[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy right-to-read.cs.html right-to-r...
From: |
GNUN |
Subject: |
www/philosophy right-to-read.cs.html right-to-r... |
Date: |
Tue, 19 Mar 2013 04:59:40 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 13/03/19 04:59:40
Modified files:
philosophy : right-to-read.cs.html right-to-read.nl.html
philosophy/po : right-to-read.translist
Added files:
philosophy/po : right-to-read.cs-diff.html
right-to-read.nl-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.cs.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.nl.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.translist?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.cs-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.nl-diff.html?cvsroot=www&rev=1.1
Patches:
Index: right-to-read.cs.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.cs.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- right-to-read.cs.html 1 Jan 2013 00:57:40 -0000 1.15
+++ right-to-read.cs.html 19 Mar 2013 04:59:38 -0000 1.16
@@ -7,6 +7,13 @@
<title>Právo ÄÃst â Projekt GNU â Nadace pro svobodný software
(FSF)</title>
<!--#include virtual="/server/banner.cs.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="http://www.gnu.org/philosophy/po/right-to-read.cs.po">
+ http://www.gnu.org/philosophy/po/right-to-read.cs.po</a>' -->
+ <!--#set var="ORIGINAL_FILE" value="/philosophy/right-to-read.html" -->
+ <!--#set var="DIFF_FILE" value="/philosophy/po/right-to-read.cs-diff.html" -->
+ <!--#set var="OUTDATED_SINCE" value="2013-01-17" -->
+ <!--#include virtual="/server/outdated.cs.html" -->
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<h2>Právo ÄÃst</h2>
@@ -383,7 +390,7 @@
<!-- timestamp start -->
Aktualizováno:
-$Date: 2013/01/01 00:57:40 $
+$Date: 2013/03/19 04:59:38 $
<!-- timestamp end -->
</p>
Index: right-to-read.nl.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.nl.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- right-to-read.nl.html 2 Jan 2013 16:28:35 -0000 1.7
+++ right-to-read.nl.html 19 Mar 2013 04:59:38 -0000 1.8
@@ -7,6 +7,13 @@
<title>Het Recht om te Lezen- GNU Project - Free Software Foundation
(FSF)</title>
<!--#include virtual="/server/banner.nl.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="http://www.gnu.org/philosophy/po/right-to-read.nl.po">
+ http://www.gnu.org/philosophy/po/right-to-read.nl.po</a>' -->
+ <!--#set var="ORIGINAL_FILE" value="/philosophy/right-to-read.html" -->
+ <!--#set var="DIFF_FILE" value="/philosophy/po/right-to-read.nl-diff.html" -->
+ <!--#set var="OUTDATED_SINCE" value="2013-01-17" -->
+ <!--#include virtual="/server/outdated.nl.html" -->
<!--#include virtual="/philosophy/po/right-to-read.translist" -->
<h2>Het Recht om te Lezen</h2>
@@ -407,7 +414,7 @@
<!-- timestamp start -->
Bijgewerkt:
-$Date: 2013/01/02 16:28:35 $
+$Date: 2013/03/19 04:59:38 $
<!-- timestamp end -->
</p>
Index: po/right-to-read.translist
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.translist,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/right-to-read.translist 1 Mar 2013 04:11:52 -0000 1.7
+++ po/right-to-read.translist 19 Mar 2013 04:59:39 -0000 1.8
@@ -2,29 +2,29 @@
<!--#set var="TRANSLATION_LIST"
value='<div id="translations">
<p>
-<span dir="ltr" class="original"><a
href="/philosophy/right-to-read.en.html">English</a> [en]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.ar.html">اÙعربÙØ©</a> [ar]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.bg.html">бÑлгаÑÑки</a> [bg]</span>
-<span dir="ltr"><a href="/philosophy/right-to-read.ca.html">catalÃ
</a> [ca]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.cs.html">Äesky</a> [cs]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.de.html">Deutsch</a> [de]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.es.html">español</a> [es]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.fa.html">ÙارسÛ</a> [fa]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.fi.html">suomi</a> [fi]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.fr.html">français</a> [fr]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.he.html">×¢×ר×ת</a> [he]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.hu.html">magyar</a> [hu]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.it.html">italiano</a> [it]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.ja.html">æ¥æ¬èª</a> [ja]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.ko.html">íêµì´</a> [ko]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.nl.html">Nederlands</a> [nl]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.pl.html">polski</a> [pl]</span>
-<span dir="ltr"><a href="/philosophy/right-to-read.pt-br.html">português do
