[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www planetfeeds.ja.html gnu/linux-and-gnu.ca.ht...
From: |
GNUN |
Subject: |
www planetfeeds.ja.html gnu/linux-and-gnu.ca.ht... |
Date: |
Thu, 29 Aug 2013 06:33:53 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 13/08/29 06:33:53
Modified files:
. : planetfeeds.ja.html
gnu : linux-and-gnu.ca.html
gnu/po : linux-and-gnu.ca-en.html linux-and-gnu.ca.po
philosophy : javascript-trap.ja.html
po : planetfeeds.ja.po
Added files:
philosophy/po : right-to-read.ko-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.ja.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/gnu/linux-and-gnu.ca.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/gnu/po/linux-and-gnu.ca-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/gnu/po/linux-and-gnu.ca.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/javascript-trap.ja.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.ko-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.ja.po?cvsroot=www&r1=1.89&r2=1.90
Patches:
Index: planetfeeds.ja.html
===================================================================
RCS file: /web/www/www/planetfeeds.ja.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- planetfeeds.ja.html 28 Aug 2013 21:58:53 -0000 1.75
+++ planetfeeds.ja.html 29 Aug 2013 06:33:50 -0000 1.76
@@ -1,20 +1,18 @@
<!-- Autogenerated File by planetrss.pl
http://web.cvs.savannah.gnu.org/viewvc/www/server/source/planetrss/?root=www -->
<p><a
-href='https://www.fsf.org/blogs/community/youre-invited-gnu-30th-anniversary-celebration-and-hackathon'>You're
-Invited: GNU 30th anniversary celebration and hackathon</a>: Are GNU ready
-to party? It's been 30 years since the GNU manifesto was penned. What began
-as frustration over a printer driver has grown into... <a
-href='https://www.fsf.org/blogs/community/youre-invited-gnu-30th-anniversary-celebration-and-hackathon'>more</a></p>
+href='https://www.fsf.org/blogs/community/youre-invited-gnu-30th-anniversary-celebration-and-hackathon'>ãæå¾
:
+GNUã®30å¨å¹´ã®ãç¥ãã¨ããã«ã½ã³</a>:
ã¿ãªãã(GNU)ããã¼ãã£ã®ç¨æã¯ããã§ãã?
+GNUã®å£°æãã30å¹´ã§ããããªã³ã¿ãã©ã¤ãã®ä¸æºããå§ã¾ã£ããã¨ãããã¾ã§ã¯å¤§ããªç¤¾ä¼éåã¸ã¨...<a
+href='https://www.fsf.org/blogs/community/youre-invited-gnu-30th-anniversary-celebration-and-hackathon'>ãã£ã¨èªã(è±èª)</a></p>
<p><a
href='https://www.fsf.org/blogs/licensing/fsf-to-begin-accepting-gpg-signed-assignments-from-the-u-s'>
-FSF to begin accepting GPG signed assignments from the U.S.</a>: The FSF is
-pleased to announce that we can begin accepting GPG-signed assignments from
-contributors residing in the United States... <a
-href='https://www.fsf.org/blogs/licensing/fsf-to-begin-accepting-gpg-signed-assignments-from-the-u-s'>more</a></p>
-<p><a href='http://mediagoblin.org/news/paranoia-optimization.html'>Paranoia
-Optimization for Our Modern Times</a>: The funny thing about propaganda is
-that kids grok all the hysteria but none of the context. I was the kind of
-80's kid who... <a
-href='http://mediagoblin.org/news/paranoia-optimization.html'>more</a></p>
+FSFã¯åè¡å½å¨ä½ã®äººã
ããGPGã§ç½²åãããèä½æ¨©ç§»è²ã®æ¸é¡ã®åãä»ããå§ãã¾ãã</a>:
+æå ±ã§ããFSFã¯ãåè¡å½å¨ä½ã®è²¢ç®è
ããGPGã§ç½²åãããèä½æ¨©ç§»è²ã®æ¸é¡ãåãä»ãããã¨ã«ãã¾ãã...
