www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy digital-inclusion-in-freedom.html


From: Yavor Doganov
Subject: www/philosophy digital-inclusion-in-freedom.html
Date: Sat, 17 Oct 2009 19:29:36 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Yavor Doganov <yavor>   09/10/17 19:29:36

Modified files:
        philosophy     : digital-inclusion-in-freedom.html 

Log message:
        Reformat according to our standards.  Validation fixes.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/digital-inclusion-in-freedom.html?cvsroot=www&r1=1.1&r2=1.2

Patches:
Index: digital-inclusion-in-freedom.html
===================================================================
RCS file: /web/www/www/philosophy/digital-inclusion-in-freedom.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- digital-inclusion-in-freedom.html   17 Oct 2009 15:21:24 -0000      1.1
+++ digital-inclusion-in-freedom.html   17 Oct 2009 19:29:31 -0000      1.2
@@ -1,120 +1,105 @@
 <!--#include virtual="/server/header.html" -->
 <title>Is Digital Inclusion A Good Thing? How Can We Make Sure It Is?</title>
 <!--#include virtual="/server/banner.html" -->
-
 <h2>Is Digital Inclusion A Good Thing? How Can We Make Sure It Is?</h2>
-<p><font size=-1><a href="http://www.stallman.org/";>Richard Stallman</a>
-</font>
-<br /><font size=-1>President, Free Software Foundation</font>
-</p>
 
+<p><a href="http://www.stallman.org/";>Richard Stallman</a>
+<br />President, Free Software Foundation
+</p>
 
-<h3>
-<a name="intro"></a>
-INTRODUCTION
-</h3>
+<h3 id="intro">INTRODUCTION</h3>
 
-<p>
-Digital information and communication technology offers the
+<p>Digital information and communication technology offers the
 possibility of a new world of freedom.  It also offers possibilities
 of surveillance and control which dictatorships of the past could only
 struggle to establish.  The battle to decide between these
-possibilities is being fought now.
+possibilities is being fought now.</p>
 
-<p>
-Activities directed at ``including'' more people in the use of digital
-technology are predicated on the assumption that such inclusion is
-invariably a good thing.  It appears so, when judged solely by
-immediate practical convenience.  However, if we judge also in terms
-of human rights, the question of whether digital inclusion is good or
-bad depends on what kind of digital world we are to be included in.
-If we wish to work towards digital inclusion as a goal, it behooves us
-to make sure it is the good kind.
+<p>Activities directed at &ldquo;including&rdquo; more people in the
+use of digital technology are predicated on the assumption that such
+inclusion is invariably a good thing.  It appears so, when judged
+solely by immediate practical convenience.  However, if we judge also
+in terms of human rights, the question of whether digital inclusion is
+good or bad depends on what kind of digital world we are to be
+included in.  If we wish to work towards digital inclusion as a goal,
+it behooves us to make sure it is the good kind.</p>
 
-<p>
-The digital world today faces six major threats to users' freedom:
+<p>The digital world today faces six major threats to users' freedom:
 surveillance, censorship, proprietary software, restricted formats,
 software as a service, and copyright enforcement.  A program to
-promote ``digital inclusion'' must take account of these threats, so
-as to avoid exposing its intended beneficiaries to them.  First we look
-at the nature of these threats; then we propose measures to resist them,
-collectively and individually.
-
-<p>
+promote &ldquo;digital inclusion&rdquo; must take account of these
+threats, so as to avoid exposing its intended beneficiaries to them.
+First we look at the nature of these threats; then we propose measures
+to resist them, collectively and individually.</p>
 
-<h3>
-<a name="surveillance"></a>
-SURVEILLANCE
-</h3>
+<h3 id="surveillance">SURVEILLANCE</h3>
 
-<p>
-Digital surveillance systems are spreading.  The UK uses computers
+<p>Digital surveillance systems are spreading.  The UK uses computers
 with cameras to track all car travel.  China plans to identify and
 photograph everyone that uses an Internet cafe.<a name="tex2html1"
-  href="#foot100"><sup>1</sup></a>
-<p>
-Cell phones are Big Brother's tools.  Some can be activated by remote
-command to listen to the user's conversations without giving any sign
-of listening, by the police<a name="tex2html3"
-  href="#foot101"><sup>2</sup></a>and by unauthorized individuals.<a 
name="tex2html5"
-  href="#foot102"><sup>3</sup></a>Users are unable to stop this because the 
software in the phone is not
-free/libre, thus not under the users' control.
+href="#foot100"><sup>1</sup></a></p>
 
-<p>
-Cell phones also localize the user, even when set to ``idle.''  The
-phone network needs must know roughly where the phone is located in
-order to communicate with it, and can easily record that information
-permanently.  However, networks are designed to locate phones far more
-accurately by triangulation.  They can do it even better with GPS in
-the phone, with or without the user's consent.
+<p>Cell phones are Big Brother's tools.  Some can be activated by
+remote command to listen to the user's conversations without giving
+any sign of listening, by the police<a name="tex2html3"
+href="#foot101"><sup>2</sup></a> and by unauthorized
+individuals.<a name="tex2html5" href="#foot102"><sup>3</sup></a> Users
+are unable to stop this because the software in the phone is not
+free/libre, thus not under the users' control.</p>
+
+<p>Cell phones also localize the user, even when set to
+&ldquo;idle.&rdquo; The phone network needs to know roughly where the
+phone is located in order to communicate with it, and can easily
+record that information permanently.  However, networks are designed
+to locate phones far more accurately by triangulation.  They can do it
+even better with GPS in the phone, with or without the user's
+consent.</p>
 
-<p>
-In many countries, universal digital surveillance does not record what
-you say, only who you talk with.  But that is enough to be quite
+<p>In many countries, universal digital surveillance does not record
+what you say, only who you talk with.  But that is enough to be quite
 dangerous, since it allows the police to follow social networks.  If a
 known dissident talks with you by phone or email, you are a candidate
 for labeling as a dissident.  It is no use ceasing to communicate by
 phone or email with fellow dissidents when a dictator takes power,
 because his secret police will have access to records of your past
-communications.
+communications.</p>
 
-<p>
-The European Union mandates keeping records of all phone calls and
+<p>The European Union mandates keeping records of all phone calls and
 email for periods up to two years.  The stated purpose of this
-surveillance is to ``prevent terrorism.''  Bush's illegal surveillance
-of phone calls also cited this purpose.  Non-state-sponsored terrorism
-is a real danger in a few countries, but the magnitude is often
-exaggerated; more people died in the US in September 2001 from car
-accidents than from terrorism, but we have no Global War on Accidents.
-By contrast, the practice of labeling political opposition as
-``terrorists,'' and using supposed ``anti-terror'' laws to infiltrate
-and sabotage their activities, threatens democracy everywhere.  For
-instance, the US Joint Terrorism Task Force infiltrated a wide range
-of political opposition groups<a name="tex2html7"
-  href="#foot103"><sup>4</sup></a>
-<p>
-False accusations of ``terrorism'' are standard practice for
-suppressing political opposition.  In the US, protesters who smashed
-windows at the 2008 Republican National Convention were charged with
-of ``terrorism.''<a name="tex2html9"
-  href="#foot104"><sup>5</sup></a>More recently, Iran described protesters 
demanding a new election as
-``terrorists.''<a name="tex2html11"
-  href="#foot105"><sup>6</sup></a>  The
-generals who ruled most of South America in the 1970s offered
-precisely that justification for their systematic murder of
-dissidents.<a name="tex2html13"
-  href="#foot20"><sup>7</sup></a>
-<p>
-A free society does not guarantee anonymity in what you do outside
+surveillance is to &ldquo;prevent terrorism.&rdquo; Bush's illegal
+surveillance of phone calls also cited this purpose.
+Non-state-sponsored terrorism is a real danger in a few countries, but
+the magnitude is often exaggerated; more people died in the US in
+September 2001 from car accidents than from terrorism, but we have no
+Global War on Accidents.  By contrast, the practice of labeling
+political opposition as &ldquo;terrorists,&rdquo; and using supposed
+&ldquo;anti-terror&rdquo; laws to infiltrate and sabotage their
+activities, threatens democracy everywhere.  For instance, the US
+Joint Terrorism Task Force infiltrated a wide range of political
+opposition groups.<a name="tex2html7"
+href="#foot103"><sup>4</sup></a></p>
+
+<p>False accusations of &ldquo;terrorism&rdquo; are standard practice
+for suppressing political opposition.  In the US, protesters who
+smashed windows at the 2008 Republican National Convention were
+charged with of &ldquo;terrorism.&rdquo;<a name="tex2html9"
+href="#foot104"><sup>5</sup></a> More recently, Iran described
+protesters demanding a new election as
+&ldquo;terrorists.&rdquo;<a name="tex2html11"
+href="#foot105"><sup>6</sup></a> The generals who ruled most of South
+America in the 1970s offered precisely that justification for their
+systematic murder of dissidents.<a name="tex2html13"
+href="#foot20"><sup>7</sup></a></p>
+
+<p>A free society does not guarantee anonymity in what you do outside
 your home: it is always possible that someone will notice where you
 went on the street, or that a merchant will remember what you bought.
 This information is dispersed, not assembled for ready use.  A
 detective can track down the people who noticed you and ask them for
 it; each person may or may not say what he knows about you.  The
-effort required for this limits how often it is done.
+effort required for this limits how often it is done.</p>
 
-<p>
-By contrast, systematic digital surveillance collects all the
+<p>By contrast, systematic digital surveillance collects all the
 information about everyone for convenient use for whatever purpose,
 whether it be marketing, infiltration, or arrest of dissidents.
 Because this endangers the people's control over the state, we must
@@ -124,97 +109,85 @@
 convenience it would offer.  I have few secrets about my own travels,
 most of which are for publicly announced speeches, but we need to
 fight surveillance even if it is established while we have no
-particular secrets to keep.
+particular secrets to keep.</p>
 
-<p>
-The UK car travel surveillance system has already been used against
+<p>The UK car travel surveillance system has already been used against
 political dissidents.<a name="tex2html14"
-  href="#foot106"><sup>8</sup></a>
-<p>
+href="#foot106"><sup>8</sup></a></p>
 
-<h3>
-<a name="censorship"></a>
-CENSORSHIP
-</h3>
+<h3 id="censorship">CENSORSHIP</h3>
 
