 @@
 "attackers access to live feeds</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.288
retrieving revision 1.289
diff -u -b -r1.288 -r1.289
--- po/proprietary.pot  12 Oct 2021 07:33:26 -0000      1.288
+++ po/proprietary.pot  12 Oct 2021 08:33:53 -0000      1.289
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
 "Language-Team: LANGUAGE <LL@li.org>\n"
@@ -295,6 +295,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a "
+"href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/\";>El
 "
+"Salvador Dictatorship's Chivo wallet is spyware</a>, it's a proprietary "
+"program that breaks users' freedom and spies on people; demands personal "
+"data such as the national ID number and does face recognition, and it as bad "
+"security for its data. It also asks for almost every malware permission in "
+"people's smart phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a "
 
"href=\"https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/\";>
 "
 "added a surveillance API (idle detection API)</a> which lets websites ask "
@@ -325,13 +343,6 @@
 "feeds</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a "
-"href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\";>
 "
-"brick them remotely</a>."
-msgstr ""
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr ""

Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.456
retrieving revision 1.457
diff -u -b -r1.456 -r1.457
--- po/proprietary.pt-br.po     12 Oct 2021 07:33:26 -0000      1.456
+++ po/proprietary.pt-br.po     12 Oct 2021 08:33:54 -0000      1.457
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2021-06-13 12:11-0300\n"
 "Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
 "Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -351,6 +351,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -379,16 +397,6 @@
 "attackers access to live feeds</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"As TVs Samsung recentes têm um <em>backdoor</em> com a qual a Samsung pode "
-"<a href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-";
-"tvs-worldwide\"> inutilizá-las remotamente </a>"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Mais itens…</a>"
@@ -464,6 +472,15 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-";
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "As TVs Samsung recentes têm um <em>backdoor</em> com a qual a Samsung "
+#~ "pode <a href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-";
+#~ "any-of-its-tvs-worldwide\"> inutilizá-las remotamente </a>"
+
+#~ msgid ""
 #~ "The Russian communications watchdog <a href=\"https://www.reuters.com/";
 #~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
 #~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.557
retrieving revision 1.558
diff -u -b -r1.557 -r1.558
--- po/proprietary.ru.po        12 Oct 2021 08:04:10 -0000      1.557
+++ po/proprietary.ru.po        12 Oct 2021 08:33:55 -0000      1.558
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2020-05-25 16:59+0000\n"
 "Last-Translator: Ineiev <ineiev@gnu.org>\n"
 "Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -363,6 +364,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -406,16 +425,6 @@
 "kalay-iot-bug-video-feeds/\">подвержены уязвимости, 
которая могла бы "
 "позволить злоумышленникам получить 
доступ к видеопотоку</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"В новых телевизорах Samsung есть черный ход, 
по которому Samsung <a href="
-"\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-";
-"worldwide\"> может их выводить из строя по 
сети</a>."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Далее...</a>"
@@ -493,6 +502,15 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-";
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "В новых телевизорах Samsung есть черный ход, 
по которому Samsung <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-";
+#~ "worldwide\"> может их выводить из строя по 
сети</a>."
+
+#~ msgid ""
 #~ "The Russian communications watchdog <a href=\"https://www.reuters.com/";
 #~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
 #~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "

Index: po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- po/proprietary.tr.po        12 Oct 2021 07:33:26 -0000      1.204
+++ po/proprietary.tr.po        12 Oct 2021 08:33:55 -0000      1.205
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2021-09-22 20:31+0200\n"
 "Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
 "Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -352,6 +352,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -390,16 +408,6 @@
 "bug-video-feeds/\">saldırganların canlı yayına erişmesini sağlayan bir "
 "güvenlik açığına sahip</a>."
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"Yeni Samsung TV'leri Samsung'un <a href=\"https://www.pcmag.com/news/samsung-";
-"can-remotely-disable-any-of-its-tvs-worldwide\">uzaktan onları "
-"durdurabileceği</a> bir arka kapısı var."
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">Daha fazlası&hellip;</a>"
@@ -481,6 +489,15 @@
 msgstr "Son Güncelleme:"
 
 #~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-";
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "Yeni Samsung TV'leri Samsung'un <a href=\"https://www.pcmag.com/news/";
+#~ "samsung-can-remotely-disable-any-of-its-tvs-worldwide\">uzaktan onları "
+#~ "durdurabileceği</a> bir arka kapısı var."
+
+#~ msgid ""
 #~ "The Russian communications watchdog <a href=\"https://www.reuters.com/";
 #~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
 #~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "

Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -b -r1.258 -r1.259
--- po/proprietary.zh-cn.po     12 Oct 2021 07:33:26 -0000      1.258
+++ po/proprietary.zh-cn.po     12 Oct 2021 08:33:55 -0000      1.259
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2021-10-11 16:14+0800\n"
 "Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
 "Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -331,6 +331,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -371,15 +389,6 @@
 "\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\";>一个安å…
¨æ¼æ´žè¢«æ”»å‡»"
 "者利用来访问现场视频</a>。"
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"最新的三星电视有个后门,三星可以用它 <a 
href=\"https://www.pcmag.com/news/";
-"samsung-can-remotely-disable-any-of-its-tvs-worldwide\">远程使电视变ç 
–</a>。"
-
 #. type: Content of: <div><p>
 msgid "<a href=\"/proprietary/all.html\">More items&hellip;</a>"
 msgstr "<a href=\"/proprietary/all.html\">更多内容&hellip;</a>"
@@ -455,6 +464,15 @@
 msgstr "最后更新:"
 
