www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy can-you-trust.ar.html can-you-tr...


From: GNUN
Subject: www/philosophy can-you-trust.ar.html can-you-tr...
Date: Mon, 27 Apr 2015 16:01:03 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/04/27 16:01:03

Modified files:
        philosophy     : can-you-trust.ar.html can-you-trust.cs.html 
                         can-you-trust.nl.html can-you-trust.tr.html 
        philosophy/po  : can-you-trust.cs-diff.html 
                         can-you-trust.nl-diff.html 
Added files:
        philosophy/po  : can-you-trust.ar-diff.html 
                         can-you-trust.tr-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/can-you-trust.ar.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/can-you-trust.cs.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/can-you-trust.nl.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/can-you-trust.tr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.cs-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.nl-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.ar-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/can-you-trust.tr-diff.html?cvsroot=www&rev=1.1

Patches:
Index: can-you-trust.ar.html
===================================================================
RCS file: /web/www/www/philosophy/can-you-trust.ar.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- can-you-trust.ar.html       10 Dec 2014 15:28:06 -0000      1.26
+++ can-you-trust.ar.html       27 Apr 2015 16:01:01 -0000      1.27
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/can-you-trust.ar.po">
+ http://www.gnu.org/philosophy/po/can-you-trust.ar.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/can-you-trust.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/can-you-trust.ar-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2015-02-26" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
 
 <!--#include virtual="/server/header.ar.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/philosophy/po/can-you-trust.translist" -->
 <!--#include virtual="/server/banner.ar.html" -->
+<!--#include virtual="/server/outdated.ar.html" -->
 <h2>هل تستطيع الوثوق بحاسوبك؟</h2>
 
 <p>بقلم <a href="http://www.stallman.org/";>ريتشارد ستالم
ن</a></p>
@@ -244,7 +250,7 @@
 <p class="unprintable"><!-- timestamp start -->
 حُدّثت:
 
-$Date: 2014/12/10 15:28:06 $
+$Date: 2015/04/27 16:01:01 $
 
 <!-- timestamp end -->
 </p>

Index: can-you-trust.cs.html
===================================================================
RCS file: /web/www/www/philosophy/can-you-trust.cs.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- can-you-trust.cs.html       21 Dec 2014 11:59:23 -0000      1.12
+++ can-you-trust.cs.html       27 Apr 2015 16:01:01 -0000      1.13
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/can-you-trust.cs.po">
+ http://www.gnu.org/philosophy/po/can-you-trust.cs.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/can-you-trust.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/can-you-trust.cs-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2015-02-26" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
 
 <!--#include virtual="/server/header.cs.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/philosophy/po/can-you-trust.translist" -->
 <!--#include virtual="/server/banner.cs.html" -->
+<!--#include virtual="/server/outdated.cs.html" -->
 <h2>Můžete svému počítači věřit?</h2>
 
 <p>napsal <a href="http://www.stallman.org/";>Richard Stallman</a></p>
@@ -279,7 +285,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Aktualizováno:
 
-$Date: 2014/12/21 11:59:23 $
+$Date: 2015/04/27 16:01:01 $
 
 <!-- timestamp end -->
 </p>

Index: can-you-trust.nl.html
===================================================================
RCS file: /web/www/www/philosophy/can-you-trust.nl.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- can-you-trust.nl.html       9 Feb 2015 21:02:55 -0000       1.13
+++ can-you-trust.nl.html       27 Apr 2015 16:01:01 -0000      1.14
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/can-you-trust.nl.po">
+ http://www.gnu.org/philosophy/po/can-you-trust.nl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/can-you-trust.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/can-you-trust.nl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2015-02-26" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
 
 <!--#include virtual="/server/header.nl.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/philosophy/po/can-you-trust.translist" -->
 <!--#include virtual="/server/banner.nl.html" -->
+<!--#include virtual="/server/outdated.nl.html" -->
 <h2>Kun je je Computer Vertrouwen?</h2>
 
 <p>door <a href="http://www.stallman.org/";>Richard Stallman</a></p>
@@ -297,7 +303,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2015/02/09 21:02:55 $
+$Date: 2015/04/27 16:01:01 $
 
 <!-- timestamp end -->
 </p>

Index: can-you-trust.tr.html
===================================================================
RCS file: /web/www/www/philosophy/can-you-trust.tr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- can-you-trust.tr.html       20 Feb 2015 17:28:09 -0000      1.18
+++ can-you-trust.tr.html       27 Apr 2015 16:01:02 -0000      1.19
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/can-you-trust.tr.po">
+ http://www.gnu.org/philosophy/po/can-you-trust.tr.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/philosophy/can-you-trust.html"
+ --><!--#set var="DIFF_FILE" value="/philosophy/po/can-you-trust.tr-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2015-02-26" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/can-you-trust.en.html" -->
 
