www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy google-engineering-talk.html


From: Karl Berry
Subject: www/philosophy google-engineering-talk.html
Date: Fri, 24 Sep 2010 22:25:47 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Karl Berry <karl>       10/09/24 22:25:47

Modified files:
        philosophy     : google-engineering-talk.html 

Log message:
        .html, not .htm, #617818

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/google-engineering-talk.html?cvsroot=www&r1=1.1&r2=1.2

Patches:
Index: google-engineering-talk.html
===================================================================
RCS file: /web/www/www/philosophy/google-engineering-talk.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- google-engineering-talk.html        6 Sep 2010 14:22:48 -0000       1.1
+++ google-engineering-talk.html        24 Sep 2010 22:25:43 -0000      1.2
@@ -323,7 +323,7 @@
 
 <p>Today, one of the most insidious threats to the future of free software 
comes from treacherous computing, which is a conspiracy of many large 
corporations. They call it "trusted computing," but what do they mean by that? 
What they mean is that an application developer can trust your computer to obey 
him and disobey you. So, from your point of view, it's _treacherous computing_, 
because your computer won't obey you anymore. The purpose of this plan is that 
you won't control your computer.</p>
 
-<p>[<a 
href="http://www.gnu.org/philosophy/can-you-trust.htm";>http://www.gnu.org/philosophy/can-you-trust.htm</a>]</p>
+<p>[<a 
href="http://www.gnu.org/philosophy/can-you-trust.html";>http://www.gnu.org/philosophy/can-you-trust.html</a>]</p>
 
 <p>And there are various different things that treacherous computing can be 
used to do, things like prohibit you from running any program that hasn't been 
authorized by the operating system developer. That's one thing they could do. 
But they may not feel they dare go that far. But another thing that they plan 
to do is to have data that's only available to a particular application. The 
idea is that an application will be able to write data in an encrypted form, 
such that it can only be decrypted by the same application, such that nobody 
else can independently write another program to access that data. And, of 
course, they would use that for limiting access to published works, you know, 
something to be a replacement for DVDs so that it would be not only illegal, 
but impossible to write the free software to play it.</p>
 
@@ -588,7 +588,7 @@
 
 <p>Updated:
 <!-- timestamp start -->
-$Date: 2010/09/06 14:22:48 $
+$Date: 2010/09/24 22:25:43 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]