www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www people/po/people.de.po people/po/people.es....


From: GNUN
Subject: www people/po/people.de.po people/po/people.es....
Date: Sun, 11 Nov 2012 01:28:24 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     12/11/11 01:28:24

Modified files:
        people/po      : people.de.po people.es.po people.pot 
        philosophy     : right-to-read.ca.html right-to-read.ko.html 
Added files:
        philosophy/po  : right-to-read.ca-diff.html 
                         right-to-read.ko-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/people/po/people.de.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/people/po/people.es.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/people/po/people.pot?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.ca.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.ko.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ca-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ko-diff.html?cvsroot=www&rev=1.1

Patches:
Index: people/po/people.de.po
===================================================================
RCS file: /web/www/www/people/po/people.de.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- people/po/people.de.po      6 Oct 2012 16:28:57 -0000       1.68
+++ people/po/people.de.po      11 Nov 2012 01:28:23 -0000      1.69
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: people.html\n"
-"POT-Creation-Date: 2012-09-28 04:25-0300\n"
+"POT-Creation-Date: 2012-11-10 20:25-0500\n"
 "PO-Revision-Date: 2012-10-04 17:00+0200\n"
 "Last-Translator: Joerg Kohne <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"Outdated-Since: 2012-11-10 20:25-0500\n"
 
 #. type: Content of: <title>
 msgid "GNU's Who - GNU Project - Free Software Foundation"
@@ -1295,6 +1296,18 @@
 msgstr "F"
 
 #. type: Content of: <h4>
+msgid "Fabio Gonzalez"
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
+"Current maintainer of <a href=\"/software/fcrypt\">GNU fcrypt</a> and <a "
+"href=\"/\">gnu.org</a> webmaster. He supports both the GNU philosophy and "
+"the free software movement. He also supports all personal visions that he "
+"read from <a href=\"http://stallman.org\";>Richard Stallman</a>."
+msgstr ""
+
+#. type: Content of: <h4>
 msgid "Filippo Rusconi"
 msgstr "Filippo Rusconi"
 
@@ -3189,9 +3202,13 @@
 "Raif S. Naffah <a href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a>"
 
 #. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Is the maintainer, and one of the authors, of <a href=\"/software/"
+#| "classpathx/crypto/\">GNU Crypto</a>."
 msgid ""
-"Is the maintainer, and one of the authors, of <a href=\"/software/classpathx/"
-"crypto/\">GNU Crypto</a>."
+"Is the maintainer, and one of the authors, of <a href=\"/software/gnu-crypto/"
+"\">GNU Crypto</a>."
 msgstr ""
 "Projektverwalter und einer der Autoren von <a href=\"/software/classpathx/"
 "crypto/\">GNU Crypto</a>."

Index: people/po/people.es.po
===================================================================
RCS file: /web/www/www/people/po/people.es.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- people/po/people.es.po      9 Nov 2012 01:26:12 -0000       1.110
+++ people/po/people.es.po      11 Nov 2012 01:28:23 -0000      1.111
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: people.es\n"
-"POT-Creation-Date: 2012-09-28 04:25-0300\n"
+"POT-Creation-Date: 2012-11-10 20:25-0500\n"
 "PO-Revision-Date: 2012-09-29 08:04+0100\n"
 "Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"Outdated-Since: 2012-11-10 20:25-0500\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Poedit-Language: Spanish\n"
 "X-Poedit-SourceCharset: utf-8\n"
@@ -1474,6 +1475,18 @@
 msgid "F"
 msgstr "F"
 
+#. type: Content of: <h4>
+msgid "Fabio Gonzalez"
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
+"Current maintainer of <a href=\"/software/fcrypt\">GNU fcrypt</a> and <a "
+"href=\"/\">gnu.org</a> webmaster. He supports both the GNU philosophy and "
+"the free software movement. He also supports all personal visions that he "
+"read from <a href=\"http://stallman.org\";>Richard Stallman</a>."
+msgstr ""
+
 # type: Content of: <h4>
 #. type: Content of: <h4>
 msgid "Filippo Rusconi"
@@ -3622,9 +3635,16 @@
 
 # type: Content of: <p>
 #. type: Content of: <p>
+# | Is the maintainer, and one of the authors, of <a
+# | [-href=\"/software/classpathx/crypto/\">GNU-]
+# | {+href=\"/software/gnu-crypto/\">GNU+} Crypto</a>.
+#, fuzzy
+#| msgid ""
+#| "Is the maintainer, and one of the authors, of <a href=\"/software/"
+#| "classpathx/crypto/\">GNU Crypto</a>."
 msgid ""
-"Is the maintainer, and one of the authors, of <a href=\"/software/classpathx/"
-"crypto/\">GNU Crypto</a>."
+"Is the maintainer, and one of the authors, of <a href=\"/software/gnu-crypto/"
+"\">GNU Crypto</a>."
 msgstr ""
 "Es el encargado de mantener, y uno de los autores, de <a href=\"/software/"
 "classpathx/crypto/\">Crypto de GNU</a>."