<a
+href='https://www.fsf.org/blogs/licensing/fsf-to-begin-accepting-gpg-signed-assignments-from-the-u-s'>ãã£ã¨èªã(è±èª)</a></p>
+<p><a
+href='http://mediagoblin.org/news/paranoia-optimization.html'>å½ä¸ãåå·çæé©å</a>:
+ãããã¬ã³ãã«ã¤ãã¦é¢ç½ãã®ã¯ãåä¾ã¯ãã¹ã¦ã®ãã¹ããªã¼ã®æå³ãã¨ããããããã®ã³ã³ããã¹ãã¯ãªã«ãç解ããªããã¨ãããã¨ã§ãããããã¯ããã種ã®80年代ã®åä¾ã§ãã...
+<a
+href='http://mediagoblin.org/news/paranoia-optimization.html'>ãã£ã¨èªã(è±èª)</a></p>
Index: gnu/linux-and-gnu.ca.html
===================================================================
RCS file: /web/www/www/gnu/linux-and-gnu.ca.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- gnu/linux-and-gnu.ca.html 19 Jul 2013 09:01:56 -0000 1.32
+++ gnu/linux-and-gnu.ca.html 29 Aug 2013 06:33:51 -0000 1.33
@@ -17,13 +17,6 @@
<!--#include virtual="/gnu/po/linux-and-gnu.translist" -->
<!--#include virtual="/server/banner.ca.html" -->
-<!--#set var="PO_FILE"
- value='<a href="http://www.gnu.org/gnu/po/linux-and-gnu.ca.po">
- http://www.gnu.org/gnu/po/linux-and-gnu.ca.po</a>' -->
- <!--#set var="ORIGINAL_FILE" value="/gnu/linux-and-gnu.html" -->
- <!--#set var="DIFF_FILE" value="/gnu/po/linux-and-gnu.ca-diff.html" -->
- <!--#set var="OUTDATED_SINCE" value="2013-05-20" -->
- <!--#include virtual="/server/outdated.ca.html" -->
<h2>Linux i el Sistema GNU</h2>
<p><strong>per <a href="http://www.stallman.org/">Richard
Stallman</a></strong></p>
@@ -195,8 +188,8 @@
href="/gnu/the-gnu-project.ca.html">http://www.gnu.org/gnu/the-gnu-project.html</a>
són bones opcions. Si parleu del nucli Linux i voleu posar un enllaç per
oferir més informació, <a
-href="http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?Linux">http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?Linux</a>
-és una bona adreça.</p>
+href="http://foldoc.org/linux">http://foldoc.org/linux</a> és una bona
+adreça.</p>
<p>
Addendum: A més de GNU, un altre projecte ha produït, de manera independent,
@@ -329,7 +322,7 @@
<p><!-- timestamp start -->
Updated:
-$Date: 2013/07/19 09:01:56 $
+$Date: 2013/08/29 06:33:51 $
<!-- timestamp end -->
</p>
Index: gnu/po/linux-and-gnu.ca-en.html
===================================================================
RCS file: /web/www/www/gnu/po/linux-and-gnu.ca-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- gnu/po/linux-and-gnu.ca-en.html 17 May 2013 17:28:30 -0000 1.8
+++ gnu/po/linux-and-gnu.ca-en.html 29 Aug 2013 06:33:52 -0000 1.9
@@ -183,9 +183,8 @@
reference, this page and <a href="/gnu/the-gnu-project.html">
http://www.gnu.org/gnu/the-gnu-project.html</a> are good choices. If
you mention Linux, the kernel, and want to add a link for further
-reference, <a href="http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?Linux">
-http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?Linux</a> is a good URL
-to use.</p>
+reference, <a href="http://foldoc.org/linux">http://foldoc.org/linux</a>
+is a good URL to use.</p>
<p>
Addendum: Aside from GNU, one other project has independently produced
@@ -302,7 +301,7 @@
<p>Updated:
<!-- timestamp start -->
-$Date: 2013/05/17 17:28:30 $
+$Date: 2013/08/29 06:33:52 $
<!-- timestamp end -->
