www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/po/who-does-that-server-really-s...


From: GNUN
Subject: www philosophy/po/who-does-that-server-really-s...
Date: Mon, 20 Nov 2017 18:59:18 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/11/20 18:59:18

Modified files:
        philosophy/po  : who-does-that-server-really-serve.translist 
                         who-does-that-server-really-serve.zh-cn.po 
        proprietary/po : malware-microsoft.ja-diff.html 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.ja-diff.html 
Added files:
        philosophy     : who-does-that-server-really-serve.zh-cn.html 
        philosophy/po  : who-does-that-server-really-serve.zh-cn-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.zh-cn.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.translist?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.zh-cn.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.zh-cn-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.45&r2=1.46

Patches:
Index: philosophy/po/who-does-that-server-really-serve.translist
===================================================================
RCS file: 
/web/www/www/philosophy/po/who-does-that-server-really-serve.translist,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- philosophy/po/who-does-that-server-really-serve.translist   4 Aug 2017 
07:59:41 -0000       1.19
+++ philosophy/po/who-does-that-server-really-serve.translist   20 Nov 2017 
23:59:18 -0000      1.20
@@ -18,6 +18,7 @@
 <span dir="ltr"><a lang="ro" hreflang="ro" 
href="/philosophy/who-does-that-server-really-serve.ro.html">română</a>&nbsp;[ro]</span>
 &nbsp;
 <span dir="ltr"><a lang="ru" hreflang="ru" 
href="/philosophy/who-does-that-server-really-serve.ru.html">русский</a>&nbsp;[ru]</span>
 &nbsp;
 <span dir="ltr"><a lang="uk" hreflang="uk" 
href="/philosophy/who-does-that-server-really-serve.uk.html">українська</a>&nbsp;[uk]</span>
 &nbsp;
+<span dir="ltr"><a lang="zh-cn" hreflang="zh-cn" 
href="/philosophy/who-does-that-server-really-serve.zh-cn.html">简体中文</a>&nbsp;[zh-cn]</span>
 &nbsp;
 </p>
 </div>' -->
 <link rel="alternate" type="text/html" 
href="/philosophy/who-does-that-server-really-serve.html" hreflang="x-default" 
/>
@@ -37,4 +38,5 @@
 <link rel="alternate" type="text/html" lang="ro" hreflang="ro" 
href="/philosophy/who-does-that-server-really-serve.ro.html" title="română" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/philosophy/who-does-that-server-really-serve.ru.html" 
title="русский" />
 <link rel="alternate" type="text/html" lang="uk" hreflang="uk" 
href="/philosophy/who-does-that-server-really-serve.uk.html" 
title="українська" />
+<link rel="alternate" type="text/html" lang="zh-cn" hreflang="zh-cn" 
href="/philosophy/who-does-that-server-really-serve.zh-cn.html" 
title="简体中文" />
 <!-- end translist file -->

Index: philosophy/po/who-does-that-server-really-serve.zh-cn.po
===================================================================
RCS file: 
/web/www/www/philosophy/po/who-does-that-server-really-serve.zh-cn.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/who-does-that-server-really-serve.zh-cn.po    20 Nov 2017 
23:52:40 -0000      1.3
+++ philosophy/po/who-does-that-server-really-serve.zh-cn.po    20 Nov 2017 
23:59:18 -0000      1.4
@@ -95,11 +95,11 @@
 msgid ""
 "Our solution to this problem is developing <em>free software</em> and "
 "rejecting proprietary software.  Free software means that you, as a user, "
-"have four essential freedoms: (0)&nbsp;to run the program as you wish, "
-"(1)&nbsp;to study and change the source code so it does what you wish, "
-"(2)&nbsp;to redistribute exact copies, and (3)&nbsp;to redistribute copies "
-"of your modified versions.  (See the <a href=\"/philosophy/free-sw.html"
-"\">free software definition</a>.)"
+"have four essential freedoms: (0)&nbsp;to run the program as you wish, (1)"
+"&nbsp;to study and change the source code so it does what you wish, (2)&nbsp;"
+"to redistribute exact copies, and (3)&nbsp;to redistribute copies of your "
+"modified versions.  (See the <a href=\"/philosophy/free-sw.html\">free "
+"software definition</a>.)"
 msgstr ""
 
"我们对此的解决方案是开发<em>自由软件</em>并拒绝专属软件。自由软件意味着,ä½
 ï¼Œ"
 "作为一个用户,拥有四项基本自由:(0)&nbsp;按ç…
§è‡ªç”±çš„意愿运行该软件,(1)&nbsp;"

Index: proprietary/po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/malware-microsoft.ja-diff.html       7 Nov 2017 09:33:14 
-0000       1.10
+++ proprietary/po/malware-microsoft.ja-diff.html       20 Nov 2017 23:59:18 
-0000      1.11
@@ -301,10 +301,16 @@
 user's computer and their use of the computer.&lt;/p&gt;
 
 &lt;p&gt;Furthermore, for users who installed the fourth stable build of
-Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the
+Windows 10, called the &ldquo;Creators Update&rdquo;, Windows maximized the
 surveillance &lt;a
 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
-by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;The &ldquo;Full&rdquo; telemetry mode, allows Microsoft Windows
+ engineers to access, &lt;a 
href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;among
 other things&lt;/a&gt;, registry keys
+ &lt;a 
href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
+ can contain sensitive information like administrator's login
+ password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;Windows DRM
 files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
@@ -505,7 +511,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/11/07 09:33:14 $
+$Date: 2017/11/20 23:59:18 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-surveillance.it-diff.html        19 Nov 2017 
09:30:41 -0000      1.31
+++ proprietary/po/proprietary-surveillance.it-diff.html        20 Nov 2017 
23:59:18 -0000      1.32
@@ -190,11 +190,16 @@
   &lt;li&gt;&lt;p&gt;Windows <span class="inserted"><ins><em>10 telemetry 
program sends information to Microsoft about the
       user's computer and their use of the computer.&lt;/p&gt;
 
-&lt;p&gt;Furthermore, for users who installed the fourth stable build of
-Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the
-surveillance &lt;a
-href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
-by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Furthermore, for users who installed the fourth stable build of
+      Windows 10, called the &ldquo;Creators Update&rdquo;, Windows maximized 
the
+      surveillance&lt;a 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
+      by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The &ldquo;Full&rdquo; telemetry mode, allows Microsoft Windows
+      engineers to access, &lt;a 
href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;among
 other things&lt;/a&gt;, registry keys
+      &lt;a 
href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
+      can contain sensitive information like administrator's login
+      password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Windows</em></ins></span> DRM
   files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
@@ -619,11 +624,12 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;According to Edward 
Snowden,</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Some portable 
phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;According to Edward Snowden,
-      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
+      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over</em></ins></span> smartphones&lt;/a&gt;
       by sending hidden text messages which enable them to turn the phones
       on and off, listen to the microphone, retrieve geo-location data from the
       GPS, take photographs, read text messages, read call, location and web
@@ -676,8 +682,6 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of 
surveillance,</strong></del></span>
   <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Sarahah app 
       &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
       uploads all phone numbers and email addresses&lt;/a&gt; in user's address
@@ -691,10 +695,10 @@
     on what people are listening to or watching&lt;/a&gt;. In addition, it may
     be analyzing people's conversations to serve them with targeted
     advertisements.&lt;/p&gt;
-       &lt;/li&gt;
+       &lt;/li&gt;</em></ins></span>
 