 <!--#include virtual="/server/header.tr.html" -->
 <!-- Parent-Version: 1.77 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/philosophy/po/can-you-trust.translist" -->
 <!--#include virtual="/server/banner.tr.html" -->
+<!--#include virtual="/server/outdated.tr.html" -->
 <h2>Bilgisayarınıza Güvenebilir misiniz?</h2>
 
 <p>Yazan: <a href="http://www.stallman.org/";>Richard Stallman</a></p>
@@ -328,7 +334,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Son Güncelleme:
 
-$Date: 2015/02/20 17:28:09 $
+$Date: 2015/04/27 16:01:02 $
 
 <!-- timestamp end -->
 </p>

Index: po/can-you-trust.cs-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/can-you-trust.cs-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/can-you-trust.cs-diff.html       12 Apr 2014 13:58:29 -0000      1.9
+++ po/can-you-trust.cs-diff.html       27 Apr 2015 16:01:02 -0000      1.10
@@ -11,21 +11,13 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-<span class="inserted"><ins><em>&lt;!-- Parent-Version: 1.77 
--&gt;</em></ins></span>
+&lt;!-- Parent-Version: 1.77 --&gt;
 &lt;title&gt;Can You Trust Your Computer?
-- GNU Project - Free Software <span class="removed"><del><strong>Foundation 
(FSF)&lt;/title&gt;</strong></del></span> <span 
class="inserted"><ins><em>Foundation&lt;/title&gt;</em></ins></span>
+- GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;!--#include virtual="/philosophy/po/can-you-trust.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Can You Trust Your Computer?&lt;/h2&gt;
 
-<span class="removed"><del><strong>&lt;!-- This document uses XHTML 1.0 
Strict, but may be served as --&gt;
-&lt;!-- text/html.  Please ensure that markup style considers --&gt;
-&lt;!-- appendex C of the XHTML 1.0 standard. See validator.w3.org. --&gt;
-
-&lt;!-- Please ensure links are consistent with Apache's MultiView. --&gt;
-&lt;!-- Change include statements to be consistent with the relevant --&gt;
-&lt;!-- language, where necessary. --&gt;</strong></del></span>
-
 &lt;p&gt;by &lt;a href="http://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/p&gt;
 
 &lt;p&gt;
@@ -246,38 +238,54 @@
 &lt;/ol&gt;
 
 &lt;hr /&gt;
-<span class="removed"><del><strong>&lt;h4&gt;This</strong></del></span>
-<span class="inserted"><ins><em>&lt;blockquote id="fsfs"&gt;&lt;p 
class="big"&gt;This</em></ins></span> essay is published
-in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
-Software, Free Society: The Selected Essays of Richard
-M. <span 
class="removed"><del><strong>Stallman&lt;/cite&gt;&lt;/a&gt;&lt;/h4&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;As of 2015, treacherous computing has 
been implemented for PCs in
+the form of the &ldquo;Trusted Platform Module&rdquo;; however, for
+practical reasons, the TPM has proved a total failure for the goal of
+providing a platform for remote attestation to verify Digital
+Restrictions Management.  Thus, companies implement DRM using other
+methods.  At present, &ldquo;Trusted Platform Modules&rdquo; are not
+being used for DRM at all, and there are reasons to think that it will
+not be feasible to use them for DRM.  Ironically, this means that the
+only current uses of the &ldquo;Trusted Platform Modules&rdquo; are
+the innocent secondary uses&mdash;for instance, to verify that no one
+has surreptitiously changed the system in a computer.&lt;/p&gt;
+
+&lt;p&gt;Therefore, we conclude that the &ldquo;Trusted Platform
+Modules&rdquo; available for PCs are not dangerous, and there is no
+reason not to include one in a computer or support it in system
+software.&lt;/p&gt;
+
+&lt;p&gt;This does not mean that everything is rosy.  Other hardware systems
+for blocking the owner of a computer from changing the software in it
+are in use in some ARM PCs as well as processors in portable phones,
+cars, TVs and other devices, and these are fully as bad as we
+expected.&lt;/p&gt;
+
+&lt;p&gt;This also does not mean that remote attestation is harmless.  If
+ever a device succeeds in implementing that, it will be a grave threat
+to users' freedom.  The current &ldquo;Trusted Platform Module&rdquo;
+is harmless only because it failed in the attempt to make remote
+attestation feasible.  We must not presume that all future attempts
+will fail too.&lt;/p&gt;
 