-<p>
-When the topic of Internet censorship is mentioned, people are likely
-to think of China, but many supposedly freedom-respecting countries
-have imposed censorship.  Denmark's government has blocked access to a
-secret list of web pages.  Australia's government wants to do
-likewise, but has met strong resistance, so instead it has forbidden
-links to a long list of URLs.  Electronic Frontiers Australia was
-forced, under threat of fines of AUD 11,000 per day, to remove a link
-to an anti-abortion political web site.<a name="tex2html16"
-  href="#foot107"><sup>9</sup></a>Denmark's secret list of forbidden URLs was 
leaked and posted on
-Wikileaks; that page is now on Australia's banned list.<a name="tex2html18"
-  href="#foot108"><sup>10</sup></a>Germany is on the verge of launching 
Internet censorship.<a name="tex2html20"
-  href="#foot109"><sup>11</sup></a>
-<p>
-Censorship of the contents of web sites is also a threat.  India just
-announced a broad plan of censorship that would effectively abolish
-freedom of the press on the Internet.<a name="tex2html22"
-  href="#foot110"><sup>12</sup></a>
-<p>
-Some European countries censor particular political views on the
+<p>When the topic of Internet censorship is mentioned, people are
+likely to think of China, but many supposedly freedom-respecting
+countries have imposed censorship.  Denmark's government has blocked
+access to a secret list of web pages.  Australia's government wants to
+do likewise, but has met strong resistance, so instead it has
+forbidden links to a long list of URLs.  Electronic Frontiers
+Australia was forced, under threat of fines of AUD 11,000 per day, to
+remove a link to an anti-abortion political web
+site.<a name="tex2html16" href="#foot107"><sup>9</sup></a> Denmark's
+secret list of forbidden URLs was leaked and posted on Wikileaks; that
+page is now on Australia's banned list.<a name="tex2html18"
+href="#foot108"><sup>10</sup></a> Germany is on the verge of launching
+Internet censorship.<a name="tex2html20"
+href="#foot109"><sup>11</sup></a></p>
+
+<p>Censorship of the contents of web sites is also a threat.  India
+just announced a broad plan of censorship that would effectively
+abolish freedom of the press on the Internet.<a name="tex2html22"
+href="#foot110"><sup>12</sup></a></p>
+
+<p>Some European countries censor particular political views on the
 Internet.  In the United States, people have been imprisoned as
-``terrorists'' for running a web site which discussed actions taken
-against experiments on animals.<a name="tex2html24"
-  href="#foot28"><sup>13</sup></a>
-<p>
-Another common excuse for censorship is the claim that ``obscene''
-works are dangerous.  I agree that some works are obscene; for
-instance, the gruesome violence in the movie Pulp Fiction revolted me,
-and I will try never to see such a thing again.  But that does not
-justify censoring it; no matter how obscene a work may be, censorship
-is more so.  A variant of this excuse is ``protecting children,''
-which plays to the exaggerated and mostly misplaced fears of
-parents.<a name="tex2html25"
-  href="#foot111"><sup>14</sup></a>
-<p>
-Censorship is nothing new.  What is new is the ease and effectiveness
-of censorship on electronic communication and publication (even where
-a few wizards have ways to bypass it).  China in 1960 achieved
-effective censorship by cutting its population off from the world, but
-that held back the country's development, which was painful for the
-regime as well as for the population.  Today China uses digital
-technology to achieve effective political censorship without cutting
-itself off in other ways.<a name="tex2html27"
-  href="#foot112"><sup>15</sup></a>
-<p>
+&ldquo;terrorists&rdquo; for running a web site which discussed
+actions taken against experiments on animals.<a name="tex2html24"
+href="#foot28"><sup>13</sup></a></p>
+
+<p>Another common excuse for censorship is the claim that
+&ldquo;obscene&rdquo; works are dangerous.  I agree that some works
+are obscene; for instance, the gruesome violence in the movie Pulp
+Fiction revolted me, and I will try never to see such a thing again.
+But that does not justify censoring it; no matter how obscene a work
+may be, censorship is more so.  A variant of this excuse is
+&ldquo;protecting children,&rdquo; which plays to the exaggerated and
+mostly misplaced fears of parents.<a name="tex2html25"
+href="#foot111"><sup>14</sup></a></p>
+
+<p>Censorship is nothing new.  What is new is the ease and
+effectiveness of censorship on electronic communication and
+publication (even where a few wizards have ways to bypass it).  China
+in 1960 achieved effective censorship by cutting its population off
+from the world, but that held back the country's development, which
+was painful for the regime as well as for the population.  Today China
+uses digital technology to achieve effective political censorship
+without cutting itself off in other ways.<a name="tex2html27"
+href="#foot112"><sup>15</sup></a></p>
 
-<h3>
-<a name="control"></a>
-SOFTWARE YOU CAN'T CONTROL
-</h3>
+<h3 id="control">SOFTWARE YOU CAN'T CONTROL</h3>
 
-<p>
-In order for computer users to have freedom in their own computing
+<p>In order for computer users to have freedom in their own computing
 activities, they must have control over the software they use.  This
-means it must be <em>free software</em>, which I here call ``free/libre''
-so as to emphasize that this is a matter of freedom, not price.
+means it must be <em>free software</em>, which I here call
+&ldquo;free/libre&rdquo; so as to emphasize that this is a matter of
+freedom, not price.</p>
 
-<p>
-A program is free/libre if it gives the user these four essential
-freedoms:<a name="tex2html29"
-  href="#foot113"><sup>16</sup></a>
-<p>
-0. Freedom to run the program as you wish.
+<p>A program is free/libre if it gives the user these four essential
+freedoms:<a name="tex2html29" href="#foot113"><sup>16</sup></a></p>
 
-<p>
-1. Freedom to study the source code, and change it to make the program
-do what you wish.
+<ul>
+<li>0. Freedom to run the program as you wish.</li>
 
-<p>
-2. Freedom to redistribute and/or republish exact copies.  (This is
-the freedom to help your neighbor.)
+<li>1. Freedom to study the source code, and change it to make the
+program do what you wish.</li>
 
-<p>
-3. Freedom to distribute and/or publish copies of your modified versions.
-(This is the freedom to contribute to your community.)
+<li>2. Freedom to redistribute and/or republish exact copies.  (This
+is the freedom to help your neighbor.)</li>
 
-<p>
-When software is free/libre, the users control what it does.  A
+<li>3. Freedom to distribute and/or publish copies of your modified
+versions.  (This is the freedom to contribute to your community.)</li>
+</ul>
+
+<p>When software is free/libre, the users control what it does.  A
 non-free or <em>proprietary</em> program is under the control of its
 developer, and functions as an instrument to give the developer
 control over the the users.  It may be convenient, or it may not, but
@@ -224,145 +197,127 @@
 and 1 give you control over your own computing, and freedom 3 enables
 users to work together to jointly control their computing, while
 freedom 2 means users are not kept divided.<a name="tex2html31"
-  href="#foot114"><sup>17</sup></a>
-<p>
-Many argue that free/libre software is impossible on theoretical
-economic grounds.  Some of them misinterpret free/libre software as
-``gratis software''; others understand the term correctly, but either
-way they claim that businesses will never want to develop such
-software.  Combining this with a theoretical premise such as ``Useful
-software can only be developed by paying programmers,'' they conclude
-that free software could never exist.  This argument is typically
-presented elliptically in the form of a question such as, ``How can
-programmers make a living if software is free?''  Both premises, as
-well as the conclusion, contradict well-known facts; perhaps the
-elliptical questions are meant to obscure the premises so people will
-not compare them with the facts.
+href="#foot114"><sup>17</sup></a></p>
 
-<p>
-We know that free software can be developed because so much of it
-exists.  There are thousands of useful free programs,<a name="tex2html34"
-  href="#foot115"><sup>18</sup></a> and millions of users<a name="tex2html36"
-  href="#foot116"><sup>19</sup></a> run the
+<p>Many argue that free/libre software is impossible on theoretical
+economic grounds.  Some of them misinterpret free/libre software as
+&ldquo;gratis software&rdquo;; others understand the term correctly,
+but either way they claim that businesses will never want to develop
+such software.  Combining this with a theoretical premise such as
+&ldquo;Useful software can only be developed by paying
+programmers,&rdquo; they conclude that free software could never
+exist.  This argument is typically presented elliptically in the form
+of a question such as, &ldquo;How can programmers make a living if
+software is free?&rdquo; Both premises, as well as the conclusion,
+contradict well-known facts; perhaps the elliptical questions are
+meant to obscure the premises so people will not compare them with the
+facts.</p>
+
+<p>We know that free software can be developed because so much of it
+exists.  There are thousands of useful free
+programs,<a name="tex2html34" href="#foot115"><sup>18</sup></a> and
+millions of users<a name="tex2html36"
+href="#foot116"><sup>19</sup></a> run the
 GNU/Linux<a name="tex2html38"
-  href="#foot117"><sup>20</sup></a>operating system.  Thousands of programmers 
write useful free software
-as volunteers.<a name="tex2html40"
-  href="#foot118"><sup>21</sup></a>  Companies such as Red Hat, IBM, Oracle,
-and Google pay programmers to write free software.  I do not know even
-approximately how many paid free software developers there are;
-studying the question would be useful.  Alexandre Zapolsky of the free
-software business event Paris Capitale du Libre
-(<tt><a name="tex2html42"
-  href="http://www.paris-libre.org";>http://www.paris-libre.org</a></tt>) said 
in 2007 that the free software
-companies of France had over 10,000 employees.
+href="#foot117"><sup>20</sup></a>operating system.  Thousands of
+programmers write useful free software as
+volunteers.<a name="tex2html40" href="#foot118"><sup>21</sup></a>
+Companies such as Red Hat, IBM, Oracle, and Google pay programmers to
+write free software.  I do not know even approximately how many paid
+free software developers there are; studying the question would be
+useful.  Alexandre Zapolsky of the free software business event Paris
+Capitale du Libre (<a href="http://www.paris-libre.org";>
+http://www.paris-libre.org</a>) said in 2007 that the free software
+companies of France had over 10,000 employees.</p>
 
-<p>
-Most computer users use proprietary software, and are accustomed to
+<p>Most computer users use proprietary software, and are accustomed to
 letting a few companies control their computing.  If you are one of
 them, you may have accepted the view that it is normal and proper for
 those companies, rather than you, to have control.  You may also
-believe that ``reputable'' developers will not use their power to
-mistreat you.  The fact is that they do.
+believe that &ldquo;reputable&rdquo; developers will not use their
+power to mistreat you.  The fact is that they do.</p>
 