   &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of 
surveillance,</em></ins></span> judging by 
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
     &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
                how much access it demands to personal data in the 
device&lt;/a&gt;.
                &lt;/p&gt;
@@ -1011,22 +1015,26 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Every &ldquo;home security&rdquo; 
camera, if its manufacturer can communicate with it,
-      is a surveillance device. &lt;a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+    <span class="removed"><del><strong>&lt;p&gt;The Nest Cam 
&ldquo;smart&rdquo; camera</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;Every &ldquo;home security&rdquo; 
camera, if its manufacturer can communicate with it,</em></ins></span>
+      is <span class="inserted"><ins><em>a surveillance 
device.</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on 
the fact
-      that the device is tethered to a server.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>manufacturer, based on</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>fact
+      that the device</em></ins></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>tethered to a server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
     &lt;p&gt;But it also demonstrates that the device gives the company
       surveillance capability.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;</em></ins></span>
+  &lt;li&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
       href="http://www.bbc.com/news/technology-34922712"&gt;always
         watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</em></ins></span> it to outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1116,10 +1124,7 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest thermometers
-  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Lots</em></ins></span> of 
<span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; products are
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Lots of 
&ldquo;smart&rdquo; products are
         designed &lt;a 
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
         listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
@@ -1127,11 +1132,11 @@
     making a device that can obey your voice commands without
     potentially spying on you.  Even if it is air-gapped, it could be
     saving up records about you for later examination.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
 
   &lt;li&gt;&lt;p&gt;Nest thermometers
   send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data</em></ins></span> about the user&lt;/a&gt;.&lt;/p&gt;
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
@@ -1576,7 +1581,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/11/19 09:30:41 $
+$Date: 2017/11/20 23:59:18 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-surveillance.ja-diff.html        19 Nov 2017 
09:30:41 -0000      1.45
+++ proprietary/po/proprietary-surveillance.ja-diff.html        20 Nov 2017 
23:59:18 -0000      1.46
@@ -190,11 +190,16 @@
   <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Windows 10 telemetry 
program sends information to Microsoft about the
       user's computer and their use of the computer.&lt;/p&gt;
 
-&lt;p&gt;Furthermore, for users who installed the fourth stable build of
-Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the
-surveillance &lt;a
-href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
-by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Furthermore, for users who installed the fourth stable build of
+      Windows 10, called the &ldquo;Creators Update&rdquo;, Windows maximized 
the
+      surveillance&lt;a 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
+      by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The &ldquo;Full&rdquo; telemetry mode, allows Microsoft Windows
+      engineers to access, &lt;a 
href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;among
 other things&lt;/a&gt;, registry keys
+      &lt;a 
href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
+      can contain sensitive information like administrator's login
+      password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Windows DRM
   files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
@@ -389,10 +394,7 @@
   just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>read logs
       for</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android</strong></del></span> apps <span 
class="removed"><del><strong>(but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 and <span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>also core system logs. TigerVPN developers
+  &lt;li&gt;&lt;p&gt;Gratis Android</strong></del></span> apps <span 
class="removed"><del><strong>(but not &lt;a 
href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)</strong></del></span> <span class="inserted"><ins><em>and 
also core system logs. TigerVPN developers
       have confirmed this.&lt;/dd&gt;
 
