www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy government-free-software.pl.html...


From: GNUN
Subject: www/philosophy government-free-software.pl.html...
Date: Sat, 6 Aug 2016 05:28:49 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/08/06 05:28:49

Modified files:
        philosophy     : government-free-software.pl.html 
                         surveillance-vs-democracy.nl.html 
                         who-does-that-server-really-serve.lt.html 
        philosophy/po  : government-free-software.pl-diff.html 
Added files:
        philosophy/po  : surveillance-vs-democracy.nl-diff.html 
                         who-does-that-server-really-serve.lt-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/government-free-software.pl.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.nl.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.lt.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/government-free-software.pl-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.nl-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.lt-diff.html?cvsroot=www&rev=1.1

Patches:
Index: government-free-software.pl.html
===================================================================
RCS file: /web/www/www/philosophy/government-free-software.pl.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- government-free-software.pl.html    1 Mar 2016 04:27:37 -0000       1.20
+++ government-free-software.pl.html    6 Aug 2016 05:28:48 -0000       1.21
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/government-free-software.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/government-free-software.pl.po">
+ https://www.gnu.org/philosophy/po/government-free-software.pl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/government-free-software.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/government-free-software.pl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-06-07" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/government-free-software.en.html" -->
 
 <!--#include virtual="/server/header.pl.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/philosophy/po/government-free-software.translist" -->
 <!--#include virtual="/server/banner.pl.html" -->
+<!--#include virtual="/server/outdated.pl.html" -->
 <h2>Środki, jakich mogą użyć rządy, by promować wolne oprogramowanie</h2>
 
 <p><a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
@@ -310,7 +316,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualizowane:
 
-$Date: 2016/03/01 04:27:37 $
+$Date: 2016/08/06 05:28:48 $
 
 <!-- timestamp end -->
 </p>

Index: surveillance-vs-democracy.nl.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.nl.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- surveillance-vs-democracy.nl.html   24 May 2016 03:58:41 -0000      1.2
+++ surveillance-vs-democracy.nl.html   6 Aug 2016 05:28:48 -0000       1.3
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/surveillance-vs-democracy.nl.po">
+ https://www.gnu.org/philosophy/po/surveillance-vs-democracy.nl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/surveillance-vs-democracy.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/surveillance-vs-democracy.nl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-06-07" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.nl.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -9,6 +14,7 @@
 
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.nl.html" -->
+<!--#include virtual="/server/outdated.nl.html" -->
 <h2>Hoeveel controle kan onze democratie verdragen?</h2>
 
 <p>door <a href="http://www.stallman.org/";>Richard Stallman</a></p>
@@ -574,7 +580,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2016/05/24 03:58:41 $
+$Date: 2016/08/06 05:28:48 $
 
 <!-- timestamp end -->
 </p>

Index: who-does-that-server-really-serve.lt.html
===================================================================
RCS file: /web/www/www/philosophy/who-does-that-server-really-serve.lt.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- who-does-that-server-really-serve.lt.html   8 Feb 2016 21:05:11 -0000       
1.2
+++ who-does-that-server-really-serve.lt.html   6 Aug 2016 05:28:48 -0000       
1.3
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/who-does-that-server-really-serve.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/who-does-that-server-really-serve.lt.po">
+ https://www.gnu.org/philosophy/po/who-does-that-server-really-serve.lt.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/who-does-that-server-really-serve.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/who-does-that-server-really-serve.lt-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2016-06-07" --><!--#set 
var="ENGLISH_PAGE" 
value="/philosophy/who-does-that-server-really-serve.en.html" -->
 
 <!--#include virtual="/server/header.lt.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -9,6 +14,7 @@
 
 <!--#include 
virtual="/philosophy/po/who-does-that-server-really-serve.translist" -->
 <!--#include virtual="/server/banner.lt.html" -->
+<!--#include virtual="/server/outdated.lt.html" -->
 <h2>Ką tas serveris iš tikrųjų aptarnauja?</h2>
 
 <p>pagal <strong>Richard Stallman</strong></p>
@@ -481,7 +487,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Atnaujinta:
 
-$Date: 2016/02/08 21:05:11 $
+$Date: 2016/08/06 05:28:48 $
 
 <!-- timestamp end -->
 </p>

Index: po/government-free-software.pl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/government-free-software.pl-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/government-free-software.pl-diff.html    29 Feb 2016 19:59:29 -0000      
1.2
+++ po/government-free-software.pl-diff.html    6 Aug 2016 05:28:48 -0000       
1.3
@@ -98,7 +98,11 @@
 well as standardized ones.)  For example, they must not distribute
 audio or video recordings in formats that require Flash or nonfree
 codecs, and public libraries must not distribute works with Digital
-Restrictions Management.&lt;/p&gt;&lt;/li&gt;
+Restrictions <span 
class="removed"><del><strong>Management.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>Management.&lt;/p&gt;
+
+&lt;p&gt;To support the policy of distributing publications and works in
+freedom-respecting formats, the state must insist that all reports
+developed for it be delivered in freedom-respecting 
formats.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
 
 &lt;li&gt;&lt;p&gt;&lt;b&gt;Untie computers from licenses&lt;/b&gt;&lt;br /&gt;
 Sale of computers must not require purchase of a proprietary
@@ -160,8 +164,7 @@
 &lt;p&gt;The computational sovereignty (and security) of the state includes
 control over the computers that do the state's work.  This requires
 avoiding &lt;a href="/philosophy/who-does-that-server-really-serve.html"&gt;
-<span class="removed"><del><strong>Software</strong></del></span>
-<span class="inserted"><ins><em>Service</em></ins></span> as a <span 
class="removed"><del><strong>Service&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>Software Substitute&lt;/a&gt;,</em></ins></span> 
unless the service is run by a state
+Service as a Software Substitute&lt;/a&gt;, unless the service is run by a 
state
 agency under the same branch of government, as well as other practices
 that diminish the state control over its computing.  Therefore,&lt;/p&gt;
 
