[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www people/po/people.de.po people/po/people.es....
From: |
GNUN |
Subject: |
www people/po/people.de.po people/po/people.es.... |
Date: |
Sun, 11 Nov 2012 01:28:24 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 12/11/11 01:28:24
Modified files:
people/po : people.de.po people.es.po people.pot
philosophy : right-to-read.ca.html right-to-read.ko.html
Added files:
philosophy/po : right-to-read.ca-diff.html
right-to-read.ko-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/people/po/people.de.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/people/po/people.es.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/people/po/people.pot?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.ca.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.ko.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ca-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ko-diff.html?cvsroot=www&rev=1.1
Patches:
Index: people/po/people.de.po
===================================================================
RCS file: /web/www/www/people/po/people.de.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- people/po/people.de.po 6 Oct 2012 16:28:57 -0000 1.68
+++ people/po/people.de.po 11 Nov 2012 01:28:23 -0000 1.69
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: people.html\n"
-"POT-Creation-Date: 2012-09-28 04:25-0300\n"
+"POT-Creation-Date: 2012-11-10 20:25-0500\n"
"PO-Revision-Date: 2012-10-04 17:00+0200\n"
"Last-Translator: Joerg Kohne <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"Outdated-Since: 2012-11-10 20:25-0500\n"
#. type: Content of: <title>
msgid "GNU's Who - GNU Project - Free Software Foundation"
@@ -1295,6 +1296,18 @@
msgstr "F"
#. type: Content of: <h4>
+msgid "Fabio Gonzalez"
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
+"Current maintainer of <a href=\"/software/fcrypt\">GNU fcrypt</a> and <a "
+"href=\"/\">gnu.org</a> webmaster. He supports both the GNU philosophy and "
+"the free software movement. He also supports all personal visions that he "
+"read from <a href=\"http://stallman.org\">Richard Stallman</a>."
+msgstr ""
+
+#. type: Content of: <h4>
msgid "Filippo Rusconi"
msgstr "Filippo Rusconi"
@@ -3189,9 +3202,13 @@
"Raif S. Naffah <a href=\"mailto:address@hidden"><address@hidden></a>"
#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Is the maintainer, and one of the authors, of <a href=\"/software/"
+#| "classpathx/crypto/\">GNU Crypto</a>."
msgid ""
-"Is the maintainer, and one of the authors, of <a href=\"/software/classpathx/"
-"crypto/\">GNU Crypto</a>."
+"Is the maintainer, and one of the authors, of <a href=\"/software/gnu-crypto/"
+"\">GNU Crypto</a>."
msgstr ""
"Projektverwalter und einer der Autoren von <a href=\"/software/classpathx/"
"crypto/\">GNU Crypto</a>."
Index: people/po/people.es.po
===================================================================
RCS file: /web/www/www/people/po/people.es.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- people/po/people.es.po 9 Nov 2012 01:26:12 -0000 1.110
+++ people/po/people.es.po 11 Nov 2012 01:28:23 -0000 1.111
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: people.es\n"
-"POT-Creation-Date: 2012-09-28 04:25-0300\n"
+"POT-Creation-Date: 2012-11-10 20:25-0500\n"
"PO-Revision-Date: 2012-09-29 08:04+0100\n"
"Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"Outdated-Since: 2012-11-10 20:25-0500\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Poedit-Language: Spanish\n"
"X-Poedit-SourceCharset: utf-8\n"
@@ -1474,6 +1475,18 @@
msgid "F"
msgstr "F"
+#. type: Content of: <h4>
+msgid "Fabio Gonzalez"
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
+"Current maintainer of <a href=\"/software/fcrypt\">GNU fcrypt</a> and <a "
+"href=\"/\">gnu.org</a> webmaster. He supports both the GNU philosophy and "
+"the free software movement. He also supports all personal visions that he "
+"read from <a href=\"http://stallman.org\">Richard Stallman</a>."
+msgstr ""
+
# type: Content of: <h4>
#. type: Content of: <h4>
msgid "Filippo Rusconi"
@@ -3622,9 +3635,16 @@
# type: Content of: <p>
#. type: Content of: <p>
+# | Is the maintainer, and one of the authors, of <a
+# | [-href=\"/software/classpathx/crypto/\">GNU-]
+# | {+href=\"/software/gnu-crypto/\">GNU+} Crypto</a>.
+#, fuzzy
+#| msgid ""
+#| "Is the maintainer, and one of the authors, of <a href=\"/software/"
+#| "classpathx/crypto/\">GNU Crypto</a>."
msgid ""
-"Is the maintainer, and one of the authors, of <a href=\"/software/classpathx/"
-"crypto/\">GNU Crypto</a>."
+"Is the maintainer, and one of the authors, of <a href=\"/software/gnu-crypto/"
+"\">GNU Crypto</a>."
msgstr ""
"Es el encargado de mantener, y uno de los autores, de <a href=\"/software/"
"classpathx/crypto/\">Crypto de GNU</a>."