     &lt;dt&gt;HideMyAss&lt;/dt&gt;
@@ -496,10 +498,10 @@
   analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
   just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)</em></ins></span>
       connect to 100
       &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;</em></ins></span>
+      on the average.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
       Some Motorola phones modify Android to
@@ -1611,7 +1613,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/11/19 09:30:41 $
+$Date: 2017/11/20 23:59:18 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/who-does-that-server-really-serve.zh-cn.html
===================================================================
RCS file: philosophy/who-does-that-server-really-serve.zh-cn.html
diff -N philosophy/who-does-that-server-really-serve.zh-cn.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/who-does-that-server-really-serve.zh-cn.html     20 Nov 2017 
23:59:18 -0000      1.1
@@ -0,0 +1,236 @@
+<!--#set var="ENGLISH_PAGE" 
value="/philosophy/who-does-that-server-really-serve.en.html" -->
+
+<!--#include virtual="/server/header.zh-cn.html" -->
+<!-- Parent-Version: 1.79 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>服务器究竟为谁服务? - GNU工程 - 
自由软件基金会</title>
+
+<!--#include 
virtual="/philosophy/po/who-does-that-server-really-serve.translist" -->
+<!--#include virtual="/server/banner.zh-cn.html" -->
+<h2>服务器究竟为谁服务?</h2>
+
+<p><strong>Richard Stallman</strong> 著</p>
+
+<blockquote><p>(本文第一版发表于<a
+href="http://www.bostonreview.net/richard-stallman-free-software-DRM";>波士顿评论</a>。)</p></blockquote>
+
+<p><strong>在网络上,专属软件不是唯一让你
失去自由的途径。服务代替软件,或叫SaaSS,就是另一个让你
把计算交给别人的途径。</strong></p>
+
+<p>基本的观点是,你可以控制å…
¶ä»–人编写的程序(如果它是自由软件),但是你
永远不能控制å…
¶ä»–人执行的服务,所以原则上在程序能够完成任务的时候,不要使用服务。</p>
+
+
+<p>SaaSS意味着使用他人实现的服务来代替运行你
自己的软件。该术语是我们用的;其他文章
和广告不会使用它,并且他们不会告诉你
一项服务是否为SaaSS。另一方面,他们可能会用含糊和分散注意力的&ldquo;云&rdquo;这一术语,它把SaaSS和å
…¶ä»–一些实践搞在一起,å…
¶ä¸­æœ‰çš„是滥用,有的还可以。通过本页的解释和举例,你
就能够分辨一项服务究竟是不是SaaSS。</p>
+
+<h3>背景:专属软件如何拿走你的自由</h3>
+
+<p>数字技术能够给你自由;它也能拿走你
的自由。第一个对我们自主控制计算的威胁来自<em>专属软件</em>å›
 ä¸ºå…¶æ‰€æœ‰è€…(诸如苹果或微软之类的å…
¬å¸ï¼‰æŽŒæŽ§è½¯ä»¶ï¼Œæ‰€ä»¥ç”¨æˆ·æ— æ³•æŽ§åˆ¶è¯¥è½¯ä»¶ã€‚其所有者
经常利用这种不公平的权力植å…
¥æ¶æ„åŠŸèƒ½ï¼Œæ¯”如间谍软件、后门和<a
+href="http://DefectiveByDesign.org";>数字权限管理(DRM)</a>(请参考他们宣ä¼
 çš„&ldquo;数字版权管理&rdquo;)。</p>
+
+<p>我们对此的解决方案是开发<em>自由软件</em>并拒绝专属软件。自由软件意味着,ä½
 ï¼Œä½œä¸ºä¸€ä¸ªç”¨æˆ·ï¼Œæ‹¥æœ‰å››é¡¹åŸºæœ¬è‡ªç”±ï¼š(0)&nbsp;按ç…
§è‡ªç”±çš„意愿运行该软件,(1)&nbsp;通过学习和修改源代ç 
è€Œä½¿è½¯ä»¶æŒ‰ç…
§è‡ªå·±çš„意愿运行,(2)&nbsp;分发原来软件的拷贝,(3)&nbsp;分发修改后软件的拷贝(请参看<a
+href="/philosophy/free-sw.html">自由软件的定义</a>。)</p>
+
+<p>通过使用自由软件,我们作为用户,拿回了对我们计算的控制。专属软件仍然存在,但是我们能够把他们排除在我们的生活之外,我们已经做到了。可是,现在有另一种方式诱使我们割让对计算的控制:服务代替软件(SaaSS)。看在自由的份上,我们也å¿
…须拒绝它。</p>
+
+<h3>服务代替软件如何拿走我们的自由</h3>
+
+<p>服务代替软件(SaaSS)意思是使用服务代替运行程序。å…
·ä½“地,它的意思是有人设置一个网络服务器来从事某种计算工作&mdash;比如,修改ç
…
§ç‰‡ã€ç¿»è¯‘文稿等等。&mdash;然后邀请用户使用该服务器做计算。使用服务器的用户会把她的数据发送到服务器,而服务器使用该数据<em>帮她做计算</em>,然后将结果发回给她或è€
…直接以她的名义行事。</p>
+
+<p>计算是<em>她自己的</em>因为,按ç…
§å‡å®šï¼ŒåŽŸåˆ™ä¸Šï¼Œå¥¹å¯ä»¥åœ¨è‡ªå·±çš„电脑上完成计算(无
论她目前是否可以使用该程序)。如果该假定不成立,那么这个æƒ
…况不是SaaSS。</p>
+
+<p>这些服务器夺取用户自由甚至比专属软件还无情
。使用专属软件,用户通常得到可执行文件而不是源代ç 
ã€‚这使学习其代ç 
å˜å¾—困难,所以判断该程序真正的操作变得困难,更改它也变得困难。</p>
+
+<p>使用SaaSS,用户甚至都没有从事å…
¶è®¡ç®—的可执行文件:它在别人的服务器上,用户看不到也摸不着。所以用户不可能弄æ¸
…楚它做了什么,也不可能改变它。</p>
+
+<p>更进一步,SaaSS自动就导致了和某些专属软件的恶意功能相同的后果。</p>
+
+<p> 例如,有些专属软件是&ldquo;间谍软件&rdquo;:该程序<a
+href="/philosophy/proprietary-surveillance.html">向外发送用户的计算活动数据</a>。微软的Windows就把用户的活动发送给微软。Windows媒体播放器汇报每个用户观看或收听的å†
…容。Amazon
+Kindle汇报用户在看哪本书的哪一页以及什么时间。愤怒的小鸟汇报用户的历史位置。</p>
+
+<p>和专属软件不同,SaaSS不需要秘密的代ç 
