trans-coord-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

trans-coord/gnun/philosophy free-sw.html right-...


From: Yavor Doganov
Subject: trans-coord/gnun/philosophy free-sw.html right-...
Date: Tue, 27 Oct 2009 18:10:12 +0000

CVSROOT:        /sources/trans-coord
Module name:    trans-coord
Changes by:     Yavor Doganov <yavor>   09/10/27 18:10:12

Modified files:
        gnun/philosophy: free-sw.html right-to-read.html why-free.html 
                         words-to-avoid.html 

Log message:
        Automatic sync from the master www repository.

CVSWeb URLs:
http://cvs.savannah.gnu.org/viewcvs/trans-coord/gnun/philosophy/free-sw.html?cvsroot=trans-coord&r1=1.14&r2=1.15
http://cvs.savannah.gnu.org/viewcvs/trans-coord/gnun/philosophy/right-to-read.html?cvsroot=trans-coord&r1=1.10&r2=1.11
http://cvs.savannah.gnu.org/viewcvs/trans-coord/gnun/philosophy/why-free.html?cvsroot=trans-coord&r1=1.14&r2=1.15
http://cvs.savannah.gnu.org/viewcvs/trans-coord/gnun/philosophy/words-to-avoid.html?cvsroot=trans-coord&r1=1.17&r2=1.18

Patches:
Index: free-sw.html
===================================================================
RCS file: /sources/trans-coord/trans-coord/gnun/philosophy/free-sw.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- free-sw.html        12 Sep 2009 18:10:08 -0000      1.14
+++ free-sw.html        27 Oct 2009 18:10:10 -0000      1.15
@@ -99,7 +99,8 @@
 a practice known as &ldquo;tivoization&rdquo; or (through
 blacklisting) as &ldquo;secure boot&rdquo; &mdash; freedom 1 becomes a
 theoretical fiction rather than a practical freedom.  This is not
-sufficient.
+sufficient.  In other words, these binaries are not free software
+even if the source code they are compiled from is free.
 </p>
 
 <p>
@@ -397,7 +398,7 @@
 <p>
 Updated:
 <!-- timestamp start -->
-$Date: 2009/09/12 18:10:08 $
+$Date: 2009/10/27 18:10:10 $
 <!-- timestamp end -->
 </p>
 </div>

Index: right-to-read.html
===================================================================
RCS file: /sources/trans-coord/trans-coord/gnun/philosophy/right-to-read.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- right-to-read.html  20 Oct 2009 18:10:12 -0000      1.10
+++ right-to-read.html  27 Oct 2009 18:10:10 -0000      1.11
@@ -12,9 +12,9 @@
 2).</em></p>
 
 <blockquote><p>
-            (from &ldquo;The Road To Tycho&rdquo;, a collection of
+            From <cite>The Road To Tycho</cite>, a collection of
             articles about the antecedents of the Lunarian
-            Revolution, published in Luna City in 2096)
+            Revolution, published in Luna City in 2096.
 </p></blockquote>
 
 <p>
@@ -48,7 +48,7 @@
 came from a middle-class family and could hardly afford the tuition,
 let alone her reading fees.  Reading his books might be the only way
 she could graduate.  He understood this situation; he himself had had
-to borrow to pay for all the research papers he read.  (10% of those
+to borrow to pay for all the research papers he read.  (Ten percent of those
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)</p>
@@ -154,7 +154,7 @@
 take 50 years for our present way of life to fade into obscurity, most
 of the specific laws and practices described above have already been
 proposed; many have been enacted into law in the US and elsewhere.  In
-the US, the 1998 Digital Millenium Copyright Act established the legal
+the US, the 1998 Digital Millenium Copyright Act (DMCA) established the legal
 basis to restrict the reading and lending of computerized books (and
 other works as well).  The European Union imposed similar restrictions
 in a 2001 copyright directive.  In France, under the DADVSI law
@@ -181,7 +181,7 @@
 