Index: people/po/people.pot
===================================================================
RCS file: /web/www/www/people/po/people.pot,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- people/po/people.pot        28 Sep 2012 08:29:11 -0000      1.88
+++ people/po/people.pot        11 Nov 2012 01:28:23 -0000      1.89
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: people.html\n"
-"POT-Creation-Date: 2012-09-28 04:25-0300\n"
+"POT-Creation-Date: 2012-11-10 20:25-0500\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1001,6 +1001,18 @@
 msgstr ""
 
 #. type: Content of: <h4>
+msgid "Fabio Gonzalez"
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
+"Current maintainer of <a href=\"/software/fcrypt\">GNU fcrypt</a> and <a "
+"href=\"/\">gnu.org</a> webmaster. He supports both the GNU philosophy and "
+"the free software movement. He also supports all personal visions that he "
+"read from <a href=\"http://stallman.org\";>Richard Stallman</a>."
+msgstr ""
+
+#. type: Content of: <h4>
 msgid "Filippo Rusconi"
 msgstr ""
 
@@ -2460,7 +2472,7 @@
 #. type: Content of: <p>
 msgid ""
 "Is the maintainer, and one of the authors, of <a "
-"href=\"/software/classpathx/crypto/\">GNU Crypto</a>."
+"href=\"/software/gnu-crypto/\">GNU Crypto</a>."
 msgstr ""
 
 #. type: Content of: <h4>

Index: philosophy/right-to-read.ca.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.ca.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- philosophy/right-to-read.ca.html    16 Sep 2012 05:28:25 -0000      1.14
+++ philosophy/right-to-read.ca.html    11 Nov 2012 01:28:23 -0000      1.15
@@ -5,6 +5,13 @@
 <title>El dret a llegir - Projecte GNU - Free Software Foundation (FSF)</title>
 
 <!--#include virtual="/server/banner.ca.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="http://www.gnu.org/philosophy/po/right-to-read.ca.po";>
+ http://www.gnu.org/philosophy/po/right-to-read.ca.po</a>' -->
+ <!--#set var="ORIGINAL_FILE" value="/philosophy/right-to-read.html" -->
+ <!--#set var="DIFF_FILE" value="/philosophy/po/right-to-read.ca-diff.html" -->
+ <!--#set var="OUTDATED_SINCE" value="2012-09-11" -->
+ <!--#include virtual="/server/outdated.ca.html" -->
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <h2>El dret a llegir</h2>
 
@@ -413,7 +420,7 @@
 <!-- timestamp start -->
 Updated:
 
-$Date: 2012/09/16 05:28:25 $
+$Date: 2012/11/11 01:28:23 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/right-to-read.ko.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.ko.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- philosophy/right-to-read.ko.html    16 Sep 2012 05:28:26 -0000      1.19
+++ philosophy/right-to-read.ko.html    11 Nov 2012 01:28:23 -0000      1.20
@@ -5,6 +5,13 @@
 <title>읽을 권리 - GNU 프로젝트 - 자유 소프트웨어 재단 
(FSF)</title>
 
 <!--#include virtual="/server/banner.ko.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="http://www.gnu.org/philosophy/po/right-to-read.ko.po";>
+ http://www.gnu.org/philosophy/po/right-to-read.ko.po</a>' -->
+ <!--#set var="ORIGINAL_FILE" value="/philosophy/right-to-read.html" -->
+ <!--#set var="DIFF_FILE" value="/philosophy/po/right-to-read.ko-diff.html" -->
+ <!--#set var="OUTDATED_SINCE" value="2012-09-11" -->
+ <!--#include virtual="/server/outdated.ko.html" -->
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <h2>읽을 권리</h2>
 
@@ -310,7 +317,7 @@
 <!-- timestamp start -->
 최종 수정일:
 