</p>
</div>
Index: gnu/po/linux-and-gnu.ca.po
===================================================================
RCS file: /web/www/www/gnu/po/linux-and-gnu.ca.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- gnu/po/linux-and-gnu.ca.po 29 Aug 2013 06:06:12 -0000 1.43
+++ gnu/po/linux-and-gnu.ca.po 29 Aug 2013 06:33:52 -0000 1.44
@@ -11,9 +11,10 @@
"PO-Revision-Date: 2013-08-29 08:04+0200\n"
"Last-Translator: Miquel Puigpelat <address@hidden>\n"
"Language-Team: Catalan <address@hidden>\n"
+"Language: ca\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
-"Content-Transfer-Encoding: 8bit"
+"Content-Transfer-Encoding: 8bit\n"
# type: Content of: <title>
#. type: Content of: <title>
@@ -392,13 +393,6 @@
# type: Content of: <p>
#. type: Content of: <p>
-#| msgid ""
-#| "If you want to make a link on “GNU/Linux” for further "
-#| "reference, this page and <a href=\"/gnu/the-gnu-project.html\"> http://"
-#| "www.gnu.org/gnu/the-gnu-project.html</a> are good choices. If you "
-#| "mention Linux, the kernel, and want to add a link for further reference, "
-#| "<a href=\"http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?Linux\"> http://"
-#| "foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?Linux</a> is a good URL to use."
msgid ""
"If you want to make a link on “GNU/Linux” for further reference, "
"this page and <a href=\"/gnu/the-gnu-project.html\"> http://www.gnu.org/gnu/"
@@ -409,7 +403,8 @@
"Si voleu posar un enllaç per oferir més informació sobre \"GNU/Linux\", "
"aquesta pà gina i <a
href=\"/gnu/the-gnu-project.ca.html\">http://www.gnu.org/"
"gnu/the-gnu-project.html</a> són bones opcions. Si parleu del nucli Linux i "
-"voleu posar un enllaç per oferir més informació, <a
href=\"http://foldoc.org/linux\">http://foldoc.org/linux</a> és una bona
adreça."
+"voleu posar un enllaç per oferir més informació, <a
href=\"http://foldoc.org/"
+"linux\">http://foldoc.org/linux</a> és una bona adreça."
# type: Content of: <p>
#. type: Content of: <p>
Index: philosophy/javascript-trap.ja.html
===================================================================
RCS file: /web/www/www/philosophy/javascript-trap.ja.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/javascript-trap.ja.html 26 Aug 2013 09:00:45 -0000 1.5
+++ philosophy/javascript-trap.ja.html 29 Aug 2013 06:33:52 -0000 1.6
@@ -205,7 +205,7 @@
<p><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2013/08/26 09:00:45 $
+$Date: 2013/08/29 06:33:52 $
<!-- timestamp end -->
</p>
Index: po/planetfeeds.ja.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.ja.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- po/planetfeeds.ja.po 29 Aug 2013 06:15:54 -0000 1.89
+++ po/planetfeeds.ja.po 29 Aug 2013 06:33:53 -0000 1.90
@@ -25,11 +25,11 @@
"invited-gnu-30th-anniversary-celebration-and-hackathon'>more</a>"
msgstr ""
"<a href='https://www.fsf.org/blogs/community/youre-invited-gnu-30th-"
-"anniversary-celebration-and-hackathon'>ãæå¾
:
GNUã®30å¨å¹´ã®ãç¥ãã¨"
-"ããã«ã½ã³</a>:
ã¿ãªãã(GNU)ããã¼ãã£ã®ç¨æã¯ããã§ãã?
GNUã®å£°æãã30å¹´"
-"ã§ããããªã³ã¿ãã©ã¤ãã®ä¸æºããå§ã¾ã£ããã¨ãããã¾ã§ã¯å¤§ããªç¤¾ä¼éåã¸ã¨..."