Brasil</a> [pt-br]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.ru.html">ÑÑÑÑкий</a> [ru]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.sl.html">slovenÅ¡Äina</a> [sl]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.sr.html">ÑÑпÑки</a> [sr]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.sv.html">svenska</a> [sv]</span>
-<span dir="ltr"><a
href="/philosophy/right-to-read.tr.html">Türkçe</a> [tr]</span>
+<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/philosophy/right-to-read.en.html">English</a> [en]</span>
+<span dir="ltr"><a lang="ar" hreflang="ar"
href="/philosophy/right-to-read.ar.html">اÙعربÙØ©</a> [ar]</span>
+<span dir="ltr"><a lang="bg" hreflang="bg"
href="/philosophy/right-to-read.bg.html">бÑлгаÑÑки</a> [bg]</span>
+<span dir="ltr"><a lang="ca" hreflang="ca"
href="/philosophy/right-to-read.ca.html">catalÃ
</a> [ca]</span>
+<span dir="ltr"><a lang="cs" hreflang="cs"
href="/philosophy/right-to-read.cs.html">Äesky</a> [cs]</span>
+<span dir="ltr"><a lang="de" hreflang="de"
href="/philosophy/right-to-read.de.html">Deutsch</a> [de]</span>
+<span dir="ltr"><a lang="es" hreflang="es"
href="/philosophy/right-to-read.es.html">español</a> [es]</span>
+<span dir="ltr"><a lang="fa" hreflang="fa"
href="/philosophy/right-to-read.fa.html">ÙارسÛ</a> [fa]</span>
+<span dir="ltr"><a lang="fi" hreflang="fi"
href="/philosophy/right-to-read.fi.html">suomi</a> [fi]</span>
+<span dir="ltr"><a lang="fr" hreflang="fr"
href="/philosophy/right-to-read.fr.html">français</a> [fr]</span>
+<span dir="ltr"><a lang="he" hreflang="he"
href="/philosophy/right-to-read.he.html">×¢×ר×ת</a> [he]</span>
+<span dir="ltr"><a lang="hu" hreflang="hu"
href="/philosophy/right-to-read.hu.html">magyar</a> [hu]</span>
+<span dir="ltr"><a lang="it" hreflang="it"
href="/philosophy/right-to-read.it.html">italiano</a> [it]</span>
+<span dir="ltr"><a lang="ja" hreflang="ja"
href="/philosophy/right-to-read.ja.html">æ¥æ¬èª</a> [ja]</span>
+<span dir="ltr"><a lang="ko" hreflang="ko"
href="/philosophy/right-to-read.ko.html">íêµì´</a> [ko]</span>
+<span dir="ltr"><a lang="nl" hreflang="nl"
href="/philosophy/right-to-read.nl.html">Nederlands</a> [nl]</span>
+<span dir="ltr"><a lang="pl" hreflang="pl"
href="/philosophy/right-to-read.pl.html">polski</a> [pl]</span>
+<span dir="ltr"><a lang="pt-br" hreflang="pt-br"
href="/philosophy/right-to-read.pt-br.html">português do
Brasil</a> [pt-br]</span>
+<span dir="ltr"><a lang="ru" hreflang="ru"
href="/philosophy/right-to-read.ru.html">ÑÑÑÑкий</a> [ru]</span>
+<span dir="ltr"><a lang="sl" hreflang="sl"
href="/philosophy/right-to-read.sl.html">slovenÅ¡Äina</a> [sl]</span>
+<span dir="ltr"><a lang="sr" hreflang="sr"
href="/philosophy/right-to-read.sr.html">ÑÑпÑки</a> [sr]</span>
+<span dir="ltr"><a lang="sv" hreflang="sv"
href="/philosophy/right-to-read.sv.html">svenska</a> [sv]</span>
+<span dir="ltr"><a lang="tr" hreflang="tr"
href="/philosophy/right-to-read.tr.html">Türkçe</a> [tr]</span>
</p>
</div>' -->
<!--#if expr="$HTML_BODY = yes" -->
Index: po/right-to-read.cs-diff.html
===================================================================
RCS file: po/right-to-read.cs-diff.html
diff -N po/right-to-read.cs-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/right-to-read.cs-diff.html 19 Mar 2013 04:59:39 -0000 1.1
@@ -0,0 +1,408 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/right-to-read.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<title>The Right to Read - GNU Project - Free Software Foundation
(FSF)</title>
+<!--#include <span
class="removed"><del><strong>virtual="/server/banner.html"</strong></del></span>
<span
class="inserted"><ins><em>virtual="/philosophy/po/right-to-read.translist"</em></ins></span>
-->
+<!--#include <span
class="removed"><del><strong>virtual="/philosophy/po/right-to-read.translist"</strong></del></span>
<span
class="inserted"><ins><em>virtual="/server/banner.html"</em></ins></span> -->
+<h2>The Right to Read</h2>
+
+<p>
+by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
+
+<div style="text-align: center; font-size: 110%;text-shadow: 0 0 0.2em
#fff; width: 300px; float: right; margin: 12px; background-color: #a0f112;
color: #353831; padding: 1em;"><a
href="http://defectivebydesign.org/ebooks.html">Join our mailing list about
the dangers of eBooks</a>.</div>
+
+<p>
+<em>This article appeared in the February 1997 issue
+of <strong>Communications of the ACM</strong> (Volume 40, Number
+2).</em></p>
+
+<blockquote><p>
+ From <cite>The Road To Tycho</cite>, a collection of
+ articles about the antecedents of the Lunarian
+ Revolution, published in Luna City in 2096.