 #~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-";
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "最新的三星电视有个后门,三星可以用它 <a 
href=\"https://www.pcmag.com/news/";
+#~ 
"samsung-can-remotely-disable-any-of-its-tvs-worldwide\">远程使电视变ç 
–</"
+#~ "a>。"
+
+#~ msgid ""
 #~ "The Russian communications watchdog <a href=\"https://www.reuters.com/";
 #~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
 #~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "

Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- po/proprietary.zh-tw-diff.html      12 Oct 2021 07:33:26 -0000      1.289
+++ po/proprietary.zh-tw-diff.html      12 Oct 2021 08:33:55 -0000      1.290
@@ -29,9 +29,9 @@
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
 <span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size: 
1.1em; font-style: italic; }
-table#TOC {
-   display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%; width: max-content;
    overflow: auto;
    border: .2em solid #e0dfda;
@@ -58,17 +58,17 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span> 
list-style: none; <span class="removed"><del><strong>margin-bottom: 
1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
  #skiplinks a, #skiplinks a:visited {
    color: #004caa;
    text-decoration: none;
 }
 #TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC a:hover { text-decoration: underline; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
   .reduced-width { width: 55em; }
@@ -137,19 +137,19 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul class="columns"&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+   &lt;ul class="columns"&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html"&gt;Fraud&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-obsolescence.html"&gt;Obsolescence&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
@@ -200,10 +200,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -238,6 +238,22 @@
     that can communicate with the company that made it.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M202106250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/"&gt;El
+    Salvador Dictatorship's Chivo wallet is spyware&lt;/a&gt;, it's a
+    proprietary program that breaks users' freedom and spies on people;
+    demands personal data such as the national ID number and does face
+    recognition, and it as bad security for its data. It also asks for
+    almost every malware permission in people's smart phones.&lt;/p&gt;
+
+    &lt;p&gt;The article criticizes it for faults in &ldquo;data
+    protection&rdquo;, though &lt;a href=""&gt;&ldquo;data protection&rdquo;
+    is the wrong approach to privacy anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M202109210"&gt;
     &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
     --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
@@ -271,14 +287,6 @@
     affected by a security vulnerability that could give attackers access
     to live feeds&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M202108240"&gt;
-    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-08&lt;/small&gt;'
-    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
-    &lt;p&gt;Recent Samsung TVs have a back door with which Samsung can &lt;a
-    
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide"&gt;
-    brick them remotely&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;
 &lt;p class="button right-align"&gt;
 &lt;a href="/proprietary/all.html"&gt;More items&hellip;&lt;/a&gt;&lt;/p&gt;
@@ -342,7 +350,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:55 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- po/proprietary.zh-tw.po     12 Oct 2021 07:33:26 -0000      1.278
+++ po/proprietary.zh-tw.po     12 Oct 2021 08:33:56 -0000      1.279
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
 "PO-Revision-Date: 2020-02-08 17:12+0800\n"
 "Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
 "Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -473,6 +473,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -501,13 +519,6 @@
 "attackers access to live feeds</a>."
 msgstr ""
 
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://";
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
 #. type: Content of: <div><p>
 # | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
 # | devices</a>-] {+href=\"/proprietary/all.html\">More items&hellip;</a>+}

Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.426
retrieving revision 1.427
diff -u -b -r1.426 -r1.427
--- po/pt-br.po 12 Oct 2021 07:33:26 -0000      1.426
+++ po/pt-br.po 12 Oct 2021 08:33:56 -0000      1.427
@@ -523,6 +523,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.717
retrieving revision 1.718
diff -u -b -r1.717 -r1.718
--- po/ru.po    12 Oct 2021 07:50:10 -0000      1.717
+++ po/ru.po    12 Oct 2021 08:33:56 -0000      1.718
@@ -515,12 +515,12 @@
 "does not like</a>. In phones sold in Europe, Xiaomi leaves this deactivated "
 "by default, but has a back door to activate the censorship."
 msgstr ""
-"В некоторых телефоны Xiaomi <a 
href=\"https://www.theguardian.com/world/2021/sep/22/";
-"lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns"
-"\">есть вредоносная функция запикивания 
фраз, выражающих политические "
-"взгляды, которые не по нраву Китаю</a>. В 
телефонах, продаваемых в Европе, "
-"Xiaomi оставляет это изначально выключенным, 
но у компании есть черный ход, "
-"чтобы включить цензуру."
+"В некоторых телефоны Xiaomi <a 
href=\"https://www.theguardian.com/world/2021/";
+"sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-"
+"concerns\">есть вредоносная функция 
запикивания фраз, выражающих "
+"политические взгляды, которые не по нраву 
Китаю</a>. В телефонах, "
+"продаваемых в Европе, Xiaomi оставляет это 
изначально выключенным, но у "
+"компании есть черный ход, чтобы включить 
цензуру."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
@@ -532,6 +532,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- po/tr.po    12 Oct 2021 07:33:26 -0000      1.222
+++ po/tr.po    12 Oct 2021 08:33:56 -0000      1.223
@@ -429,6 +429,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/zh-cn.po 12 Oct 2021 07:33:27 -0000      1.224
+++ po/zh-cn.po 12 Oct 2021 08:33:56 -0000      1.225
@@ -429,6 +429,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "

Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/zh-tw.po 12 Oct 2021 07:33:27 -0000      1.342
+++ po/zh-tw.po 12 Oct 2021 08:33:56 -0000      1.343
@@ -454,6 +454,24 @@
 
 #. type: Content of: <div><ul><li><p>
 msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-";
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in &ldquo;data protection&rdquo;, "
+"though <a href=\"\">&ldquo;data protection&rdquo; is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
 "Google's proprietary Chrome web browser <a href=\"https://www.techrepublic.";
 "com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
 "\"> added a surveillance API (idle detection API)</a> which lets websites "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]