@@ -211,7 +214,7 @@
 restrictions prevent users from developing, installing and using
 replacements for any and all of the installed software that the
 manufacturer could upgrade.  This would apply, in particular, to any
-device on which &ldquo;jailbreaking&rdquo; is needed to install a
+device on which <span 
class="removed"><del><strong>&ldquo;jailbreaking&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a 
href="/proprietary/proprietary-jails.html"&gt;&ldquo;jailbreaking&rdquo;&lt;/a&gt;</em></ins></span>
 is needed to install a
 different operating system, or in which the interfaces for some
 peripherals are secret.
 &lt;/p&gt;&lt;/li&gt;
@@ -264,19 +267,17 @@
 information on coordinating and submitting translations of this 
article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright &copy; <span 
class="removed"><del><strong>2011</strong></del></span> <span 
class="inserted"><ins><em>2011, 2015, 2016</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2011, 2015, 2016 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative</strong></del></span>
-<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</em></ins></span>
-Commons <span class="removed"><del><strong>Attribution-NoDerivs 3.0 United 
States License&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/02/29 19:59:29 $
+$Date: 2016/08/06 05:28:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/surveillance-vs-democracy.nl-diff.html
===================================================================
RCS file: po/surveillance-vs-democracy.nl-diff.html
diff -N po/surveillance-vs-democracy.nl-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/surveillance-vs-democracy.nl-diff.html   6 Aug 2016 05:28:48 -0000       
1.1
@@ -0,0 +1,553 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/surveillance-vs-democracy.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;title&gt;How Much Surveillance Can Democracy Withstand?
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;How Much Surveillance Can Democracy Withstand?&lt;/h2&gt;
+
+&lt;p&gt;by &lt;a href="http://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/p&gt;
+
+&lt;!-- rms: I deleted the link because of Wired's announced
+     anti-ad-block system --&gt;
+&lt;blockquote&gt;&lt;p&gt;A version of this article was first published in 
Wired
+in October 2013.&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;p&gt;Thanks to Edward Snowden's disclosures, we know that the current
+level of general surveillance in society is incompatible with human
+rights.  The repeated harassment and prosecution of dissidents,
+sources, and journalists in the US and elsewhere provides
+confirmation.  We need to reduce the level of general surveillance,
+but how far?  Where exactly is the
+&lt;em&gt;maximum tolerable level of surveillance&lt;/em&gt;, which we must 
ensure
+is not exceeded?  It is the level beyond which surveillance starts to
+interfere with the functioning of democracy, in that whistleblowers
+(such as Snowden) are likely to be caught.&lt;/p&gt;
+
+&lt;p&gt;Faced with government secrecy, we the people depend on
+whistleblowers
+to &lt;a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama"&gt;tell
+us what the state is doing&lt;/a&gt;.  However, today's surveillance
+intimidates potential whistleblowers, which means it is too much.  To
+recover our democratic control over the state, we must reduce
+surveillance to the point where whistleblowers know they are safe.&lt;/p&gt;
+
+&lt;p&gt;Using free/libre
+software, &lt;a href="/philosophy/free-software-even-more-important.html"&gt;as
+I've advocated for 30 years&lt;/a&gt;, is the first step in taking control
+of our digital lives, and that includes preventing surveillance.  We
+can't trust nonfree software; the NSA
+&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/"&gt;uses&lt;/a&gt;
+and
+even &lt;a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;
+security weaknesses in nonfree software to invade our own computers
+and routers.  Free software gives us control of our own computers,
+but &lt;a href="http://www.wired.com/opinion/2013/10/149481/"&gt;that won't
+protect our privacy once we set foot on the Internet&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;a
+href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan
+legislation to &ldquo;curtail the domestic surveillance
+powers&rdquo;&lt;/a&gt; in the U.S. is being drawn up, but it relies on
+limiting the government's use of our virtual dossiers.  That won't
+suffice to protect whistleblowers if &ldquo;catching the
+whistleblower&rdquo; is grounds for access sufficient to identify him
+or her.  We need to go further.&lt;/p&gt;
+
+&lt;h3&gt;The Upper Limit on Surveillance in a Democracy&lt;/h3&gt;
+
+&lt;p&gt;If whistleblowers don't dare reveal crimes and lies, we lose the
+last shred of effective control over our government and institutions.
+That's why surveillance that enables the state to find out who has
+talked with a reporter is too much surveillance&mdash;too much for
+democracy to endure.&lt;/p&gt;
+
+&lt;p&gt;An unnamed U.S. government official ominously told journalists in
+2011 that
+the &lt;a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.
 would
+not subpoena reporters because &ldquo;We know who you're talking
+to.&rdquo;&lt;/a&gt;
+Sometimes &lt;a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'
+phone call records are subpoenaed&lt;/a&gt; to find this out, but Snowden
+has shown us that in effect they subpoena all the phone call records
+of everyone in the U.S., all the
+time, &lt;a 
href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from
+Verizon&lt;/a&gt;
+and &lt;a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from
+other companies too&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Opposition and dissident activities need to keep secrets from
+states that are willing to play dirty tricks on them.  The ACLU has
+demonstrated the U.S. government's &lt;a
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic
+practice of infiltrating peaceful dissident groups&lt;/a&gt; on the pretext
+that there might be terrorists among them.  The point at which
+surveillance is too much is the point at which the state can find who
+spoke to a known journalist or a known dissident.&lt;/p&gt;
+
+&lt;h3&gt;Information, Once Collected, Will Be Misused&lt;/h3&gt;
+
+&lt;p&gt;When people recognize that the level of general surveillance is too
+high, the first response is to propose limits on access to the
+accumulated data.  That sounds nice, but it won't fix the problem, not
+even slightly, even supposing that the government obeys the rules.
+(The NSA has misled the FISA court, which said it
+was &lt;a 
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable
+to effectively hold the NSA accountable&lt;/a&gt;.) Suspicion of a crime
+will be grounds for access, so once a whistleblower is accused of
+&ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
+excuse to access the accumulated material.&lt;/p&gt;
+
+&lt;p&gt;In addition, the state's surveillance staff will misuse the data for
+personal reasons.  Some NSA
+agents &lt;a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used
+U.S. surveillance systems to track their lovers&lt;/a&gt;&mdash;past,
+present, or wished-for&mdash;in a practice called
+&ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
+few times; we don't know how many other times it wasn't caught.  But
+these events shouldn't surprise us, because police have