æ¥èŽ·å¾—用户数据。反过来,用户必
须把数据交给服务器才能获得服务。这和间谍软件的效果一æ 
·ï¼šæœåŠ¡å™¨æ“ä½œè€…获得了数据&mdash;不必花力气,因
为SaaSS就是这样的。Amy
+Webb,从来也没有要发表她女儿的ç…
§ç‰‡ï¼Œé”™è¯¯åœ°ä½¿ç”¨äº†SaaSS(Instagram)来编辑女儿的ç…
§ç‰‡ã€‚最后,<a
+href="http://www.slate.com/articles/technology/data_mine_1/2013/09/privacy_facebook_kids_don_t_post_photos_of_your_kids_on_social_media.html";>ç
…§ç‰‡è¿˜æ˜¯ä»Žé‚£é‡Œæ³„露了出去</a>。
+</p>
+
+<p>理论上,同态加密<sup><a
+href="#TransNote1">1</a></sup>可能发展到有一天未来的SaaSS服务无
法理解用户发来的某些数据。这样的服务<em>可能</em>无
法窥探用户;这并不意味着他们<em>不再</em>窥探。</p>
+
+<p>某些专属软件带有全局后门,它允许远程安装
软件。例如,Windows就有一个å…
¨å±€åŽé—¨ï¼Œå¾®è½¯å¯ä»¥ç”¨å®ƒå¼ºåˆ¶æ”¹å˜ç”µè„‘上的任何软件。几
乎所有移动电话也都有后门。一些专属软件也有å…
¨å±€åŽé—¨ï¼›ä¾‹å¦‚,工作在GNU/Linux上的Steam客户端允许其开发者
远程安装更改后的版本。</p>
+
+<p>使用SaaSS,服务器操作员能够改变服务器使用的软件。他应该能够这æ
 ·åšï¼Œå› ä¸ºè¿™æ˜¯ä»–的电脑;但是其结果和带有å…
¨å±€åŽé—¨çš„专属软件是一æ 
·çš„:有人有权不动声色地更改用户的计算。</p>
+
+<p>所以,SaaSS和带有间谍软件及全局后门的专属软件是一æ 
·çš„。它给予服务器操作员凌驾于用户之上的权力,而这正是我们å¿
…须反抗的权力。</p>
+
+<h3>SaaSS和SaaS</h3>
+
+<p>最初我们认为这个有问题的实践是&ldquo;SaaS&rdquo;,意思是&ldquo;软件即服务&rdquo;。这是一个常用的术语,它是指在服务器上设置软件而不给用户拷贝,而我们认为该术语准确地描述了此类实践的问题所在。</p>
+
+<p>后来我们认识到SaaS这一术语有时也用于通讯服务&mdash;而此问题并不适用于这些服务。另外,&ldquo;软件即服务&rdquo;这一术语不能解释<em>为什么</em>这种实践是不好的。所以我们创é€
 äº†&ldquo;服务代替软件&rdquo;这一术语,它更清
楚地定义了这个不好的实践,并且说出为什么它是不好的。</p>
+
+<h3>区分SaaSS问题和专属软件问题</h3>
+
+<p>SaaSS和专属软件导致类似的有害结果,但是å…
¶æœºåˆ¶å„有不同。对专属软件,该机制是你
有软件拷贝,并使用该软件拷贝,但是修改该拷贝是困难/或è€
…是非法的。对SaaSS,该机制是软件进行你的计算,但是你
并没有该软件的拷贝。</p>
+
+<p>这两个问题常常令人困扰,这并不仅仅
是意外。网络开发者使用含糊不清
的术语&ldquo;网络应用&rdquo;把服务器软件和运行在本地电脑的浏览器里的程序搞在一起。有些网页会在ä½
 çš„浏览器里安装
非平凡的、甚至是大型的JavaScript软件,并且不告诉你。<a
+href="/philosophy/javascript-trap.html">当这些JavaScript程序不是自由软件时</a>,它们就和å
…¶ä»–非自由软件一样导致不公正。然而,在这里,我们å…
³å¿ƒçš„是使用服务本身。</p>
+
+<p>许多自由软件支持者
认为SaaSS问题会由于开发服务器端的自由软件而解决。对服务器操作è€
…
来说,服务器端的程序最好是自由软件;如果它是专属软件,那么å
…¶å¼€å‘者/所有者
就有凌驾于服务器之上的权力。这对服务器操作者是不å…
¬æ­£çš„,而且对服务器的用户也毫无
帮助。但是如果服务器端的程序是自由软件,它也没有保护<em>服务器用户</em>不受SaaSS的影响。该程序使服务器操作è€
…自由,但是没有给服务器用户自由。</p>
+
+<p>把服务器软件的源代ç 
å‘布可以使社区受益:这使有相应技术的用户可以搭建类似的服务器,也可能修改软件。<a
+href="/licenses/license-recommendations.html">我们建议使用GNU Affero
+GPL</a>作为服务器端软件的许可证。</p>
+
+<p>但是这些服务器都没有让你
能够控制自己的计算,除非它是<em>你的</em>服务器(你
控制它的软件,尽管服务器的硬件可能不是你
的)。也许某些工作你
可以放心地使用朋友的服务器,就像你让朋友在你
的机器上维护软件一样。除此之外的服务器对你
都应该是SaaSS。SaaSS总是使你受制于服务器操作者
的权力,而唯一的解药是,<em>不要使用SaaSS!</em>不要使用他人的服务器来对ä½
 æäº¤çš„数据进行计算。</p>
+
+<p>这个问题展示了&ldquo;开放&rdquo;和&ldquo;自由&rdquo;的深度不同。源代ç
 æ˜¯å¼€æº<a
+href="/philosophy/free-open-overlap.html">意味着,差不多总是,自由软件</a>。但是,<a
+href="http://opendefinition.org/software-service";>&ldquo;开源软件&rdquo;服务</a>,意味着服务器软件是开源或是自由软件,却错失了SaaSS的问题。</p>
+
+<p>服务从根本上不同于程序,由它带来的道德问题从æ 
¹æœ¬ä¸Šä¹Ÿå’Œç¨‹åºçš„不同。为了避免混淆,我们<a
+href="/philosophy/network-services-arent-free-or-nonfree.html">避å…
æŠŠæœåŠ¡æè¿°ä¸º&ldquo;自由&rdquo;或&ldquo;专属。&rdquo;</a></p>
+
+<h3>区分SaaSS和其他网络服务</h3>
+
+<p>哪些在线服务是SaaSS?最明确的例子是翻译服务,比如它把英语文字翻译成西班牙语文字。ä½
 è¦ç¿»è¯‘这件事纯粹是你自己的计算。你
可以通过在自己的电脑上运行一个程序完成。(道义上说,该程序应该是自由软件。)翻译服务代替了该程序,所以这是服务代替软件,即SaaSS。由于它剥夺了ä½
 å¯¹è‡ªå·±è®¡ç®—的控制,所以它对你作恶。</p>
+
+<p>另一个明确的例子是使用诸如Flickr或Instagram之类的服务来编辑ç
…§ç‰‡ã€‚几十年以来,人们都是在自己的电脑上编辑照片;在你
无法控制的服务器上编辑ç…
§ç‰‡ï¼Œè€Œä¸æ˜¯åœ¨è‡ªå·±çš„电脑上,就是SaaSS。</p>
+
+<p>拒绝SaaSS并不是说要拒绝所有的å…
¶ä»–人运行的网络服务。大多数服务器不是SaaSS,因
为它们的任务是通讯,而不是为用户做计算。</p>
+
+<p>网络服务器最初的概念不是为你做计算,而是让你
能够访问它发布的信息。即使在今天这也是大多数网站做的事,这个没有SaaSS的问题,å›
 ä¸ºè®¿é—®åˆ«äººå‘布的信息不是在做你
的计算。使用博客网站发布自己的成果也不是,使用诸如Twitter或StatusNet的服务发布微博也不是。(这些服务可能会有å
…¶ä»–问题,根据具体情况而不同。)这个道理对å…
¶ä»–非私人的通讯服务也适用,比如聊天室。</p>
+
+<p>究å…
¶æœ¬è´¨ï¼Œç¤¾äº¤ç½‘络是一种沟通和出版的形式,不是SaaSS。然而,如果一个服务的主要设施是社交网络的话,它就可能带有SaaSS的功能和扩展。</p>
+
+<p>如果一项服务不是SaaSS,并不意味着它就没有问题。服务有å
…
¶ä»–的道德问题。比如,Facebook使用Flash发布视频,就是迫使用户使用非自由软件;它要求使用非自由的JavaScript代ç
 