 <p>
 In 2001 the US began attempting to use the proposed Free Trade Area of
-the Americas treaty to impose the same rules on all the countries in
+the Americas (FTAA) treaty to impose the same rules on all the countries in
 the Western Hemisphere.  The FTAA is one of the so-called &ldquo;free
 trade&rdquo; treaties, which are actually designed to give business
 increased power over democratic governments; imposing laws like the
@@ -192,11 +192,10 @@
 <p>
 Since then, the US has imposed similar requirements on countries such
 as Australia and Mexico through bilateral &ldquo;free trade&rdquo;
-agreements, and on countries such as Costa Rica through CAFTA.
-Ecuador's President Correa refused to sign the &ldquo;free
-trade&rdquo; agreement, but Ecuador had adopted something like the
-DMCA in 2003.  Ecuador's new constitution may provide an opportunity
-to get rid of it.</p>
+agreements, and on countries such as Costa Rica through another
+treaty, CAFTA.  Ecuador's President Correa refused to sign a
+&ldquo;free trade&rdquo; agreement with the US, but I've heard Ecuador
+had adopted something like the DMCA in 2003.</p>
 
 <p>
 One of the ideas in the story was not proposed in reality until 2002.
@@ -206,14 +205,14 @@
 
 <p>
 The proponents of this scheme have given it names such as
-&ldquo;trusted computing&rdquo; and &ldquo;palladium&rdquo;.  We call
+&ldquo;trusted computing&rdquo; and &ldquo;Palladium&rdquo;.  We call
 it <a href="/philosophy/can-you-trust.html">&ldquo;treacherous
-computing&rdquo;</a>, because the effect is to make your computer obey
-companies instead of you.  This was implemented in 2007 as part
-of <a href="http://badvista.org/";>Windows Vista</a>; we expect Apple
-to do something similar.  In this scheme, it is the manufacturer that
-keeps the secret code, but the <abbr>FBI</abbr> would have little
-trouble getting it.</p>
+computing&rdquo;</a> because the effect is to make your computer obey
+companies even to the extent of disobeying and defying you.  This was
+implemented in 2007 as part of <a href="http://badvista.org/";>Windows
+Vista</a>; we expect Apple to do something similar.  In this scheme,
+it is the manufacturer that keeps the secret code, but
+the <abbr>FBI</abbr> would have little trouble getting it.</p>
 
 <p>
 What Microsoft keeps is not exactly a password in the traditional
@@ -227,30 +226,33 @@
 Vista also gives Microsoft additional powers; for instance, Microsoft
 can forcibly install upgrades, and it can order all machines running
 Vista to refuse to run a certain device driver.  The main purpose of
-Vista's many restrictions is to make DRM that users can't overcome.</p>
+Vista's many restrictions is to impose DRM (Digital Restrictions
+Management) that users can't overcome.  The threat of DRM is why we
+have established the <a href="http://DefectiveByDesign.org";>
+DefectiveByDesign.org</a> campaign.</p>
+
+<p>
+When this story was first written, the SPA was threatening small
+Internet service providers, demanding they permit the SPA to monitor
+all users.  Most ISPs surrendered when threatened, because they cannot
+afford to fight back in court.  One ISP, Community ConneXion in
+Oakland, California, refused the demand and was actually sued.  The
+SPA later dropped the suit, but obtained the DMCA, which gave them the
+power they sought.</p>
 
 <p>
 The SPA, which actually stands for Software Publisher's Association,
-has been replaced in this police-like role by the BSA or Business
-Software Alliance.  It is not, today, an official police force;
+has been replaced in its police-like role by the Business
+Software Alliance.  The BSA is not, today, an official police force;
 unofficially, it acts like one.  Using methods reminiscent of the
 erstwhile Soviet Union, it invites people to inform on their coworkers
 and friends.  A BSA terror campaign in Argentina in 2001 made
-slightly-veiled threats that people sharing software would be raped.</p>
-
-<p>
-When this story was first written, the SPA was threatening small
-Internet service providers, demanding they permit the SPA to monitor
-all users.  Most ISPs surrendered when threatened, because they cannot
-afford to fight back in court.  (Atlanta Journal-Constitution, 1 Oct
-96, D3.)  At least one ISP, Community ConneXion in Oakland CA, refused
-the demand and was actually sued.  The SPA later dropped the suit, but
-obtained the DMCA which gave them the power they sought.</p>
+slightly veiled threats that people sharing software would be raped.</p>
 
 <p>
 The university security policies described above are not imaginary.
-For example, a computer at one Chicago-area university prints this
-message when you log in (quotation marks are in the original):</p>
+For example, a computer at one Chicago-area university displayed this
+message upon login:</p>
 
 <blockquote><p>
 This system is for the use of authorized users only.  Individuals using
@@ -358,7 +360,7 @@
 <p>
 Updated:
 <!-- timestamp start -->
-$Date: 2009/10/20 18:10:12 $
+$Date: 2009/10/27 18:10:10 $
 <!-- timestamp end -->
 </p>
 </div>