+</p></blockquote>
+
+<p>
+For Dan Halbert, the road to Tycho began in college—when Lissa
+Lenz asked to borrow his computer. Hers had broken down, and unless
+she could borrow another, she would fail her midterm project. There
+was no one she dared ask, except Dan.</p>
+
+<p>
+This put Dan in a dilemma. He had to help her—but if he lent
+her his computer, she might read his books. Aside from the fact that
+you could go to prison for many years for letting someone else read
+your books, the very idea shocked him at first. Like everyone, he had
+been taught since elementary school that sharing books was nasty and
+wrong—something that only pirates would do.</p>
+
+<p>
+And there wasn't much chance that the SPA—the Software
+Protection Authority—would fail to catch him. In his software
+class, Dan had learned that each book had a copyright monitor that
+reported when and where it was read, and by whom, to Central
+Licensing. (They used this information to catch reading pirates, but
+also to sell personal interest profiles to retailers.) The next time
+his computer was networked, Central Licensing would find out. He, as
+computer owner, would receive the harshest punishment—for not
+taking pains to prevent the crime.</p>
+
+<p>
+Of course, Lissa did not necessarily intend to read his books. She
+might want the computer only to write her midterm. But Dan knew she
+came from a middle-class family and could hardly afford the tuition,
+let alone her reading fees. Reading his books might be the only way
+she could graduate. He understood this situation; he himself had had
+to borrow to pay for all the research papers he read. (Ten percent of those
+fees went to the researchers who wrote the papers; since Dan aimed for
+an academic career, he could hope that his own research papers, if
+frequently referenced, would bring in enough to repay this loan.)</p>
+
+<p>
+Later on, Dan would learn there was a time when anyone could go to the
+library and read journal articles, and even books, without having to
+pay. There were independent scholars who read thousands of pages
+without government library grants. But in the 1990s, both commercial
+and nonprofit journal publishers had begun charging fees for access.
+By 2047, libraries offering free public access to scholarly literature
+were a dim memory.</p>
+
+<p>
+There were ways, of course, to get around the SPA and Central
+Licensing. They were themselves illegal. Dan had had a classmate in
+software, Frank Martucci, who had obtained an illicit debugging tool,
+and used it to skip over the copyright monitor code when reading
+books. But he had told too many friends about it, and one of them
+turned him in to the SPA for a reward (students deep in debt were
+easily tempted into betrayal). In 2047, Frank was in prison, not for
+pirate reading, but for possessing a debugger.</p>
+
+<p>
+Dan would later learn that there was a time when anyone could have
+debugging tools. There were even free debugging tools available on CD
+or downloadable over the net. But ordinary users started using them
+to bypass copyright monitors, and eventually a judge ruled that this
+had become their principal use in actual practice. This meant they
+were illegal; the debuggers' developers were sent to prison.</p>
+
+<p>
+Programmers still needed debugging tools, of course, but debugger
+vendors in 2047 distributed numbered copies only, and only to
+officially licensed and bonded programmers. The debugger Dan used in
+software class was kept behind a special firewall so that it could be
+used only for class exercises.</p>
+
+<p>
+It was also possible to bypass the copyright monitors by installing a
+modified system kernel. Dan would eventually find out about the free
+kernels, even entire free operating systems, that had existed around
+the turn of the century. But not only were they illegal, like
+debuggers—you could not install one if you had one, without
+knowing your computer's root password. And neither
+the <abbr title="Federal Bureau of Investigation">FBI</abbr> nor
+Microsoft Support would tell you that.</p>
+
+<p>
+Dan concluded that he couldn't simply lend Lissa his computer. But he
+couldn't refuse to help her, because he loved her. Every chance to
+speak with her filled him with delight. And that she chose him to ask
+for help, that could mean she loved him too.</p>
+
+<p>
+Dan resolved the dilemma by doing something even more
+unthinkable—he lent her the computer, and told her his password.
+This way, if Lissa read his books, Central Licensing would think he
+was reading them. It was still a crime, but the SPA would not
+automatically find out about it. They would only find out if Lissa
+reported him.</p>
+
+<p>
+Of course, if the school ever found out that he had given Lissa his
+own password, it would be curtains for both of them as students,
+regardless of what she had used it for. School policy was that any
+interference with their means of monitoring students' computer use was
+grounds for disciplinary action. It didn't matter whether you did
+anything harmful—the offense was making it hard for the
+administrators to check on you. They assumed this meant you were
+doing something else forbidden, and they did not need to know what it
+was.</p>
+
+<p>
+Students were not usually expelled for this—not directly.