-&lt;!-- If needed, change the copyright block at the bottom. In general, --&gt;
-&lt;!-- all pages on the GNU web server should have the section about    --&gt;
-&lt;!-- verbatim copying.  Please do NOT remove this without talking     --&gt;
-&lt;!-- with the webmasters first. --&gt; 
-&lt;!-- Please make sure the copyright date is consistent with the document 
--&gt;
-&lt;!-- and that it is like this "2001, 2002" not this "2001-2002." 
--&gt;</strong></del></span> <span 
class="inserted"><ins><em>Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;</em></ins></span>
+&lt;hr /&gt;</em></ins></span>
+
+&lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
+in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;
-Please</strong></del></span>
-<span class="inserted"><ins><em>&lt;div class="unprintable"&gt;
-
-&lt;p&gt;Please</em></ins></span> send <span 
class="inserted"><ins><em>general</em></ins></span> FSF &amp; GNU inquiries to 
&lt;a
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to &lt;a
 href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.  There are 
also &lt;a
-href="/contact/"&gt;other ways to contact&lt;/a&gt; the FSF.
-<span class="removed"><del><strong>&lt;br /&gt;
-Please send broken</strong></del></span>  <span 
class="inserted"><ins><em>Broken</em></ins></span> links and other
-corrections or suggestions <span class="inserted"><ins><em>can be 
sent</em></ins></span> to &lt;a <span 
class="removed"><del><strong>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;</strong></del></span>
-<span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+href="/contact/"&gt;other ways to contact&lt;/a&gt; the FSF.  Broken links and 
other
+corrections or suggestions can be sent to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
         replace it with the translation of these two:
@@ -291,31 +299,23 @@
         &lt;p&gt;For information on coordinating and submitting translations of
         our web pages, see &lt;a
         href="/server/standards/README.translations.html"&gt;Translations
-        README&lt;/a&gt;. --&gt;</em></ins></span>
+        README&lt;/a&gt;. --&gt;
 Please see the &lt;a
 href="/server/standards/README.translations.html"&gt;Translations 
README&lt;/a&gt; for
-information on coordinating and submitting translations of this <span 
class="removed"><del><strong>article.
-&lt;/p&gt;
-
-&lt;p&gt;
-Copyright</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+information on coordinating and submitting translations of this 
article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright</em></ins></span> &copy; 2002, <span 
class="removed"><del><strong>2007</strong></del></span> <span 
class="inserted"><ins><em>2007, 2014</em></ins></span> Richard <span 
class="removed"><del><strong>Stallman
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Stallman&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Copyright &copy; 2002, 2007, <span 
class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2015</em></ins></span> Richard 
Stallman&lt;/p&gt;
   
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative
-Commons Attribution-NoDerivs 3.0 United States <span 
class="removed"><del><strong>License&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>License&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+Commons Attribution-NoDerivs 3.0 United States License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Updated:</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p 
class="unprintable"&gt;Updated:</em></ins></span>
+&lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2014/04/12 13:58:29 $
+$Date: 2015/04/27 16:01:02 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/can-you-trust.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/can-you-trust.nl-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/can-you-trust.nl-diff.html       12 Apr 2014 13:58:29 -0000      1.9
+++ po/can-you-trust.nl-diff.html       27 Apr 2015 16:01:02 -0000      1.10
@@ -11,21 +11,13 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-<span class="inserted"><ins><em>&lt;!-- Parent-Version: 1.77 
--&gt;</em></ins></span>
+&lt;!-- Parent-Version: 1.77 --&gt;
 &lt;title&gt;Can You Trust Your Computer?
-- GNU Project - Free Software <span class="removed"><del><strong>Foundation 
(FSF)&lt;/title&gt;</strong></del></span> <span 
class="inserted"><ins><em>Foundation&lt;/title&gt;</em></ins></span>
+- GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;!--#include virtual="/philosophy/po/can-you-trust.translist" --&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Can You Trust Your Computer?&lt;/h2&gt;
 
-<span class="removed"><del><strong>&lt;!-- This document uses XHTML 1.0 
Strict, but may be served as --&gt;
-&lt;!-- text/html.  Please ensure that markup style considers --&gt;
-&lt;!-- appendex C of the XHTML 1.0 standard. See validator.w3.org. --&gt;
-
-&lt;!-- Please ensure links are consistent with Apache's MultiView. --&gt;
-&lt;!-- Change include statements to be consistent with the relevant --&gt;
-&lt;!-- language, where necessary. --&gt;</strong></del></span>
-
 &lt;p&gt;by &lt;a href="http://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/p&gt;
 
 &lt;p&gt;
@@ -246,38 +238,54 @@
 &lt;/ol&gt;
 