Index: people/po/people.pot
===================================================================
RCS file: /web/www/www/people/po/people.pot,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- people/po/people.pot 28 Sep 2012 08:29:11 -0000 1.88
+++ people/po/people.pot 11 Nov 2012 01:28:23 -0000 1.89
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: people.html\n"
-"POT-Creation-Date: 2012-09-28 04:25-0300\n"
+"POT-Creation-Date: 2012-11-10 20:25-0500\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1001,6 +1001,18 @@
msgstr ""
#. type: Content of: <h4>
+msgid "Fabio Gonzalez"
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
+"Current maintainer of <a href=\"/software/fcrypt\">GNU fcrypt</a> and <a "
+"href=\"/\">gnu.org</a> webmaster. He supports both the GNU philosophy and "
+"the free software movement. He also supports all personal visions that he "
+"read from <a href=\"http://stallman.org\">Richard Stallman</a>."
+msgstr ""
+
+#. type: Content of: <h4>
msgid "Filippo Rusconi"
msgstr ""
@@ -2460,7 +2472,7 @@
#. type: Content of: <p>
msgid ""
"Is the maintainer, and one of the authors, of <a "
-"href=\"/software/classpathx/crypto/\">GNU Crypto</a>."
+"href=\"/software/gnu-crypto/\">GNU Crypto</a>."
msgstr ""
#. type: Content of: <h4>
Index: philosophy/right-to-read.ca.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.ca.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- philosophy/right-to-read.ca.html 16 Sep 2012 05:28:25 -0000 1.14
+++ philosophy/right-to-read.ca.html 11 Nov 2012 01:28:23 -0000 1.15
@@ -5,6 +5,13 @@
<title>El dret a llegir - Projecte GNU - Free Software Foundation (FSF)</title>
<!--#include virtual="/server/banner.ca.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="http://www.gnu.org/philosophy/po/right-to-read.ca.po">
+ http://www.gnu.org/philosophy/po/right-to-read.ca.po</a>' -->
+ <!--#set var="ORIGINAL_FILE" value="/philosophy/right-to-read.html" -->
+ <!--#set var="DIFF_FILE" value="/philosophy/po/right-to-read.ca-diff.html" -->
+ <!--#set var="OUTDATED_SINCE" value="2012-09-11" -->
+ <!--#include virtual="/server/outdated.ca.html" -->
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<h2>El dret a llegir</h2>
@@ -413,7 +420,7 @@
<!-- timestamp start -->
Updated:
-$Date: 2012/09/16 05:28:25 $
+$Date: 2012/11/11 01:28:23 $
<!-- timestamp end -->
</p>
Index: philosophy/right-to-read.ko.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.ko.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- philosophy/right-to-read.ko.html 16 Sep 2012 05:28:26 -0000 1.19
+++ philosophy/right-to-read.ko.html 11 Nov 2012 01:28:23 -0000 1.20
@@ -5,6 +5,13 @@
<title>ì½ì ê¶ë¦¬ - GNU íë¡ì í¸ - ìì ìíí¸ì¨ì´ ì¬ë¨
(FSF)</title>
<!--#include virtual="/server/banner.ko.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="http://www.gnu.org/philosophy/po/right-to-read.ko.po">
+ http://www.gnu.org/philosophy/po/right-to-read.ko.po</a>' -->
+ <!--#set var="ORIGINAL_FILE" value="/philosophy/right-to-read.html" -->
+ <!--#set var="DIFF_FILE" value="/philosophy/po/right-to-read.ko-diff.html" -->
+ <!--#set var="OUTDATED_SINCE" value="2012-09-11" -->
+ <!--#include virtual="/server/outdated.ko.html" -->
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<h2>ì½ì ê¶ë¦¬</h2>
@@ -310,7 +317,7 @@
<!-- timestamp start -->
ìµì¢
ìì ì¼:
-$Date: 2012/09/16 05:28:26 $
+$Date: 2012/11/11 01:28:23 $
<!-- timestamp end -->
</p>
Index: philosophy/po/right-to-read.ca-diff.html
===================================================================
RCS file: philosophy/po/right-to-read.ca-diff.html
diff -N philosophy/po/right-to-read.ca-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ philosophy/po/right-to-read.ca-diff.html 11 Nov 2012 01:28:24 -0000
1.1
@@ -0,0 +1,404 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/right-to-read.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<title>The Right to Read - GNU Project - Free Software Foundation
(FSF)</title>
+<!--#include virtual="/server/banner.html" -->
+<!--#include virtual="/philosophy/po/right-to-read.translist" -->
+<h2>The Right to Read</h2>
+
+<p>
+by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
+
+<div style="text-align: center; font-size: 110%;text-shadow: 0 0 0.2em
#fff; width: 300px; float: right; margin: 12px; background-color: #a0f112;
color: #353831; padding: 1em;"><a
href="http://defectivebydesign.org/ebooks.html">Join our mailing list about
the dangers of eBooks</a>.</div>
+
+<p>
+<em>This article appeared in the February 1997 issue
+of <strong>Communications of the ACM</strong> (Volume 40, Number
+2).</em></p>
+
+<blockquote><p>
+ From <cite>The Road To Tycho</cite>, a collection of
+ articles about the antecedents of the Lunarian
+ Revolution, published in Luna City in 2096.