Index: why-free.html
===================================================================
RCS file: /sources/trans-coord/trans-coord/gnun/philosophy/why-free.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- why-free.html       18 Oct 2009 18:10:10 -0000      1.14
+++ why-free.html       27 Oct 2009 18:10:10 -0000      1.15
@@ -260,19 +260,6 @@
 features I would otherwise have considered highest priority.</p>
 
 <p>
-The <a href="/fsf/fsf.html">Free Software Foundation (FSF)</a>, a
-tax-exempt charity for free software development, raises funds by
-<a href="http://order.fsf.org/";>selling</a>
-GNU
-<a href="/software/software.html">CD-ROMs</a>,
-<a href="http://order.fsf.org/";>T-shirts</a>,
-<a href="/doc/doc.html">manuals</a>, and
-<a href="http://order.fsf.org/";>deluxe distributions</a>,
-(all of which users are free to copy and change), as well as from
-<a href="http://donate.fsf.org/";>donations</a>.  It now has a staff of five
-programmers, plus three employees who handle mail orders.</p>
-
-<p>
 Some free software developers make money by selling support services.
 In 1994, Cygnus Support, with around 50 employees, estimated that
 about 15 per cent of its staff activity was free software
@@ -345,7 +332,7 @@
 </p>
 
 <p>
-Copyright &copy; 1994, 2008 Richard Stallman
+Copyright &copy; 1994, 2009 Richard Stallman
 <br />
 Verbatim copying and distribution of this entire article is
 permitted in any medium without royalty provided this notice is 
@@ -355,7 +342,7 @@
 <p>
 Updated:
 <!-- timestamp start -->
-$Date: 2009/10/18 18:10:10 $
+$Date: 2009/10/27 18:10:10 $
 <!-- timestamp end -->
 </p>
 </div>

Index: words-to-avoid.html
===================================================================
RCS file: /sources/trans-coord/trans-coord/gnun/philosophy/words-to-avoid.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- words-to-avoid.html 6 Oct 2009 18:10:10 -0000       1.17
+++ words-to-avoid.html 27 Oct 2009 18:10:10 -0000      1.18
@@ -180,29 +180,29 @@
 <h4 id="Consumer">&ldquo;Consumer&rdquo;</h4>
 <p>
 The term &ldquo;consumer,&rdquo; when used to refer to computer users,
-is loaded with assumptions we should reject.</p>
+is loaded with assumptions we should reject.  Playing a digital
+recording, or running a program, does not consume it.
 <p>
-The terms &ldquo;producer&rdquo; and
-&ldquo;consumer&rdquo; come from economic theory, and presuppose
-the assumptions and narrow prespective of economic theory.
-That warps your thinking.</p>
+The terms &ldquo;producer&rdquo; and &ldquo;consumer&rdquo; come from
+economic theory, and bring with them its narrow prespective and
+misguided assumotions.  They tend to warp your thinking.</p>
 <p>
 In addition, describing the users of software as &ldquo;consumers&rdquo;
-presumes a narrow role for them.  It treats them like cattle that
+presumes a narrow role for them: it regards them as cattle that
 passively graze on what others make available to them.</p>
 <p>
 This kind of thinking leads to travesties like the CBDTPA
 &ldquo;Consumer Broadband and Digital Television Promotion Act&rdquo;
 which would require copying restriction facilities in every digital
-device.  If all the users do is &ldquo;consume&rdquo;, then why should
+device.  If all the users do is &ldquo;consume,&rdquo; then why should
 they mind?</p>
 <p>
-The narrow economic conception of users as &ldquo;consumers&rdquo; tends
-to go hand in hand with the idea that published works are
+The shallow economic conception of users as &ldquo;consumers&rdquo; tends
+to go hand in hand with the idea that published works are mere
 &ldquo;content.&rdquo;</p>
 <p>
-To describe people who are not limited to passive consumption on their
-computers, we suggest terms such as &ldquo;individuals&rdquo; and
+To describe people who are not limited to passive use of works, we
+suggest terms such as &ldquo;individuals&rdquo; and
 &ldquo;citizens&rdquo;.</p>
 
 
@@ -686,7 +686,7 @@
 <p>
 Updated:
 <!-- timestamp start -->
-$Date: 2009/10/06 18:10:10 $
+$Date: 2009/10/27 18:10:10 $
 <!-- timestamp end -->
 </p>
 </div>




reply via email to

[Prev in Thread] Current Thread [Next in Thread]