-"<a href='https://www.fsf.org/blogs/community/youre-"
-"invited-gnu-30th-anniversary-celebration-and-hackathon'>ãã£ã¨èªã(è±èª)</a>"
+"anniversary-celebration-and-hackathon'>ãæå¾
:
GNUã®30å¨å¹´ã®ãç¥ãã¨ããã«ã½"
+"ã³</a>: ã¿ãªãã(GNU)ããã¼ãã£ã®ç¨æã¯ããã§ãã?
GNUã®å£°æãã30å¹´ã§ããã"
+"ãªã³ã¿ãã©ã¤ãã®ä¸æºããå§ã¾ã£ããã¨ãããã¾ã§ã¯å¤§ããªç¤¾ä¼éåã¸ã¨...<a
"
+"href='https://www.fsf.org/blogs/community/youre-invited-gnu-30th-anniversary-"
+"celebration-and-hackathon'>ãã£ã¨èªã(è±èª)</a>"
#. type: Content of: <p>
msgid ""
@@ -41,11 +41,11 @@
"accepting-gpg-signed-assignments-from-the-u-s'>more</a>"
msgstr ""
"<a href='https://www.fsf.org/blogs/licensing/fsf-to-begin-accepting-gpg-"
-"signed-assignments-from-the-u-s'> FSFã¯åè¡å½å¨ä½ã®äººã
ããGPGã§ç½²åããã"
-"èä½æ¨©ç§»è²ã®æ¸é¡ã®åãä»ããå§ãã¾ãã</a>: æå
±ã§ããFSFã¯ãåè¡å½å¨ä½ã®è²¢ç®è
"
-"ããGPGã§ç½²åãããèä½æ¨©ç§»è²ã®æ¸é¡ãåãä»ãããã¨ã«ãã¾ãã...
"
-"<a href='https://www.fsf.org/blogs/licensing/fsf-to-begin-"
-"accepting-gpg-signed-assignments-from-the-u-s'>ãã£ã¨èªã(è±èª)</a>"
+"signed-assignments-from-the-u-s'> FSFã¯åè¡å½å¨ä½ã®äººã
ããGPGã§ç½²åãããè"
+"ä½æ¨©ç§»è²ã®æ¸é¡ã®åãä»ããå§ãã¾ãã</a>: æå
±ã§ããFSFã¯ãåè¡å½å¨ä½ã®è²¢ç®è
"
+"ããGPGã§ç½²åãããèä½æ¨©ç§»è²ã®æ¸é¡ãåãä»ãããã¨ã«ãã¾ãã...
<a "
+"href='https://www.fsf.org/blogs/licensing/fsf-to-begin-accepting-gpg-signed-"
+"assignments-from-the-u-s'>ãã£ã¨èªã(è±èª)</a>"
#. type: Content of: <p>
msgid ""
@@ -55,12 +55,11 @@
"80's kid who... <a href='http://mediagoblin.org/news/paranoia-optimization."
"html'>more</a>"
msgstr ""
-"<a href='http://mediagoblin.org/news/paranoia-optimization.html'>å½ä¸ã"
-"åå·çæé©å</a>:
ãããã¬ã³ãã«ã¤ãã¦é¢ç½ãã®ã¯ãåä¾ã¯ãã¹ã¦ã®ãã¹ããªã¼ã®æå³ã"
-"ã¨ããããããã®ã³ã³ããã¹ãã¯ãªã«ãç解ããªããã¨ãããã¨ã§ãããããã¯ããã種ã®"
-"80年代ã®åä¾ã§ãã... "
-"<a href='http://mediagoblin.org/news/paranoia-optimization.html'>"
-"ãã£ã¨èªã(è±èª)</a>"
+"<a
href='http://mediagoblin.org/news/paranoia-optimization.html'>å½ä¸ãåå·ç"
+"æé©å</a>:
ãããã¬ã³ãã«ã¤ãã¦é¢ç½ãã®ã¯ãåä¾ã¯ãã¹ã¦ã®ãã¹ããªã¼ã®æå³ã"
+"ã¨ããããããã®ã³ã³ããã¹ãã¯ãªã«ãç解ããªããã¨ãããã¨ã§ãããããã¯ãã"
+"ã種ã®80年代ã®åä¾ã§ãã... <a
href='http://mediagoblin.org/news/paranoia-"
+"optimization.html'>ãã£ã¨èªã(è±èª)</a>"
#, fuzzy
#~| msgid ""
Index: philosophy/po/right-to-read.ko-en.html
===================================================================
RCS file: philosophy/po/right-to-read.ko-en.html
diff -N philosophy/po/right-to-read.ko-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ philosophy/po/right-to-read.ko-en.html 29 Aug 2013 06:33:52 -0000
1.1
@@ -0,0 +1,391 @@
+<!--#include virtual="/server/header.html" -->
+<title>The Right to Read - GNU Project - Free Software Foundation (FSF)</title>
+<!--#include virtual="/server/banner.html" -->
+<!--#include virtual="/philosophy/po/right-to-read.translist" -->
+<h2>The Right to Read</h2>
+
+<p>
+by <a href="http://www.stallman.org/"><strong>Richard Stallman</strong></a></p>