+long &lt;a href="http://www.sweetliberty.org/issues/privacy/lein1.htm"&gt;used
+their access to driver's license records to track down someone
+attractive&lt;/a&gt;, a practice known as &ldquo;running a plate for a
+date.&rdquo;  This practice has expanded with &lt;a 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared"&gt;new
 digital systems&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;Surveillance data will always be used for other purposes, even if
+this is prohibited.  Once the data has been accumulated and the state
+has the possibility of access to it, it can misuse that data in
+dreadful ways, as shown by examples
+from &lt;a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;
+and &lt;a 
href="https://en.wikipedia.org/wiki/Japanese_American_internment"&gt;the
+US &lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Personal data collected by the state is also likely to be obtained
+by outside crackers that break the security of the servers, even
+by &lt;a 
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml"&gt;crackers
+working for hostile states&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Governments can easily use massive surveillance capability
+to &lt;a 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert
+democracy directly&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Total surveillance accessible to the state enables the state to
+launch a massive fishing expedition against any person.  To make
+journalism and democracy safe, we must limit the accumulation of data
+that is easily accessible to the state.&lt;/p&gt;
+
+&lt;h3&gt;Robust Protection for Privacy Must Be Technical&lt;/h3&gt;
+
+&lt;p&gt;The Electronic Frontier Foundation and other organizations propose
+a set of legal principles designed to &lt;a
+href="https://en.necessaryandproportionate.org/text"&gt;prevent the
+abuses of massive surveillance&lt;/a&gt;.  These principles include,
+crucially, explicit legal protection for whistleblowers; as a
+consequence, they would be adequate for protecting democratic
+freedoms&mdash;if adopted completely and enforced without exception
+forever.&lt;/p&gt;
+
+&lt;p&gt;However, such legal protections are precarious: as recent history
+shows, they can be repealed (as in the FISA Amendments Act),
+suspended, or &lt;a
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Meanwhile, demagogues will cite the usual excuses as grounds for
+total surveillance; any terrorist attack, even one that kills just a
+handful of people, can be hyped to provide an opportunity.&lt;/p&gt;
+
+&lt;p&gt;If limits on access to the data are set aside, it will be as if
+they had never existed: years worth of dossiers would suddenly become
+available for misuse by the state and its agents and, if collected by
+companies, for their private misuse as well.  If, however, we stop the
+collection of dossiers on everyone, those dossiers won't exist, and
+there will be no way to compile them retroactively.  A new illiberal
+regime would have to implement surveillance afresh, and it would only
+collect data starting at that date.  As for suspending or momentarily
+ignoring this law, the idea would hardly make sense.&lt;/p&gt;
+
+&lt;h3&gt;First, Don't Be Foolish&lt;/h3&gt;
+
+&lt;p&gt;To have privacy, you must not throw it away: the first one who has
+to protect your privacy is you.  Avoid identifying yourself to web
+sites, contact them with Tor, and use browsers that block the schemes
+they use to track visitors.  Use the GNU Privacy Guard to encrypt the
+contents of your email.  Pay for things with cash.&lt;/p&gt;
+
+&lt;p&gt;Keep your own data; don't store your data in a company's
+&ldquo;convenient&rdquo; server.  It's safe, however, to entrust a
+data backup to a commercial service, provided you put the files in an
+archive and encrypt the whole archive, including the names of the
+files, with free software on your own computer before uploading
+it.&lt;/p&gt;
+
+&lt;p&gt;For privacy's sake, you must avoid nonfree software since, as a
+consequence of giving others control of your computing, it
+is &lt;a href="/philosophy/proprietary-surveillance.html"&gt;likely to spy
+on you&lt;/a&gt;.
+Avoid &lt;a 
href="/philosophy/who-does-that-server-really-serve.html"&gt;service
+as a software substitute&lt;/a&gt;; as well as giving others control of your
+computing, it requires you to hand over all the pertinent data to the
+server.&lt;/p&gt;
+
+&lt;p&gt;Protect your friends' and acquaintances' privacy,
+too.  &lt;a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't
+give out their personal information&lt;/a&gt; except how to contact them,
+and never give any web site your list of email or phone contacts.
+Don't tell a company such as Facebook anything about your friends that
+they might not wish to publish in a newspaper.  Better yet, don't be
+used by Facebook at all.  Reject communication systems that require
+users to give their real names, even if you are going to give yours,
+since they pressure other people to surrender their privacy.&lt;/p&gt;
+
+&lt;p&gt;Self-protection is essential, but even the most rigorous
+self-protection is insufficient to protect your privacy on or from
+systems that don't belong to you.  When we communicate with others or
+move around the city, our privacy depends on the practices of society.
+We can avoid some of the systems that surveil our communications and
+movements, but not all of them.  Clearly, the better solution is to
+make all these systems stop surveilling people other than legitimate
+suspects.&lt;/p&gt;
+
+&lt;h3&gt;We Must Design Every System for Privacy&lt;/h3&gt;
+
+&lt;p&gt;If we don't want a total surveillance society, we must consider
+surveillance a kind of social pollution, and limit the surveillance
+impact of each new digital system just as we limit the environmental
+impact of physical construction.&lt;/p&gt;
+
+&lt;p&gt;For example: &ldquo;smart&rdquo; meters for electricity are touted
+for sending the power company moment-by-moment data about each
+customer's electric usage, including how usage compares with users in
+general.  This is implemented based on general surveillance, but does
+not require any surveillance.  It would be easy for the power company
+to calculate the average usage in a residential neighborhood by
+dividing the total usage by the number of subscribers, and send that
+to the meters.  Each customer's meter could compare her usage, over
+any desired period of time, with the average usage pattern for that
+period.  The same benefit, with no surveillance!&lt;/p&gt;
+
+&lt;p&gt;We need to design such privacy into all our digital systems.&lt;/p&gt;
+
+&lt;h3&gt;Remedy for Collecting Data: Leaving It Dispersed&lt;/h3&gt;
+
+&lt;p&gt;One way to make monitoring safe for privacy is
+to &lt;a name="dispersal"&gt;keep the data dispersed and inconvenient to
+access&lt;/a&gt;.  Old-fashioned security cameras were no threat to 
privacy(&lt;a href="#privatespace"&gt;*&lt;/a&gt;).
+The recording was stored on the premises, and kept for a few weeks at
+most.  Because of the inconvenience of accessing these recordings, it
+was never done massively; they were accessed only in the places where
+someone reported a crime.  It would not be feasible to physically
+collect millions of tapes every day and watch them or copy them.&lt;/p&gt;
+
+&lt;p&gt;Nowadays, security cameras have become surveillance cameras: they
+are connected to the Internet so recordings can be collected in a data