+</p></blockquote>
+
+<p>
+For Dan Halbert, the road to Tycho began in college—when Lissa
+Lenz asked to borrow his computer. Hers had broken down, and unless
+she could borrow another, she would fail her midterm project. There
+was no one she dared ask, except Dan.</p>
+
+<p>
+This put Dan in a dilemma. He had to help her—but if he lent
+her his computer, she might read his books. Aside from the fact that
+you could go to prison for many years for letting someone else read
+your books, the very idea shocked him at first. Like everyone, he had
+been taught since elementary school that sharing books was nasty and
+wrong—something that only pirates would do.</p>
+
+<p>
+And there wasn't much chance that the SPA—the Software
+Protection Authority—would fail to catch him. In his software
+class, Dan had learned that each book had a copyright monitor that
+reported when and where it was read, and by whom, to Central
+Licensing. (They used this information to catch reading pirates, but
+also to sell personal interest profiles to retailers.) The next time
+his computer was networked, Central Licensing would find out. He, as
+computer owner, would receive the harshest punishment—for not
+taking pains to prevent the crime.</p>
+
+<p>
+Of course, Lissa did not necessarily intend to read his books. She
+might want the computer only to write her midterm. But Dan knew she
+came from a middle-class family and could hardly afford the tuition,
+let alone her reading fees. Reading his books might be the only way
+she could graduate. He understood this situation; he himself had had
+to borrow to pay for all the research papers he read. (Ten percent of those
+fees went to the researchers who wrote the papers; since Dan aimed for
+an academic career, he could hope that his own research papers, if
+frequently referenced, would bring in enough to repay this loan.)</p>
+
+<p>
+Later on, Dan would learn there was a time when anyone could go to the
+library and read journal articles, and even books, without having to
+pay. There were independent scholars who read thousands of pages
+without government library grants. But in the 1990s, both commercial
+and nonprofit journal publishers had begun charging fees for access.
+By 2047, libraries offering free public access to scholarly literature
+were a dim memory.</p>
+
+<p>
+There were ways, of course, to get around the SPA and Central
+Licensing. They were themselves illegal. Dan had had a classmate in
+software, Frank Martucci, who had obtained an illicit debugging tool,
+and used it to skip over the copyright monitor code when reading
+books. But he had told too many friends about it, and one of them
+turned him in to the SPA for a reward (students deep in debt were
+easily tempted into betrayal). In 2047, Frank was in prison, not for
+pirate reading, but for possessing a debugger.</p>
+
+<p>
+Dan would later learn that there was a time when anyone could have
+debugging tools. There were even free debugging tools available on CD
+or downloadable over the net. But ordinary users started using them
+to bypass copyright monitors, and eventually a judge ruled that this
+had become their principal use in actual practice. This meant they
+were illegal; the debuggers' developers were sent to prison.</p>
+
+<p>
+Programmers still needed debugging tools, of course, but debugger
+vendors in 2047 distributed numbered copies only, and only to
+officially licensed and bonded programmers. The debugger Dan used in
+software class was kept behind a special firewall so that it could be
+used only for class exercises.</p>
+
+<p>
+It was also possible to bypass the copyright monitors by installing a
+modified system kernel. Dan would eventually find out about the free
+kernels, even entire free operating systems, that had existed around
+the turn of the century. But not only were they illegal, like
+debuggers—you could not install one if you had one, without
+knowing your computer's root password. And neither
+the <abbr title="Federal Bureau of Investigation">FBI</abbr> nor
+Microsoft Support would tell you that.</p>
+
+<p>
+Dan concluded that he couldn't simply lend Lissa his computer. But he
+couldn't refuse to help her, because he loved her. Every chance to
+speak with her filled him with delight. And that she chose him to ask
+for help, that could mean she loved him too.</p>
+
+<p>
+Dan resolved the dilemma by doing something even more
+unthinkable—he lent her the computer, and told her his password.
+This way, if Lissa read his books, Central Licensing would think he
+was reading them. It was still a crime, but the SPA would not
+automatically find out about it. They would only find out if Lissa
+reported him.</p>
+
+<p>
+Of course, if the school ever found out that he had given Lissa his
+own password, it would be curtains for both of them as students,
+regardless of what she had used it for. School policy was that any
+interference with their means of monitoring students' computer use was
+grounds for disciplinary action. It didn't matter whether you did
+anything harmful—the offense was making it hard for the
+administrators to check on you. They assumed this meant you were
+doing something else forbidden, and they did not need to know what it
+was.</p>
+
+<p>
+Students were not usually expelled for this—not directly.