-$Date: 2012/09/16 05:28:26 $
+$Date: 2012/11/11 01:28:23 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/right-to-read.ca-diff.html
===================================================================
RCS file: philosophy/po/right-to-read.ca-diff.html
diff -N philosophy/po/right-to-read.ca-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/right-to-read.ca-diff.html    11 Nov 2012 01:28:24 -0000      
1.1
@@ -0,0 +1,404 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/right-to-read.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;title&gt;The Right to Read - GNU Project - Free Software Foundation 
(FSF)&lt;/title&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;!--#include virtual="/philosophy/po/right-to-read.translist" --&gt;
+&lt;h2&gt;The Right to Read&lt;/h2&gt;
+
+&lt;p&gt;
+by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard 
Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
+
+&lt;div style="text-align: center; font-size: 110%;text-shadow: 0 0 0.2em 
#fff; width: 300px; float: right; margin: 12px; background-color: #a0f112; 
color: #353831; padding: 1em;"&gt;&lt;a 
href="http://defectivebydesign.org/ebooks.html"&gt;Join our mailing list about 
the dangers of eBooks&lt;/a&gt;.&lt;/div&gt;
+
+&lt;p&gt;
+&lt;em&gt;This article appeared in the February 1997 issue
+of &lt;strong&gt;Communications of the ACM&lt;/strong&gt; (Volume 40, Number
+2).&lt;/em&gt;&lt;/p&gt;
+
+&lt;blockquote&gt;&lt;p&gt;
+            From &lt;cite&gt;The Road To Tycho&lt;/cite&gt;, a collection of
+            articles about the antecedents of the Lunarian
+            Revolution, published in Luna City in 2096.
+&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;p&gt;
+For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
+Lenz asked to borrow his computer.  Hers had broken down, and unless
+she could borrow another, she would fail her midterm project.  There
+was no one she dared ask, except Dan.&lt;/p&gt;
+
+&lt;p&gt;
+This put Dan in a dilemma.  He had to help her&mdash;but if he lent
+her his computer, she might read his books.  Aside from the fact that
+you could go to prison for many years for letting someone else read
+your books, the very idea shocked him at first.  Like everyone, he had
+been taught since elementary school that sharing books was nasty and
+wrong&mdash;something that only pirates would do.&lt;/p&gt;
+
+&lt;p&gt;
+And there wasn't much chance that the SPA&mdash;the Software
+Protection Authority&mdash;would fail to catch him.  In his software
+class, Dan had learned that each book had a copyright monitor that
+reported when and where it was read, and by whom, to Central
+Licensing.  (They used this information to catch reading pirates, but
+also to sell personal interest profiles to retailers.)  The next time
+his computer was networked, Central Licensing would find out.  He, as
+computer owner, would receive the harshest punishment&mdash;for not
+taking pains to prevent the crime.&lt;/p&gt;
+
+&lt;p&gt;
+Of course, Lissa did not necessarily intend to read his books.  She
+might want the computer only to write her midterm.  But Dan knew she
+came from a middle-class family and could hardly afford the tuition,
+let alone her reading fees.  Reading his books might be the only way
+she could graduate.  He understood this situation; he himself had had
+to borrow to pay for all the research papers he read.  (Ten percent of those
+fees went to the researchers who wrote the papers; since Dan aimed for
+an academic career, he could hope that his own research papers, if
+frequently referenced, would bring in enough to repay this loan.)&lt;/p&gt;
+
+&lt;p&gt;
+Later on, Dan would learn there was a time when anyone could go to the
+library and read journal articles, and even books, without having to
+pay.  There were independent scholars who read thousands of pages
+without government library grants.  But in the 1990s, both commercial
+and nonprofit journal publishers had begun charging fees for access.
+By 2047, libraries offering free public access to scholarly literature
+were a dim memory.&lt;/p&gt;
+
+&lt;p&gt;
+There were ways, of course, to get around the SPA and Central
+Licensing.  They were themselves illegal.  Dan had had a classmate in
+software, Frank Martucci, who had obtained an illicit debugging tool,
+and used it to skip over the copyright monitor code when reading
+books.  But he had told too many friends about it, and one of them
+turned him in to the SPA for a reward (students deep in debt were
+easily tempted into betrayal).  In 2047, Frank was in prison, not for
+pirate reading, but for possessing a debugger.&lt;/p&gt;
+
+&lt;p&gt;
+Dan would later learn that there was a time when anyone could have
+debugging tools.  There were even free debugging tools available on CD
+or downloadable over the net.  But ordinary users started using them
+to bypass copyright monitors, and eventually a judge ruled that this
+had become their principal use in actual practice.  This meant they
+were illegal; the debuggers' developers were sent to prison.&lt;/p&gt;
+
+&lt;p&gt;
+Programmers still needed debugging tools, of course, but debugger
+vendors in 2047 distributed numbered copies only, and only to
+officially licensed and bonded programmers.  The debugger Dan used in
+software class was kept behind a special firewall so that it could be
+used only for class exercises.&lt;/p&gt;
+
+&lt;p&gt;
+It was also possible to bypass the copyright monitors by installing a
+modified system kernel.  Dan would eventually find out about the free
+kernels, even entire free operating systems, that had existed around
+the turn of the century.  But not only were they illegal, like
+debuggers&mdash;you could not install one if you had one, without
+knowing your computer's root password.  And neither
+the &lt;abbr title="Federal Bureau of Investigation"&gt;FBI&lt;/abbr&gt; nor
+Microsoft Support would tell you that.&lt;/p&gt;
+
+&lt;p&gt;
+Dan concluded that he couldn't simply lend Lissa his computer.  But he
+couldn't refuse to help her, because he loved her.  Every chance to
+speak with her filled him with delight.  And that she chose him to ask
+for help, that could mean she loved him too.&lt;/p&gt;
+
+&lt;p&gt;
+Dan resolved the dilemma by doing something even more
+unthinkable&mdash;he lent her the computer, and told her his password.
