[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy google-engineering-talk.html
From: |
Karl Berry |
Subject: |
www/philosophy google-engineering-talk.html |
Date: |
Fri, 24 Sep 2010 22:25:47 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: Karl Berry <karl> 10/09/24 22:25:47
Modified files:
philosophy : google-engineering-talk.html
Log message:
.html, not .htm, #617818
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/google-engineering-talk.html?cvsroot=www&r1=1.1&r2=1.2
Patches:
Index: google-engineering-talk.html
===================================================================
RCS file: /web/www/www/philosophy/google-engineering-talk.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- google-engineering-talk.html 6 Sep 2010 14:22:48 -0000 1.1
+++ google-engineering-talk.html 24 Sep 2010 22:25:43 -0000 1.2
@@ -323,7 +323,7 @@
<p>Today, one of the most insidious threats to the future of free software
comes from treacherous computing, which is a conspiracy of many large
corporations. They call it "trusted computing," but what do they mean by that?
What they mean is that an application developer can trust your computer to obey
him and disobey you. So, from your point of view, it's _treacherous computing_,
because your computer won't obey you anymore. The purpose of this plan is that
you won't control your computer.</p>
-<p>[<a
href="http://www.gnu.org/philosophy/can-you-trust.htm">http://www.gnu.org/philosophy/can-you-trust.htm</a>]</p>
+<p>[<a
href="http://www.gnu.org/philosophy/can-you-trust.html">http://www.gnu.org/philosophy/can-you-trust.html</a>]</p>
<p>And there are various different things that treacherous computing can be
used to do, things like prohibit you from running any program that hasn't been
authorized by the operating system developer. That's one thing they could do.
But they may not feel they dare go that far. But another thing that they plan
to do is to have data that's only available to a particular application. The
idea is that an application will be able to write data in an encrypted form,
such that it can only be decrypted by the same application, such that nobody
else can independently write another program to access that data. And, of
course, they would use that for limiting access to published works, you know,
something to be a replacement for DVDs so that it would be not only illegal,
but impossible to write the free software to play it.</p>
@@ -588,7 +588,7 @@
<p>Updated:
<!-- timestamp start -->
-$Date: 2010/09/06 14:22:48 $
+$Date: 2010/09/24 22:25:43 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy google-engineering-talk.html,
Karl Berry <=