+Instead they were banned from the school computer systems, and would
+inevitably fail all their classes.</p>
+
+<p>
+Later, Dan would learn that this kind of university policy started
+only in the 1980s, when university students in large numbers began
+using computers. Previously, universities maintained a different
+approach to student discipline; they punished activities that were
+harmful, not those that merely raised suspicion.</p>
+
+<p>
+Lissa did not report Dan to the SPA. His decision to help her led to
+their marriage, and also led them to question what they had been
+taught about piracy as children. The couple began reading about the
+history of copyright, about the Soviet Union and its restrictions on
+copying, and even the original United States Constitution. They moved
+to Luna, where they found others who had likewise gravitated away from
+the long arm of the SPA. When the Tycho Uprising began in 2062, the
+universal right to read soon became one of its central aims.</p>
+
+
+<h3 id="AuthorsNote">Author's Note</h3>
+
+<p>[This note has been updated several times since the first
+publication of the story.]</p>
+
+<p>
+The right to read is a battle being fought today. Although it may
+take 50 years for our present way of life to fade into obscurity, most
+of the specific laws and practices described above have already been
+proposed; many have been enacted into law in the US and elsewhere. In
+the US, the 1998 Digital Millennium Copyright Act (DMCA) established the legal
+basis to restrict the reading and lending of computerized books (and
+other works as well). The European Union imposed similar restrictions
+in a 2001 copyright directive. In France, under the DADVSI law
+adopted in 2006, mere possession of a copy of DeCSS, the free program
+to decrypt video on a DVD, is a crime.</p>
+
+<p>
+In 2001, Disney-funded Senator Hollings proposed a bill called the
+SSSCA that would require every new computer to have mandatory
+copy-restriction facilities that the user cannot bypass. Following
+the Clipper chip and similar US government key-escrow proposals, this
+shows a long-term trend: computer systems are increasingly set up to
+give absentees with clout control over the people actually using the
+computer system. The SSSCA was later renamed to the unpronounceable
+CBDTPA, which was glossed as the “Consume But Don't Try
+Programming Act”.
+</p>
+
+<p>
+The Republicans took control of the US senate shortly thereafter.
+They are less tied to Hollywood than the Democrats, so they did not
+press these proposals. Now that the Democrats are back in control,
+the danger is once again higher.</p>
+
+<p>
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere. The FTAA is one of the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit. The FTAA was effectively killed by
+Lula, President of Brazil, who rejected the DMCA requirement and
+others.</p>
+
+<p>
+Since then, the US has imposed similar requirements on countries such
+as Australia and Mexico through bilateral “free trade”
+agreements, and on countries such as Costa Rica through another
+treaty, CAFTA. Ecuador's President Correa refused to sign a
+“free trade” agreement with the US, but I've heard Ecuador
+had adopted something like the DMCA in 2003.</p>
+
+<p>
+One of the ideas in the story was not proposed in reality until 2002.
+This is the idea that the <abbr>FBI</abbr> and Microsoft will keep
the
+root passwords for your personal computers, and not let you have
+them.</p>
+
+<p>
+The proponents of this scheme have given it names such as
+“trusted computing” and “Palladium”. We call
+it <a href="/philosophy/can-you-trust.html">“treacherous
+computing”</a> because the effect is to make your computer obey
+companies even to the extent of disobeying and defying you. This was
+implemented in 2007 as part of <a href="http://badvista.org/">Windows
+Vista</a>; we expect Apple to do something similar. In this scheme,
+it is the manufacturer that keeps the secret code, but
+the <abbr>FBI</abbr> would have little trouble getting
it.</p>
+
+<p>
+What Microsoft keeps is not exactly a password in the traditional
+sense; no person ever types it on a terminal. Rather, it is a
+signature and encryption key that corresponds to a second key stored
+in your computer. This enables Microsoft, and potentially any web
+sites that cooperate with Microsoft, the ultimate control over what
+the user can do on his own computer.</p>
+
+<p>
+Vista also gives Microsoft additional powers; for instance, Microsoft
+can forcibly install upgrades, and it can order all machines running
+Vista to refuse to run a certain device driver. The main purpose of
+Vista's many restrictions is to impose DRM (Digital Restrictions
+Management) that users can't overcome. The threat of DRM is why we
+have established the <a href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p>
+
+<p>
+When this story was first written, the SPA was threatening small
+Internet service providers, demanding they permit the SPA to monitor
+all users. Most ISPs surrendered when threatened, because they cannot
+afford to fight back in court. One ISP, Community ConneXion in
+Oakland, California, refused the demand and was actually sued. The
+SPA later dropped the suit, but obtained the DMCA, which gave them the
+power they sought.</p>
+
+<p>
+The SPA, which actually stands for Software Publishers Association,
+has been replaced in its police-like role by the Business
+Software Alliance. The BSA is not, today, an official police force;
+unofficially, it acts like one. Using methods reminiscent of the
+erstwhile Soviet Union, it invites people to inform on their coworkers
+and friends. A BSA terror campaign in Argentina in 2001 made
+slightly veiled threats that people sharing software would be raped.</p>
+
+<p>
+The university security policies described above are not imaginary.