ï¼›å¹¶ä¸”它通过让用户展示自己的生活来误导他们对隐私的感觉。这些都是重要的问题,不过不同于SaaSS。
+</p>
+
+<p>搜索引擎之类的服务是从网络上收集数据并让你
查看。查看他们收集的数据不是普通意义上的用户计算活动&mdash;ä½
 
并没有提供这个收集活动&mdash;所以使用此类网络搜索不是SaaSS。然而,使用å
…¶ä»–人的服务器为你
自己的网站部署搜索设施<em>是</em>SaaSS。</p>
+
+<p>网购不是SaaSS,因为这个计算不是<em>你
自己的</em>活动;而是你和商店å…
±åŒå®Œæˆçš„活动。网购的真正问题在于你
是否相信收钱的一方以及其他个人信息(从你
的姓名算起)。</p>
+
+<p>仓库网站,如Savannah和SourceForge,本身不是SaaSS,因
为仓库的工作是发布交给它的数据。</p>
+
+<p>使用联合项目的服务器不是SaaSS,因为你做的计算不是你
自己的。例如,如果你修改了Wikipedia页面,那么你
并不是在做自己的计算;而是你
在做Wikipedia的联合计算。Wikipedia控制自己的服务器,但是如果他们使用的是å
…¶ä»–人的服务器,那么机构和个人都面临SaaSS的问题。</p>
+
+<p>有些网站提供多种服务,如果å…
¶ä¸­ä¸€ä¸ªä¸æ˜¯SaaSS,另一种也可能是SaaSS。例如,Facebook的主要服务是社交网络,这不是SaaSS;然而,它支持第三方应用,å
…¶ä¸­æœ‰äº›æ˜¯SaaSS。Flickr的主要服务是发布ç…
§ç‰‡ï¼Œè¿™ä¸æ˜¯SaaSS,但是它还有编辑ç…
§ç‰‡çš„功能,这就是SaaSS。类似地,在Instagram发布ç…
§ç‰‡ä¸æ˜¯SaaSS,但是使用它来转换照片格式就是SaaSS。</p>
+
+<p>Google 
Docs展示了评价一个服务有多么复杂。它让人们通过运行一个大型的<a
+href="/philosophy/javascript-trap.html">非自由JavaScript程序</a>来编辑文档,明显是错误的。然而,它还提供上ä¼
 å’Œä¸‹è½½æ ‡å‡†æ 
¼å¼æ–‡æ¡£çš„API。一个自由软件编辑器也可以通过此APIä¼ 
输文档。这个应用场景不是SaaSS,因为Google
+Docs只是作为仓库来使用。把自己的数据展示给一个å…
¬å¸æ˜¯ä¸€ä»¶åäº‹ï¼Œä½†è¿™ä¹Ÿåªæ˜¯éšç§çš„问题,不是SaaSS;依赖某个服务来访问自己的数据也是一件坏事,但它也只是风险的问题,不是SaaSS。另一方面,使用服务来转换文档的æ
 ¼å¼<em>是</em>SaaSS,因为你
可以使用自己电脑里的合适程序(希望是,自由软件)来完成这件事。</p>
+
+<p>当然,通过自由软件使用Google
+Docs并不常见。最常见的是,人们通过非自由的JavaScript程序来使用它,这和使用å
…¶ä»–非自由软件一样糟糕。这个场景还会引å…
¥SaaSS;这取决于哪些操作是JavaScript程序做的,哪些是服务器做的。我们不知道,但是由于SaaSS和专属软件都对用户作恶,知不知道并不是å
…³é”®ã€‚</p>
+
+<p>通过他人的仓库进行发布不会有隐私的问题,但是通过Google
+Docs发布却有一个特别的问题:不运行非自由的JavaScript代ç 
ï¼Œä½ ç”šè‡³ä¸èƒ½åœ¨æµè§ˆå™¨é‡Œ<em>查看Google
+Docs文本</em>。所以,你不应该使用Google 
Docs发布文档&mdash;但是这不是由于SaaSS的原因。</p>
+
+<p>IT产业并不鼓励用户做这些区分。这就是&ldquo;云计算&rdquo;这一时髦词汇的用途。该词是如此的模糊不æ¸
…,以至于它几乎可以表示任何互联网的使用形式。它包
含SaaSS,也包含许多其他的网络使用情
况。在一个特定的语境,使用者
可能用&ldquo;云&rdquo;(如果是技术背景的使用者
)表示脑海里一个特定的意思,但是通常不会解释说该词在å…
¶ä»–文章中有å…
¶ä»–的意思。该术语引导人们对本应该单独处理的情
况进行普遍化。</p>
+
+<p>如果&ldquo;云计算&rdquo;有定义,那么它不是一个计算的方式,而是对计算的一种思考方法:一种魔鬼才会考虑的方法,意思是,&ldquo;不要提问。不要æ‹
…心是谁控制你的计算或者是谁掌握你的数据。在你
吞掉鱼饵之前不要检查藏在服务之饵里的钓钩。要毫不怀疑地相信这些å
…
¬å¸ã€‚&rdquo;换句话说,&ldquo;做一个没有主见的人。&rdquo;思想里的云就是要阻碍æ¸
…楚地思考。为了清楚地思考计算,让我们避å…
ä½¿ç”¨&ldquo;云&rdquo;这个词。</p>
+
+<h3 id="renting">区分租用服务器和SaaSS的不同</h3>
+
+<p>如果你租用服务器(真实的或虚拟的),你可以控制å…
¶è½¯ä»¶ï¼Œå®ƒå°±ä¸æ˜¯SaaSS。在SaaSS的情形,å…
¶ä»–人决定服务器运行的软件,因而他们控制着你
的计算。在你安装服务器软件的情形,你控制着你
的计算。所以,租用服务器实际上是你
的电脑。此时,我们认为它就是你的。</p>
+
+<p>租用的远程服务器上的<em>数据</em>没有在自己家里的服务器上的数据安å
…¨ï¼Œä½†æ˜¯è¿™ä¸ªæ˜¯SaaSS之外的问题。</p>
+
+<h3>SaaSS问题的应对</h3>
+
+<p>只有小部分网站实施SaaSS;大多数网站没有这个问题。但是我们如何应对有这个问题的网站呢?</p>
+
+<p>对简单的情况,你
用自己的数据进行自己的计算,解决方法也简单:使用一份ä½
 è‡ªå·±çš„自由软件拷贝。用一份诸如GNU
+Emacs或自由字处理程序的自由软件来进行自己的文本编辑。使用诸如GIMP的自由软件来编辑ç
…
§ç‰‡ã€‚如果没有可用的自由软件怎么办?专属软件或SaaSS会拿走ä½
 çš„自由,所以你不应该使用它们。你
可以贡献时间或资金来开发一款可以替代专属软件的自由软件。</p>
+
+<p>和其他人结成合作团队怎么样?现在在不用服务器的情
况下工作可能有困难,而团队可能并不知道如何运作自己的服务器。如果ä½
 è¦ä½¿ç”¨ä»–人的服务器,至少不要相信由å…
¬å¸è¿ä½œçš„服务器。一纸客户合同对你不是保护,除非你
能够侦测到违规并真正起诉,而公司制作的合同可能å…
è®¸å®½æ³›çš„滥用。政府可以从该公司强行调取你的以及å…
¶ä»–人的数据,正如奥巴马总统对电话å…
¬å¸æ‰€åšçš„;还要假设该å…
¬å¸ä¸è‡ªæ„¿äº¤å‡ºæ•°æ®ï¼Œä¸è¿‡ç¾Žå›½ç”µè¯å…
¬å¸æ˜¯éžæ³•ä¸ºå¸ƒä»€æ”¿åºœç›‘听其用户的。如果你必
须使用服务器,请使用除了商业关系之外还有å…
¶ä»–可信基础的服务器操作方。</p>
+
+<p>然而,长远来看,我们能够构建替代服务器的机制。例如,我们可以构建能够分享åŠ
 
