www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy free-digital-society.html


From: Pavel Kharitonov
Subject: www/philosophy free-digital-society.html
Date: Mon, 12 Dec 2011 06:56:39 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     Pavel Kharitonov <ineiev>       11/12/12 06:56:39

Modified files:
        philosophy     : free-digital-society.html 

Log message:
        Write "nonfree" without dash; use <h3> for section titles (RT #717081)

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/free-digital-society.html?cvsroot=www&r1=1.9&r2=1.10

Patches:
Index: free-digital-society.html
===================================================================
RCS file: /web/www/www/philosophy/free-digital-society.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- free-digital-society.html   29 Nov 2011 09:28:27 -0000      1.9
+++ free-digital-society.html   12 Dec 2011 06:55:49 -0000      1.10
@@ -28,7 +28,7 @@
 doesn't respect their freedom; or we have to make it respect their
 freedom.</p>
 
-<strong>[Surveillance]</strong>
+<h3>Surveillance</h3>
 
 <p>What are the threats? First, surveillance. Computers are Stalin's
 dream: they are ideal tools for surveillance, because anything we
@@ -63,7 +63,7 @@
 <p>We can stop our own computers from doing surveillance on us if
 we have control of the software that they run. But the software
 these people are running, they don't have control over. It's
-non-free software, and that's why it has malicious features, such as
+nonfree software, and that's why it has malicious features, such as
 surveillance. However, the surveillance is not always done with our own
 computers, it's also done at one remove. For instance ISPs in Europe
 are required to keep data about the user's internet communications
@@ -125,7 +125,7 @@
 could get there, because their car was tracked through this universal
 car tracking system.</p>
 
-<strong>[Censorship]</strong>
+<h3>Censorship</h3>
 
 <p>The second threat is censorship. Censorship is not new, it
 existed long before computers. But 15 years ago, we thought that
@@ -179,7 +179,7 @@
 Internet is not a free country. And is not a legitimate government
 either.</p>
 
-<strong>[Restricted data formats]</strong>
+<h3>Restricted data formats</h3>
 
 <p>The next threat to our freedom comes from data formats that restrict
 the users.</p>
@@ -192,13 +192,13 @@
 <p>Now, evidently, if the program implements a secret format, that's
 because the program is not free software. So this is another kind of
 malicious feature. Surveillance is one kind of malicious feature that
-you find in some non-free programs; using secret formats to restrict
+you find in some nonfree programs; using secret formats to restrict
 the users is another kind of malicious feature that you also find in
-some non-free programs.</p>
+some nonfree programs.</p>
 
 <p>But if you have a free program that handles a certain format,
 <em>ipso facto</em> that format is not secret. This kind of malicious
-feature can only exist in a non-free program. Surveillance features
+feature can only exist in a nonfree program. Surveillance features
 could theoretically exist in a free program but you don't find them
 happening. Because the users would fix it. The users wouldn't like
 this, so they would fix it.</p>
@@ -255,7 +255,7 @@
 views. If it were a lecture for a course, if it were didactic, then
 it ought to be free, but statements of opinion are different.</p>
 
-<strong>[Software that isn't free]</strong>
+<h3>Software that isn't free</h3>
 
 <p>Now this leads me to the next threat which comes from software
 that the users don't have control over. In other words: software
@@ -280,9 +280,9 @@
 controls the users. But somebody controls that program and, through
 it, has <em>power</em> over the users. </p>
 
-<p>So, a non-free program is an instrument to give somebody
+<p>So, a nonfree program is an instrument to give somebody
 <em>power</em> over a lot of other people and this is unjust
-power that nobody should ever have. This is why non-free software
+power that nobody should ever have. This is why nonfree software
 (les logiciels privateurs, qui privent de la libert&eacute;), why
 proprietary software is an injustice and should not exist; because
 it leaves the users without freedom.</p>
@@ -318,7 +318,7 @@
 but not on the Amazon &ldquo;Swindle&rdquo;.</p>
 
 <p>Anyway, malicious features are present in the most widely used
-non-free programs, but they are rare in free software, because
+nonfree programs, but they are rare in free software, because
 with free software the users have control: they can read the source
 code and they can change it. So, if there were a malicious feature,
 somebody would sooner or later spot it and fix it. This means that
@@ -329,7 +329,7 @@
 you're going to fail. And that's why we find that malicious features
 are rare in free software, and common in proprietary software.</p>
 
-<strong>[The 4 freedoms of free software]</strong>
+<h3>The 4 freedoms of free software</h3>
 
 <p>Now the essential freedoms are four:</p>
 
@@ -374,7 +374,7 @@
 to include the freedom to use your version, not just the freedom to
 make some source code that won't run.</p>
 
-<strong>[The GNU project and the free software movement]</strong>
+<h3>The GNU project and the free software movement</h3>
 
 <p>I launched the free software movement in 1983, when I announced the
 plan to develop a free software operating system whose name is GNU. Now
@@ -440,7 +440,7 @@
 stand, you're free to say what you think. If you agree with them,
 you can say open source. If you agree with us, show it: say libre!</p>
 
-<strong>[Free software and education]</strong>
+<h3>Free software and education</h3>
 
 <p>Now the most important point about free software is that schools
 must teach exclusively free software. All levels of schools from
@@ -550,7 +550,7 @@
 or less.&rdquo; So don't get distracted with those secondary issues,
 and ignore what really matters!</p>
 
-<strong>[Internet services]</strong>
+<h3>Internet services</h3>
 
 <p>So, moving on to the next menace. There are two issues that arise
 from the use of internet services. One of them is that the server
@@ -659,11 +659,11 @@
 for you on data supplied by you&mdash;things that you should do on
 your own computer but they invite you to let somebody else's computer
 do that computing work for you. And the result is you lose control
-over it. It's just as if you used a non-free program.</p>
+over it. It's just as if you used a nonfree program.</p>
 
 <p>Two different scenarios but they lead to the same problem. If
-you do your computing with a non-free program&mdash;well, the users
-don't control the non-free program, it controls the users, which
+you do your computing with a nonfree program&mdash;well, the users
+don't control the nonfree program, it controls the users, which
 would include you. So you've lost control of the computing that's
 being done. But if you do your computing in his server&mdash;well,
 the programs that are doing it are the ones he chose. You can't touch
@@ -756,7 +756,7 @@
 <p>I wouldn't want my country to be the pioneer in this. So, use paper
 for voting. Make sure there are ballots that can be recounted.</p>
 
-<strong>[The war on sharing]</strong>
+<h3>The war on sharing</h3>
 
 <p>The next threat to our freedom in a digital society comes from
 the war on sharing.</p>
@@ -904,7 +904,7 @@
 better. I appreciate their work and I realize if we want them to do
 more work we should support them.</p>
 
-<strong>[Supporting the arts]</strong>
+<h3>Supporting the arts</h3>
 
 <p>I have two proposals for how to support artists, methods that
 are compatible with sharing. That would allow us to end the war on
@@ -977,7 +977,7 @@
 propose cruel and draconian measures. They're trying to do something
 that's nasty by nature. So let's support artists in other ways.</p>
 
-<strong>[Rights in cyberspace]</strong>
+<h3>Rights in cyberspace</h3>
 
 <p>The last threat to our freedom in digital society is the fact that
 we don't have a firm right to do the things we do, in cyberspace. In
@@ -1080,7 +1080,7 @@
 
 <p>Updated:
 <!-- timestamp start -->
-$Date: 2011/11/29 09:28:27 $
+$Date: 2011/12/12 06:55:49 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]