+
+<div style="text-align: center; font-size: 110%;text-shadow: 0 0 0.2em #fff;
width: 300px; float: right; margin: 12px; background-color: #a0f112; color:
#353831; padding: 1em;"><a href="http://defectivebydesign.org/ebooks.html">Join
our mailing list about the dangers of eBooks</a>.</div>
+
+<p>
+<em>This article appeared in the February 1997 issue
+of <strong>Communications of the ACM</strong> (Volume 40, Number
+2).</em></p>
+
+<blockquote><p>
+ From <cite>The Road To Tycho</cite>, a collection of
+ articles about the antecedents of the Lunarian
+ Revolution, published in Luna City in 2096.
+</p></blockquote>
+
+<p>
+For Dan Halbert, the road to Tycho began in college—when Lissa
+Lenz asked to borrow his computer. Hers had broken down, and unless
+she could borrow another, she would fail her midterm project. There
+was no one she dared ask, except Dan.</p>
+
+<p>
+This put Dan in a dilemma. He had to help her—but if he lent
+her his computer, she might read his books. Aside from the fact that
+you could go to prison for many years for letting someone else read
+your books, the very idea shocked him at first. Like everyone, he had
+been taught since elementary school that sharing books was nasty and
+wrong—something that only pirates would do.</p>
+
+<p>
+And there wasn't much chance that the SPA—the Software
+Protection Authority—would fail to catch him. In his software
+class, Dan had learned that each book had a copyright monitor that
+reported when and where it was read, and by whom, to Central
+Licensing. (They used this information to catch reading pirates, but
+also to sell personal interest profiles to retailers.) The next time
+his computer was networked, Central Licensing would find out. He, as
+computer owner, would receive the harshest punishment—for not
+taking pains to prevent the crime.</p>
+
+<p>
+Of course, Lissa did not necessarily intend to read his books. She
+might want the computer only to write her midterm. But Dan knew she
+came from a middle-class family and could hardly afford the tuition,
+let alone her reading fees. Reading his books might be the only way
+she could graduate. He understood this situation; he himself had had
+to borrow to pay for all the research papers he read. (Ten percent of those
+fees went to the researchers who wrote the papers; since Dan aimed for
+an academic career, he could hope that his own research papers, if
+frequently referenced, would bring in enough to repay this loan.)</p>
+
+<p>
+Later on, Dan would learn there was a time when anyone could go to the
+library and read journal articles, and even books, without having to
+pay. There were independent scholars who read thousands of pages
+without government library grants. But in the 1990s, both commercial
+and nonprofit journal publishers had begun charging fees for access.