+This way, if Lissa read his books, Central Licensing would think he
+was reading them.  It was still a crime, but the SPA would not
+automatically find out about it.  They would only find out if Lissa
+reported him.&lt;/p&gt;
+
+&lt;p&gt;
+Of course, if the school ever found out that he had given Lissa his
+own password, it would be curtains for both of them as students,
+regardless of what she had used it for.  School policy was that any
+interference with their means of monitoring students' computer use was
+grounds for disciplinary action.  It didn't matter whether you did
+anything harmful&mdash;the offense was making it hard for the
+administrators to check on you.  They assumed this meant you were
+doing something else forbidden, and they did not need to know what it
+was.&lt;/p&gt;
+
+&lt;p&gt;
+Students were not usually expelled for this&mdash;not directly.
+Instead they were banned from the school computer systems, and would
+inevitably fail all their classes.&lt;/p&gt;
+
+&lt;p&gt;
+Later, Dan would learn that this kind of university policy started
+only in the 1980s, when university students in large numbers began
+using computers.  Previously, universities maintained a different
+approach to student discipline; they punished activities that were
+harmful, not those that merely raised suspicion.&lt;/p&gt;
+
+&lt;p&gt;
+Lissa did not report Dan to the SPA.  His decision to help her led to
+their marriage, and also led them to question what they had been
+taught about piracy as children.  The couple began reading about the
+history of copyright, about the Soviet Union and its restrictions on
+copying, and even the original United States Constitution.  They moved
+to Luna, where they found others who had likewise gravitated away from
+the long arm of the SPA.  When the Tycho Uprising began in 2062, the
+universal right to read soon became one of its central aims.&lt;/p&gt;
+
+
+&lt;h3 id="AuthorsNote"&gt;Author's Note&lt;/h3&gt;
+
+&lt;p&gt;[This note has been updated several times since the first
+publication of the story.]&lt;/p&gt;
+
+&lt;p&gt;
+The right to read is a battle being fought today.  Although it may
+take 50 years for our present way of life to fade into obscurity, most
+of the specific laws and practices described above have already been
+proposed; many have been enacted into law in the US and elsewhere.  In
+the US, the 1998 Digital Millennium Copyright Act (DMCA) established the legal
+basis to restrict the reading and lending of computerized books (and
+other works as well).  The European Union imposed similar restrictions
+in a 2001 copyright directive.  In France, under the DADVSI law
+adopted in 2006, mere possession of a copy of DeCSS, the free program
+to decrypt video on a DVD, is a crime.&lt;/p&gt;
+
+&lt;p&gt;
+In 2001, Disney-funded Senator Hollings proposed a bill called the
+SSSCA that would require every new computer to have mandatory
+copy-restriction facilities that the user cannot bypass.  Following
+the Clipper chip and similar US government key-escrow proposals, this
+shows a long-term trend: computer systems are increasingly set up to
+give absentees with clout control over the people actually using the
+computer system.  The SSSCA was later renamed to the unpronounceable
+CBDTPA, which was glossed as the &ldquo;Consume But Don't Try
+Programming Act&rdquo;.
+&lt;/p&gt;
+
+&lt;p&gt;
+The Republicans took control of the US senate shortly thereafter.
+They are less tied to Hollywood than the Democrats, so they did not
+press these proposals.  Now that the Democrats are back in control,
+the danger is once again higher.&lt;/p&gt;
+
+&lt;p&gt;
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere.  The FTAA is one of the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit.  The FTAA was effectively killed by
+Lula, President of Brazil, who rejected the DMCA requirement and
+others.&lt;/p&gt;
+
+&lt;p&gt;
+Since then, the US has imposed similar requirements on countries such
+as Australia and Mexico through bilateral &ldquo;free trade&rdquo;
+agreements, and on countries such as Costa Rica through another
+treaty, CAFTA.  Ecuador's President Correa refused to sign a
+&ldquo;free trade&rdquo; agreement with the US, but I've heard Ecuador
+had adopted something like the DMCA in 2003.&lt;/p&gt;
+
+&lt;p&gt;
+One of the ideas in the story was not proposed in reality until 2002.
+This is the idea that the &lt;abbr&gt;FBI&lt;/abbr&gt; and Microsoft will keep 
the
+root passwords for your personal computers, and not let you have
+them.&lt;/p&gt;
+
+&lt;p&gt;
+The proponents of this scheme have given it names such as
+&ldquo;trusted computing&rdquo; and &ldquo;Palladium&rdquo;.  We call
+it &lt;a href="/philosophy/can-you-trust.html"&gt;&ldquo;treacherous
+computing&rdquo;&lt;/a&gt; because the effect is to make your computer obey
+companies even to the extent of disobeying and defying you.  This was
+implemented in 2007 as part of &lt;a href="http://badvista.org/"&gt;Windows
+Vista&lt;/a&gt;; we expect Apple to do something similar.  In this scheme,
+it is the manufacturer that keeps the secret code, but
+the &lt;abbr&gt;FBI&lt;/abbr&gt; would have little trouble getting 
it.&lt;/p&gt;
+
+&lt;p&gt;
+What Microsoft keeps is not exactly a password in the traditional
+sense; no person ever types it on a terminal.  Rather, it is a
+signature and encryption key that corresponds to a second key stored
+in your computer.  This enables Microsoft, and potentially any web
+sites that cooperate with Microsoft, the ultimate control over what
+the user can do on his own computer.&lt;/p&gt;
+
+&lt;p&gt;
+Vista also gives Microsoft additional powers; for instance, Microsoft
+can forcibly install upgrades, and it can order all machines running
+Vista to refuse to run a certain device driver.  The main purpose of
+Vista's many restrictions is to impose DRM (Digital Restrictions
+Management) that users can't overcome.  The threat of DRM is why we
+have established the &lt;a href="http://DefectiveByDesign.org"&gt;
+Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;
+
+&lt;p&gt;
+When this story was first written, the SPA was threatening small
+Internet service providers, demanding they permit the SPA to monitor
+all users.  Most ISPs surrendered when threatened, because they cannot
+afford to fight back in court.  One ISP, Community ConneXion in
+Oakland, California, refused the demand and was actually sued.  The