+Instead they were banned from the school computer systems, and would
+inevitably fail all their classes.</p>
+
+<p>
+Later, Dan would learn that this kind of university policy started
+only in the 1980s, when university students in large numbers began
+using computers. Previously, universities maintained a different
+approach to student discipline; they punished activities that were
+harmful, not those that merely raised suspicion.</p>
+
+<p>
+Lissa did not report Dan to the SPA. His decision to help her led to
+their marriage, and also led them to question what they had been
+taught about piracy as children. The couple began reading about the
+history of copyright, about the Soviet Union and its restrictions on
+copying, and even the original United States Constitution. They moved
+to Luna, where they found others who had likewise gravitated away from
+the long arm of the SPA. When the Tycho Uprising began in 2062, the
+universal right to read soon became one of its central aims.</p>
+
+
+<h3 id="AuthorsNote">Author's Note</h3>
+
+<p>[This note has been updated several times since the first
+publication of the story.]</p>
+
+<p>
+The right to read is a battle being fought today. Although it may
+take 50 years for our present way of life to fade into obscurity, most
+of the specific laws and practices described above have already been
+proposed; many have been enacted into law in the US and elsewhere. In
+the US, the 1998 Digital Millennium Copyright Act (DMCA) established the legal
+basis to restrict the reading and lending of computerized books (and
+other works as well). The European Union imposed similar restrictions
+in a 2001 copyright directive. In France, under the DADVSI law
+adopted in 2006, mere possession of a copy of DeCSS, the free program
+to decrypt video on a DVD, is a crime.</p>
+
+<p>
+In 2001, Disney-funded Senator Hollings proposed a bill called the
+SSSCA that would require every new computer to have mandatory
+copy-restriction facilities that the user cannot bypass. Following
+the Clipper chip and similar US government key-escrow proposals, this
+shows a long-term trend: computer systems are increasingly set up to
+give absentees with clout control over the people actually using the
+computer system. The SSSCA was later renamed to the unpronounceable
+CBDTPA, which was glossed as the “Consume But Don't Try
+Programming Act”.
+</p>
+
+<p>
+The Republicans took control of the US senate shortly thereafter.
+They are less tied to Hollywood than the Democrats, so they did not
+press these proposals. Now that the Democrats are back in control,
+the danger is once again higher.</p>
+
+<p>
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere. The FTAA is one of the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit. The FTAA was effectively killed by
+Lula, President of Brazil, who rejected the DMCA requirement and
+others.</p>
+
+<p>
+Since then, the US has imposed similar requirements on countries such
+as Australia and Mexico through bilateral “free trade”
+agreements, and on countries such as Costa Rica through another
+treaty, CAFTA. Ecuador's President Correa refused to sign a
+“free trade” agreement with the US, but I've heard Ecuador
+had adopted something like the DMCA in 2003.</p>
+
+<p>
+One of the ideas in the story was not proposed in reality until 2002.
+This is the idea that the <abbr>FBI</abbr> and Microsoft will keep
the
+root passwords for your personal computers, and not let you have
+them.</p>
+
+<p>
+The proponents of this scheme have given it names such as
+“trusted computing” and “Palladium”. We call
+it <a href="/philosophy/can-you-trust.html">“treacherous
+computing”</a> because the effect is to make your computer obey
+companies even to the extent of disobeying and defying you. This was
+implemented in 2007 as part of <a href="http://badvista.org/">Windows
+Vista</a>; we expect Apple to do something similar. In this scheme,
+it is the manufacturer that keeps the secret code, but
+the <abbr>FBI</abbr> would have little trouble getting
it.</p>
+
+<p>
+What Microsoft keeps is not exactly a password in the traditional
+sense; no person ever types it on a terminal. Rather, it is a
+signature and encryption key that corresponds to a second key stored
+in your computer. This enables Microsoft, and potentially any web
+sites that cooperate with Microsoft, the ultimate control over what
+the user can do on his own computer.</p>
+
+<p>
+Vista also gives Microsoft additional powers; for instance, Microsoft
+can forcibly install upgrades, and it can order all machines running
+Vista to refuse to run a certain device driver. The main purpose of
+Vista's many restrictions is to impose DRM (Digital Restrictions
+Management) that users can't overcome. The threat of DRM is why we
+have established the <a href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p>
+
+<p>
+When this story was first written, the SPA was threatening small
+Internet service providers, demanding they permit the SPA to monitor
+all users. Most ISPs surrendered when threatened, because they cannot
+afford to fight back in court. One ISP, Community ConneXion in
+Oakland, California, refused the demand and was actually sued. The
+SPA later dropped the suit, but obtained the DMCA, which gave them the
+power they sought.</p>
+
+<p>
+The SPA, which actually stands for Software Publishers Association,
+has been replaced in its police-like role by the Business
+Software Alliance. The BSA is not, today, an official police force;
+unofficially, it acts like one. Using methods reminiscent of the
+erstwhile Soviet Union, it invites people to inform on their coworkers
+and friends. A BSA terror campaign in Argentina in 2001 made
+slightly veiled threats that people sharing software would be raped.</p>
+
+<p>
+The university security policies described above are not imaginary.
+For example, a computer at one Chicago-area university displayed this
+message upon login:</p>
+
+<blockquote><p>
+This system is for the use of authorized users only. Individuals using
+this computer system without authority or in the excess of their authority
+are subject to having all their activities on this system monitored and
+recorded by system personnel. In the course of monitoring individuals
+improperly using this system or in the course of system maintenance, the
+activities of authorized user may also be monitored. Anyone using this
+system expressly consents to such monitoring and is advised that if such
+monitoring reveals possible evidence of illegal activity or violation of
+University regulations system personnel may provide the evidence of such
+monitoring to University authorities and/or law enforcement officials.