+By 2047, libraries offering free public access to scholarly literature
+were a dim memory.</p>
+
+<p>
+There were ways, of course, to get around the SPA and Central
+Licensing. They were themselves illegal. Dan had had a classmate in
+software, Frank Martucci, who had obtained an illicit debugging tool,
+and used it to skip over the copyright monitor code when reading
+books. But he had told too many friends about it, and one of them
+turned him in to the SPA for a reward (students deep in debt were
+easily tempted into betrayal). In 2047, Frank was in prison, not for
+pirate reading, but for possessing a debugger.</p>
+
+<p>
+Dan would later learn that there was a time when anyone could have
+debugging tools. There were even free debugging tools available on CD
+or downloadable over the net. But ordinary users started using them
+to bypass copyright monitors, and eventually a judge ruled that this
+had become their principal use in actual practice. This meant they
+were illegal; the debuggers' developers were sent to prison.</p>
+
+<p>
+Programmers still needed debugging tools, of course, but debugger
+vendors in 2047 distributed numbered copies only, and only to
+officially licensed and bonded programmers. The debugger Dan used in
+software class was kept behind a special firewall so that it could be
+used only for class exercises.</p>
+
+<p>
+It was also possible to bypass the copyright monitors by installing a
+modified system kernel. Dan would eventually find out about the free
+kernels, even entire free operating systems, that had existed around
+the turn of the century. But not only were they illegal, like
+debuggers—you could not install one if you had one, without
+knowing your computer's root password. And neither
+the <abbr title="Federal Bureau of Investigation">FBI</abbr> nor
+Microsoft Support would tell you that.</p>
+
+<p>
+Dan concluded that he couldn't simply lend Lissa his computer. But he
+couldn't refuse to help her, because he loved her. Every chance to
+speak with her filled him with delight. And that she chose him to ask
+for help, that could mean she loved him too.</p>
+
+<p>
+Dan resolved the dilemma by doing something even more
+unthinkable—he lent her the computer, and told her his password.
+This way, if Lissa read his books, Central Licensing would think he
+was reading them. It was still a crime, but the SPA would not
+automatically find out about it. They would only find out if Lissa
+reported him.</p>
+
+<p>
+Of course, if the school ever found out that he had given Lissa his
+own password, it would be curtains for both of them as students,
+regardless of what she had used it for. School policy was that any
+interference with their means of monitoring students' computer use was
+grounds for disciplinary action. It didn't matter whether you did
+anything harmful—the offense was making it hard for the
+administrators to check on you. They assumed this meant you were
+doing something else forbidden, and they did not need to know what it
+was.</p>
+
+<p>
+Students were not usually expelled for this—not directly.
+Instead they were banned from the school computer systems, and would
+inevitably fail all their classes.</p>
+
+<p>
+Later, Dan would learn that this kind of university policy started
+only in the 1980s, when university students in large numbers began
+using computers. Previously, universities maintained a different
+approach to student discipline; they punished activities that were
+harmful, not those that merely raised suspicion.</p>
+
+<p>
+Lissa did not report Dan to the SPA. His decision to help her led to
+their marriage, and also led them to question what they had been
+taught about piracy as children. The couple began reading about the
+history of copyright, about the Soviet Union and its restrictions on
+copying, and even the original United States Constitution. They moved
+to Luna, where they found others who had likewise gravitated away from
+the long arm of the SPA. When the Tycho Uprising began in 2062, the
+universal right to read soon became one of its central aims.</p>
+
+
+<h3 id="AuthorsNote">Author's Note</h3>
+
+<p>[This note has been updated several times since the first
+publication of the story.]</p>
+
+<p>
+The right to read is a battle being fought today. Although it may
+take 50 years for our present way of life to fade into obscurity, most
+of the specific laws and practices described above have already been
+proposed; many have been enacted into law in the US and elsewhere. In
+the US, the 1998 Digital Millennium Copyright Act (DMCA) established the legal
+basis to restrict the reading and lending of computerized books (and
+other works as well). The European Union imposed similar restrictions
+in a 2001 copyright directive. In France, under the DADVSI law
+adopted in 2006, mere possession of a copy of DeCSS, the free program
+to decrypt video on a DVD, is a crime.</p>
+
+<p>
+In 2001, Disney-funded Senator Hollings proposed a bill called the
+SSSCA that would require every new computer to have mandatory
+copy-restriction facilities that the user cannot bypass. Following
+the Clipper chip and similar US government key-escrow proposals, this
+shows a long-term trend: computer systems are increasingly set up to
+give absentees with clout control over the people actually using the
+computer system. The SSSCA was later renamed to the unpronounceable
+CBDTPA, which was glossed as the “Consume But Don't Try
+Programming Act”.