+center and saved forever.  This is already dangerous, but it is going
+to get worse.  Advances in face recognition may bring the day when
+suspected journalists can be tracked on the street all the time to see
+who they talk with.&lt;/p&gt;
+
+&lt;p&gt;Internet-connected cameras often have lousy digital security
+themselves, <span class="removed"><del><strong>so</strong></del></span> <span 
class="inserted"><ins><em>which
+means</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html"&gt;anyone
+could</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances"&gt;anyone
+can</em></ins></span> watch what <span class="removed"><del><strong>the camera 
sees&lt;/a&gt;.  To restore privacy,</strong></del></span> <span 
class="inserted"><ins><em>those cameras see&lt;/a&gt;.  This makes 
internet-connected
+cameras a major threat to security as well as privacy.  For privacy's
+sake,</em></ins></span> we should ban the use of Internet-connected cameras 
aimed where
+and when the public is admitted, except when carried by people.
+Everyone must be free to post photos and video recordings
+occasionally, but the systematic accumulation of such data on the
+Internet must be limited.&lt;/p&gt;
+
+&lt;p&gt;&lt;a name="privatespace"&gt;&lt;b&gt;*&lt;/b&gt;&lt;/a&gt;I assume 
here that the security
+camera points at the inside of a store, or at the street.  Any camera
+pointed at someone's private space by someone else violates privacy,
+but that is another issue.&lt;/p&gt;
+
+&lt;h3 id="digitalcash"&gt;Remedy for Internet Commerce Surveillance&lt;/h3&gt;
+
+&lt;p&gt;Most data collection comes from people's own digital activities.
+Usually the data is collected first by companies.  But when it comes
+to the threat to privacy and democracy, it makes no difference whether
+surveillance is done directly by the state or farmed out to a
+business, because the data that the companies collect is
+systematically available to the state.&lt;/p&gt;
+
+&lt;p&gt;The NSA, through PRISM,
+has &lt;a href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten
+into the databases of many large Internet corporations&lt;/a&gt;.  AT&amp;T
+has saved all its phone call records since 1987
+and &lt;a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes
+them available to the DEA&lt;/a&gt; to search on request.  Strictly
+speaking, the U.S.  government does not possess that data, but in
+practical terms it may as well possess it.  Some companies are praised
+for &lt;a 
href="https://www.eff.org/who-has-your-back-government-data-requests-2015"&gt;resisting
+government data requests to the limited extent they can&lt;/a&gt;, but that
+can only partly compensate for the harm they do to by collecting that
+data in the first place.  In addition, many of those companies misuse
+the data directly or provide it to data brokers.&lt;/p&gt;
+
+&lt;p&gt;The goal of making journalism and democracy safe therefore requires
+that we reduce the data collected about people by any organization,
+not just by the state.  We must redesign digital systems so that they
+do not accumulate data about their users.  If they need digital data
+about our transactions, they should not be allowed to keep them more
+than a short time beyond what is inherently necessary for their
+dealings with us.&lt;/p&gt;
+
+&lt;p&gt;One of the motives for the current level of surveillance of the
+Internet is that sites are financed through advertising based on
+tracking users' activities and propensities.  This converts a mere
+annoyance&mdash;advertising that we can learn to ignore&mdash;into a
+surveillance system that harms us whether we know it or not.
+Purchases over the Internet also track their users.  And we are all
+aware that &ldquo;privacy policies&rdquo; are more excuses to violate
+privacy than commitments to uphold it.&lt;/p&gt;
+
+&lt;p&gt;We could correct both problems by adopting a system of anonymous
+payments&mdash;anonymous for the payer, that is.  (We don't want to
+help the payee dodge
+taxes.)  &lt;a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin
+is not anonymous&lt;/a&gt;, though there are efforts to develop ways to pay
+anonymously with Bitcoin.  However, technology
+for &lt;a 
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital
+cash was first developed in the 1980s&lt;/a&gt;; we need only suitable
+business arrangements, and for the state not to obstruct them.&lt;/p&gt;
+
+&lt;p&gt;A further threat from sites' collection of personal data is that
+security breakers might get in, take it, and misuse it.  This includes
+customers' credit card details.  An anonymous payment system would end
+this danger: a security hole in the site can't hurt you if the site
+knows nothing about you.&lt;/p&gt;
+
+&lt;h3&gt;Remedy for Travel Surveillance&lt;/h3&gt;
+
+&lt;p&gt;We must convert digital toll collection to anonymous payment (using
+digital cash, for instance).  License-plate recognition systems
+recognize all license plates, and
+the &lt;a 
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm"&gt;data
+can be kept indefinitely&lt;/a&gt;; they should be required by law to notice
+and record only those license numbers that are on a list of cars
+sought by court orders.  A less secure alternative would record all
+cars locally but only for a few days, and not make the full data
+available over the Internet; access to the data should be limited to
+searching for a list of court-ordered license-numbers.&lt;/p&gt;
+
+&lt;p&gt;The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is
+&lt;a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes"&gt;punishment
+without trial&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;It is acceptable to have a list of people whose person and luggage
+will be searched with extra care, and anonymous passengers on domestic
+flights could be treated as if they were on this list.  It is also
+acceptable to bar non-citizens, if they are not permitted to enter the
+country at all, from boarding flights to the country.  This ought to
+be enough for all legitimate purposes.&lt;/p&gt;
+
+&lt;p&gt;Many mass transit systems use some kind of smart cards or RFIDs for
+payment.  These systems accumulate personal data: if you once make the
+mistake of paying with anything but cash, they associate the card
+permanently with your name.  Furthermore, they record all travel
+associated with each card.  Together they amount to massive
+surveillance.  This data collection must be reduced.&lt;/p&gt;
+
+&lt;p&gt;Navigation services do surveillance: the user's computer tells the
+map service the user's location and where the user wants to go; then
+the server determines the route and sends it back to the user's
+computer, which displays it.  Nowadays, the server probably records
+the user's locations, since there is nothing to prevent it.  This
+surveillance is not inherently necessary, and redesign could avoid it:
+free/libre software in the user's computer could download map data for
+the pertinent regions (if not downloaded previously), compute the
+route, and display it, without ever telling anyone where the user is
+or wants to go.&lt;/p&gt;
+
+&lt;p&gt;Systems for borrowing bicycles, etc., can be designed so that the
+borrower's identity is known only inside the station where the item
+was borrowed.  Borrowing would inform all stations that the item is
+&ldquo;out,&rdquo; so when the user returns it at any station (in
+general, a different one), that station will know where and when that