密数据的点对点程序。自由软件社区应该开发分布式点对点程序来代替重要的&ldquo;网络应用&rdquo;。按ç
…§<a
+href="/licenses/why-affero-gpl.html">GNU Affero
+GPL</a>发布这些程序是明智的,因
为它们有可能被某些人转换成基于服务器的程序。<a
+href="/">GNU工程</a>正在寻求做此开发的志愿者。我们也邀请å…
¶ä»–自由软件项目在其设计中考虑这个问题。</p>
+
+<p>同时,如果有公司邀请你使用它们的服务器来做你
的计算,不要接受;不要使用SaaSS。不要购买或安装
&ldquo;轻客户端&rdquo;,这些只是简单的电脑,它们的计算能力是如此之弱,ä½
 çš„计算只能在服务器上真正完成,除非你配合<em>ä½ 
的</em>服务器来使用这些客户端。使用真正的电脑并把数据限制在该电脑上。为ä½
 çš„自由起见,请用你自己的自由软件拷贝来做计算。</p>
+
+<h3>请同时参看:</h3>
+<p><a 
href="/philosophy/bug-nobody-allowed-to-understand.html">不许任何人了解的缺陷</a>。</p>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+<h3>译注</h3>
+<ol>
+<li id="TransNote1">homomorphic
+encryption,同态加密:指对加密内容的计算结果和对非加密内
容的计算结果一样的加密算法。</li>
+</ol></div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.zh-cn.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>请将有关自由软件基金会(FSF) &amp; 
GNU的一般性问题发送到<a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>。也可以通过<a
+href="/contact/">其他联系方法</a>联系自由软件基金会(FSF)。有å…
³å¤±æ•ˆé“¾æŽ¥æˆ–其他错误和建议,请发送邮件到<a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>。</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+若您想翻译本文,请参看<a
+href="/server/standards/README.translations.html">翻译须知</a>获取有å…
³åè°ƒå’Œæäº¤ç¿»è¯‘的相关事项。</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2010, 2013, 2015, 2016 Richard Stallman</p>
+
+<p>本页面使用<a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribution-NoDerivatives 4.0 International License</a>授权。</p>
+
+<!--#include virtual="/server/bottom-notes.zh-cn.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+<b>翻译团队</b>:<a rel="team"
+href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2017。</div>
+
+<p class="unprintable"><!-- timestamp start -->
+最后更新:
+
+$Date: 2017/11/20 23:59:18 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>