+</p></blockquote>
+
+<p>
+This is an interesting approach to the Fourth Amendment: pressure most
+everyone to agree, in advance, to waive their rights under it.</p>
+
+<h3 id="BadNews">Bad News</h3>
+
+<p>
+The battle for the right to read is already in progress,
+The enemy is organized, while we are not, so it is going against us.
+Here are articles about bad things that have happened since the
+original publication of this article.</p>
+
+<ul>
+<li>Today's commercial ebooks <a
href="/philosophy/the-danger-of-ebooks.html">
+ abolish readers' traditional freedoms.</a></li>
+<li><a href="http://www.nature.com/nature_education/biology.html">
+ A "biology textbook" web site</a> that you can access only by
signing
+ a <a href="http://www.nature.com/principles/viewTermsOfUse">
+ contract not to lend it to anyone else</a>, which the publisher can
+ revoke at will.</li>
+<li><a
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic
+ Publishing:</a> An article about distribution of books in
+ electronic form, and copyright issues affecting the right to read
+ a copy.</li>
+<li><a
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx">Books
+ inside Computers:</a> Software to control who can read
+ books and documents on a PC.</li>
+</ul>
+
+<p>If we want to stop the bad news and create some good news, we need
+to organize and fight. The
+FSF's <a href="http://defectivebydesign.org"> Defective by
Design</a>
+campaign has made a start — subscribe to the campaign's mailing
+list to lend a hand. And <a href="http://www.fsf.org/associate">join
+the FSF</a> to help fund our work.
+</p>
+
+<h3 id="References">References</h3>
+
+<ul>
+ <li>The administration's “White Paper”: Information
+ Infrastructure Task Force, Intellectual Property [<a
+ href="/philosophy/not-ipr.html">sic</a>] and the
+ National Information Infrastructure: The Report of the Working
+ Group on Intellectual Property [sic] Rights (1995).</li>
+
+ <li><a
href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html">An
+ explanation of the White Paper:
+ The Copyright Grab</a>, Pamela Samuelson, Wired, Jan.
1996</li>
+
+ <li><a <span
class="removed"><del><strong>href="http://www.law.duke.edu/boylesite/Sold_out.htm">Sold</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.law.duke.edu/boylesite/sold_out.htm">Sold</em></ins></span>
Out</a>,
+ James Boyle, New York Times, 31 March 1996</li>
+
+ <li><a
href="http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public
Data or Private Data</a>,
+ Washington Post, 4 Nov 1996. </li>
+
+ <li><a href="http://www.public-domain.org/">Union for the Public
+ Domain</a>—an organization which aims to resist and
+ reverse the overextension of copyright and patent powers.</li>
+</ul>
+
+<hr />
+<h4>This essay is published
+in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</h4>
+
+<p><strong>Other Texts to Read</strong></p>
+
+<ul>
+ <li><a href="/philosophy/philosophy.html">Philosophy of the
+ GNU Project</a></li>
+ <li><a
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
+ id="COPYPROCTECTION">Copy Protection: Just Say No</a>,
+ Published in Computer World.</li>
+</ul>
+
+</div>
+
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+
+<p>
+Please send FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.
+<br />
+Please send broken links and other corrections or suggestions to
+<a href="mailto:address@hidden"><address@hidden></a>.
+</p>
+
+<p>
+Please see the
+<a href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting
+translations of this article.
+</p>
+
+<p>
+Copyright © 1996, 2002, 2007, 2009, 2010 Richard Stallman
+<br />
+This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
+Commons Attribution-NoDerivs 3.0 United States License</a>.
+</p>
+
+<span class="removed"><del><strong><p>
+Updated:</strong></del></span>
+
+<span class="inserted"><ins><em><!--#include
virtual="/server/bottom-notes.html" -->
+
+<p>Updated:</em></ins></span>
+<!-- timestamp start -->
+$Date: 2013/03/19 04:59:39 $
+<!-- timestamp end -->
+</p>
+</div>
+
+</div>
+</body>
+</html>
+</pre></body></html>
Index: po/right-to-read.nl-diff.html
===================================================================
RCS file: po/right-to-read.nl-diff.html
diff -N po/right-to-read.nl-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/right-to-read.nl-diff.html 19 Mar 2013 04:59:39 -0000 1.1
@@ -0,0 +1,408 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/right-to-read.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<title>The Right to Read - GNU Project - Free Software Foundation
(FSF)</title>
+<!--#include <span
class="removed"><del><strong>virtual="/server/banner.html"</strong></del></span>
<span
class="inserted"><ins><em>virtual="/philosophy/po/right-to-read.translist"</em></ins></span>
-->
+<!--#include <span
class="removed"><del><strong>virtual="/philosophy/po/right-to-read.translist"</strong></del></span>
<span
class="inserted"><ins><em>virtual="/server/banner.html"</em></ins></span> -->
+<h2>The Right to Read</h2>
+
+<p>
+by <a href="http://www.stallman.org/"><strong>Richard
Stallman</strong></a></p>
+
+<div style="text-align: center; font-size: 110%;text-shadow: 0 0 0.2em
#fff; width: 300px; float: right; margin: 12px; background-color: #a0f112;
color: #353831; padding: 1em;"><a
href="http://defectivebydesign.org/ebooks.html">Join our mailing list about
the dangers of eBooks</a>.</div>
+
+<p>
+<em>This article appeared in the February 1997 issue
+of <strong>Communications of the ACM</strong> (Volume 40, Number
+2).</em></p>
+
+<blockquote><p>
+ From <cite>The Road To Tycho</cite>, a collection of
+ articles about the antecedents of the Lunarian
+ Revolution, published in Luna City in 2096.