+SPA later dropped the suit, but obtained the DMCA, which gave them the
+power they sought.&lt;/p&gt;
+
+&lt;p&gt;
+The SPA, which actually stands for Software Publishers Association,
+has been replaced in its police-like role by the Business
+Software Alliance.  The BSA is not, today, an official police force;
+unofficially, it acts like one.  Using methods reminiscent of the
+erstwhile Soviet Union, it invites people to inform on their coworkers
+and friends.  A BSA terror campaign in Argentina in 2001 made
+slightly veiled threats that people sharing software would be raped.&lt;/p&gt;
+
+&lt;p&gt;
+The university security policies described above are not imaginary.
+For example, a computer at one Chicago-area university displayed this
+message upon login:&lt;/p&gt;
+
+&lt;blockquote&gt;&lt;p&gt;
+This system is for the use of authorized users only.  Individuals using
+this computer system without authority or in the excess of their authority
+are subject to having all their activities on this system monitored and
+recorded by system personnel.  In the course of monitoring individuals
+improperly using this system or in the course of system maintenance, the
+activities of authorized user may also be monitored.  Anyone using this
+system expressly consents to such monitoring and is advised that if such
+monitoring reveals possible evidence of illegal activity or violation of
+University regulations system personnel may provide the evidence of such
+monitoring to University authorities and/or law enforcement officials.
+&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;p&gt;
+This is an interesting approach to the Fourth Amendment: pressure most
+everyone to agree, in advance, to waive their rights under it.&lt;/p&gt;
+
+&lt;h3 id="BadNews"&gt;Bad News&lt;/h3&gt;
+
+&lt;p&gt;
+The battle for the right to read is already in progress,
+The enemy is organized, while we are not, so it is going against us.
+Here are articles about bad things that have happened since the
+original publication of this article.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;Today's commercial ebooks &lt;a 
href="/philosophy/the-danger-of-ebooks.html"&gt;
+     abolish readers' traditional freedoms.&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="http://www.nature.com/nature_education/biology.html"&gt;
+     A "biology textbook" web site&lt;/a&gt; that you can access only by 
signing
+     a &lt;a href="http://www.nature.com/principles/viewTermsOfUse"&gt;
+     contract not to lend it to anyone else&lt;/a&gt;, which the publisher can
+     revoke at will.&lt;/li&gt;
+&lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://news.zdnet.com/2100-9595_22-103151.html"&gt;Electronic</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151"&gt;Electronic</em></ins></span>
+     Publishing:&lt;/a&gt; An article about distribution of books in
+     electronic form, and copyright issues affecting the right to read
+     a copy.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx"&gt;Books
+     inside Computers:&lt;/a&gt; Software to control who can read
+     books and documents on a PC.&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;If we want to stop the bad news and create some good news, we need
+to organize and fight.  The
+FSF's &lt;a href="http://defectivebydesign.org"&gt; Defective by 
Design&lt;/a&gt;
+campaign has made a start &mdash; subscribe to the campaign's mailing
+list to lend a hand.  And &lt;a href="http://www.fsf.org/associate"&gt;join
+the FSF&lt;/a&gt; to help fund our work.
+&lt;/p&gt;
+
+&lt;h3 id="References"&gt;References&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;The administration's &ldquo;White Paper&rdquo;: Information
+       Infrastructure Task Force, Intellectual Property [&lt;a
+       href="/philosophy/not-ipr.html"&gt;sic&lt;/a&gt;] and the
+       National Information Infrastructure: The Report of the Working
+       Group on Intellectual Property [sic] Rights (1995).&lt;/li&gt;
+
+  &lt;li&gt;&lt;a 
href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html"&gt;An
+       explanation of the White Paper:
+       The Copyright Grab&lt;/a&gt;, Pamela Samuelson, Wired, Jan. 
1996&lt;/li&gt;
+
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.law.duke.edu/boylesite/sold_out.htm"&gt;Sold</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.law.duke.edu/boylesite/Sold_out.htm"&gt;Sold</em></ins></span>
 Out&lt;/a&gt;,
+       James Boyle, New York Times, 31 March 1996&lt;/li&gt;
+
+  &lt;li&gt;&lt;a 
href="http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html"&gt;Public
 Data or Private Data&lt;/a&gt;, 
+       Washington Post, 4 Nov 1996. &lt;/li&gt;
+
+  &lt;li&gt;&lt;a href="http://www.public-domain.org/"&gt;Union for the Public
+       Domain&lt;/a&gt;&mdash;an organization which aims to resist and
+       reverse the overextension of copyright and patent powers.&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;hr /&gt;
+&lt;h4&gt;This essay is published
+in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/h4&gt;
+
+&lt;p&gt;&lt;strong&gt;Other Texts to Read&lt;/strong&gt;&lt;/p&gt;
+
+&lt;ul&gt;
+       &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
+       GNU Project&lt;/a&gt;&lt;/li&gt;
+       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/managementtopics/management/opinion/story/0,10801,49358,00.html";</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";</em></ins></span>
+               id="COPYPROCTECTION"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               Published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;/div&gt;
+
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+
+&lt;p&gt;
+Please send FSF &amp; GNU inquiries to 
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt; 
+the FSF.
+&lt;br /&gt;
+Please send broken links and other corrections or suggestions to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+Please see the 
+&lt;a href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting
+translations of this article.
+&lt;/p&gt;
+
+&lt;p&gt;
+Copyright &copy; 1996, 2002, 2007, 2009, 2010 Richard Stallman
+&lt;br /&gt;
+This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative
+Commons Attribution-NoDerivs 3.0 United States License&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2012/11/11 01:28:24 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: philosophy/po/right-to-read.ko-diff.html