-<p>
-Microsoft Windows has features to spy on the user,<a name="tex2html43"
-  href="#foot119"><sup>22</sup></a>Digital Restrictions Management (DRM) 
features designed to stop the
-user from making full use of his own files,<a name="tex2html45"
-  href="#foot120"><sup>23</sup></a> and an all-purpose back door with which
-Microsoft can forcibly change the software in any way at any
-time.<a name="tex2html47"
-  href="#foot121"><sup>24</sup></a>Microsoft can alter any software, not just 
its own.<a name="tex2html49"
-  href="#foot122"><sup>25</sup></a>Cell phones tied to particular phone 
networks may give the network a
-similar back door.  MacOS also has DRM features designed to restrict
-the user.
+<p>Microsoft Windows has features to spy on the
+user,<a name="tex2html43" href="#foot119"><sup>22</sup></a> Digital
+Restrictions Management (DRM) features designed to stop the user from
+making full use of his own files,<a name="tex2html45"
+href="#foot120"><sup>23</sup></a> and an all-purpose back door with
+which Microsoft can forcibly change the software in any way at any
+time.<a name="tex2html47" href="#foot121"><sup>24</sup></a> Microsoft
+can alter any software, not just its own.<a name="tex2html49"
+href="#foot122"><sup>25</sup></a> Cell phones tied to particular phone
+networks may give the network a similar back door.  MacOS also has DRM
+features designed to restrict the user.</p>
 
-<p>
-The only known defense against malicious features is to insist on
+<p>The only known defense against malicious features is to insist on
 software that is controlled by the users: free/libre software.  It is
 not a perfect guarantee, but the alternative is no defense at all.  If
 code is law, those governed by it must have the power to decide what
-it should say.
+it should say.</p>
 
-<p>
+<h3 id="protocols">RESTRICTED FORMATS</h3>
 
-<h3>
-<a name="protocols"></a>
-RESTRICTED FORMATS
-</h3>
-
-<p>
-Restricted file formats impose private control over communication and
-publication.  Those who control the formats control, in a general
+<p>Restricted file formats impose private control over communication
+and publication.  Those who control the formats control, in a general
 sense, society's use of information, since it can't be distributed or
-read/viewed without their permission.
-
-<p>
-For instance, text files are often distributed in the secret Microsoft
-Word format, which other developers have only imperfectly been able to
-decode and implement.  This practice is comparable to publishing books
-in a secret alphabet which only officially approved scribes know how
-to read.  Italian public television (RAI) distributes video in VC-1
-format, whose specifications are available only under nondisclosure
-agreement from the Society of Motion Picture and Television Engineers.
-Ironically, the SMPTE states this in Word file, which is not suitable
-to cite as a reference.<a name="tex2html51"
-  href="#foot123"><sup>26</sup></a>This standard has been partly decoded 
through reverse engineering.
-
-<p>
-Most music distribution on the Internet uses the patented MP3 format,
-and most video uses patented MPEG-4 formats such as DIVX and H.264.
-VC-1 is also patented.<a name="tex2html53"
-  href="#foot124"><sup>27</sup></a>  Any software
-patent directly attacks every user's freedom to use her computer.  Use
-of patented data formats is comparable to mandating that people use
-officially approved scribes rather than do their own reading and
-writing.  Patents on MPEG formats have been used to attack and
-threaten developers and distributors of programs that can handle these
-formats, including free/libre programs.  Some distributors of the
-GNU/Linux system, for instance Red Hat, do not dare to include support
-for these programs.
-
-<p>
-A restricted format is a trap; any and all use of the format has the
-effect of pushing computer users into the trap.  Inclusion in
-dependence on these formats is not a step forward.
+read/viewed without their permission.</p>
 
-<p>
+<p>For instance, text files are often distributed in the secret
+Microsoft Word format, which other developers have only imperfectly
+been able to decode and implement.  This practice is comparable to
+publishing books in a secret alphabet which only officially approved
+scribes know how to read.  Italian public television (RAI) distributes
+video in VC-1 format, whose specifications are available only under
+nondisclosure agreement from the Society of Motion Picture and
+Television Engineers.  Ironically, the SMPTE states this in Word file,
+which is not suitable to cite as a reference.<a name="tex2html51"
+href="#foot123"><sup>26</sup></a> This standard has been partly
+decoded through reverse engineering.</p>
+
+<p>Most music distribution on the Internet uses the patented MP3
+format, and most video uses patented MPEG-4 formats such as DIVX and
+H.264.  VC-1 is also patented.<a name="tex2html53"
+href="#foot124"><sup>27</sup></a> Any software patent directly attacks
+every user's freedom to use her computer.  Use of patented data
+formats is comparable to mandating that people use officially approved
+scribes rather than do their own reading and writing.  Patents on MPEG
+formats have been used to attack and threaten developers and
+distributors of programs that can handle these formats, including
+free/libre programs.  Some distributors of the GNU/Linux system, for
+instance Red Hat, do not dare to include support for these
+programs.</p>
+
+<p>A restricted format is a trap; any and all use of the format has
+the effect of pushing computer users into the trap.  Inclusion in
+dependence on these formats is not a step forward.</p>
 
-<h3>
-<a name="saas"></a>
-SOFTWARE AS A SERVICE
-</h3>
+<h3 id="saas">SOFTWARE AS A SERVICE</h3>
 
-<p>
-Typical proprietary software gives you only a binary, whose actions
+<p>Typical proprietary software gives you only a binary, whose actions
 are controlled by the developer, and not by you.  A new practice
-called ``software as a service,'' or ``SaaS,'' gives you even less
-control.  With SaaS you don't even get a copy of the program you can
-run.  Instead, you send your data to a server, a program runs there,
-and the server sends you back the result.  If users have a binary,
-they could reverse-engineer it and patch it if they are really
-determined.  With SaaS, they can't even do that.
+called &ldquo;software as a service,&rdquo; or &ldquo;SaaS,&rdquo;
+gives you even less control.  With SaaS you don't even get a copy of
+the program you can run.  Instead, you send your data to a server, a
+program runs there, and the server sends you back the result.  If
+users have a binary, they could reverse-engineer it and patch it if
+they are really determined.  With SaaS, they can't even do that.</p>
+
+<p>Reverse engineering being so difficult, perhaps software as a
+service is little worse than proprietary software.  The point,
+however, is that it is no better.  For users to have control of their
+computing, they must avoid SaaS just as they must avoid proprietary
+software.</p>
+
+<p>For the preparation of this paper I was invited to use an IEEE site
+called <a href="http://pdf-express.org";>pdf-express.org</a> to convert
+my PDF file into one with the embedded fonts required for the
+conference proceedings.  Looking at that site, I concluded that it was
+an instance of software as a service, and therefore I should not use
+it.  Another strike against it is that it requires users to identify
+themselves, which is gratuitous surveillance.</p>
 
-<p>
-Reverse engineering being so difficult, perhaps software as a service
-is little worse than proprietary software.  The point, however, is
-that it is no better.  For users to have control of their computing,
-they must avoid SaaS just as they must avoid proprietary software.
-
-<p>
-For the preparation of this paper I was invited to use an IEEE site
-called <tt><a name="tex2html55"
-  href="pdf-express.org">pdf-express.org</a></tt> to convert my PDF file into 
one with the
-embedded fonts required for the conference proceedings.  Looking at
-that site, I concluded that it was an instance of software as a
-service, and therefore I should not use it.  Another strike against it
-is that it requires users to identify themselves, which is gratuitous
-surveillance.
-
-<p>
-It's not that I'm specifically worried that this site is malicious.  I
-cannot trust the IEEE implicitly, since I disapprove of its
+<p>It's not that I'm specifically worried that this site is malicious.
+I cannot trust the IEEE implicitly, since I disapprove of its
 restrictions on redistributing the papers it publishes, but there is
 little scope in that particular site's job for intentional
 mistreatment of its users (aside from the gratuitous surveillance).
@@ -370,26 +325,19 @@
 power.  The point is that we should not let ourselves become
 accustomed to granting others that sort of power over us.  The habit
 of handing over control of our computing to others is a dangerous one.
-The way to resist the practice is to refuse invitations to follow it.
+The way to resist the practice is to refuse invitations to follow
+it.</p>
 
-<p>
-The only way to maintain your control over your computing is to do it
-using your own copy of a free/libre program.
+<p>The only way to maintain your control over your computing is to do
+it using your own copy of a free/libre program.</p>
 
-<p>
+<h3 id="copyright">COPYRIGHT AND SHARING</h3>
 
-<h3>
-<a name="copyright"></a>
-COPYRIGHT AND SHARING
-</h3>
-
-<p>
-The biggest conflict over freedom in the Internet is the War on
+<p>The biggest conflict over freedom in the Internet is the War on
 Sharing: the attempt by the publishing industry to prevent Internet
-users from enjoying the capability to copy and share information.
+users from enjoying the capability to copy and share information.</p>
 
-<p>
-Copyright was established in the age of the printing press as an
+<p>Copyright was established in the age of the printing press as an
 industrial regulation on the business of writing and publishing.  The
 aim was to encourage the publication of a diversity of written works.
 The means used was to require publishers to get the author's
@@ -399,27 +347,19 @@
 little: copyright restricted only publication, not the things an
 ordinary reader could do, so it was easy to enforce and met with
 little opposition.  That made copyright arguably a beneficial system
-for the public, and therefore legitimate.
-
-<p>
-Well and good--back then.
+for the public, and therefore legitimate.</p>
 
-<p>
+<p>Well and good&mdash;back then.</p>
 
-<h4>
-<a name="waronsharing"></a>
-The War on Sharing
-</h4>
+<h4 id="waronsharing">The War on Sharing</h4>
 
-<p>
-Nowadays, computers and networks provide superior means for
+<p>Nowadays, computers and networks provide superior means for
 distributing and manipulating information, including published
 software, musical recordings, texts, images, and videos.  Networks
-offer the possibility of unlimited access to all sorts of data--an
-information utopia.
+offer the possibility of unlimited access to all sorts of
+data&mdash;an information utopia.</p>
 
-<p>
-The works that people use to do practical jobs, such as software,
+<p>The works that people use to do practical jobs, such as software,
 recipes, text fonts, educational works and reference works, must be
 free/libre so that the users can control (individually and
 collectively) the jobs that they do with these works.  That argument
@@ -431,237 +371,205 @@
 the bonds of society.  When copying and sharing a book was so
 difficult that one would hardly ask such a large favor, the issue of
 freedom to share was moot.  Today, the Internet makes sharing easy,
-and thus makes the freedom to share essential.
+and thus makes the freedom to share essential.</p>
 