+item was borrowed.  It will inform the other station that the item is
+no longer &ldquo;out.&rdquo; It will also calculate the user's bill,
+and send it (after waiting some random number of minutes) to
+headquarters along a ring of stations, so that headquarters would not
+find out which station the bill came from.  Once this is done, the
+return station would forget all about the transaction.  If an item
+remains &ldquo;out&rdquo; for too long, the station where it was
+borrowed can inform headquarters; in that case, it could send the
+borrower's identity immediately.&lt;/p&gt;
+
+&lt;h3&gt;Remedy for Communications Dossiers&lt;/h3&gt;
+
+&lt;p&gt;Internet service providers and telephone companies keep extensive
+data on their users' contacts (browsing, phone calls, etc).  With
+mobile phones, they
+also &lt;a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record
+the user's physical location&lt;/a&gt;.  They keep these dossiers for a long
+time: over 30 years, in the case of AT&amp;T.  Soon they will
+even &lt;a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record
+the user's body activities&lt;/a&gt;.  It appears that
+the &lt;a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location"&gt;NSA
+collects cell phone location data&lt;/a&gt; in bulk.&lt;/p&gt;
+
+&lt;p&gt;Unmonitored communication is impossible where systems create such
+dossiers.  So it should be illegal to create or keep them.  ISPs and
+phone companies must not be allowed to keep this information for very
+long, in the absence of a court order to surveil a certain party.&lt;/p&gt;
+
+&lt;p&gt;This solution is not entirely satisfactory, because it won't
+physically stop the government from collecting all the information
+immediately as it is generated&mdash;which is what
+the &lt;a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.
 does
+with some or all phone companies&lt;/a&gt;.  We would have to rely on
+prohibiting that by law.  However, that would be better than the
+current situation, where the relevant law (the PAT RIOT Act) does not
+clearly prohibit the practice.  In addition, if the government did
+resume this sort of surveillance, it would not get data about
+everyone's phone calls made prior to that time.&lt;/p&gt;
+
+&lt;p&gt;For privacy about who you exchange email with, a simple partial
+solution is for you and others to use email services in a country that
+would never cooperate with your own government, and which communicate
+with each other using encryption.  However, Ladar Levison (owner of
+the mail service Lavabit that US surveillance sought to corrupt
+completely) has a more sophisticated idea for an encryption system
+through which your email service would know only that you sent mail to
+some user of my email service, and my email service would know only
+that I received mail from some user of your email service, but it
+would be hard to determine that you had sent mail to me.&lt;/p&gt;
+
+&lt;h3&gt;But Some Surveillance Is Necessary&lt;/h3&gt;
+
+&lt;p&gt;For the state to find criminals, it needs to be able to investigate
+specific crimes, or specific suspected planned crimes, under a court
+order.  With the Internet, the power to tap phone conversations would
+naturally extend to the power to tap Internet connections.  This power
+is easy to abuse for political reasons, but it is also necessary.
+Fortunately, this won't make it possible to find whistleblowers after
+the fact, if (as I recommend) we prevent digital systems from accumulating
+massive dossiers before the fact.&lt;/p&gt;
+
+&lt;p&gt;Individuals with special state-granted power, such as police,
+forfeit their right to privacy and must be monitored.  (In fact,
+police have their own jargon term for perjury,
+&ldquo;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302"&gt;testilying&lt;/a&gt;,&rdquo;
+since they do it so frequently, particularly about protesters
+and &lt;a 
href="http://photographyisnotacrime.com/"&gt;photographers&lt;/a&gt;.)
+One city in California that required police to wear video cameras all
+the time
+found &lt;a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their
+use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
+
+&lt;p&gt;&lt;a
+href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
+are not people, and not entitled to human rights&lt;/a&gt;.  It is
+legitimate to require businesses to publish the details of processes
+that might cause chemical, biological, nuclear, fiscal, computational
+(e.g., &lt;a href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;) or political
+(e.g., lobbying) hazards to society, to whatever level is needed for
+public well-being.  The danger of these operations (consider the BP
+oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
+that of terrorism.&lt;/p&gt;
+
+&lt;p&gt;However, journalism must be protected from surveillance even when
+it is carried out as part of a business.&lt;/p&gt;
+
+&lt;hr /&gt;
+
+&lt;p&gt;Digital technology has brought about a tremendous increase in the
+level of surveillance of our movements, actions, and communications.
+It is far more than we experienced in the 1990s, and &lt;a
+href="https://hbr.org/2013/06/your-iphone-works-for-the-secret-police"&gt;far
+more than people behind the Iron Curtain experienced&lt;/a&gt; in the 1980s,
+and proposed legal limits on state use of the accumulated data would
+not alter that.&lt;/p&gt;
+
+&lt;p&gt;Companies are designing even more intrusive surveillance.  Some
+project that pervasive surveillance, hooked to companies such as
+Facebook, could have deep effects on &lt;a
+href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people"&gt;how
+people think&lt;/a&gt;.  Such possibilities are imponderable; but the threat
+to democracy is not speculation.  It exists and is visible today.&lt;/p&gt;
+
+&lt;p&gt;Unless we believe that our free countries previously suffered from
+a grave surveillance deficit, and ought to be surveilled more than the
+Soviet Union and East Germany were, we must reverse this increase.
+That requires stopping the accumulation of big data about people.&lt;/p&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2015, 2016 Richard Stallman&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2016/08/06 05:28:48 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/who-does-that-server-really-serve.lt-diff.html
===================================================================
RCS file: po/who-does-that-server-really-serve.lt-diff.html
diff -N po/who-does-that-server-really-serve.lt-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/who-does-that-server-really-serve.lt-diff.html   6 Aug 2016 05:28:48 
-0000       1.1
@@ -0,0 +1,484 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/who-does-that-server-really-serve.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;title&gt;Who Does That Server Really Serve?
+- GNU Project - Free Software Foundation&lt;/title&gt;
+
+&lt;!--#include 
virtual="/philosophy/po/who-does-that-server-really-serve.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+   
+&lt;h2&gt;Who does that server really serve?&lt;/h2&gt;
+
+&lt;p&gt;by &lt;strong&gt;Richard Stallman&lt;/strong&gt;&lt;/p&gt;
+
+&lt;blockquote&gt;&lt;p&gt;(The first version was published
+in &lt;a 
href="http://www.bostonreview.net/richard-stallman-free-software-DRM"&gt;
+Boston Review&lt;/a&gt;.)&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;p&gt;&lt;strong&gt;On the Internet, proprietary software isn't the only 
way to