+For example, a computer at one Chicago-area university displayed this
+message upon login:</p>
+
+<blockquote><p>
+This system is for the use of authorized users only. Individuals using
+this computer system without authority or in the excess of their authority
+are subject to having all their activities on this system monitored and
+recorded by system personnel. In the course of monitoring individuals
+improperly using this system or in the course of system maintenance, the
+activities of authorized user may also be monitored. Anyone using this
+system expressly consents to such monitoring and is advised that if such
+monitoring reveals possible evidence of illegal activity or violation of
+University regulations system personnel may provide the evidence of such
+monitoring to University authorities and/or law enforcement officials.
+</p></blockquote>
+
+<p>
+This is an interesting approach to the Fourth Amendment: pressure most
+everyone to agree, in advance, to waive their rights under it.</p>
+
+<h3 id="BadNews">Bad News</h3>
+
+<p>
+The battle for the right to read is already in progress,
+The enemy is organized, while we are not, so it is going against us.
+Here are articles about bad things that have happened since the
+original publication of this article.</p>
+
+<ul>
+<li>Today's commercial ebooks <a
href="/philosophy/the-danger-of-ebooks.html">
+ abolish readers' traditional freedoms.</a></li>
+<li><a href="http://www.nature.com/nature_education/biology.html">
+ A "biology textbook" web site</a> that you can access only by
signing
+ a <a href="http://www.nature.com/principles/viewTermsOfUse">
+ contract not to lend it to anyone else</a>, which the publisher can
+ revoke at will.</li>
+<li><a <span
class="removed"><del><strong>href="http://news.zdnet.com/2100-9595_22-103151.html">Electronic</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic</em></ins></span>
+ Publishing:</a> An article about distribution of books in
+ electronic form, and copyright issues affecting the right to read
+ a copy.</li>
+<li><a
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx">Books
+ inside Computers:</a> Software to control who can read
+ books and documents on a PC.</li>
+</ul>
+
+<p>If we want to stop the bad news and create some good news, we need
+to organize and fight. The
+FSF's <a href="http://defectivebydesign.org"> Defective by
Design</a>
+campaign has made a start — subscribe to the campaign's mailing
+list to lend a hand. And <a href="http://www.fsf.org/associate">join
+the FSF</a> to help fund our work.
+</p>
+
+<h3 id="References">References</h3>
+
+<ul>
+ <li>The administration's “White Paper”: Information
+ Infrastructure Task Force, Intellectual Property [<a
+ href="/philosophy/not-ipr.html">sic</a>] and the
+ National Information Infrastructure: The Report of the Working
+ Group on Intellectual Property [sic] Rights (1995).</li>
+
+ <li><a
href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html">An
+ explanation of the White Paper:
+ The Copyright Grab</a>, Pamela Samuelson, Wired, Jan.
1996</li>
+
+ <li><a <span
class="removed"><del><strong>href="http://www.law.duke.edu/boylesite/sold_out.htm">Sold</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.law.duke.edu/boylesite/Sold_out.htm">Sold</em></ins></span>
Out</a>,
+ James Boyle, New York Times, 31 March 1996</li>
+
+ <li><a
href="http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public
Data or Private Data</a>,
+ Washington Post, 4 Nov 1996. </li>
+
+ <li><a href="http://www.public-domain.org/">Union for the Public
+ Domain</a>—an organization which aims to resist and
+ reverse the overextension of copyright and patent powers.</li>
+</ul>
+
+<hr />
+<h4>This essay is published
+in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</h4>
+
+<p><strong>Other Texts to Read</strong></p>
+
+<ul>
+ <li><a href="/philosophy/philosophy.html">Philosophy of the
+ GNU Project</a></li>
+ <li><a <span
class="removed"><del><strong>href="http://www.computerworld.com/managementtopics/management/opinion/story/0,10801,49358,00.html"</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"</em></ins></span>
+ id="COPYPROCTECTION">Copy Protection: Just Say No</a>,
+ Published in Computer World.</li>
+</ul>
+
+</div>
+
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+
+<p>
+Please send FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.
+<br />
+Please send broken links and other corrections or suggestions to
+<a href="mailto:address@hidden"><address@hidden></a>.
+</p>
+
+<p>
+Please see the
+<a href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting
+translations of this article.
+</p>
+
+<p>
+Copyright © 1996, 2002, 2007, 2009, 2010 Richard Stallman
+<br />
+This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
+Commons Attribution-NoDerivs 3.0 United States License</a>.
+</p>
+
+<p>
+Updated:
+<!-- timestamp start -->
+$Date: 2012/11/11 01:28:24 $
+<!-- timestamp end -->
+</p>
+</div>
+
+</div>
+</body>
+</html>
+</pre></body></html>
Index: philosophy/po/right-to-read.ko-diff.html
===================================================================
RCS file: philosophy/po/right-to-read.ko-diff.html
diff -N philosophy/po/right-to-read.ko-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ philosophy/po/right-to-read.ko-diff.html 11 Nov 2012 01:28:24 -0000
1.1
@@ -0,0 +1,404 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/right-to-read.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<title>The Right to Read - GNU Project - Free Software Foundation
(FSF)</title>
+<!--#include virtual="/server/banner.html" -->
+<!--#include virtual="/philosophy/po/right-to-read.translist" -->
+<h2>The Right to Read</h2>
+
+<p>
+by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
+
+<div style="text-align: center; font-size: 110%;text-shadow: 0 0 0.2em
#fff; width: 300px; float: right; margin: 12px; background-color: #a0f112;
color: #353831; padding: 1em;"><a
href="http://defectivebydesign.org/ebooks.html">Join our mailing list about
the dangers of eBooks</a>.</div>
+
+<p>
+<em>This article appeared in the February 1997 issue
+of <strong>Communications of the ACM</strong> (Volume 40, Number
+2).</em></p>
+
+<blockquote><p>
+ From <cite>The Road To Tycho</cite>, a collection of
+ articles about the antecedents of the Lunarian
+ Revolution, published in Luna City in 2096.