Index: philosophy/po/who-does-that-server-really-serve.zh-cn-en.html
===================================================================
RCS file: philosophy/po/who-does-that-server-really-serve.zh-cn-en.html
diff -N philosophy/po/who-does-that-server-really-serve.zh-cn-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/who-does-that-server-really-serve.zh-cn-en.html       20 Nov 
2017 23:59:18 -0000      1.1
@@ -0,0 +1,469 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.79 -->
+<title>Who Does That Server Really Serve?
+- GNU Project - Free Software Foundation</title>
+
+<!--#include 
virtual="/philosophy/po/who-does-that-server-really-serve.translist" -->
+<!--#include virtual="/server/banner.html" -->
+   
+<h2>Who does that server really serve?</h2>
+
+<p>by <strong>Richard Stallman</strong></p>
+
+<blockquote><p>(The first version was published
+in <a href="http://www.bostonreview.net/richard-stallman-free-software-DRM";>
+Boston Review</a>.)</p></blockquote>
+
+<p><strong>On the Internet, proprietary software isn't the only way to
+lose your freedom.  Service as a Software Substitute, or SaaSS, is
+another way to give someone else power over your computing.</strong></p>
+
+<p>The basic point is, you can have control over a program someone else
+wrote (if it's free), but you can never have control over a service
+someone else runs, so never use a service where in principle a program
+would do.</p>
+
+
+<p>SaaSS means using a service implemented by someone else as a
+substitute for running your copy of a program.  The term is ours;
+articles and ads won't use it, and they won't tell you whether a
+service is SaaSS.  Instead they will probably use the vague and
+distracting term &ldquo;cloud&rdquo;, which lumps SaaSS together with
+various other practices, some abusive and some ok.  With the
+explanation and examples in this page, you can tell whether a service
+is SaaSS.</p>
+
+<h3>Background: How Proprietary Software Takes Away Your Freedom</h3>
+
+<p>Digital technology can give you freedom; it can also take your
+freedom away.  The first threat to our control over our computing came
+from <em>proprietary software</em>: software that the users cannot
+control because the owner (a company such as Apple or Microsoft)
+controls it.  The owner often takes advantage of this unjust power by
+inserting malicious features such as spyware, back doors, and <a
+href="http://DefectiveByDesign.org";>Digital Restrictions Management
+(DRM)</a> (referred to as &ldquo;Digital Rights Management&rdquo; in
+their propaganda).</p>
+
+<p>Our solution to this problem is developing <em>free software</em>
+and rejecting proprietary software.  Free software means that you, as
+a user, have four essential freedoms: (0)&nbsp;to run the program as
+you wish, (1)&nbsp;to study and change the source code so it does what
+you wish, (2)&nbsp;to redistribute exact copies, and (3)&nbsp;to
+redistribute copies of your modified versions.  (See
+the <a href="/philosophy/free-sw.html">free software
+definition</a>.)</p>
+
+<p>With free software, we, the users, take back control of our
+computing.  Proprietary software still exists, but we can exclude it
+from our lives and many of us have done so.  However, we are now
+offered another tempting way to cede control over our computing:
+Service as a Software Substitute (SaaSS).  For our freedom's sake, we
+have to reject that too.</p>
+
+<h3>How Service as a Software Substitute Takes Away Your Freedom</h3>
+
+<p>Service as a Software Substitute (SaaSS) means using a service as a
+substitute for running your copy of a program.  Concretely, it means
+that someone sets up a network server that does certain computing
+tasks&mdash;for instance, modifying a photo, translating text into
+another language, etc.&mdash;then invites users to do computing via
+that server.  A user of the server would send her data to the server,
+which does <em>her own computing</em> on the data thus provided, then
+sends the results back to her or acts directly on her behalf.</p>
+
+<p>The computing is <em>her own</em> because, by assumption, she
+could, in principle, have done it by running a program on her own
+computer (whether or not that program is available to her at
+present).  In cases where this assumption is not so, it isn't SaaSS.</p>
+
+<p>These servers wrest control from the users even more inexorably
+than proprietary software.  With proprietary software, users typically
+get an executable file but not the source code.  That makes it hard to
+study the code that is running, so it's hard to determine what the
+program really does, and hard to change it.</p>
+
+<p>With SaaSS, the users do not have even the executable file that
+does their computing: it is on someone else's server, where the users
+can't see or touch it.  Thus it is impossible for them to ascertain
+what it really does, and impossible to change it.</p>
+
+<p>Furthermore, SaaSS automatically leads to consequences equivalent
+to the malicious features of certain proprietary software.</p>
+
+<p> For instance, some proprietary programs are &ldquo;spyware&rdquo;:
+the program <a href="/philosophy/proprietary-surveillance.html">
+sends out data about users' computing activities</a>.
+Microsoft Windows sends information about users' activities to
+Microsoft.  Windows Media Player reports what each user watches or
+listens to.  The Amazon Kindle reports which pages of which books the
+user looks at, and when.  Angry Birds reports the user's geolocation
+history.</p>
+
+<p>Unlike proprietary software, SaaSS does not require covert code to
+obtain the user's data.  Instead, users must send their data to the
+server in order to use it.  This has the same effect as spyware: the
+server operator gets the data&mdash;with no special effort, by the
+nature of SaaSS.  Amy Webb, who intended never to post any photos of
+her daughter, made the mistake of using SaaSS (Instagram) to edit
+photos of her.  Eventually
+<a 
href="http://www.slate.com/articles/technology/data_mine_1/2013/09/privacy_facebook_kids_don_t_post_photos_of_your_kids_on_social_media.html";>
 they
+leaked from there</a>.
+</p>
+
+<p>Theoretically, homomorphic encryption might some day advance to the
+point where future SaaSS services might be constructed to be unable to
+understand some of the data that users send them.  Such
+services <em>could</em> be set up not to snoop on users; this does not
+mean they <em>will</em> do no snooping.</p>
+
+<p>Some proprietary operating systems have a universal back door,
+permitting someone to remotely install software changes.  For
+instance, Windows has a universal back door with which Microsoft can
+forcibly change any software on the machine.  Nearly all portable
+phones have them, too.  Some proprietary applications also have
+universal back doors; for instance, the Steam client for GNU/Linux
+allows the developer to remotely install modified versions.</p>
+
+<p>With SaaSS, the server operator can change the software in use on
+the server.  He ought to be able to do this, since it's his computer;
+but the result is the same as using a proprietary application program
+with a universal back door: someone has the power to silently impose
+changes in how the user's computing gets done.</p>
+
+<p>Thus, SaaSS is equivalent to running proprietary software with
+spyware and a universal back door.  It gives the server operator
+unjust power over the user, and that power is something we must
+resist.</p>
+
+<h3>SaaSS and SaaS</h3>
+
+<p>Originally we referred to this problematical practice as
+&ldquo;SaaS&rdquo;, which stands for &ldquo;Software as a
+Service&rdquo;.  It's a commonly used term for setting up software on a
+server rather than offering copies of it to users, and we thought it
+described precisely the cases where this problem occurs.</p>
+
+<p>Subsequently we became aware that the term SaaS is sometimes used for
+communication services&mdash;activities for which this issue is not
+applicable.  In addition, the term &ldquo;Software as a Service&rdquo;
+doesn't explain <em>why</em> the practice is bad.  So we coined the term
+&ldquo;Service as a Software Substitute&rdquo;, which defines the bad
+practice more clearly and says what is bad about it.</p>
+
+<h3>Untangling the SaaSS Issue from the Proprietary Software Issue</h3>
+
+<p>SaaSS and proprietary software lead to similar harmful results, but
+the mechanisms are different.  With proprietary software, the
+mechanism is that you have and use a copy which is difficult and/or
+illegal to change.  With SaaSS, the mechanism is that you don't have
+the copy that's doing your computing.</p>
+
+<p>These two issues are often confused, and not only by accident.  Web
+developers use the vague term &ldquo;web application&rdquo; to lump
+the server software together with programs run on your machine in your
+browser.  Some web pages install nontrivial, even large JavaScript
+programs into your browser without informing
+you.  <a href="/philosophy/javascript-trap.html">When these JavaScript
+programs are nonfree</a>, they cause the same sort of injustice as any
+other nonfree software.  Here, however, we are concerned with the
+issue of using the service itself.</p>
+
+<p>Many free software supporters assume that the problem of SaaSS will
+be solved by developing free software for servers.  For the server
+operator's sake, the programs on the server had better be free; if
+they are proprietary, their developers/owners have power over the
+server.  That's unfair to the server operator, and doesn't help the
+server's users at all.  But if the programs on the server are free,
+that doesn't protect <em>the server's users</em> from the effects of
+SaaSS.  These programs liberate the server operator, but not the
+server's users.</p>
+
+<p>Releasing the server software source code does benefit the
+community: it enables suitably skilled users to set up similar
+servers, perhaps changing the
+software.  <a href="/licenses/license-recommendations.html"> We
+recommend using the GNU Affero GPL</a> as the license for programs
+often used on servers.</p>
+
+<p>But none of these servers would give you control over computing you
+do on it, unless it's <em>your</em> server (one whose software load
+you control, regardless of whether the machine is your property).  It
+may be OK to trust your friend's server for some jobs, just as you
+might let your friend maintain the software on your own computer.
+Outside of that, all these servers would be SaaSS for you.  SaaSS
+always subjects you to the power of the server operator, and the only
+remedy is, <em>Don't use SaaSS!</em>  Don't use someone else's server
+to do your own computing on data provided by you.</p>
+
+<p>This issue demonstrates the depth of the difference between
+&ldquo;open&rdquo; and &ldquo;free&rdquo;.  Source code that is open
+source <a href="/philosophy/free-open-overlap.html">is, nearly always,
+free</a>.  However, the idea of
+an <a href="http://opendefinition.org/software-service";>&ldquo;open
+software&rdquo; service</a>, meaning one whose server software is open