-<p>
-One obstacle stands in the way of this utopia: copyright.  Readers and
-listeners who make use of their new ability to copy and share
+<p>One obstacle stands in the way of this utopia: copyright.  Readers
+and listeners who make use of their new ability to copy and share
 published information are technically copyright infringers.  The same
 law which formerly acted as a beneficial industrial regulation on
 publishers has now become a restriction on the public it was meant to
-benefit.
+benefit.</p>
 
-<p>
-In a democracy, a law that prohibits a popular and useful activity is
-usually soon relaxed. Not so where corporations have more political
+<p>In a democracy, a law that prohibits a popular and useful activity
+is usually soon relaxed. Not so where corporations have more political
 power than the public.  The entertainment companies' lobby is
 determined to prevent the public from taking advantage of the power of
 their computers, and has found copyright a suitable tool.  Under their
 influence, rather than relaxing copyright rules to permit productive
 and free use of the Internet, governments have made it stricter than
-ever, forbidding the act of sharing.
+ever, forbidding the act of sharing.</p>
 
-<p>
-The publishers and their friendly governments would like to go to any
-length they can get away with to wage the War on Sharing.  In the US,
-the record companies' legal arm (the RIAA) regularly sues teenagers
-for hundreds of thousands of dollars, and one sharer was fined almost
-two million.<a name="tex2html56"
-  href="#foot125"><sup>28</sup></a>The French government recently passed a law 
(HADOPI) to abolish the
-principle of due process of law, by punishing Internet users with
-disconnection on the mere accusation of copying.  Only certain
-selected, government-approved organizations were empowered to make
-such accusations; thus, this law meant to abolish Libert&#233;,
-Egalit&#233;, and Fraternit&#233; with one blow.  The law was rejected as
-unconstitutional by the Constitutional Council.<a name="tex2html58"
-  href="#foot126"><sup>29</sup></a>A similar law in New Zealand was withdrawn 
this year after public
+<p>The publishers and their friendly governments would like to go to
+any length they can get away with to wage the War on Sharing.  In the
+US, the record companies' legal arm (the RIAA) regularly sues
+teenagers for hundreds of thousands of dollars, and one sharer was
+fined almost two million.<a name="tex2html56"
+href="#foot125"><sup>28</sup></a> The French government recently
+passed a law (HADOPI) to abolish the principle of due process of law,
+by punishing Internet users with disconnection on the mere accusation
+of copying.  Only certain selected, government-approved organizations
+were empowered to make such accusations; thus, this law meant to
+abolish Libert&eacute;, Egalit&eacute;, and Fraternit&eacute; with one
+blow.  The law was rejected as unconstitutional by the Constitutional
+Council.<a name="tex2html58" href="#foot126"><sup>29</sup></a> A
+similar law in New Zealand was withdrawn this year after public
 protests.  The European Parliament recently voted against imposing
 similar injustice on the whole European Union, but the EU's weak form
 of democracy does not give Parliament the final decision.  Some would
 like to go even further: a UK member of parliament proposed ten years'
-imprisonment for noncommercial sharing.
+imprisonment for noncommercial sharing.</p>
 
-<p>
-The US, Canada, the European Union, and various other countries are
-engaged in negotiating the ``Anti-Counterfeiting Trade Agreement.''
-The negotiations are secret, but Canada reluctantly published a list
-of suggestions it received from private parties, and HADOPI-style
-punishment without trial was one of them.<a name="tex2html60"
-  href="#foot127"><sup>30</sup></a>The suggestion is likely to have come from 
the copyright lobby, which
-has great influence in the US government and others, so the danger is
-not negligible.  European officials may seek to use this treaty to
+<p>The US, Canada, the European Union, and various other countries are
+engaged in negotiating the &ldquo;Anti-Counterfeiting Trade
+Agreement.&rdquo; The negotiations are secret, but Canada reluctantly
+published a list of suggestions it received from private parties, and
+HADOPI-style punishment without trial was one of
+them.<a name="tex2html60" href="#foot127"><sup>30</sup></a> The
+suggestion is likely to have come from the copyright lobby, which has
+great influence in the US government and others, so the danger is not
+negligible.  European officials may seek to use this treaty to
 circumvent the European Parliament, following a practice known as
-``policy laundering.''
+&ldquo;policy laundering.&rdquo;</p>
 
-<p>
-The corporations that profit most from copyright legally exercise it
-in the name of the authors (most of whom actually gain little).  They
-would have us believe that copyright is a natural right of authors,
-and that we the public must suffer it no matter how painful it is.
-They call sharing ``piracy,'' equating helping your neighbor with
-attacking a ship.
-
-<p>
-Public anger over these measures is growing, but it is held back by
-propaganda.  Terms such as ``piracy,''<a name="tex2html62"
-  href="#foot128"><sup>31</sup></a>  ``protecting
-authors'' and ``intellectual property,''<a name="tex2html64"
-  href="#foot129"><sup>32</sup></a> and claims that reading, viewing or 
listening to
-anything without paying is ``theft,'' have convinced many readers that
-their rights and interests do not count.  This propaganda implicitly
-assumes that publishers deserve the special power which they exercise
-in the name of the authors), and that we are morally obliged to suffer
-whatever measures might be needed to maintain their power.
-
-<p>
+<p>The corporations that profit most from copyright legally exercise
+it in the name of the authors (most of whom actually gain little).
+They would have us believe that copyright is a natural right of
+authors, and that we the public must suffer it no matter how painful
+it is.  They call sharing &ldquo;piracy,&rdquo; equating helping your
+neighbor with attacking a ship.</p>
+
+<p>Public anger over these measures is growing, but it is held back by
+propaganda.  Terms such as &ldquo;piracy,&rdquo;<a name="tex2html62"
+href="#foot128"><sup>31</sup></a> &ldquo;protecting authors&rdquo; and
+&ldquo;intellectual property,&rdquo;<a name="tex2html64"
+href="#foot129"><sup>32</sup></a> and claims that reading, viewing or
+listening to anything without paying is &ldquo;theft,&rdquo; have
+convinced many readers that their rights and interests do not count.
+This propaganda implicitly assumes that publishers deserve the special
+power which they exercise in the name of the authors), and that we are
+morally obliged to suffer whatever measures might be needed to
+maintain their power.</p>
+
+<h4 id="digitalrestrictionsmanagement">Digital restrictions
+management</h4>
+
+<p>The publishers aim to do more than punish sharing.  They have
+realized that by publishing works in encrypted format, which can be
+viewed only with software designed to control the users, they could
+gain unprecedented power over all use of these works.  They could
+compel people to pay, and also to identify themselves, every time they
+wish to read a book, listen to a song, or watch a video.  They could
+make people's copies disappear on a planned schedule.  They could even
+make copies unreadable at will, if they have all-purpose back-doors
+such as found in Windows, or special features for the
+purpose.<a name="tex2html66" href="#foot130"><sup>33</sup></a></p>
 
-<h4>
-<a name="digitalrestrictionsmanagement"></a>
-Digital restrictions management
-</h4>
-
-<p>
-The publishers aim to do more than punish sharing.  They have realized
-that by publishing works in encrypted format, which can be viewed
-only with software designed to control the users, they could gain
-unprecedented power over all use of these works.  They could compel
-people to pay, and also to identify themselves, every time they wish
-to read a book, listen to a song, or watch a video.  They could make
-people's copies disappear on a planned schedule.  They could even make
-copies unreadable at will, if they have all-purpose back-doors such as
-found in Windows, or special features for the purpose.<a name="tex2html66"
-  href="#foot130"><sup>33</sup></a>
-<p>
-Designing products and media to restrict the user is called Digital
+<p>Designing products and media to restrict the user is called Digital
 Restrictions Management, or DRM.<a name="tex2html68"
-  href="#foot66"><sup>34</sup></a>  Its purpose
-is an injustice: to deny computer users what would otherwise be their
-legal rights in using their copies of published works.  Its method is
-a second injustice, since it imposes the use of proprietary software.
-
-<p>
-The publishers gained US government support for their dream of total
-power with the Digital Millennium Copyright Act of 1998 (DMCA).  This
-law gave publishers power, in effect, to write their own copyright
-rules, by implementing them in the code of the authorized player
-software.  Even reading or listening is illegal when the software
-is designed to block it.
-
-<p>
-The DMCA has an exception: it does not forbid uses that qualify as
-``fair use.''  But it strips this exception of practical effect by
-censoring any software that people could use to do these things.
-Under the DMCA, any program that could be used to break digital
-handcuffs is banned unless it has other comparably important
-``commercially significant'' uses.  (The denial of validity to any
-other kind of significance, such as social or ethical significance,
-explicitly endorses business' domination of society.)  Practically
-speaking, the limited right to disobey your software jailer is
-meaningless since the means to do so is not available.
+href="#foot66"><sup>34</sup></a> Its purpose is an injustice: to deny
+computer users what would otherwise be their legal rights in using
+their copies of published works.  Its method is a second injustice,
+since it imposes the use of proprietary software.</p>
+
+<p>The publishers gained US government support for their dream of
+total power with the Digital Millennium Copyright Act of 1998 (DMCA).
+This law gave publishers power, in effect, to write their own
+copyright rules, by implementing them in the code of the authorized
+player software.  Even reading or listening is illegal when the
+software is designed to block it.</p>
+
+<p>The DMCA has an exception: it does not forbid uses that qualify as
+&ldquo;fair use.&rdquo; But it strips this exception of practical
+effect by censoring any software that people could use to do these
+things.  Under the DMCA, any program that could be used to break
+digital handcuffs is banned unless it has other comparably important
+&ldquo;commercially significant&rdquo; uses.  (The denial of validity
+to any other kind of significance, such as social or ethical
+significance, explicitly endorses business' domination of society.)
+Practically speaking, the limited right to disobey your software
+jailer is meaningless since the means to do so is not available.</p>
 