+</p></blockquote>
+
+<p>
+For Dan Halbert, the road to Tycho began in college—when Lissa
+Lenz asked to borrow his computer. Hers had broken down, and unless
+she could borrow another, she would fail her midterm project. There
+was no one she dared ask, except Dan.</p>
+
+<p>
+This put Dan in a dilemma. He had to help her—but if he lent
+her his computer, she might read his books. Aside from the fact that
+you could go to prison for many years for letting someone else read
+your books, the very idea shocked him at first. Like everyone, he had
+been taught since elementary school that sharing books was nasty and
+wrong—something that only pirates would do.</p>
+
+<p>
+And there wasn't much chance that the SPA—the Software
+Protection Authority—would fail to catch him. In his software
+class, Dan had learned that each book had a copyright monitor that
+reported when and where it was read, and by whom, to Central
+Licensing. (They used this information to catch reading pirates, but
+also to sell personal interest profiles to retailers.) The next time
+his computer was networked, Central Licensing would find out. He, as
+computer owner, would receive the harshest punishment—for not
+taking pains to prevent the crime.</p>
+
+<p>
+Of course, Lissa did not necessarily intend to read his books. She
+might want the computer only to write her midterm. But Dan knew she
+came from a middle-class family and could hardly afford the tuition,
+let alone her reading fees. Reading his books might be the only way
+she could graduate. He understood this situation; he himself had had
+to borrow to pay for all the research papers he read. (Ten percent of those
+fees went to the researchers who wrote the papers; since Dan aimed for
+an academic career, he could hope that his own research papers, if
+frequently referenced, would bring in enough to repay this loan.)</p>
+
+<p>
+Later on, Dan would learn there was a time when anyone could go to the
+library and read journal articles, and even books, without having to
+pay. There were independent scholars who read thousands of pages
+without government library grants. But in the 1990s, both commercial
+and nonprofit journal publishers had begun charging fees for access.
+By 2047, libraries offering free public access to scholarly literature
+were a dim memory.</p>
+
+<p>
+There were ways, of course, to get around the SPA and Central
+Licensing. They were themselves illegal. Dan had had a classmate in
+software, Frank Martucci, who had obtained an illicit debugging tool,
+and used it to skip over the copyright monitor code when reading
+books. But he had told too many friends about it, and one of them
+turned him in to the SPA for a reward (students deep in debt were
+easily tempted into betrayal). In 2047, Frank was in prison, not for
+pirate reading, but for possessing a debugger.</p>
+
+<p>
+Dan would later learn that there was a time when anyone could have
+debugging tools. There were even free debugging tools available on CD
+or downloadable over the net. But ordinary users started using them
+to bypass copyright monitors, and eventually a judge ruled that this
+had become their principal use in actual practice. This meant they
+were illegal; the debuggers' developers were sent to prison.</p>
+
+<p>
+Programmers still needed debugging tools, of course, but debugger
+vendors in 2047 distributed numbered copies only, and only to
+officially licensed and bonded programmers. The debugger Dan used in
+software class was kept behind a special firewall so that it could be
+used only for class exercises.</p>
+
+<p>
+It was also possible to bypass the copyright monitors by installing a
+modified system kernel. Dan would eventually find out about the free
+kernels, even entire free operating systems, that had existed around
+the turn of the century. But not only were they illegal, like
+debuggers—you could not install one if you had one, without
+knowing your computer's root password. And neither
+the <abbr title="Federal Bureau of Investigation">FBI</abbr> nor
+Microsoft Support would tell you that.</p>
+
+<p>
+Dan concluded that he couldn't simply lend Lissa his computer. But he
+couldn't refuse to help her, because he loved her. Every chance to
+speak with her filled him with delight. And that she chose him to ask
+for help, that could mean she loved him too.</p>
+
+<p>
+Dan resolved the dilemma by doing something even more
+unthinkable—he lent her the computer, and told her his password.
+This way, if Lissa read his books, Central Licensing would think he
+was reading them. It was still a crime, but the SPA would not
+automatically find out about it. They would only find out if Lissa
+reported him.</p>
+
+<p>
+Of course, if the school ever found out that he had given Lissa his
+own password, it would be curtains for both of them as students,
+regardless of what she had used it for. School policy was that any
+interference with their means of monitoring students' computer use was
+grounds for disciplinary action. It didn't matter whether you did
+anything harmful—the offense was making it hard for the
+administrators to check on you. They assumed this meant you were
+doing something else forbidden, and they did not need to know what it
+was.</p>
+
+<p>
+Students were not usually expelled for this—not directly.