+lose your freedom.  Service as a Software Substitute, or SaaSS, is
+another way to give someone else power over your 
computing.&lt;/strong&gt;&lt;/p&gt;
+
+<span class="removed"><del><strong>SaaSS</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;The basic point is, you can have 
control over a program someone else
+wrote (if it's free), but you can never have control over a service
+someone else runs, so never use a service where in principle a program
+would do.&lt;/p&gt;
+
+
+&lt;p&gt;SaaSS</em></ins></span> means using a service implemented by someone 
else as a
+substitute for running your copy of a program.  The term is ours;
+articles and ads won't use it, and they won't tell you whether a
+service is SaaSS.  Instead they will probably use the vague and
+distracting term &ldquo;cloud&rdquo;, which lumps SaaSS together with
+various other practices, some abusive and some ok.  With the
+explanation and examples in this page, you can tell whether a service
+is <span class="removed"><del><strong>SaaSS.</strong></del></span> <span 
class="inserted"><ins><em>SaaSS.&lt;/p&gt;</em></ins></span>
+
+&lt;h3&gt;Background: How Proprietary Software Takes Away Your 
Freedom&lt;/h3&gt;
+
+&lt;p&gt;Digital technology can give you freedom; it can also take your
+freedom away.  The first threat to our control over our computing came
+from &lt;em&gt;proprietary software&lt;/em&gt;: software that the users cannot
+control because the owner (a company such as Apple or Microsoft)
+controls it.  The owner often takes advantage of this unjust power by
+inserting malicious features such as spyware, back doors, and &lt;a
+href="http://DefectiveByDesign.org"&gt;Digital Restrictions Management
+(DRM)&lt;/a&gt; (referred to as &ldquo;Digital Rights Management&rdquo; in
+their propaganda).&lt;/p&gt;
+
+&lt;p&gt;Our solution to this problem is developing &lt;em&gt;free 
software&lt;/em&gt;
+and rejecting proprietary software.  Free software means that you, as
+a user, have four essential freedoms: (0)&nbsp;to run the program as
+you wish, (1)&nbsp;to study and change the source code so it does what
+you wish, (2)&nbsp;to redistribute exact copies, and (3)&nbsp;to
+redistribute copies of your modified versions.  (See
+the &lt;a href="/philosophy/free-sw.html"&gt;free software
+definition&lt;/a&gt;.)&lt;/p&gt;
+
+&lt;p&gt;With free software, we, the users, take back control of our
+computing.  Proprietary software still exists, but we can exclude it
+from our lives and many of us have done so.  However, we are now
+offered another tempting way to cede control over our computing:
+Service as a Software Substitute (SaaSS).  For our freedom's sake, we
+have to reject that too.&lt;/p&gt;
+
+&lt;h3&gt;How Service as a Software Substitute Takes Away Your 
Freedom&lt;/h3&gt;
+
+&lt;p&gt;Service as a Software Substitute (SaaSS) means using a service as a
+substitute for running your copy of a program.  Concretely, it means
+that someone sets up a network server that does certain computing
+tasks&mdash;for instance, modifying a photo, translating text into
+another language, etc.&mdash;then invites users to do computing via
+that server.  A user of the server would send her data to the server,
+which does &lt;em&gt;her own computing&lt;/em&gt; on the data thus provided, 
then
+sends the results back to her or acts directly on her behalf.&lt;/p&gt;
+
+&lt;p&gt;The computing is &lt;em&gt;her own&lt;/em&gt; because, by assumption, 
she
+could, in principle, have done it by running a program on her own
+computer (whether or not that program is available to her at
+present).  In cases where this assumption is not so, it isn't SaaSS.&lt;/p&gt;
+
+&lt;p&gt;These servers wrest control from the users even more inexorably
+than proprietary software.  With proprietary software, users typically
+get an executable file but not the source code.  That makes it hard to
+study the code that is running, so it's hard to determine what the
+program really does, and hard to change it.&lt;/p&gt;
+
+&lt;p&gt;With SaaSS, the users do not have even the executable file that
+does their computing: it is on someone else's server, where the users
+can't see or touch it.  Thus it is impossible for them to ascertain
+what it really does, and impossible to change it.&lt;/p&gt;
+
+&lt;p&gt;Furthermore, SaaSS automatically leads to consequences equivalent
+to the malicious features of certain proprietary software.&lt;/p&gt;
+
+&lt;p&gt; For instance, some proprietary programs are &ldquo;spyware&rdquo;:
+the program &lt;a href="/philosophy/proprietary-surveillance.html"&gt;
+sends out data about users' computing activities&lt;/a&gt;.
+Microsoft Windows sends information about users' activities to
+Microsoft.  Windows Media Player reports what each user watches or
+listens to.  The Amazon Kindle reports which pages of which books the
+user looks at, and when.  Angry Birds reports the user's geolocation
+history.&lt;/p&gt;
+
+&lt;p&gt;Unlike proprietary software, SaaSS does not require covert code to
+obtain the user's data.  Instead, users must send their data to the
+server in order to use it.  This has the same effect as spyware: the
+server operator gets the data&mdash;with no special effort, by the
+nature of SaaSS.  Amy Webb, who intended never to post any photos of
+her daughter, made the mistake of using SaaSS (Instagram) to edit
+photos of her.  Eventually
+&lt;a 
href="http://www.slate.com/articles/technology/data_mine_1/2013/09/privacy_facebook_kids_don_t_post_photos_of_your_kids_on_social_media.html"&gt;
 they
+leaked from there&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;Theoretically, homomorphic encryption might some day advance to the
+point where future SaaSS services might be constructed to be unable to
+understand some of the data that users send them.  Such
+services &lt;em&gt;could&lt;/em&gt; be set up not to snoop on users; this does 
not
+mean they &lt;em&gt;will&lt;/em&gt; do no snooping.&lt;/p&gt;
+
+&lt;p&gt;Some proprietary operating systems have a universal back door,
+permitting someone to remotely install software changes.  For
+instance, Windows has a universal back door with which Microsoft can
+forcibly change any software on the machine.  Nearly all portable
+phones have them, too.  Some proprietary applications also have
+universal back doors; for instance, the Steam client for GNU/Linux
+allows the developer to remotely install modified versions.&lt;/p&gt;
+
+&lt;p&gt;With SaaSS, the server operator can change the software in use on
+the server.  He ought to be able to do this, since it's his computer;
+but the result is the same as using a proprietary application program
+with a universal back door: someone has the power to silently impose
+changes in how the user's computing gets done.&lt;/p&gt;
+
+&lt;p&gt;Thus, SaaSS is equivalent to running proprietary software with
+spyware and a universal back door.  It gives the server operator
+unjust power over the user, and that power is something we must
+resist.&lt;/p&gt;
+
+&lt;h3&gt;SaaSS and SaaS&lt;/h3&gt;
+
+&lt;p&gt;Originally we referred to this problematical practice as
+&ldquo;SaaS&rdquo;, which stands for &ldquo;Software as a
+Service&rdquo;.  It's a commonly used term for setting up software on a
+server rather than offering copies of it to users, and we thought it
+described precisely the cases where this problem occurs.&lt;/p&gt;
+
+&lt;p&gt;Subsequently we became aware that the term SaaS is sometimes used for
+communication services&mdash;activities for which this issue is not