-<p>
-Similar software censorship laws have since been adopted in the
+<p>Similar software censorship laws have since been adopted in the
 European Union, Australia, and New Zealand, and other countries.
 Canada has tried to do this for several years, but opposition there
 has blocked it.  The publishers' lobbies seek to impose these
 restrictions on all countries; for instance, the US demands them in
-trade treaties.  WIPO (the World ``Intellectual Property''
+trade treaties.  WIPO (the World &ldquo;Intellectual Property&rdquo;
 Organization) helps, by promoting two treaties whose sole point is to
 require laws such as these.  Signing these treaties does no good for a
 country's citizens, and there is no good reason why any country should
 sign them.  But when countries do sign, politicians can cite
-``compliance with treaty obligations'' as an excuse for software
-censorship.
+&ldquo;compliance with treaty obligations&rdquo; as an excuse for
+software censorship.</p>
 
-<p>
-We still have the same old freedoms in using paper books and other
+<p>We still have the same old freedoms in using paper books and other
 analog media.  But if e-books replace printed books, those freedoms
 will not transfer.  Imagine: no more used book stores; no more lending
 a book to your friend; no more borrowing one from the public
-library--no more ``leaks'' that might give someone a chance to read
-without paying.  No more purchasing a book anonymously with cash--you
-can only buy an e-book with a credit card, thus enabling computerized
-surveillance--and public libraries become retail outlets.  That is the
-world the publishers want for us.  If you buy the Amazon Kindle (we
-call it the Swindle) or the Sony Reader (we call it the Shreader for
-what it threatens to do to books), you pay to establish that world.
-
-<p>
+library&mdash;no more &ldquo;leaks&rdquo; that might give someone a
+chance to read without paying.  No more purchasing a book anonymously
+with cash&mdash;you can only buy an e-book with a credit card, thus
+enabling computerized surveillance&mdash;and public libraries become
+retail outlets.  That is the world the publishers want for us.  If you
+buy the Amazon Kindle (we call it the Swindle) or the Sony Reader (we
+call it the Shreader for what it threatens to do to books), you pay to
+establish that world.</p>
+
+<h3 id="supportingartists">SUPPORTING THE ARTS</h3>
+
+<p>The publishers tell us that a War on Sharing is the only way to
+keep art alive.  Supporting the arts is a desirable goal, but it could
+not justify these means.  Fortunately, it does not require them
+either.  Public sharing of copies tends to call attention to obscure
+or niche works: when Monty Python put its video files on the net for
+download, its sales increased by a factor of over
+200.<a name="tex2html69" href="#foot131"><sup>35</sup></a> Meanwhile,
+digital technology also offers new ways to support the arts.</p>
 
-<h3>
-<a name="supportingartists"></a>
-SUPPORTING THE ARTS
-</h3>
-
-<p>
-The publishers tell us that a War on Sharing is the only way to keep
-art alive.  Supporting the arts is a desirable goal, but it could not
-justify these means.  Fortunately, it does not require them either.
-Public sharing of copies tends to call attention to obscure or niche
-works: when Monty Python put its video files on the net for download,
-its sales increased by a factor of over 200.<a name="tex2html69"
-  href="#foot131"><sup>35</sup></a>Meanwhile, digital technology also offers 
new ways to support the
-arts.
+<h4 id="donations">Donations</h4>
 
-<p>
-
-<h4>
-<a name="donations"></a>
-Donations
-</h4>
-
-<p>
-The singer Jane Siberry (now known as Issa) offered her music for
+<p>The singer Jane Siberry (now known as Issa) offered her music for
 download through her own web site, allowing people to pay whatever
-amount they wish.  (The site, <tt><a name="tex2html71"
-  href="sheeba.ca">sheeba.ca</a></tt>, currently says it is
-being redesigned but suggests the general policy will continue.)  The
+amount they wish.  (The site, <a name="tex2html71"
+href="http://sheeba.ca";>sheeba.ca</a>, currently says it is being
+redesigned but suggests the general policy will continue.)  The
 average price paid per song was more than the $.99 that the major
 record companies charge.<a name="tex2html72"
-  href="#foot132"><sup>36</sup></a>
-<p>
-Bestsellers also can still do well without stopping people from
+href="#foot132"><sup>36</sup></a></p>
+
+<p>Bestsellers also can still do well without stopping people from
 sharing.  Stephen King got hundreds of thousands of dollars selling a
 serialized unencrypted e-book with no technical obstacle to sharing of
 copies.  Radiohead made millions in 2007 by inviting fans to copy an
-album and pay what they wished, while it was also shared on the Internet.
-In 2008, Nine Inch Nails released an album with permission to share
-copies and made 750,000 dollars in a few days.<a name="tex2html74"
-  href="#foot133"><sup>37</sup></a>
-<p>
-Even hampered by today's inconvenient methods of sending money to
+album and pay what they wished, while it was also shared on the
+Internet.  In 2008, Nine Inch Nails released an album with permission
+to share copies and made 750,000 dollars in a few
+days.<a name="tex2html74" href="#foot133"><sup>37</sup></a></p>
+
+<p>Even hampered by today's inconvenient methods of sending money to
 artists, voluntary contributions from fans can support them.  Kevin
 Kelly, former editor of Wired Magazine, estimates the artist need only
 find approximately 1,000 true fans in order to earn a living from
 their support.<a name="tex2html76"
-  href="#foot134"><sup>38</sup></a>
-<p>
-But when computer networks provide an easy anonymous method for
+href="#foot134"><sup>38</sup></a></p>
+
+<p>But when computer networks provide an easy anonymous method for
 sending someone a small amount of money, without requiring a credit
 card, voluntary support for artists will become far more effective.
-Every player could have a button you can press, ``Click here to
-send the artists one dollar.''  (The optimal amount may vary between
-countries; in India, one rupee might be a better choice.)  Wouldn't
-you press it, at least once a week?
-
-<p>
-Why, today, would you hesitate to send one dollar to an artist, once a
-week or even once a day?  Not because you would miss the dollar, but
-because of the inconvenience of sending it.  Remove the inconvenience,
-and voluntary support for artists will soar.
+Every player could have a button you can press, &ldquo;Click here to
+send the artists one dollar.&rdquo; (The optimal amount may vary
+between countries; in India, one rupee might be a better choice.)
+Wouldn't you press it, at least once a week?</p>
+
+<p>Why, today, would you hesitate to send one dollar to an artist,
+once a week or even once a day?  Not because you would miss the
+dollar, but because of the inconvenience of sending it.  Remove the
+inconvenience, and voluntary support for artists will soar.</p>
+
+<h4 id="tax">Tax-based support</h4>
+
+<p>Another way to support the arts is with tax funds: perhaps with a
+special tax on blank media or Internet connectivity, or with general
+revenue.<a name="tex2html78" href="#foot135"><sup>39</sup></a> If this
+is to succeed in supporting artists, the state should distribute the
+tax money directly and entirely to them, and make sure it cannot under
+any pretext be taken from them by publishers such as record companies.
+Thus, in order to design this tax system to achieve the valid goal of
+&ldquo;supporting the arts,&rdquo; we must first reject the misguided
+goal of &ldquo;compensating the rights-holders.&rdquo;</p>
 
-<p>
-
-<h4>
-<a name="tax"></a>
-Tax-based support
-</h4>
-
-<p>
-Another way to support the arts is with tax funds: perhaps
-with a special tax on blank media or Internet connectivity, or with
-general revenue.<a name="tex2html78"
-  href="#foot135"><sup>39</sup></a>  If this is to succeed in supporting 
artists,
-the state should distribute the tax money directly and entirely to
-them, and make sure it cannot under any pretext be taken from them by
-publishers such as record companies.  Thus, in order to design this
-tax system to achieve the valid goal of ``supporting the arts,'' we
-must first reject the misguided goal of ``compensating the
-rights-holders.''
-
-<p>
-The state should not distribute this tax money in linear proportion to
-popularity, because that would give most of it to superstars,
+<p>The state should not distribute this tax money in linear proportion
+to popularity, because that would give most of it to superstars,
 leaving little to support all the other artists.  I therefore
 recommend using a function whose derivative is positive but tends
 towards zero, such as cube root.  With cube root, if superstar A has
@@ -671,134 +579,103 @@
 than other artists, the superstars together will get only a small
 fraction of the funds, so that the system can adequately support a
 large number of fairly popular artists.  This system would use its
-funds efficiently for the support of art.
-
-<p>
-I propose this system for art because art is where the controversy is.
-There is no fundamental reason why a tax-based system should not also
-be used to support functional works that ought to be free/libre, such
-as software and encyclopedias, but there is a practical difficulty in
-doing so: it is common for those works to have thousands of coauthors,
-and figuring out the right way to divide the funds among them might be
-difficult even with the cooperation and generosity of everyone
-involved.  Fortunately it appears not to be necessary to solve this
-problem, because people already put so much effort into developing
-free/libre functional works.
-
-<p>
-Francis Muguet<a name="tex2html80"
-  href="#foot79"><sup>40</sup></a> and I have developed a new
-proposal called the M&#233;c&#233;nat Global (or Global Patronage) which
-combines the idea of tax-support and voluntary payments.<a name="tex2html81"
-  href="#foot136"><sup>41</sup></a>  Every Internet subscriber would
-pay a monthly fee to support certain arts that are shared on the
-Internet.  Each user could optionally divide up to a certain maximum
-portion of her fee among her choice of works; the funds for each work
-would be divided among the creative contributors to the work (but not
-the publishers).  The totals thus assigned to various artists would
-also provide a measure of each artist's popularity.  The system would
-then distribute the rest of the money on the basis of that popularity,
-using a cube-root or similar tapering-off function.
-
-<p>
-
-<h3>
-<a name="makingitgood"></a>
-MAKING DIGITAL INCLUSION GOOD
-</h3>
-
-<p>
-The paper so far describes the factors that can make digital inclusion
-good or bad.  These factors are part of human society and subject to
-our influence.  Beyond just asking whether and when digital inclusion
-is a good thing, we can consider how to make sure it is good.
-
-<p>
+funds efficiently for the support of art.</p>
 