+</p></blockquote>
+
+<p>
+For Dan Halbert, the road to Tycho began in college—when Lissa
+Lenz asked to borrow his computer. Hers had broken down, and unless
+she could borrow another, she would fail her midterm project. There
+was no one she dared ask, except Dan.</p>
+
+<p>
+This put Dan in a dilemma. He had to help her—but if he lent
+her his computer, she might read his books. Aside from the fact that
+you could go to prison for many years for letting someone else read
+your books, the very idea shocked him at first. Like everyone, he had
+been taught since elementary school that sharing books was nasty and
+wrong—something that only pirates would do.</p>
+
+<p>
+And there wasn't much chance that the SPA—the Software
+Protection Authority—would fail to catch him. In his software
+class, Dan had learned that each book had a copyright monitor that
+reported when and where it was read, and by whom, to Central
+Licensing. (They used this information to catch reading pirates, but
+also to sell personal interest profiles to retailers.) The next time
+his computer was networked, Central Licensing would find out. He, as
+computer owner, would receive the harshest punishment—for not
+taking pains to prevent the crime.</p>
+
+<p>
+Of course, Lissa did not necessarily intend to read his books. She
+might want the computer only to write her midterm. But Dan knew she
+came from a middle-class family and could hardly afford the tuition,
+let alone her reading fees. Reading his books might be the only way
+she could graduate. He understood this situation; he himself had had
+to borrow to pay for all the research papers he read. (Ten percent of those
+fees went to the researchers who wrote the papers; since Dan aimed for
+an academic career, he could hope that his own research papers, if
+frequently referenced, would bring in enough to repay this loan.)</p>
+
+<p>
+Later on, Dan would learn there was a time when anyone could go to the
+library and read journal articles, and even books, without having to
+pay. There were independent scholars who read thousands of pages
+without government library grants. But in the 1990s, both commercial
+and nonprofit journal publishers had begun charging fees for access.
+By 2047, libraries offering free public access to scholarly literature
+were a dim memory.</p>
+
+<p>
+There were ways, of course, to get around the SPA and Central
+Licensing. They were themselves illegal. Dan had had a classmate in
+software, Frank Martucci, who had obtained an illicit debugging tool,
+and used it to skip over the copyright monitor code when reading
+books. But he had told too many friends about it, and one of them
+turned him in to the SPA for a reward (students deep in debt were
+easily tempted into betrayal). In 2047, Frank was in prison, not for
+pirate reading, but for possessing a debugger.</p>
+
+<p>
+Dan would later learn that there was a time when anyone could have
+debugging tools. There were even free debugging tools available on CD
+or downloadable over the net. But ordinary users started using them
+to bypass copyright monitors, and eventually a judge ruled that this
+had become their principal use in actual practice. This meant they
+were illegal; the debuggers' developers were sent to prison.</p>
+
+<p>
+Programmers still needed debugging tools, of course, but debugger
+vendors in 2047 distributed numbered copies only, and only to
+officially licensed and bonded programmers. The debugger Dan used in
+software class was kept behind a special firewall so that it could be
+used only for class exercises.</p>
+
+<p>
+It was also possible to bypass the copyright monitors by installing a
+modified system kernel. Dan would eventually find out about the free
+kernels, even entire free operating systems, that had existed around
+the turn of the century. But not only were they illegal, like
+debuggers—you could not install one if you had one, without
+knowing your computer's root password. And neither
+the <abbr title="Federal Bureau of Investigation">FBI</abbr> nor
+Microsoft Support would tell you that.</p>
+
+<p>
+Dan concluded that he couldn't simply lend Lissa his computer. But he
+couldn't refuse to help her, because he loved her. Every chance to
+speak with her filled him with delight. And that she chose him to ask
+for help, that could mean she loved him too.</p>
+
+<p>
+Dan resolved the dilemma by doing something even more
+unthinkable—he lent her the computer, and told her his password.
+This way, if Lissa read his books, Central Licensing would think he
+was reading them. It was still a crime, but the SPA would not
+automatically find out about it. They would only find out if Lissa
+reported him.</p>
+
+<p>
+Of course, if the school ever found out that he had given Lissa his
+own password, it would be curtains for both of them as students,
+regardless of what she had used it for. School policy was that any
+interference with their means of monitoring students' computer use was
+grounds for disciplinary action. It didn't matter whether you did
+anything harmful—the offense was making it hard for the
+administrators to check on you. They assumed this meant you were
+doing something else forbidden, and they did not need to know what it
+was.</p>
+
+<p>
+Students were not usually expelled for this—not directly.