+Instead they were banned from the school computer systems, and would
+inevitably fail all their classes.</p>
+
+<p>
+Later, Dan would learn that this kind of university policy started
+only in the 1980s, when university students in large numbers began
+using computers. Previously, universities maintained a different
+approach to student discipline; they punished activities that were
+harmful, not those that merely raised suspicion.</p>
+
+<p>
+Lissa did not report Dan to the SPA. His decision to help her led to
+their marriage, and also led them to question what they had been
+taught about piracy as children. The couple began reading about the
+history of copyright, about the Soviet Union and its restrictions on
+copying, and even the original United States Constitution. They moved
+to Luna, where they found others who had likewise gravitated away from
+the long arm of the SPA. When the Tycho Uprising began in 2062, the
+universal right to read soon became one of its central aims.</p>
+
+
+<h3 id="AuthorsNote">Author's Note</h3>
+
+<p>[This note has been updated several times since the first
+publication of the story.]</p>
+
+<p>
+The right to read is a battle being fought today. Although it may
+take 50 years for our present way of life to fade into obscurity, most
+of the specific laws and practices described above have already been
+proposed; many have been enacted into law in the US and elsewhere. In
+the US, the 1998 Digital Millennium Copyright Act (DMCA) established the legal
+basis to restrict the reading and lending of computerized books (and
+other works as well). The European Union imposed similar restrictions
+in a 2001 copyright directive. In France, under the DADVSI law
+adopted in 2006, mere possession of a copy of DeCSS, the free program
+to decrypt video on a DVD, is a crime.</p>
+
+<p>
+In 2001, Disney-funded Senator Hollings proposed a bill called the
+SSSCA that would require every new computer to have mandatory
+copy-restriction facilities that the user cannot bypass. Following
+the Clipper chip and similar US government key-escrow proposals, this
+shows a long-term trend: computer systems are increasingly set up to
+give absentees with clout control over the people actually using the
+computer system. The SSSCA was later renamed to the unpronounceable
+CBDTPA, which was glossed as the “Consume But Don't Try
+Programming Act”.
+</p>
+
+<p>
+The Republicans took control of the US senate shortly thereafter.
+They are less tied to Hollywood than the Democrats, so they did not
+press these proposals. Now that the Democrats are back in control,
+the danger is once again higher.</p>
+
+<p>
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere. The FTAA is one of the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit. The FTAA was effectively killed by
+Lula, President of Brazil, who rejected the DMCA requirement and
+others.</p>
+
+<p>
+Since then, the US has imposed similar requirements on countries such
+as Australia and Mexico through bilateral “free trade”
+agreements, and on countries such as Costa Rica through another
+treaty, CAFTA. Ecuador's President Correa refused to sign a
+“free trade” agreement with the US, but I've heard Ecuador
+had adopted something like the DMCA in 2003.</p>
+
+<p>
+One of the ideas in the story was not proposed in reality until 2002.
+This is the idea that the <abbr>FBI</abbr> and Microsoft will keep
the
+root passwords for your personal computers, and not let you have
+them.</p>
+
+<p>
+The proponents of this scheme have given it names such as
+“trusted computing” and “Palladium”. We call
+it <a href="/philosophy/can-you-trust.html">“treacherous
+computing”</a> because the effect is to make your computer obey
+companies even to the extent of disobeying and defying you. This was
+implemented in 2007 as part of <a href="http://badvista.org/">Windows
+Vista</a>; we expect Apple to do something similar. In this scheme,
+it is the manufacturer that keeps the secret code, but
+the <abbr>FBI</abbr> would have little trouble getting
it.</p>
+
+<p>
+What Microsoft keeps is not exactly a password in the traditional
+sense; no person ever types it on a terminal. Rather, it is a
+signature and encryption key that corresponds to a second key stored
+in your computer. This enables Microsoft, and potentially any web
+sites that cooperate with Microsoft, the ultimate control over what
+the user can do on his own computer.</p>
+
+<p>
+Vista also gives Microsoft additional powers; for instance, Microsoft
+can forcibly install upgrades, and it can order all machines running
+Vista to refuse to run a certain device driver. The main purpose of
+Vista's many restrictions is to impose DRM (Digital Restrictions
+Management) that users can't overcome. The threat of DRM is why we
+have established the <a href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p>
+
+<p>
+When this story was first written, the SPA was threatening small
+Internet service providers, demanding they permit the SPA to monitor
+all users. Most ISPs surrendered when threatened, because they cannot
+afford to fight back in court. One ISP, Community ConneXion in
+Oakland, California, refused the demand and was actually sued. The
+SPA later dropped the suit, but obtained the DMCA, which gave them the
+power they sought.</p>
+
+<p>
+The SPA, which actually stands for Software Publishers Association,
+has been replaced in its police-like role by the Business
+Software Alliance. The BSA is not, today, an official police force;
+unofficially, it acts like one. Using methods reminiscent of the
+erstwhile Soviet Union, it invites people to inform on their coworkers
+and friends. A BSA terror campaign in Argentina in 2001 made
+slightly veiled threats that people sharing software would be raped.</p>
+
+<p>
+The university security policies described above are not imaginary.