+source and/or free, fails to address the issue of SaaSS.</p>
+
+<p>Services are fundamentally different from programs, and the ethical
+issues that services raise are fundamentally different from the issues
+that programs raise.  To avoid confusion,
+we <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+avoid describing a service as &ldquo;free&rdquo; or
+&ldquo;proprietary.&rdquo;</a></p>
+
+<h3>Distinguishing SaaSS from Other Network Services</h3>
+
+<p>Which online services are SaaSS?  The clearest example is a
+translation service, which translates (say) English text into Spanish
+text.  Translating a text for you is computing that is purely yours.
+You could do it by running a program on your own computer, if only you
+had the right program.  (To be ethical, that program should be free.)
+The translation service substitutes for that program, so it is Service
+as a Software Substitute, or SaaSS.  Since it denies you control
+over your computing, it does you wrong.</p>
+
+<p>Another clear example is using a service such as Flickr or
+Instagram to modify a photo.  Modifying photos is an activity that
+people have done in their own computers for decades; doing it in a
+server you don't control, rather than your own computer, is SaaSS.</p>
+
+<p>Rejecting SaaSS does not mean refusing to use any network servers
+run by anyone other than you.  Most servers are not SaaSS because the
+jobs they do are some sort of communication, rather than the user's
+own computing.</p>
+
+<p>The original idea of web servers wasn't to do computing for you, it
+was to publish information for you to access.  Even today this is what
+most web sites do, and it doesn't pose the SaaSS problem, because
+accessing someone's published information isn't doing your own
+computing.  Neither is use of a blog site to publish your own works,
+or using a microblogging service such as Twitter or StatusNet.  (These
+services may or may not have other problems, depending on details.)
+The same goes for other communication not meant to be private, such as
+chat groups.</p>
+
+<p>In its essence, social networking is a form of communication and
+publication, not SaaSS.  However, a service whose main facility is
+social networking can have features or extensions which are SaaSS.</p>
+
+<p>If a service is not SaaSS, that does not mean it is OK.  There are
+other ethical issues about services.  For instance, Facebook
+distributes video in Flash, which pressures users to run nonfree
+software; it requires running nonfree JavaScript code; and it gives
+users a misleading impression of privacy while luring them into baring
+their lives to Facebook.  Those are important issues, different from
+the SaaSS issue.
+</p>
+
+<p>Services such as search engines collect data from around the web
+and let you examine it.  Looking through their collection of data
+isn't your own computing in the usual sense&mdash;you didn't provide
+that collection&mdash;so using such a service to search the web is not
+SaaSS.  However, using someone else's server to implement a search
+facility for your own site <em>is</em> SaaSS.</p>
+
+<p>Purchasing online is not SaaSS, because the computing
+isn't <em>your own</em> activity; rather, it is done jointly by and
+for you and the store.  The real issue in online shopping is whether
+you trust the other party with your money and other personal
+information (starting with your name).</p>
+
+<p>Repository sites such as Savannah and SourceForge are not
+inherently SaaSS, because a repository's job is publication of data
+supplied to it.</p>
+
+<p>Using a joint project's servers isn't SaaSS because the computing
+you do in this way isn't your own.  For instance, if you edit pages on
+Wikipedia, you are not doing your own computing; rather, you are
+collaborating in Wikipedia's computing.  Wikipedia controls its own
+servers, but organizations as well as individuals encounter the
+problem of SaaSS if they do their computing in someone else's
+server.</p>
+
+<p>Some sites offer multiple services, and if one is not SaaSS,
+another may be SaaSS.  For instance, the main service of Facebook is
+social networking, and that is not SaaSS; however, it supports
+third-party applications, some of which are SaaSS.  Flickr's main
+service is distributing photos, which is not SaaSS, but it also has
+features for editing photos, which is SaaSS.  Likewise, using
+Instagram to post a photo is not SaaSS, but using it to transform the
+photo is SaaSS.</p>
+
+<p>Google Docs shows how complex the evaluation of a single service
+can become.  It invites people to edit a document by running a
+large <a href="/philosophy/javascript-trap.html">nonfree JavaScript
+program</a>, clearly wrong.  However, it offers an API for uploading
+and downloading documents in standard formats.  A free software editor
+can do so through this API.  This usage scenario is not SaaSS, because
+it uses Google Docs as a mere repository.  Showing all your data to a
+company is bad, but that is a matter of privacy, not SaaSS; depending
+on a service for access to your data is bad, but that is a matter of
+risk, not SaaSS.  On the other hand, using the service for converting
+document formats <em>is</em> SaaSS, because it's something you could
+have done by running a suitable program (free, one hopes) in your own
+computer.</p>
+
+<p>Using Google Docs through a free editor is rare, of course.  Most
+often, people use it through the nonfree JavaScript program, which is
+bad like any nonfree program.  This scenario might involve SaaSS, too;
+that depends on what part of the editing is done in the JavaScript
+program and what part in the server.  We don't know, but since SaaSS
+and proprietary software do similar wrong to the user, it is not
+crucial to know.</p>
+
+<p>Publishing via someone else's repository does not raise privacy
+issues, but publishing through Google Docs has a special problem: it
+is impossible even to <em>view the text</em> of a Google Docs document
+in a browser without running the nonfree JavaScript code.  Thus, you
+should not use Google Docs to publish anything&mdash;but the reason
+is not a matter of SaaSS.</p>
+
+<p>The IT industry discourages users from making these distinctions.
+That's what the buzzword &ldquo;cloud computing&rdquo; is for.  This
+term is so nebulous that it could refer to almost any use of the
+Internet.  It includes SaaSS as well as many other network usage
+practices.  In any given context, an author who writes
+&ldquo;cloud&rdquo; (if a technical person) probably has a specific
+meaning in mind, but usually does not explain that in other articles
+the term has other specific meanings.  The term leads people to
+generalize about practices they ought to consider individually.</p>
+
+<p>If &ldquo;cloud computing&rdquo; has a meaning, it is not a way of
+doing computing, but rather a way of thinking about computing: a
+devil-may-care approach which says, &ldquo;Don't ask questions.  Don't
+worry about who controls your computing or who holds your data.  Don't
+check for a hook hidden inside our service before you swallow it.
+Trust companies without hesitation.&rdquo; In other words, &ldquo;Be a
+sucker.&rdquo; A cloud in the mind is an obstacle to clear thinking.
+For the sake of clear thinking about computing, let's avoid the term
+&ldquo;cloud.&rdquo;</p>
+
+<h3 id="renting">Renting a Server Distinguished from SaaSS</h3>
+
+<p>If you rent a server (real or virtual), whose software load you
+have control over, that's not SaaSS.  In SaaSS, someone else decides
+what software runs on the server and therefore controls the computing
+it does for you.  In the case where you install the software on the
+server, you control what computing it does for you.  Thus, the rented
+server is virtually your computer.  For this issue, it counts as
+yours.</p>
+
+<p>The <em>data</em> on the rented remote server is less secure than
+if you had the server at home, but that is a separate issue from
+SaaSS.</p>
+
+<h3>Dealing with the SaaSS Problem</h3>
+
+<p>Only a small fraction of all web sites do SaaSS; most don't raise
+the issue.  But what should we do about the ones that raise it?</p>
+
+<p>For the simple case, where you are doing your own computing on data
+in your own hands, the solution is simple: use your own copy of a free
+software application.  Do your text editing with your copy of a free
+text editor such as GNU Emacs or a free word processor.  Do your photo
+editing with your copy of free software such as GIMP.  What if there
+is no free program available?  A proprietary program or SaaSS would
+take away your freedom, so you shouldn't use those.  You can contribute
+your time or your money to development of a free replacement.</p>
+
+<p>What about collaborating with other individuals as a group?  It may
+be hard to do this at present without using a server, and your group
+may not know how to run its own server.  If you use someone else's
+server, at least don't trust a server run by a company.  A mere
+contract as a customer is no protection unless you could detect a
+breach and could really sue, and the company probably writes its
+contracts to permit a broad range of abuses.  The state can subpoena
+your data from the company along with everyone else's, as Obama has
+done to phone companies, supposing the company doesn't volunteer them
+like the US phone companies that illegally wiretapped their customers
+for Bush.  If you must use a server, use a server whose operators give
+you a basis for trust beyond a mere commercial relationship.</p>
+
+<p>However, on a longer time scale, we can create alternatives to
+using servers.  For instance, we can create a peer-to-peer program
+through which collaborators can share data encrypted.  The free
+software community should develop distributed peer-to-peer
+replacements for important &ldquo;web applications&rdquo;.  It may be
+wise to release them under
+the <a href="/licenses/why-affero-gpl.html"> GNU Affero GPL</a>, since
+they are likely candidates for being converted into server-based
+programs by someone else.  The <a href="/">GNU project</a> is looking
+for volunteers to work on such replacements.  We also invite other
+free software projects to consider this issue in their design.</p>
+
+<p>In the meantime, if a company invites you to use its server to do
+your own computing tasks, don't yield; don't use SaaSS.  Don't buy or
+install &ldquo;thin clients&rdquo;, which are simply computers so weak
+they make you do the real work on a server, unless you're going to use
+them with <em>your</em> server.  Use a real computer and keep your
+data there.  Do your own computing with your own copy of a free
+program, for your freedom's sake.</p>
+
+<h3>See also:</h3>
+<p><a href="/philosophy/bug-nobody-allowed-to-understand.html">The
+Bug Nobody is Allowed to Understand</a>.</p>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2010, 2013, 2015, 2016 Richard Stallman</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/11/20 23:59:18 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]