+applicable.  In addition, the term &ldquo;Software as a Service&rdquo;
+doesn't explain &lt;em&gt;why&lt;/em&gt; the practice is bad.  So we coined 
the term
+&ldquo;Service as a Software Substitute&rdquo;, which defines the bad
+practice more clearly and says what is bad about it.&lt;/p&gt;
+
+&lt;h3&gt;Untangling the SaaSS Issue from the Proprietary Software 
Issue&lt;/h3&gt;
+
+&lt;p&gt;SaaSS and proprietary software lead to similar harmful results, but
+the mechanisms are different.  With proprietary software, the
+mechanism is that you have and use a copy which is difficult and/or
+illegal to change.  With SaaSS, the mechanism is that you don't have
+the copy that's doing your computing.&lt;/p&gt;
+
+&lt;p&gt;These two issues are often confused, and not only by accident.  Web
+developers use the vague term &ldquo;web application&rdquo; to lump
+the server software together with programs run on your machine in your
+browser.  Some web pages install nontrivial, even large JavaScript
+programs into your browser without informing
+you.  &lt;a href="/philosophy/javascript-trap.html"&gt;When these JavaScript
+programs are nonfree&lt;/a&gt;, they cause the same sort of injustice as any
+other nonfree software.  Here, however, we are concerned with the
+issue of using the service itself.&lt;/p&gt;
+
+&lt;p&gt;Many free software supporters assume that the problem of SaaSS will
+be solved by developing free software for servers.  For the server
+operator's sake, the programs on the server had better be free; if
+they are proprietary, their developers/owners have power over the
+server.  That's unfair to the server operator, and doesn't help the
+server's users at all.  But if the programs on the server are free,
+that doesn't protect &lt;em&gt;the server's users&lt;/em&gt; from the effects 
of
+SaaSS.  These programs liberate the server operator, but not the
+server's users.&lt;/p&gt;
+
+&lt;p&gt;Releasing the server software source code does benefit the
+community: it enables suitably skilled users to set up similar
+servers, perhaps changing the
+software.  &lt;a href="/licenses/license-recommendations.html"&gt; We
+recommend using the GNU Affero GPL&lt;/a&gt; as the license for programs
+often used on servers.&lt;/p&gt;
+
+&lt;p&gt;But none of these servers would give you control over computing you
+do on it, unless it's &lt;em&gt;your&lt;/em&gt; server (one whose software load
+you control, regardless of whether the machine is your property).  It
+may be OK to trust your friend's server for some jobs, just as you
+might let your friend maintain the software on your own computer.
+Outside of that, all these servers would be SaaSS for you.  SaaSS
+always subjects you to the power of the server operator, and the only
+remedy is, &lt;em&gt;Don't use SaaSS!&lt;/em&gt;  Don't use someone else's 
server
+to do your own computing on data provided by you.&lt;/p&gt;
+
+&lt;p&gt;This issue demonstrates the depth of the difference between
+&ldquo;open&rdquo; and &ldquo;free&rdquo;.  Source code that is open
+source &lt;a href="/philosophy/free-open-overlap.html"&gt;is, nearly always,
+free&lt;/a&gt;.  However, the idea of
+an &lt;a href="http://opendefinition.org/software-service"&gt;&ldquo;open
+software&rdquo; service&lt;/a&gt;, meaning one whose server software is open
+source and/or free, fails to address the issue of SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Services are fundamentally different from programs, and the ethical
+issues that services raise are fundamentally different from the issues
+that programs raise.  To avoid confusion,
+we &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+avoid describing a service as &ldquo;free&rdquo; or
+&ldquo;proprietary.&rdquo;&lt;/a&gt;&lt;/p&gt;
+
+&lt;h3&gt;Distinguishing SaaSS from Other Network Services&lt;/h3&gt;
+
+&lt;p&gt;Which online services are SaaSS?  The clearest example is a
+translation service, which translates (say) English text into Spanish
+text.  Translating a text for you is computing that is purely yours.
+You could do it by running a program on your own computer, if only you
+had the right program.  (To be ethical, that program should be free.)
+The translation service substitutes for that program, so it is Service
+as a Software Substitute, or SaaSS.  Since it denies you control
+over your computing, it does you wrong.&lt;/p&gt;
+
+&lt;p&gt;Another clear example is using a service such as Flickr or
+Instagram to modify a photo.  Modifying photos is an activity that
+people have done in their own computers for decades; doing it in a
+server you don't control, rather than your own computer, is SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Rejecting SaaSS does not mean refusing to use any network servers
+run by anyone other than you.  Most servers are not SaaSS because the
+jobs they do are some sort of communication, rather than the user's
+own computing.&lt;/p&gt;
+
+&lt;p&gt;The original idea of web servers wasn't to do computing for you, it
+was to publish information for you to access.  Even today this is what
+most web sites do, and it doesn't pose the SaaSS problem, because
+accessing someone's published information isn't doing your own
+computing.  Neither is use of a blog site to publish your own works,
+or using a microblogging service such as Twitter or StatusNet.  (These
+services may or may not have other problems, depending on details.)
+The same goes for other communication not meant to be private, such as
+chat groups.&lt;/p&gt;
+
+&lt;p&gt;In its essence, social networking is a form of communication and
+publication, not SaaSS.  However, a service whose main facility is
+social networking can have features or extensions which are SaaSS.&lt;/p&gt;
+
+&lt;p&gt;If a service is not SaaSS, that does not mean it is OK.  There are
+other ethical issues about services.  For instance, Facebook
+distributes video in Flash, which pressures users to run nonfree
+software; it requires running nonfree JavaScript code; and it gives
+users a misleading impression of privacy while luring them into baring
+their lives to Facebook.  Those are important issues, different from
+the SaaSS issue.
+&lt;/p&gt;
+
+&lt;p&gt;Services such as search engines collect data from around the web
+and let you examine it.  Looking through their collection of data
+isn't your own computing in the usual sense&mdash;you didn't provide
+that collection&mdash;so using such a service to search the web is not
+SaaSS.  However, using someone else's server to implement a search
+facility for your own site &lt;em&gt;is&lt;/em&gt; SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Purchasing online is not SaaSS, because the computing
+isn't &lt;em&gt;your own&lt;/em&gt; activity; rather, it is done jointly by and
+for you and the store.  The real issue in online shopping is whether
+you trust the other party with your money and other personal
+information (starting with your name).&lt;/p&gt;
+
+&lt;p&gt;Repository sites such as Savannah and SourceForge are not
+inherently SaaSS, because a repository's job is publication of data
+supplied to it.&lt;/p&gt;
+
+&lt;p&gt;Using a joint project's servers isn't SaaSS because the computing
+you do in this way isn't your own.  For instance, if you edit pages on
+Wikipedia, you are not doing your own computing; rather, you are
+collaborating in Wikipedia's computing.  Wikipedia controls its own
+servers, but organizations as well as individuals encounter the