+</p>
+
+<p>
+The Republicans took control of the US senate shortly thereafter.
+They are less tied to Hollywood than the Democrats, so they did not
+press these proposals. Now that the Democrats are back in control,
+the danger is once again higher.</p>
+
+<p>
+In 2001 the US began attempting to use the proposed Free Trade Area of
+the Americas (FTAA) treaty to impose the same rules on all the countries in
+the Western Hemisphere. The FTAA is one of the so-called free
+trade treaties, which are actually designed to give business
+increased power over democratic governments; imposing laws like the
+DMCA is typical of this spirit. The FTAA was effectively killed by
+Lula, President of Brazil, who rejected the DMCA requirement and
+others.</p>
+
+<p>
+Since then, the US has imposed similar requirements on countries such
+as Australia and Mexico through bilateral “free trade”
+agreements, and on countries such as Costa Rica through another
+treaty, CAFTA. Ecuador's President Correa refused to sign a
+“free trade” agreement with the US, but I've heard Ecuador
+had adopted something like the DMCA in 2003.</p>
+
+<p>
+One of the ideas in the story was not proposed in reality until 2002.
+This is the idea that the <abbr>FBI</abbr> and Microsoft will keep the
+root passwords for your personal computers, and not let you have
+them.</p>
+
+<p>
+The proponents of this scheme have given it names such as
+“trusted computing” and “Palladium”. We call
+it <a href="/philosophy/can-you-trust.html">“treacherous
+computing”</a> because the effect is to make your computer obey
+companies even to the extent of disobeying and defying you. This was
+implemented in 2007 as part of <a href="http://badvista.org/">Windows
+Vista</a>; we expect Apple to do something similar. In this scheme,
+it is the manufacturer that keeps the secret code, but
+the <abbr>FBI</abbr> would have little trouble getting it.</p>
+
+<p>
+What Microsoft keeps is not exactly a password in the traditional
+sense; no person ever types it on a terminal. Rather, it is a
+signature and encryption key that corresponds to a second key stored
+in your computer. This enables Microsoft, and potentially any web
+sites that cooperate with Microsoft, the ultimate control over what
+the user can do on his own computer.</p>
+
+<p>
+Vista also gives Microsoft additional powers; for instance, Microsoft
+can forcibly install upgrades, and it can order all machines running
+Vista to refuse to run a certain device driver. The main purpose of
+Vista's many restrictions is to impose DRM (Digital Restrictions
+Management) that users can't overcome. The threat of DRM is why we
+have established the <a href="http://DefectiveByDesign.org">
+Defective by Design</a> campaign.</p>
+
+<p>
+When this story was first written, the SPA was threatening small
+Internet service providers, demanding they permit the SPA to monitor
+all users. Most ISPs surrendered when threatened, because they cannot
+afford to fight back in court. One ISP, Community ConneXion in
+Oakland, California, refused the demand and was actually sued. The
+SPA later dropped the suit, but obtained the DMCA, which gave them the
+power they sought.</p>
+
+<p>
+The SPA, which actually stands for Software Publishers Association,
+has been replaced in its police-like role by the Business
+Software Alliance. The BSA is not, today, an official police force;
+unofficially, it acts like one. Using methods reminiscent of the
+erstwhile Soviet Union, it invites people to inform on their coworkers
+and friends. A BSA terror campaign in Argentina in 2001 made
+slightly veiled threats that people sharing software would be raped.</p>
+
+<p>
+The university security policies described above are not imaginary.
+For example, a computer at one Chicago-area university displayed this
+message upon login:</p>
+
+<blockquote><p>
+This system is for the use of authorized users only. Individuals using
+this computer system without authority or in the excess of their authority
+are subject to having all their activities on this system monitored and
+recorded by system personnel. In the course of monitoring individuals
+improperly using this system or in the course of system maintenance, the
+activities of authorized user may also be monitored. Anyone using this
+system expressly consents to such monitoring and is advised that if such
+monitoring reveals possible evidence of illegal activity or violation of
+University regulations system personnel may provide the evidence of such
+monitoring to University authorities and/or law enforcement officials.