===================================================================
RCS file: philosophy/po/right-to-read.ko-diff.html
diff -N philosophy/po/right-to-read.ko-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/right-to-read.ko-diff.html    11 Nov 2012 01:28:24 -0000      
1.1
@@ -0,0 +1,404 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/right-to-read.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;title&gt;The Right to Read - GNU Project - Free Software Foundation 
(FSF)&lt;/title&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;!--#include virtual="/philosophy/po/right-to-read.translist" --&gt;
+&lt;h2&gt;The Right to Read&lt;/h2&gt;
+
+&lt;p&gt;
+by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard 
Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
+
+&lt;div style="text-align: center; font-size: 110%;text-shadow: 0 0 0.2em 
#fff; width: 300px; float: right; margin: 12px; background-color: #a0f112; 
color: #353831; padding: 1em;"&gt;&lt;a 
href="http://defectivebydesign.org/ebooks.html"&gt;Join our mailing list about 
the dangers of eBooks&lt;/a&gt;.&lt;/div&gt;
+
+&lt;p&gt;
+&lt;em&gt;This article appeared in the February 1997 issue
+of &lt;strong&gt;Communications of the ACM&lt;/strong&gt; (Volume 40, Number
+2).&lt;/em&gt;&lt;/p&gt;
+
+&lt;blockquote&gt;&lt;p&gt;
+            From &lt;cite&gt;The Road To Tycho&lt;/cite&gt;, a collection of
+            articles about the antecedents of the Lunarian
+            Revolution, published in Luna City in 2096.
+&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;p&gt;
+For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
+Lenz asked to borrow his computer.  Hers had broken down, and unless
+she could borrow another, she would fail her midterm project.  There
+was no one she dared ask, except Dan.&lt;/p&gt;
+
+&lt;p&gt;
+This put Dan in a dilemma.  He had to help her&mdash;but if he lent
+her his computer, she might read his books.  Aside from the fact that
+you could go to prison for many years for letting someone else read
+your books, the very idea shocked him at first.  Like everyone, he had
+been taught since elementary school that sharing books was nasty and
+wrong&mdash;something that only pirates would do.&lt;/p&gt;
+
+&lt;p&gt;
+And there wasn't much chance that the SPA&mdash;the Software
+Protection Authority&mdash;would fail to catch him.  In his software
+class, Dan had learned that each book had a copyright monitor that
+reported when and where it was read, and by whom, to Central
+Licensing.  (They used this information to catch reading pirates, but
+also to sell personal interest profiles to retailers.)  The next time
+his computer was networked, Central Licensing would find out.  He, as
+computer owner, would receive the harshest punishment&mdash;for not
+taking pains to prevent the crime.&lt;/p&gt;
+
+&lt;p&gt;
+Of course, Lissa did not necessarily intend to read his books.  She
+might want the computer only to write her midterm.  But Dan knew she
+came from a middle-class family and could hardly afford the tuition,
+let alone her reading fees.  Reading his books might be the only way
+she could graduate.  He understood this situation; he himself had had
+to borrow to pay for all the research papers he read.  (Ten percent of those
+fees went to the researchers who wrote the papers; since Dan aimed for
+an academic career, he could hope that his own research papers, if
+frequently referenced, would bring in enough to repay this loan.)&lt;/p&gt;
+
+&lt;p&gt;
+Later on, Dan would learn there was a time when anyone could go to the
+library and read journal articles, and even books, without having to
+pay.  There were independent scholars who read thousands of pages
+without government library grants.  But in the 1990s, both commercial
+and nonprofit journal publishers had begun charging fees for access.
+By 2047, libraries offering free public access to scholarly literature
+were a dim memory.&lt;/p&gt;
+
+&lt;p&gt;
+There were ways, of course, to get around the SPA and Central
+Licensing.  They were themselves illegal.  Dan had had a classmate in
+software, Frank Martucci, who had obtained an illicit debugging tool,
+and used it to skip over the copyright monitor code when reading
+books.  But he had told too many friends about it, and one of them
+turned him in to the SPA for a reward (students deep in debt were
+easily tempted into betrayal).  In 2047, Frank was in prison, not for
+pirate reading, but for possessing a debugger.&lt;/p&gt;
+
+&lt;p&gt;
+Dan would later learn that there was a time when anyone could have
+debugging tools.  There were even free debugging tools available on CD
+or downloadable over the net.  But ordinary users started using them
+to bypass copyright monitors, and eventually a judge ruled that this
+had become their principal use in actual practice.  This meant they
+were illegal; the debuggers' developers were sent to prison.&lt;/p&gt;
+
+&lt;p&gt;
+Programmers still needed debugging tools, of course, but debugger
+vendors in 2047 distributed numbered copies only, and only to
+officially licensed and bonded programmers.  The debugger Dan used in
+software class was kept behind a special firewall so that it could be
+used only for class exercises.&lt;/p&gt;
+
+&lt;p&gt;
+It was also possible to bypass the copyright monitors by installing a
+modified system kernel.  Dan would eventually find out about the free
+kernels, even entire free operating systems, that had existed around
+the turn of the century.  But not only were they illegal, like
+debuggers&mdash;you could not install one if you had one, without
+knowing your computer's root password.  And neither
+the &lt;abbr title="Federal Bureau of Investigation"&gt;FBI&lt;/abbr&gt; nor
+Microsoft Support would tell you that.&lt;/p&gt;
+
+&lt;p&gt;
+Dan concluded that he couldn't simply lend Lissa his computer.  But he
+couldn't refuse to help her, because he loved her.  Every chance to
+speak with her filled him with delight.  And that she chose him to ask
+for help, that could mean she loved him too.&lt;/p&gt;
+
+&lt;p&gt;
+Dan resolved the dilemma by doing something even more
+unthinkable&mdash;he lent her the computer, and told her his password.
+This way, if Lissa read his books, Central Licensing would think he