-<h4>
-<a name="legally"></a>
-Defending freedom legally
-</h4>
-
-<p>
-Full victory over the threats to digital freedom can only be achieved
-through changes in laws.  Systematic collection or retention of
-information on any person using computers and/or networks should
+<p>I propose this system for art because art is where the controversy
+is.  There is no fundamental reason why a tax-based system should not
+also be used to support functional works that ought to be free/libre,
+such as software and encyclopedias, but there is a practical
+difficulty in doing so: it is common for those works to have thousands
+of coauthors, and figuring out the right way to divide the funds among
+them might be difficult even with the cooperation and generosity of
+everyone involved.  Fortunately it appears not to be necessary to
+solve this problem, because people already put so much effort into
+developing free/libre functional works.</p>
+
+<p>Francis Muguet<a name="tex2html80" href="#foot79"><sup>40</sup></a>
+and I have developed a new proposal called the M&#233;c&#233;nat
+Global (or Global Patronage) which combines the idea of tax-support
+and voluntary payments.<a name="tex2html81"
+href="#foot136"><sup>41</sup></a> Every Internet subscriber would pay
+a monthly fee to support certain arts that are shared on the Internet.
+Each user could optionally divide up to a certain maximum portion of
+her fee among her choice of works; the funds for each work would be
+divided among the creative contributors to the work (but not the
+publishers).  The totals thus assigned to various artists would also
+provide a measure of each artist's popularity.  The system would then
+distribute the rest of the money on the basis of that popularity,
+using a cube-root or similar tapering-off function.</p>
+
+<h3 id="makingitgood">MAKING DIGITAL INCLUSION GOOD</h3>
+
+<p>The paper so far describes the factors that can make digital
+inclusion good or bad.  These factors are part of human society and
+subject to our influence.  Beyond just asking whether and when digital
+inclusion is a good thing, we can consider how to make sure it is
+good.</p>
+
+<h4 id="legally">Defending freedom legally</h4>
+
+<p>Full victory over the threats to digital freedom can only be
+achieved through changes in laws.  Systematic collection or retention
+of information on any person using computers and/or networks should
 require a specific court order; travel and communication within any
 country should normally be anonymous.  States should reject censorship
 and adopt constitutional protections against it.  States should
 protect their computing sovereignty by using only free software, and
 schools should teach only free software in order to carry out their
 mission to educate good citizens of a strong, free and cooperating
-society.
+society.</p>
 
-<p>
-To respect computer users' freedom to operate their computers, states
-should not allow patents to apply to software or (more generally)
-using computers in particular ways.  States should mandate their own
-use of freely implementable, publicly documented formats for all
-communication with the public, and should lead the private sector also
-to use only these formats.  To make copyright acceptable in the
+<p>To respect computer users' freedom to operate their computers,
+states should not allow patents to apply to software or (more
+generally) using computers in particular ways.  States should mandate
+their own use of freely implementable, publicly documented formats for
+all communication with the public, and should lead the private sector
+also to use only these formats.  To make copyright acceptable in the
 network age, noncommercial copying and sharing of published works
 should be legal.  Commercial use of DRM should be prohibited, and
 independently developed free software to access DRM formats should be
-lawful.
+lawful.</p>
 
-<p>
-To make these changes in laws happen, we need to organize.  The
-Electronic Frontier Foundation (<tt><a name="tex2html83"
-  href="eff.org">eff.org</a></tt>) campaigns against
-censorship and surveillance.  End Software Patents
-(<tt><a name="tex2html84"
-  href="endsoftpatents.org">endsoftpatents.org</a></tt>) and the League for 
Programming Freedom
-(<tt><a name="tex2html85"
-  href="progfree.org">progfree.org</a></tt>) campaign against software 
patents.  The Free
-Software Foundation campaigns against DRM through the site
-<tt><a name="tex2html86"
-  href="DefectiveByDesign.org">DefectiveByDesign.org</a></tt>.
+<p>To make these changes in laws happen, we need to organize.  The
+Electronic Frontier Foundation (<a href="http://eff.org";>eff.org</a>)
+campaigns against censorship and surveillance.  End Software Patents
+(<a href="http://endsoftpatents.org";>endsoftpatents.org</a>) and the
+League for Programming Freedom
+(<a href="http://progfree.org";>progfree.org</a>) campaign against
+software patents.  The Free Software Foundation campaigns against DRM
+through the site
+<a href="http://DefectiveByDesign.org";>DefectiveByDesign.org</a>.</p>
 
-<p>
+<h4 id="personally">Defending freedom personally</h4>
 
-<h4>
-<a name="personally"></a>
-Defending freedom personally
-</h4>
-
-<p>
-While we fight these legislative battles, we should also personally
+<p>While we fight these legislative battles, we should also personally
 reject products and services designed to take away our freedom.  To
 resist surveillance, we should avoid identifying ourselves to web
 sites unless it is inherently necessary, and we should buy things
-anonymously--with cash, not with bank cards.  To maintain control of
-our computing, we should not use proprietary software or software as a
-service.
+anonymously&mdash;with cash, not with bank cards.  To maintain control
+of our computing, we should not use proprietary software or software
+as a service.</p>
 
-<p>
-Above all, we should never buy or use products that implement DRM
+<p>Above all, we should never buy or use products that implement DRM
 handcuffs unless we personally have the means to break them.  Products
-with DRM are a trap; don't take the bait!
+with DRM are a trap; don't take the bait!</p>
 
-<p>
+<h4 id="others">Defending others' freedom</h4>
 
-<h4>
-<a name="others"></a>
-Defending others' freedom
-</h4>
-
-<p>
-We can take direct action to protect others' freedom in the digital
+<p>We can take direct action to protect others' freedom in the digital
 world.  For instance, we can remove the passwords from our wireless
-networks--it is safe, and it weakens government surveillance power.
-(The way to protect the privacy of our own Internet communications, to
-the extent that it is possible, is with end-to-end encryption.)  If
-others use enough of the bandwidth to cause actual inconvenience, we
-need to protect ourselves, but we can try gentle methods first (such
-as talking with the neighbors, or setting a password occasionally for
-a day or two), and keep the option of a permanent password as a last
-resort.
+networks&mdash;it is safe, and it weakens government surveillance
+power.  (The way to protect the privacy of our own Internet
+communications, to the extent that it is possible, is with end-to-end
+encryption.)  If others use enough of the bandwidth to cause actual
+inconvenience, we need to protect ourselves, but we can try gentle
+methods first (such as talking with the neighbors, or setting a
+password occasionally for a day or two), and keep the option of a
+permanent password as a last resort.</p>
 
-<p>
-When we publish, we should grant the users of our work the freedoms
+<p>When we publish, we should grant the users of our work the freedoms
 they deserve, by applying an explicit license appropriate to the type
 of work.  For works that state your thoughts or observations, and
 artistic works, the license should permit at least noncommercial
@@ -806,320 +683,307 @@
 suitable.  (I insisted on such a license for this article.)  Works
 that do functional jobs, such as software, reference works and
 educational works, should carry a free/libre license that grants users
-the four freedoms.
-
-<p>
+the four freedoms.</p>
 
-<h4>
-<a name="inclusioninfreedom"></a>
-inclusion in freedom
-</h4>
+<h4 id="inclusioninfreedom">Inclusion in freedom</h4>
 
-<p>
-In our efforts to help others in practical ways, we must avoid doing
-them harm at a deeper level.  Until freedom is generally assured in
-Internet use, projects for digital inclusion must take special care
+<p>In our efforts to help others in practical ways, we must avoid
+doing them harm at a deeper level.  Until freedom is generally assured
+in Internet use, projects for digital inclusion must take special care
 that the computing they promote is the freedom-respecting kind.  This
-means using free/libre software--certainly not Windows or MacOS.
+means using free/libre software&mdash;certainly not Windows or MacOS.
 This means using free, documented formats, without DRM.  It also means
 not exposing the supposed beneficiaries to surveillance or censorship
-through the computing practices to which they are being introduced.
-
-<p>
+through the computing practices to which they are being
+introduced.</p>
 
 <h2>Footnotes</h2>
 
 <dl>
-<dt><a name="foot100">... cafe.</a><a
+<dt id="foot100">&hellip; cafe.<a
  href="digital-inclusion-in-freedom.html#tex2html1"><sup>1</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html2"
-  
href="http://www.theaustralian.news.com.au/story/0,25197,24510571-2703,00.html";>http://www.theaustralian.news.com.au/story/0,25197,24510571-2703,00.html</a></tt>.
+  <a name="tex2html2"
+  
href="http://www.theaustralian.news.com.au/story/0,25197,24510571-2703,00.html";>http://www.theaustralian.news.com.au/story/0,25197,24510571-2703,00.html</a>.
 
 </dd>
-<dt><a name="foot101">... police</a><a
+<dt id="foot101">&hellip; police<a
  href="digital-inclusion-in-freedom.html#tex2html3"><sup>2</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html4"
-  
href="http://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>http://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html</a></tt>.
+  <a name="tex2html4"
+  
href="http://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>http://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html</a>.
 
 </dd>
-<dt><a name="foot102">... individuals.</a><a
+<dt id="foot102">&hellip; individuals.<a
  href="digital-inclusion-in-freedom.html#tex2html5"><sup>3</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html6"
-  
href="http://www.firstcoastnews.com/news/local/news-article.aspx?storyid=84936";>http://www.firstcoastnews.com/news/local/news-article.aspx?storyid=84936</a></tt>.
+  <a name="tex2html6"
+  
href="http://www.firstcoastnews.com/news/local/news-article.aspx?storyid=84936";>http://www.firstcoastnews.com/news/local/news-article.aspx?storyid=84936</a>.
 
 </dd>
-<dt><a name="foot103">... groups</a><a
+<dt id="foot103">&hellip; groups<a
  href="digital-inclusion-in-freedom.html#tex2html7"><sup>4</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html8"
-  
href="http://www.aclu.org/safefree/spyfiles/24011res20060131.html";>http://www.aclu.org/safefree/spyfiles/24011res20060131.html</a></tt>.
+  <a name="tex2html8"
+  
href="http://www.aclu.org/safefree/spyfiles/24011res20060131.html";>http://www.aclu.org/safefree/spyfiles/24011res20060131.html</a>.
 
 </dd>
-<dt><a name="foot104">... ``terrorism.''</a><a
+<dt id="foot104">&hellip; &ldquo;terrorism.&rdquo;<a
  href="digital-inclusion-in-freedom.html#tex2html9"><sup>5</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html10"
-  
href="http://democracynow.org/2008/9/4/eight_members_of_rnc_activist_group";>http://democracynow.org/2008/9/4/eight_members_of_rnc_activist_group</a></tt>.
+  <a name="tex2html10"
+  
href="http://democracynow.org/2008/9/4/eight_members_of_rnc_activist_group";>http://democracynow.org/2008/9/4/eight_members_of_rnc_activist_group</a>.
 