+Instead they were banned from the school computer systems, and would
+inevitably fail all their classes.</p>
+
+<p>
+Later, Dan would learn that this kind of university policy started
+only in the 1980s, when university students in large numbers began
+using computers. Previously, universities maintained a different
+approach to student discipline; they punished activities that were
+harmful, not those that merely raised suspicion.</p>
+
+<p>
+Lissa did not report Dan to the SPA. His decision to help her led to
+their marriage, and also led them to question what they had been
+taught about piracy as children. The couple began reading about the
+history of copyright, about the Soviet Union and its restrictions on
+copying, and even the original United States Constitution. They moved
+to Luna, where they found others who had likewise gravitated away from
+the long arm of the SPA. When the Tycho Uprising began in 2062, the
+universal right to read soon became one of its central aims.</p>
+
+
+<h3 id="AuthorsNote">Author's Note</h3>
+
+<p>[This note has been updated several times since the first
+publication of the story.]</p>
+
+<p>
+The right to read is a battle being fought today. Although it may
+take 50 years for our present way of life to fade into obscurity, most
+of the specific laws and practices described above have already been
+proposed; many have been enacted into law in the US and elsewhere. In
+the US, the 1998 Digital Millennium Copyright Act (DMCA) established the legal
+basis to restrict the reading and lending of computerized books (and
+other works as well). The European Union imposed similar restrictions
+in a 2001 copyright directive. In France, under the DADVSI law
+adopted in 2006, mere possession of a copy of DeCSS, the free program
+to decrypt video on a DVD, is a crime.</p>
+
+<p>
+In 2001, Disney-funded Senator Hollings proposed a bill called the
+SSSCA that would require every new computer to have mandatory
+copy-restriction facilities that the user cannot bypass. Following
+the Clipper chip and similar US government key-escrow proposals, this
+shows a long-term trend: computer systems are increasingly set up to
+give absentees with clout control over the people actually using the
+computer system. The SSSCA was later renamed to the unpronounceable
+CBDTPA, which was glossed as the “Consume But Don't Try
+Programming Act”.
+</p>
+
+<p>
+The Republicans took control of the US senate shortly thereafter.
+They are less tied to Hollywood than the Democrats, so they did not
+press these proposals. Now that the Democrats are back in control,
+the danger is once again higher.</p>
+
+<p>
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere. The FTAA is one of the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit. The FTAA was effectively killed by
+Lula, President of Brazil, who rejected the DMCA requirement and
+others.</p>
+
+<p>
+Since then, the US has imposed similar requirements on countries such
+as Australia and Mexico through bilateral “free trade”
+agreements, and on countries such as Costa Rica through another
+treaty, CAFTA. Ecuador's President Correa refused to sign a
+“free trade” agreement with the US, but I've heard Ecuador
+had adopted something like the DMCA in 2003.</p>
+
+<p>
+One of the ideas in the story was not proposed in reality until 2002.
+This is the idea that the <abbr>FBI</abbr> and Microsoft will keep
the
+root passwords for your personal computers, and not let you have
+them.</p>
+
+<p>
+The proponents of this scheme have given it names such as
+“trusted computing” and “Palladium”. We call
+it <a href="/philosophy/can-you-trust.html">“treacherous
+computing”</a> because the effect is to make your computer obey
+companies even to the extent of disobeying and defying you. This was
+implemented in 2007 as part of <a href="http://badvista.org/">Windows
+Vista</a>; we expect Apple to do something similar. In this scheme,
+it is the manufacturer that keeps the secret code, but
+the <abbr>FBI</abbr> would have little trouble getting
it.</p>
+
+<p>
+What Microsoft keeps is not exactly a password in the traditional
+sense; no person ever types it on a terminal. Rather, it is a
+signature and encryption key that corresponds to a second key stored
+in your computer. This enables Microsoft, and potentially any web
+sites that cooperate with Microsoft, the ultimate control over what
+the user can do on his own computer.</p>
+
+<p>
+Vista also gives Microsoft additional powers; for instance, Microsoft
+can forcibly install upgrades, and it can order all machines running
+Vista to refuse to run a certain device driver. The main purpose of
+Vista's many restrictions is to impose DRM (Digital Restrictions
+Management) that users can't overcome. The threat of DRM is why we
+have established the <a href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p>
+
+<p>
+When this story was first written, the SPA was threatening small
+Internet service providers, demanding they permit the SPA to monitor
+all users. Most ISPs surrendered when threatened, because they cannot
+afford to fight back in court. One ISP, Community ConneXion in
+Oakland, California, refused the demand and was actually sued. The
+SPA later dropped the suit, but obtained the DMCA, which gave them the
+power they sought.</p>
+
+<p>
+The SPA, which actually stands for Software Publishers Association,
+has been replaced in its police-like role by the Business
+Software Alliance. The BSA is not, today, an official police force;
+unofficially, it acts like one. Using methods reminiscent of the
+erstwhile Soviet Union, it invites people to inform on their coworkers
+and friends. A BSA terror campaign in Argentina in 2001 made
+slightly veiled threats that people sharing software would be raped.</p>
+
+<p>
+The university security policies described above are not imaginary.