+was reading them.  It was still a crime, but the SPA would not
+automatically find out about it.  They would only find out if Lissa
+reported him.&lt;/p&gt;
+
+&lt;p&gt;
+Of course, if the school ever found out that he had given Lissa his
+own password, it would be curtains for both of them as students,
+regardless of what she had used it for.  School policy was that any
+interference with their means of monitoring students' computer use was
+grounds for disciplinary action.  It didn't matter whether you did
+anything harmful&mdash;the offense was making it hard for the
+administrators to check on you.  They assumed this meant you were
+doing something else forbidden, and they did not need to know what it
+was.&lt;/p&gt;
+
+&lt;p&gt;
+Students were not usually expelled for this&mdash;not directly.
+Instead they were banned from the school computer systems, and would
+inevitably fail all their classes.&lt;/p&gt;
+
+&lt;p&gt;
+Later, Dan would learn that this kind of university policy started
+only in the 1980s, when university students in large numbers began
+using computers.  Previously, universities maintained a different
+approach to student discipline; they punished activities that were
+harmful, not those that merely raised suspicion.&lt;/p&gt;
+
+&lt;p&gt;
+Lissa did not report Dan to the SPA.  His decision to help her led to
+their marriage, and also led them to question what they had been
+taught about piracy as children.  The couple began reading about the
+history of copyright, about the Soviet Union and its restrictions on
+copying, and even the original United States Constitution.  They moved
+to Luna, where they found others who had likewise gravitated away from
+the long arm of the SPA.  When the Tycho Uprising began in 2062, the
+universal right to read soon became one of its central aims.&lt;/p&gt;
+
+
+&lt;h3 id="AuthorsNote"&gt;Author's Note&lt;/h3&gt;
+
+&lt;p&gt;[This note has been updated several times since the first
+publication of the story.]&lt;/p&gt;
+
+&lt;p&gt;
+The right to read is a battle being fought today.  Although it may
+take 50 years for our present way of life to fade into obscurity, most
+of the specific laws and practices described above have already been
+proposed; many have been enacted into law in the US and elsewhere.  In
+the US, the 1998 Digital Millennium Copyright Act (DMCA) established the legal
+basis to restrict the reading and lending of computerized books (and
+other works as well).  The European Union imposed similar restrictions
+in a 2001 copyright directive.  In France, under the DADVSI law
+adopted in 2006, mere possession of a copy of DeCSS, the free program
+to decrypt video on a DVD, is a crime.&lt;/p&gt;
+
+&lt;p&gt;
+In 2001, Disney-funded Senator Hollings proposed a bill called the
+SSSCA that would require every new computer to have mandatory
+copy-restriction facilities that the user cannot bypass.  Following
+the Clipper chip and similar US government key-escrow proposals, this
+shows a long-term trend: computer systems are increasingly set up to
+give absentees with clout control over the people actually using the
+computer system.  The SSSCA was later renamed to the unpronounceable
+CBDTPA, which was glossed as the &ldquo;Consume But Don't Try
+Programming Act&rdquo;.
+&lt;/p&gt;
+
+&lt;p&gt;
+The Republicans took control of the US senate shortly thereafter.
+They are less tied to Hollywood than the Democrats, so they did not
+press these proposals.  Now that the Democrats are back in control,
+the danger is once again higher.&lt;/p&gt;
+
+&lt;p&gt;
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere.  The FTAA is one of the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit.  The FTAA was effectively killed by
+Lula, President of Brazil, who rejected the DMCA requirement and
+others.&lt;/p&gt;
+
+&lt;p&gt;
+Since then, the US has imposed similar requirements on countries such
+as Australia and Mexico through bilateral &ldquo;free trade&rdquo;
+agreements, and on countries such as Costa Rica through another
+treaty, CAFTA.  Ecuador's President Correa refused to sign a
+&ldquo;free trade&rdquo; agreement with the US, but I've heard Ecuador
+had adopted something like the DMCA in 2003.&lt;/p&gt;
+
+&lt;p&gt;
+One of the ideas in the story was not proposed in reality until 2002.
+This is the idea that the &lt;abbr&gt;FBI&lt;/abbr&gt; and Microsoft will keep 
the
+root passwords for your personal computers, and not let you have
+them.&lt;/p&gt;
+
+&lt;p&gt;
+The proponents of this scheme have given it names such as
+&ldquo;trusted computing&rdquo; and &ldquo;Palladium&rdquo;.  We call
+it &lt;a href="/philosophy/can-you-trust.html"&gt;&ldquo;treacherous
+computing&rdquo;&lt;/a&gt; because the effect is to make your computer obey
+companies even to the extent of disobeying and defying you.  This was
+implemented in 2007 as part of &lt;a href="http://badvista.org/"&gt;Windows
+Vista&lt;/a&gt;; we expect Apple to do something similar.  In this scheme,
+it is the manufacturer that keeps the secret code, but
+the &lt;abbr&gt;FBI&lt;/abbr&gt; would have little trouble getting 
it.&lt;/p&gt;
+
+&lt;p&gt;
+What Microsoft keeps is not exactly a password in the traditional
+sense; no person ever types it on a terminal.  Rather, it is a
+signature and encryption key that corresponds to a second key stored
+in your computer.  This enables Microsoft, and potentially any web
+sites that cooperate with Microsoft, the ultimate control over what
+the user can do on his own computer.&lt;/p&gt;
+
+&lt;p&gt;
+Vista also gives Microsoft additional powers; for instance, Microsoft
+can forcibly install upgrades, and it can order all machines running
+Vista to refuse to run a certain device driver.  The main purpose of
+Vista's many restrictions is to impose DRM (Digital Restrictions
+Management) that users can't overcome.  The threat of DRM is why we
+have established the &lt;a href="http://DefectiveByDesign.org"&gt;
+Defective by Design&lt;/a&gt; campaign.&lt;/p&gt;
+
+&lt;p&gt;
+When this story was first written, the SPA was threatening small
+Internet service providers, demanding they permit the SPA to monitor
+all users.  Most ISPs surrendered when threatened, because they cannot
+afford to fight back in court.  One ISP, Community ConneXion in
+Oakland, California, refused the demand and was actually sued.  The
+SPA later dropped the suit, but obtained the DMCA, which gave them the