 </dd>
-<dt><a name="foot105">...
-``terrorists.''</a><a
+<dt id="foot105">&hellip; &ldquo;terrorists.&rdquo;<a
  href="digital-inclusion-in-freedom.html#tex2html11"><sup>6</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html12"
-  
href="http://abcnews.go.com/international/story?id=7891929";>http://abcnews.go.com/international/story?id=7891929</a></tt>.
+  <a name="tex2html12"
+  
href="http://abcnews.go.com/international/story?id=7891929";>http://abcnews.go.com/international/story?id=7891929</a>.
 
 </dd>
-<dt><a name="foot20">...
-dissidents.</a><a
+<dt id="foot20">&hellip; dissidents.<a
  href="digital-inclusion-in-freedom.html#tex2html13"><sup>7</sup></a></dt>
 <dd>See the documentary, Condor: the First War on
-  Terror, by Rodrigo V&#225;squez (2003).
+  Terror, by Rodrigo V&aacute;squez (2003).
 
 </dd>
-<dt><a name="foot106">... dissidents.</a><a
+<dt id="foot106">&hellip; dissidents.<a
  href="digital-inclusion-in-freedom.html#tex2html14"><sup>8</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html15"
-  
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm";>http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm</a></tt>.
+  <a name="tex2html15"
+  
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm";>http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm</a>.
 
 </dd>
-<dt><a name="foot107">... site.</a><a
+<dt id="foot107">&hellip; site.<a
  href="digital-inclusion-in-freedom.html#tex2html16"><sup>9</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html17"
-  
href="http://www.computerworld.com.au/article/302161/watchdog_threatens_online_rights_group_11k_fine?fp=16&amp;fpid=1";>http://www.computerworld.com.au/article/302161/watchdog_threatens_online_rights_group_11k_fine?fp=16&amp;fpid=1</a></tt>.
+  <a name="tex2html17"
+  
href="http://www.computerworld.com.au/article/302161/watchdog_threatens_online_rights_group_11k_fine?fp=16&amp;fpid=1";>http://www.computerworld.com.au/article/302161/watchdog_threatens_online_rights_group_11k_fine?fp=16&amp;fpid=1</a>.
 
 </dd>
-<dt><a name="foot108">... list.</a><a
+<dt id="foot108">&hellip; list.<a
  href="digital-inclusion-in-freedom.html#tex2html18"><sup>10</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html19"
-  
href="http://www.smh.com.au/articles/2009/03/17/1237054787635.html";>http://www.smh.com.au/articles/2009/03/17/1237054787635.html</a></tt>.
+  <a name="tex2html19"
+  
href="http://www.smh.com.au/articles/2009/03/17/1237054787635.html";>http://www.smh.com.au/articles/2009/03/17/1237054787635.html</a>.
 
 </dd>
-<dt><a name="foot109">... censorship.</a><a
+<dt id="foot109">&hellip; censorship.<a
  href="digital-inclusion-in-freedom.html#tex2html20"><sup>11</sup></a></dt>
-<dd>See <tt><a name="tex2html21"
-  
href="http://netzpolitik.org/2009/the-dawning-of-internet-censorship-in-germany/";>http://netzpolitik.org/2009/the-dawning-of-internet-censorship-in-germany/</a></tt>.
+<dd>See <a name="tex2html21"
+  
href="http://netzpolitik.org/2009/the-dawning-of-internet-censorship-in-germany/";>http://netzpolitik.org/2009/the-dawning-of-internet-censorship-in-germany/</a>.
 
 </dd>
-<dt><a name="foot110">... Internet.</a><a
+<dt id="foot110">&hellip; Internet.<a
  href="digital-inclusion-in-freedom.html#tex2html22"><sup>12</sup></a></dt>
-<dd>See <tt><a name="tex2html23"
-  
href="http://timesofindia.indiatimes.com/India/Govt-gearing-up-to-gag-news-websites/articleshow/4562292.cms";>http://timesofindia.indiatimes.com/India/Govt-gearing-up-to-gag-news-websites/articleshow/4562292.cms</a></tt>.
+<dd>See <a name="tex2html23"
+  
href="http://timesofindia.indiatimes.com/India/Govt-gearing-up-to-gag-news-websites/articleshow/4562292.cms";>http://timesofindia.indiatimes.com/India/Govt-gearing-up-to-gag-news-websites/articleshow/4562292.cms</a>.
 
 </dd>
-<dt><a name="foot28">... animals.</a><a
+<dt id="foot28">&hellip; animals.<a
  href="digital-inclusion-in-freedom.html#tex2html24"><sup>13</sup></a></dt>
 <dd>I support medical research
   using animals, as well as abortion rights.  Our defense of political
   freedom should not be limited to causes we agree with.
 
 </dd>
-<dt><a name="foot111">...
-parents.</a><a
+<dt id="foot111">&hellip; parents.<a
  href="digital-inclusion-in-freedom.html#tex2html25"><sup>14</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html26"
-  
href="http://www.mcclatchydc.com/homepage/story/28029.html";>http://www.mcclatchydc.com/homepage/story/28029.html</a></tt>.
+  <a name="tex2html26"
+  
href="http://www.mcclatchydc.com/homepage/story/28029.html";>http://www.mcclatchydc.com/homepage/story/28029.html</a>.
 
 </dd>
-<dt><a name="foot112">... ways.</a><a
+<dt id="foot112">&hellip; ways.<a
  href="digital-inclusion-in-freedom.html#tex2html27"><sup>15</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html28"
+  <a name="tex2html28"
   
href="http://www.networkworld.com/news/2009/052909-20-years-after-tiananmen-china.html
   
">http://www.networkworld.com/news/2009/052909-20-years-after-tiananmen-china.html
-  </a></tt>.
+  </a>.
 
 </dd>
-<dt><a name="foot113">...
-freedoms:</a><a
+<dt id="foot113">&hellip; freedoms:<a
  href="digital-inclusion-in-freedom.html#tex2html29"><sup>16</sup></a></dt>
-<dd>See <tt><a name="tex2html30"
-  
href="http://gnu.org/philosophy/free-sw.html";>http://gnu.org/philosophy/free-sw.html</a></tt>.
+<dd>See <a name="tex2html30"
+  href="/philosophy/free-sw.html">http://gnu.org/philosophy/free-sw.html</a>.
 
 </dd>
-<dt><a name="foot114">... divided.</a><a
+<dt id="foot114">&hellip; divided.<a
  href="digital-inclusion-in-freedom.html#tex2html31"><sup>17</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html32"
-  
href="http://www.gnu.org/philosophy/why-free.html";>http://www.gnu.org/philosophy/why-free.html</a></tt>
 and
-  <tt><a name="tex2html33"
-  
href="http://www.gnu.org/philosophy/shouldbefree.html";>http://www.gnu.org/philosophy/shouldbefree.html</a></tt>
 for other
+  <a name="tex2html32"
+  
href="/philosophy/why-free.html">http://www.gnu.org/philosophy/why-free.html</a>
 and
+  <a name="tex2html33"
+  
href="/philosophy/shouldbefree.html">http://www.gnu.org/philosophy/shouldbefree.html</a>
 for other
   arguments.
 
 </dd>
-<dt><a name="foot115">... programs,</a><a
+<dt id="foot115">&hellip; programs,<a
  href="digital-inclusion-in-freedom.html#tex2html34"><sup>18</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html35"
-  href="http://directory.fsf.org";>http://directory.fsf.org</a></tt>.
+  <a name="tex2html35"
+  href="http://directory.fsf.org";>http://directory.fsf.org</a>.
 
 </dd>
-<dt><a name="foot116">... users</a><a
+<dt id="foot116">&hellip; users<a
  href="digital-inclusion-in-freedom.html#tex2html36"><sup>19</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html37"
-  
href="http:en.wikipedia.org/wiki/Linux_adoption">http:en.wikipedia.org/wiki/Linux_adoption</a></tt>.
+  <a name="tex2html37"
+  
href="http:en.wikipedia.org/wiki/Linux_adoption">http:en.wikipedia.org/wiki/Linux_adoption</a>.
 
 </dd>
-<dt><a name="foot117">...
-GNU/Linux</a><a
+<dt id="foot117">&hellip; GNU/Linux<a
  href="digital-inclusion-in-freedom.html#tex2html38"><sup>20</sup></a></dt>
-<dd>See <tt><a name="tex2html39"
-  
href="http://gnu.org/gnu/gnu-linux-faq.html";>http://gnu.org/gnu/gnu-linux-faq.html</a></tt>.
+<dd>See <a name="tex2html39"
+  href="/gnu/gnu-linux-faq.html">http://gnu.org/gnu/gnu-linux-faq.html</a>.
 
 </dd>
-<dt><a name="foot118">... volunteers.</a><a
+<dt id="foot118">&hellip; volunteers.<a
  href="digital-inclusion-in-freedom.html#tex2html40"><sup>21</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html41"
-  
href="http://www.gnu.org/philosophy/fs-motives.html";>http://www.gnu.org/philosophy/fs-motives.html</a></tt>
+  <a name="tex2html41"
+  
href="/philosophy/fs-motives.html">http://www.gnu.org/philosophy/fs-motives.html</a>
   for some of their motives.
 
 </dd>
-<dt><a name="foot119">... user,</a><a
+<dt id="foot119">&hellip; user,<a
  href="digital-inclusion-in-freedom.html#tex2html43"><sup>22</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html44"
-  
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/</a></tt>.
+  <a name="tex2html44"
+  
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/</a>.
 
 </dd>
-<dt><a name="foot120">... files,</a><a
+<dt id="foot120">&hellip; files,<a
  href="digital-inclusion-in-freedom.html#tex2html45"><sup>23</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html46"
-  href="http://badvista.org";>http://badvista.org</a></tt>.
+  <a name="tex2html46"
+  href="http://badvista.org";>http://badvista.org</a>.
 
 </dd>
-<dt><a name="foot121">...
-time.</a><a
+<dt id="foot121">&hellip; time.<a
  href="digital-inclusion-in-freedom.html#tex2html47"><sup>24</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html48"
-  
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263";>http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263</a></tt>.
+  <a name="tex2html48"
+  
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263";>http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263</a>.
 
 </dd>
-<dt><a name="foot122">... own.</a><a
+<dt id="foot122">&hellip; own.<a
  href="digital-inclusion-in-freedom.html#tex2html49"><sup>25</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html50"
-  
href="http://voices.washingtonpost.com/securityfix/2009/05/microsoft_update_quietly_insta.html";>http://voices.washingtonpost.com/securityfix/2009/05/microsoft_update_quietly_insta.html</a></tt>.
+  <a name="tex2html50"
+  
href="http://voices.washingtonpost.com/securityfix/2009/05/microsoft_update_quietly_insta.html";>http://voices.washingtonpost.com/securityfix/2009/05/microsoft_update_quietly_insta.html</a>.
 