+For example, a computer at one Chicago-area university displayed this
+message upon login:</p>
+
+<blockquote><p>
+This system is for the use of authorized users only. Individuals using
+this computer system without authority or in the excess of their authority
+are subject to having all their activities on this system monitored and
+recorded by system personnel. In the course of monitoring individuals
+improperly using this system or in the course of system maintenance, the
+activities of authorized user may also be monitored. Anyone using this
+system expressly consents to such monitoring and is advised that if such
+monitoring reveals possible evidence of illegal activity or violation of
+University regulations system personnel may provide the evidence of such
+monitoring to University authorities and/or law enforcement officials.
+</p></blockquote>
+
+<p>
+This is an interesting approach to the Fourth Amendment: pressure most
+everyone to agree, in advance, to waive their rights under it.</p>
+
+<h3 id="BadNews">Bad News</h3>
+
+<p>
+The battle for the right to read is already in progress,
+The enemy is organized, while we are not, so it is going against us.
+Here are articles about bad things that have happened since the
+original publication of this article.</p>
+
+<ul>
+<li>Today's commercial ebooks <a
href="/philosophy/the-danger-of-ebooks.html">
+ abolish readers' traditional freedoms.</a></li>
+<li><a href="http://www.nature.com/nature_education/biology.html">
+ A "biology textbook" web site</a> that you can access only by
signing
+ a <a href="http://www.nature.com/principles/viewTermsOfUse">
+ contract not to lend it to anyone else</a>, which the publisher can
+ revoke at will.</li>
+<li><a <span
class="removed"><del><strong>href="http://news.zdnet.com/2100-9595_22-103151.html">Electronic</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic</em></ins></span>
+ Publishing:</a> An article about distribution of books in
+ electronic form, and copyright issues affecting the right to read
+ a copy.</li>
+<li><a
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx">Books
+ inside Computers:</a> Software to control who can read
+ books and documents on a PC.</li>
+</ul>
+
+<p>If we want to stop the bad news and create some good news, we need
+to organize and fight. The
+FSF's <a href="http://defectivebydesign.org"> Defective by
Design</a>
+campaign has made a start — subscribe to the campaign's mailing
+list to lend a hand. And <a href="http://www.fsf.org/associate">join
+the FSF</a> to help fund our work.
+</p>
+
+<h3 id="References">References</h3>
+
+<ul>
+ <li>The administration's “White Paper”: Information
+ Infrastructure Task Force, Intellectual Property [<a
+ href="/philosophy/not-ipr.html">sic</a>] and the
+ National Information Infrastructure: The Report of the Working
+ Group on Intellectual Property [sic] Rights (1995).</li>
+
+ <li><a
href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html">An
+ explanation of the White Paper:
+ The Copyright Grab</a>, Pamela Samuelson, Wired, Jan.
1996</li>
+
+ <li><a <span
class="removed"><del><strong>href="http://www.law.duke.edu/boylesite/sold_out.htm">Sold</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.law.duke.edu/boylesite/Sold_out.htm">Sold</em></ins></span>
Out</a>,
+ James Boyle, New York Times, 31 March 1996</li>
+
+ <li><a
href="http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public
Data or Private Data</a>,
+ Washington Post, 4 Nov 1996. </li>
+
+ <li><a href="http://www.public-domain.org/">Union for the Public
+ Domain</a>—an organization which aims to resist and
+ reverse the overextension of copyright and patent powers.</li>
+</ul>
+
+<hr />
+<h4>This essay is published
+in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</h4>
+
+<p><strong>Other Texts to Read</strong></p>
+
+<ul>
+ <li><a href="/philosophy/philosophy.html">Philosophy of the
+ GNU Project</a></li>
+ <li><a <span
class="removed"><del><strong>href="http://www.computerworld.com/managementtopics/management/opinion/story/0,10801,49358,00.html"</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"</em></ins></span>
+ id="COPYPROCTECTION">Copy Protection: Just Say No</a>,
+ Published in Computer World.</li>
+</ul>
+
+</div>
+
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+
+<p>
+Please send FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.
+<br />
+Please send broken links and other corrections or suggestions to
+<a href="mailto:address@hidden"><address@hidden></a>.
+</p>
+
+<p>
+Please see the
+<a href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting
+translations of this article.
+</p>
+
+<p>
+Copyright © 1996, 2002, 2007, 2009, 2010 Richard Stallman
+<br />
+This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
+Commons Attribution-NoDerivs 3.0 United States License</a>.
+</p>
+
+<p>
+Updated:
+<!-- timestamp start -->
+$Date: 2012/11/11 01:28:24 $
+<!-- timestamp end -->
+</p>
+</div>
+
+</div>
+</body>
+</html>
+</pre></body></html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www people/po/people.de.po people/po/people.es....,
GNUN <=