+problem of SaaSS if they do their computing in someone else's
+server.&lt;/p&gt;
+
+&lt;p&gt;Some sites offer multiple services, and if one is not SaaSS,
+another may be SaaSS.  For instance, the main service of Facebook is
+social networking, and that is not SaaSS; however, it supports
+third-party applications, some of which are SaaSS.  Flickr's main
+service is distributing photos, which is not SaaSS, but it also has
+features for editing photos, which is SaaSS.  Likewise, using
+Instagram to post a photo is not SaaSS, but using it to transform the
+photo is SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Google Docs shows how complex the evaluation of a single service
+can become.  It invites people to edit a document by running a
+large &lt;a href="/philosophy/javascript-trap.html"&gt;nonfree JavaScript
+program&lt;/a&gt;, clearly wrong.  However, it offers an API for uploading
+and downloading documents in standard formats.  A free software editor
+can do so through this API.  This usage scenario is not SaaSS, because
+it uses Google Docs as a mere repository.  Showing all your data to a
+company is bad, but that is a matter of privacy, not SaaSS; depending
+on a service for access to your data is bad, but that is a matter of
+risk, not SaaSS.  On the other hand, using the service for converting
+document formats &lt;em&gt;is&lt;/em&gt; SaaSS, because it's something you 
could
+have done by running a suitable program (free, one hopes) in your own
+computer.&lt;/p&gt;
+
+&lt;p&gt;Using Google Docs through a free editor is rare, of course.  Most
+often, people use it through the nonfree JavaScript program, which is
+bad like any nonfree program.  This scenario might involve SaaSS, too;
+that depends on what part of the editing is done in the JavaScript
+program and what part in the server.  We don't know, but since SaaSS
+and proprietary software do similar wrong to the user, it is not
+crucial to know.&lt;/p&gt;
+
+&lt;p&gt;Publishing via someone else's repository does not raise privacy
+issues, but publishing through Google Docs has a special problem: it
+is impossible even to &lt;em&gt;view the text&lt;/em&gt; of a Google Docs 
document
+in a browser without running the nonfree JavaScript code.  Thus, you
+should not use Google Docs to publish anything&mdash;but the reason
+is not a matter of SaaSS.&lt;/p&gt;
+
+&lt;p&gt;The IT industry discourages users from making these distinctions.
+That's what the buzzword &ldquo;cloud computing&rdquo; is for.  This
+term is so nebulous that it could refer to almost any use of the
+Internet.  It includes SaaSS as well as many other network usage
+practices.  In any given context, an author who writes
+&ldquo;cloud&rdquo; (if a technical person) probably has a specific
+meaning in mind, but usually does not explain that in other articles
+the term has other specific meanings.  The term leads people to
+generalize about practices they ought to consider individually.&lt;/p&gt;
+
+&lt;p&gt;If &ldquo;cloud computing&rdquo; has a meaning, it is not a way of
+doing computing, but rather a way of thinking about computing: a
+devil-may-care approach which says, &ldquo;Don't ask questions.  Don't
+worry about who controls your computing or who holds your data.  Don't
+check for a hook hidden inside our service before you swallow it.
+Trust companies without hesitation.&rdquo; In other words, &ldquo;Be a
+sucker.&rdquo; A cloud in the mind is an obstacle to clear thinking.
+For the sake of clear thinking about computing, let's avoid the term
+&ldquo;cloud.&rdquo;&lt;/p&gt;
+
+&lt;h3 id="renting"&gt;Renting a Server Distinguished from SaaSS&lt;/h3&gt;
+
+&lt;p&gt;If you rent a server (real or virtual), whose software load you
+have control over, that's not SaaSS.  In SaaSS, someone else decides
+what software runs on the server and therefore controls the computing
+it does for you.  In the case where you install the software on the
+server, you control what computing it does for you.  Thus, the rented
+server is virtually your computer.  For this issue, it counts as
+yours.&lt;/p&gt;
+
+&lt;p&gt;The &lt;em&gt;data&lt;/em&gt; on the rented remote server is less 
secure than
+if you had the server at home, but that is a separate issue from
+SaaSS.&lt;/p&gt;
+
+&lt;h3&gt;Dealing with the SaaSS Problem&lt;/h3&gt;
+
+&lt;p&gt;Only a small fraction of all web sites do SaaSS; most don't raise
+the issue.  But what should we do about the ones that raise it?&lt;/p&gt;
+
+&lt;p&gt;For the simple case, where you are doing your own computing on data
+in your own hands, the solution is simple: use your own copy of a free
+software application.  Do your text editing with your copy of a free
+text editor such as GNU Emacs or a free word processor.  Do your photo
+editing with your copy of free software such as GIMP.  What if there
+is no free program available?  A proprietary program or SaaSS would
+take away your freedom, so you shouldn't use those.  You can contribute
+your time or your money to development of a free replacement.&lt;/p&gt;
+
+&lt;p&gt;What about collaborating with other individuals as a group?  It may
+be hard to do this at present without using a server, and your group
+may not know how to run its own server.  If you use someone else's
+server, at least don't trust a server run by a company.  A mere
+contract as a customer is no protection unless you could detect a
+breach and could really sue, and the company probably writes its
+contracts to permit a broad range of abuses.  The state can subpoena
+your data from the company along with everyone else's, as Obama has
+done to phone companies, supposing the company doesn't volunteer them
+like the US phone companies that illegally wiretapped their customers
+for Bush.  If you must use a server, use a server whose operators give
+you a basis for trust beyond a mere commercial relationship.&lt;/p&gt;
+
+&lt;p&gt;However, on a longer time scale, we can create alternatives to
+using servers.  For instance, we can create a peer-to-peer program
+through which collaborators can share data encrypted.  The free
+software community should develop distributed peer-to-peer
+replacements for important &ldquo;web applications&rdquo;.  It may be
+wise to release them under
+the &lt;a href="/licenses/why-affero-gpl.html"&gt; GNU Affero GPL&lt;/a&gt;, 
since
+they are likely candidates for being converted into server-based
+programs by someone else.  The &lt;a href="/"&gt;GNU project&lt;/a&gt; is 
looking
+for volunteers to work on such replacements.  We also invite other
+free software projects to consider this issue in their design.&lt;/p&gt;
+
+&lt;p&gt;In the meantime, if a company invites you to use its server to do
+your own computing tasks, don't yield; don't use SaaSS.  Don't buy or
+install &ldquo;thin clients&rdquo;, which are simply computers so weak
+they make you do the real work on a server, unless you're going to use
+them with &lt;em&gt;your&lt;/em&gt; server.  Use a real computer and keep your
+data there.  Do your own computing with your own copy of a free
+program, for your freedom's sake.&lt;/p&gt;
+
+&lt;h3&gt;See also:&lt;/h3&gt;
+&lt;p&gt;&lt;a href="/philosophy/bug-nobody-allowed-to-understand.html"&gt;The
+Bug Nobody is Allowed to Understand&lt;/a&gt;.&lt;/p&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2010, 2013, 2015, 2016 Richard Stallman&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2016/08/06 05:28:48 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]