+</p></blockquote>
+
+<p>
+This is an interesting approach to the Fourth Amendment: pressure most
+everyone to agree, in advance, to waive their rights under it.</p>
+
+<h3 id="BadNews">Bad News</h3>
+
+<p>
+The battle for the right to read is already in progress,
+The enemy is organized, while we are not, so it is going against us.
+Here are articles about bad things that have happened since the
+original publication of this article.</p>
+
+<ul>
+<li>Today's commercial ebooks <a href="/philosophy/the-danger-of-ebooks.html">
+ abolish readers' traditional freedoms.</a></li>
+<li><a href="http://www.nature.com/nature_education/biology.html">
+ A "biology textbook" web site</a> that you can access only by signing
+ a <a href="http://www.nature.com/principles/viewTermsOfUse">
+ contract not to lend it to anyone else</a>, which the publisher can
+ revoke at will.</li>
+<li><a href="http://news.zdnet.com/2100-9595_22-103151.html">Electronic
+ Publishing:</a> An article about distribution of books in
+ electronic form, and copyright issues affecting the right to read
+ a copy.</li>
+<li><a
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx">Books
+ inside Computers:</a> Software to control who can read
+ books and documents on a PC.</li>
+</ul>
+
+<p>If we want to stop the bad news and create some good news, we need
+to organize and fight. The
+FSF's <a href="http://defectivebydesign.org"> Defective by Design</a>
+campaign has made a start — subscribe to the campaign's mailing
+list to lend a hand. And <a href="http://www.fsf.org/associate">join
+the FSF</a> to help fund our work.
+</p>
+
+<h3 id="References">References</h3>
+
+<ul>
+ <li>The administration's “White Paper”: Information
+ Infrastructure Task Force, Intellectual Property [<a
+ href="/philosophy/not-ipr.html">sic</a>] and the
+ National Information Infrastructure: The Report of the Working
+ Group on Intellectual Property [sic] Rights (1995).</li>
+
+ <li><a href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html">An
+ explanation of the White Paper:
+ The Copyright Grab</a>, Pamela Samuelson, Wired, Jan. 1996</li>
+
+ <li><a href="http://www.law.duke.edu/boylesite/sold_out.htm">Sold Out</a>,
+ James Boyle, New York Times, 31 March 1996</li>
+
+ <li><a
href="http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public
Data or Private Data</a>,
+ Washington Post, 4 Nov 1996. </li>
+
+ <li><a href="http://www.public-domain.org/">Union for the Public
+ Domain</a>—an organization which aims to resist and
+ reverse the overextension of copyright and patent powers.</li>
+</ul>
+
+<hr />
+<h4>This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</h4>
+
+<p><strong>Other Texts to Read</strong></p>
+
+<ul>
+ <li><a href="/philosophy/philosophy.html">Philosophy of the
+ GNU Project</a></li>
+ <li><a
href="http://www.computerworld.com/managementtopics/management/opinion/story/0,10801,49358,00.html"
+ id="COPYPROCTECTION">Copy Protection: Just Say No</a>,
+ Published in Computer World.</li>
+</ul>
+
+</div>
+
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+
+<p>
+Please send FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.
+<br />
+Please send broken links and other corrections or suggestions to
+<a href="mailto:address@hidden"><address@hidden></a>.
+</p>
+
+<p>
+Please see the
+<a href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting
+translations of this article.
+</p>
+
+<p>
+Copyright © 1996, 2002, 2007, 2009, 2010 Richard Stallman
+<br />
+This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
+Commons Attribution-NoDerivs 3.0 United States License</a>.
+</p>
+
+<p>
+Updated:
+<!-- timestamp start -->
+$Date: 2013/08/29 06:33:52 $
+<!-- timestamp end -->
+</p>
+</div>
+
+</div>
+</body>
+</html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www planetfeeds.ja.html gnu/linux-and-gnu.ca.ht...,
GNUN <=