 </dd>
-<dt><a name="foot123">... reference.</a><a
+<dt id="foot123">&hellip; reference.<a
  href="digital-inclusion-in-freedom.html#tex2html51"><sup>26</sup></a></dt>
 <dd>The standard in machine-readable form
-  is only available to be ``leased'';
-  <tt><a name="tex2html52"
-  
href="http://www.smpte.org/standards/LicenseAgreement_CD-ROM.pdf";>http://www.smpte.org/standards/LicenseAgreement_CD-ROM.pdf</a></tt>.
+  is only available to be &ldquo;leased&rdquo;;
+  <a name="tex2html52"
+  
href="http://www.smpte.org/standards/LicenseAgreement_CD-ROM.pdf";>http://www.smpte.org/standards/LicenseAgreement_CD-ROM.pdf</a>.
 
 </dd>
-<dt><a name="foot124">... patented.</a><a
+<dt id="foot124">&hellip; patented.<a
  href="digital-inclusion-in-freedom.html#tex2html53"><sup>27</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html54"
-  
href="http://www.mpegla.com/news/n_06-08-17_pr.pdf";>http://www.mpegla.com/news/n_06-08-17_pr.pdf</a></tt>.
+  <a name="tex2html54"
+  
href="http://www.mpegla.com/news/n_06-08-17_pr.pdf";>http://www.mpegla.com/news/n_06-08-17_pr.pdf</a>.
 
 </dd>
-<dt><a name="foot125">... million.</a><a
+<dt id="foot125">&hellip; million.<a
  href="digital-inclusion-in-freedom.html#tex2html56"><sup>28</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html57"
-  
href="http://arstechnica.com/tech-policy/news/2009/06/jammie-thomas-retrial-verdict.ars";>http://arstechnica.com/tech-policy/news/2009/06/jammie-thomas-retrial-verdict.ars</a></tt>.
+  <a name="tex2html57"
+  
href="http://arstechnica.com/tech-policy/news/2009/06/jammie-thomas-retrial-verdict.ars";>http://arstechnica.com/tech-policy/news/2009/06/jammie-thomas-retrial-verdict.ars</a>.
 
 </dd>
-<dt><a name="foot126">... Council.</a><a
+<dt id="foot126">&hellip; Council.<a
  href="digital-inclusion-in-freedom.html#tex2html58"><sup>29</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html59"
-  
href="http://www.laquadrature.net/fr/hadopi-is-dead-three-strikes-killed-by-highest-court";>http://www.laquadrature.net/fr/hadopi-is-dead-three-strikes-killed-by-highest-court</a></tt>.
+  <a name="tex2html59"
+  
href="http://www.laquadrature.net/fr/hadopi-is-dead-three-strikes-killed-by-highest-court";>http://www.laquadrature.net/fr/hadopi-is-dead-three-strikes-killed-by-highest-court</a>.
 
 </dd>
-<dt><a name="foot127">... them.</a><a
+<dt id="foot127">&hellip; them.<a
  href="digital-inclusion-in-freedom.html#tex2html60"><sup>30</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html61"
-  
href="http://arstechnica.com/tech-policy/news/2008/11/canadian-wish-list-for-secret-acta-treaty-long-varied.ars";>http://arstechnica.com/tech-policy/news/2008/11/canadian-wish-list-for-secret-acta-treaty-long-varied.ars</a></tt>.
+  <a name="tex2html61"
+  
href="http://arstechnica.com/tech-policy/news/2008/11/canadian-wish-list-for-secret-acta-treaty-long-varied.ars";>http://arstechnica.com/tech-policy/news/2008/11/canadian-wish-list-for-secret-acta-treaty-long-varied.ars</a>.
 
 </dd>
-<dt><a name="foot128">... ``piracy,''</a><a
+<dt id="foot128">&hellip; &ldquo;piracy,&rdquo;<a
  href="digital-inclusion-in-freedom.html#tex2html62"><sup>31</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html63"
-  
href="gnu.org/philosophy/words-to-avoid.html">gnu.org/philosophy/words-to-avoid.html</a></tt>.
+  <a name="tex2html63"
+  
href="/philosophy/words-to-avoid.html">gnu.org/philosophy/words-to-avoid.html</a>.
 
 </dd>
-<dt><a name="foot129">... property,''</a><a
+<dt id="foot129">&hellip; property,&rdquo;<a
  href="digital-inclusion-in-freedom.html#tex2html64"><sup>32</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html65"
-  
href="http://gnu.org/philosophy/not-ipr.html";>http://gnu.org/philosophy/not-ipr.html</a></tt>
 for why this propaganda
+  <a name="tex2html65"
+  href="/philosophy/not-ipr.html">http://gnu.org/philosophy/not-ipr.html</a> 
for why this propaganda
   term is harmful.
 
 </dd>
-<dt><a name="foot130">... purpose.</a><a
+<dt id="foot130">&hellip; purpose.<a
  href="digital-inclusion-in-freedom.html#tex2html66"><sup>33</sup></a></dt>
-<dd>See <tt><a name="tex2html67"
-  
href="http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html";>http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html</a></tt>.
+<dd>See <a name="tex2html67"
+  
href="http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html";>http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html</a>.
 
 </dd>
-<dt><a name="foot66">... DRM.</a><a
+<dt id="foot66">&hellip; DRM.<a
  href="digital-inclusion-in-freedom.html#tex2html68"><sup>34</sup></a></dt>
-<dd>Those publishers, in an act
-  of doublespeak, call it ``Digital Rights Management''.
+<dd>Those publishers, in an act of doublespeak, call it &ldquo;Digital
+  Rights Management&rdquo;.
 
 </dd>
-<dt><a name="foot131">... 200.</a><a
+<dt id="foot131">&hellip; 200.<a
  href="digital-inclusion-in-freedom.html#tex2html69"><sup>35</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html70"
-  
href="http://www.boingboing.net/2009/01/23/monty-pythons-free-w.html";>http://www.boingboing.net/2009/01/23/monty-pythons-free-w.html</a></tt>.
+  <a name="tex2html70"
+  
href="http://www.boingboing.net/2009/01/23/monty-pythons-free-w.html";>http://www.boingboing.net/2009/01/23/monty-pythons-free-w.html</a>.
 
 </dd>
-<dt><a name="foot132">... charge.</a><a
+<dt id="foot132">&hellip; charge.<a
  href="digital-inclusion-in-freedom.html#tex2html72"><sup>36</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html73"
-  
href="http://www.37signals.com/svn/posts/419-jane-siberrys-you-decide-what-feels-right-pricing";>http://www.37signals.com/svn/posts/419-jane-siberrys-you-decide-what-feels-right-pricing</a></tt>.
+  <a name="tex2html73"
+  
href="http://www.37signals.com/svn/posts/419-jane-siberrys-you-decide-what-feels-right-pricing";>http://www.37signals.com/svn/posts/419-jane-siberrys-you-decide-what-feels-right-pricing</a>.
 
 </dd>
-<dt><a name="foot133">... days.</a><a
+<dt id="foot133">&hellip; days.<a
  href="digital-inclusion-in-freedom.html#tex2html74"><sup>37</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html75"
-  
href="http://www.boingboing.net/2008/03/05/nine-inch-nails-made.html";>http://www.boingboing.net/2008/03/05/nine-inch-nails-made.html</a></tt>.
+  <a name="tex2html75"
+  
href="http://www.boingboing.net/2008/03/05/nine-inch-nails-made.html";>http://www.boingboing.net/2008/03/05/nine-inch-nails-made.html</a>.
 
 </dd>
-<dt><a name="foot134">... support.</a><a
+<dt id="foot134">&hellip; support.<a
  href="digital-inclusion-in-freedom.html#tex2html76"><sup>38</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html77"
-  
href="http://www.kk.org/thetechnium/archives/2008/03/1000_true_fans.php";>http://www.kk.org/thetechnium/archives/2008/03/1000_true_fans.php</a></tt>.
+  <a name="tex2html77"
+  
href="http://www.kk.org/thetechnium/archives/2008/03/1000_true_fans.php";>http://www.kk.org/thetechnium/archives/2008/03/1000_true_fans.php</a>.
 
 </dd>
-<dt><a name="foot135">... revenue.</a><a
+<dt id="foot135">&hellip; revenue.<a
  href="digital-inclusion-in-freedom.html#tex2html78"><sup>39</sup></a></dt>
-<dd>See <tt><a name="tex2html79"
-  
href="http://gnu.org/philosophy/dat.html";>http://gnu.org/philosophy/dat.html</a></tt>
+<dd>See <a name="tex2html79"
+  href="/philosophy/dat.html">http://gnu.org/philosophy/dat.html</a>
   for my 1992 proposal.
 
 </dd>
-<dt><a name="foot79">... Muguet</a><a
+<dt id="foot79">&hellip; Muguet<a
  href="digital-inclusion-in-freedom.html#tex2html80"><sup>40</sup></a></dt>
 <dd>Head of the Knowledge Networks and Information
   Society lab at the University of Geneva.
 </dd>
-<dt><a name="foot136">... payments.</a><a
+<dt id="foot136">&hellip; payments.<a
  href="digital-inclusion-in-freedom.html#tex2html81"><sup>41</sup></a></dt>
 <dd>See
-  <tt><a name="tex2html82"
-  href="http://mecenat-global.org";>http://mecenat-global.org</a></tt>.
+  <a name="tex2html82"
+  href="http://mecenat-global.org";>http://mecenat-global.org</a>.
 
 </dd>
 </dl>
@@ -1161,7 +1025,7 @@
 <p>
 Updated:
 <!-- timestamp start -->
-$Date: 2009/10/17 15:21:24 $
+$Date: 2009/10/17 19:29:31 $
 <!-- timestamp end -->
 </p>
 </div>
@@ -1186,8 +1050,7 @@
 
 <ul class="translations-list">
 <!-- English -->
-<li><a href="/philosophy/digital-inclusion-in-freedom.html">English</a>
-&nbsp;[en]</li>
+<li><a 
href="/philosophy/digital-inclusion-in-freedom.html">English</a>&nbsp;[en]</li>
 </ul>
 </div>
 </div>




reply via email to

[Prev in Thread] Current Thread [Next in Thread]