+power they sought.&lt;/p&gt;
+
+&lt;p&gt;
+The SPA, which actually stands for Software Publishers Association,
+has been replaced in its police-like role by the Business
+Software Alliance.  The BSA is not, today, an official police force;
+unofficially, it acts like one.  Using methods reminiscent of the
+erstwhile Soviet Union, it invites people to inform on their coworkers
+and friends.  A BSA terror campaign in Argentina in 2001 made
+slightly veiled threats that people sharing software would be raped.&lt;/p&gt;
+
+&lt;p&gt;
+The university security policies described above are not imaginary.
+For example, a computer at one Chicago-area university displayed this
+message upon login:&lt;/p&gt;
+
+&lt;blockquote&gt;&lt;p&gt;
+This system is for the use of authorized users only.  Individuals using
+this computer system without authority or in the excess of their authority
+are subject to having all their activities on this system monitored and
+recorded by system personnel.  In the course of monitoring individuals
+improperly using this system or in the course of system maintenance, the
+activities of authorized user may also be monitored.  Anyone using this
+system expressly consents to such monitoring and is advised that if such
+monitoring reveals possible evidence of illegal activity or violation of
+University regulations system personnel may provide the evidence of such
+monitoring to University authorities and/or law enforcement officials.
+&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;p&gt;
+This is an interesting approach to the Fourth Amendment: pressure most
+everyone to agree, in advance, to waive their rights under it.&lt;/p&gt;
+
+&lt;h3 id="BadNews"&gt;Bad News&lt;/h3&gt;
+
+&lt;p&gt;
+The battle for the right to read is already in progress,
+The enemy is organized, while we are not, so it is going against us.
+Here are articles about bad things that have happened since the
+original publication of this article.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;Today's commercial ebooks &lt;a 
href="/philosophy/the-danger-of-ebooks.html"&gt;
+     abolish readers' traditional freedoms.&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a href="http://www.nature.com/nature_education/biology.html"&gt;
+     A "biology textbook" web site&lt;/a&gt; that you can access only by 
signing
+     a &lt;a href="http://www.nature.com/principles/viewTermsOfUse"&gt;
+     contract not to lend it to anyone else&lt;/a&gt;, which the publisher can
+     revoke at will.&lt;/li&gt;
+&lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://news.zdnet.com/2100-9595_22-103151.html"&gt;Electronic</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151"&gt;Electronic</em></ins></span>
+     Publishing:&lt;/a&gt; An article about distribution of books in
+     electronic form, and copyright issues affecting the right to read
+     a copy.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx"&gt;Books
+     inside Computers:&lt;/a&gt; Software to control who can read
+     books and documents on a PC.&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;If we want to stop the bad news and create some good news, we need
+to organize and fight.  The
+FSF's &lt;a href="http://defectivebydesign.org"&gt; Defective by 
Design&lt;/a&gt;
+campaign has made a start &mdash; subscribe to the campaign's mailing
+list to lend a hand.  And &lt;a href="http://www.fsf.org/associate"&gt;join
+the FSF&lt;/a&gt; to help fund our work.
+&lt;/p&gt;
+
+&lt;h3 id="References"&gt;References&lt;/h3&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;The administration's &ldquo;White Paper&rdquo;: Information
+       Infrastructure Task Force, Intellectual Property [&lt;a
+       href="/philosophy/not-ipr.html"&gt;sic&lt;/a&gt;] and the
+       National Information Infrastructure: The Report of the Working
+       Group on Intellectual Property [sic] Rights (1995).&lt;/li&gt;
+
+  &lt;li&gt;&lt;a 
href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html"&gt;An
+       explanation of the White Paper:
+       The Copyright Grab&lt;/a&gt;, Pamela Samuelson, Wired, Jan. 
1996&lt;/li&gt;
+
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.law.duke.edu/boylesite/sold_out.htm"&gt;Sold</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.law.duke.edu/boylesite/Sold_out.htm"&gt;Sold</em></ins></span>
 Out&lt;/a&gt;,
+       James Boyle, New York Times, 31 March 1996&lt;/li&gt;
+
+  &lt;li&gt;&lt;a 
href="http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html"&gt;Public
 Data or Private Data&lt;/a&gt;, 
+       Washington Post, 4 Nov 1996. &lt;/li&gt;
+
+  &lt;li&gt;&lt;a href="http://www.public-domain.org/"&gt;Union for the Public
+       Domain&lt;/a&gt;&mdash;an organization which aims to resist and
+       reverse the overextension of copyright and patent powers.&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;hr /&gt;
+&lt;h4&gt;This essay is published
+in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/h4&gt;
+
+&lt;p&gt;&lt;strong&gt;Other Texts to Read&lt;/strong&gt;&lt;/p&gt;
+
+&lt;ul&gt;
+       &lt;li&gt;&lt;a href="/philosophy/philosophy.html"&gt;Philosophy of the
+       GNU Project&lt;/a&gt;&lt;/li&gt;
+       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/managementtopics/management/opinion/story/0,10801,49358,00.html";</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No";</em></ins></span>
+               id="COPYPROCTECTION"&gt;Copy Protection: Just Say No&lt;/a&gt;,
+               Published in Computer World.&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;/div&gt;
+
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+
+&lt;p&gt;
+Please send FSF &amp; GNU inquiries to 
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt; 
+the FSF.
+&lt;br /&gt;
+Please send broken links and other corrections or suggestions to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+Please see the 
+&lt;a href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting
+translations of this article.
+&lt;/p&gt;
+
+&lt;p&gt;
+Copyright &copy; 1996, 2002, 2007, 2009, 2010 Richard Stallman
+&lt;br /&gt;
+This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative
+Commons Attribution-NoDerivs 3.0 United States License&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2012/11/11 01:28:24 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]