+For example, a computer at one Chicago-area university displayed this
+message upon login:</p>
+
+<blockquote><p>
+This system is for the use of authorized users only. Individuals using
+this computer system without authority or in the excess of their authority
+are subject to having all their activities on this system monitored and
+recorded by system personnel. In the course of monitoring individuals
+improperly using this system or in the course of system maintenance, the
+activities of authorized user may also be monitored. Anyone using this
+system expressly consents to such monitoring and is advised that if such
+monitoring reveals possible evidence of illegal activity or violation of
+University regulations system personnel may provide the evidence of such
+monitoring to University authorities and/or law enforcement officials.
+</p></blockquote>
+
+<p>
+This is an interesting approach to the Fourth Amendment: pressure most
+everyone to agree, in advance, to waive their rights under it.</p>
+
+<h3 id="BadNews">Bad News</h3>
+
+<p>
+The battle for the right to read is already in progress,
+The enemy is organized, while we are not, so it is going against us.
+Here are articles about bad things that have happened since the
+original publication of this article.</p>
+
+<ul>
+<li>Today's commercial ebooks <a
href="/philosophy/the-danger-of-ebooks.html">
+ abolish readers' traditional freedoms.</a></li>
+<li><a href="http://www.nature.com/nature_education/biology.html">
+ A "biology textbook" web site</a> that you can access only by
signing
+ a <a href="http://www.nature.com/principles/viewTermsOfUse">
+ contract not to lend it to anyone else</a>, which the publisher can
+ revoke at will.</li>
+<li><a
href="http://www.zdnet.com/news/seybold-opens-chapter-on-digital-books/103151">Electronic
+ Publishing:</a> An article about distribution of books in
+ electronic form, and copyright issues affecting the right to read
+ a copy.</li>
+<li><a
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx">Books
+ inside Computers:</a> Software to control who can read
+ books and documents on a PC.</li>
+</ul>
+
+<p>If we want to stop the bad news and create some good news, we need
+to organize and fight. The
+FSF's <a href="http://defectivebydesign.org"> Defective by
Design</a>
+campaign has made a start — subscribe to the campaign's mailing
+list to lend a hand. And <a href="http://www.fsf.org/associate">join
+the FSF</a> to help fund our work.
+</p>
+
+<h3 id="References">References</h3>
+
+<ul>
+ <li>The administration's “White Paper”: Information
+ Infrastructure Task Force, Intellectual Property [<a
+ href="/philosophy/not-ipr.html">sic</a>] and the
+ National Information Infrastructure: The Report of the Working
+ Group on Intellectual Property [sic] Rights (1995).</li>
+
+ <li><a
href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html">An
+ explanation of the White Paper:
+ The Copyright Grab</a>, Pamela Samuelson, Wired, Jan.
1996</li>
+
+ <li><a <span
class="removed"><del><strong>href="http://www.law.duke.edu/boylesite/Sold_out.htm">Sold</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.law.duke.edu/boylesite/sold_out.htm">Sold</em></ins></span>
Out</a>,
+ James Boyle, New York Times, 31 March 1996</li>
+
+ <li><a
href="http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public
Data or Private Data</a>,
+ Washington Post, 4 Nov 1996. </li>
+
+ <li><a href="http://www.public-domain.org/">Union for the Public
+ Domain</a>—an organization which aims to resist and
+ reverse the overextension of copyright and patent powers.</li>
+</ul>
+
+<hr />
+<h4>This essay is published
+in <a
href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</h4>
+
+<p><strong>Other Texts to Read</strong></p>
+
+<ul>
+ <li><a href="/philosophy/philosophy.html">Philosophy of the
+ GNU Project</a></li>
+ <li><a
href="http://www.computerworld.com/s/article/49358/Copy_Protection_Just_Say_No"
+ id="COPYPROCTECTION">Copy Protection: Just Say No</a>,
+ Published in Computer World.</li>
+</ul>
+
+</div>
+
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+
+<p>
+Please send FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.
+<br />
+Please send broken links and other corrections or suggestions to
+<a href="mailto:address@hidden"><address@hidden></a>.
+</p>
+
+<p>
+Please see the
+<a href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting
+translations of this article.
+</p>
+
+<p>
+Copyright © 1996, 2002, 2007, 2009, 2010 Richard Stallman
+<br />
+This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
+Commons Attribution-NoDerivs 3.0 United States License</a>.
+</p>
+
+<span class="removed"><del><strong><p>
+Updated:</strong></del></span>
+
+<span class="inserted"><ins><em><!--#include
virtual="/server/bottom-notes.html" -->
+
+<p>Updated:</em></ins></span>
+<!-- timestamp start -->
+$Date: 2013/03/19 04:59:39 $
+<!-- timestamp end -->
+</p>
+</div>
+
+</div>
+</body>
+</html>
+</pre></body></html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy right-to-read.cs.html right-to-r...,
GNUN <=