 &lt;hr /&gt;
-<span class="removed"><del><strong>&lt;h4&gt;This</strong></del></span>
-<span class="inserted"><ins><em>&lt;blockquote id="fsfs"&gt;&lt;p 
class="big"&gt;This</em></ins></span> essay is published
-in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
-Software, Free Society: The Selected Essays of Richard
-M. <span 
class="removed"><del><strong>Stallman&lt;/cite&gt;&lt;/a&gt;&lt;/h4&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;As of 2015, treacherous computing has 
been implemented for PCs in
+the form of the &ldquo;Trusted Platform Module&rdquo;; however, for
+practical reasons, the TPM has proved a total failure for the goal of
+providing a platform for remote attestation to verify Digital
+Restrictions Management.  Thus, companies implement DRM using other
+methods.  At present, &ldquo;Trusted Platform Modules&rdquo; are not
+being used for DRM at all, and there are reasons to think that it will
+not be feasible to use them for DRM.  Ironically, this means that the
+only current uses of the &ldquo;Trusted Platform Modules&rdquo; are
+the innocent secondary uses&mdash;for instance, to verify that no one
+has surreptitiously changed the system in a computer.&lt;/p&gt;
+
+&lt;p&gt;Therefore, we conclude that the &ldquo;Trusted Platform
+Modules&rdquo; available for PCs are not dangerous, and there is no
+reason not to include one in a computer or support it in system
+software.&lt;/p&gt;
+
+&lt;p&gt;This does not mean that everything is rosy.  Other hardware systems
+for blocking the owner of a computer from changing the software in it
+are in use in some ARM PCs as well as processors in portable phones,
+cars, TVs and other devices, and these are fully as bad as we
+expected.&lt;/p&gt;
+
+&lt;p&gt;This also does not mean that remote attestation is harmless.  If
+ever a device succeeds in implementing that, it will be a grave threat
+to users' freedom.  The current &ldquo;Trusted Platform Module&rdquo;
+is harmless only because it failed in the attempt to make remote
+attestation feasible.  We must not presume that all future attempts
+will fail too.&lt;/p&gt;
 
-&lt;!-- If needed, change the copyright block at the bottom. In general, --&gt;
-&lt;!-- all pages on the GNU web server should have the section about    --&gt;
-&lt;!-- verbatim copying.  Please do NOT remove this without talking     --&gt;
-&lt;!-- with the webmasters first. --&gt; 
-&lt;!-- Please make sure the copyright date is consistent with the document 
--&gt;
-&lt;!-- and that it is like this "2001, 2002" not this "2001-2002." 
--&gt;</strong></del></span> <span 
class="inserted"><ins><em>Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;</em></ins></span>
+&lt;hr /&gt;</em></ins></span>
+
+&lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
+in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;
-Please</strong></del></span>
-<span class="inserted"><ins><em>&lt;div class="unprintable"&gt;
-
-&lt;p&gt;Please</em></ins></span> send <span 
class="inserted"><ins><em>general</em></ins></span> FSF &amp; GNU inquiries to 
&lt;a
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to &lt;a
 href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.  There are 
also &lt;a
-href="/contact/"&gt;other ways to contact&lt;/a&gt; the FSF.
-<span class="removed"><del><strong>&lt;br /&gt;
-Please send broken</strong></del></span>  <span 
class="inserted"><ins><em>Broken</em></ins></span> links and other
-corrections or suggestions <span class="inserted"><ins><em>can be 
sent</em></ins></span> to &lt;a <span 
class="removed"><del><strong>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;</strong></del></span>
-<span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+href="/contact/"&gt;other ways to contact&lt;/a&gt; the FSF.  Broken links and 
other
+corrections or suggestions can be sent to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
         replace it with the translation of these two:
@@ -291,31 +299,23 @@
         &lt;p&gt;For information on coordinating and submitting translations of
         our web pages, see &lt;a
         href="/server/standards/README.translations.html"&gt;Translations
-        README&lt;/a&gt;. --&gt;</em></ins></span>
+        README&lt;/a&gt;. --&gt;
 Please see the &lt;a
 href="/server/standards/README.translations.html"&gt;Translations 
README&lt;/a&gt; for
-information on coordinating and submitting translations of this <span 
class="removed"><del><strong>article.
-&lt;/p&gt;
-
-&lt;p&gt;
-Copyright</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+information on coordinating and submitting translations of this 
article.&lt;/p&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Copyright</em></ins></span> &copy; 2002, <span 
class="removed"><del><strong>2007</strong></del></span> <span 
class="inserted"><ins><em>2007, 2014</em></ins></span> Richard <span 
class="removed"><del><strong>Stallman
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Stallman&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Copyright &copy; 2002, 2007, <span 
class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2015</em></ins></span> Richard 
Stallman&lt;/p&gt;
   
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative
-Commons Attribution-NoDerivs 3.0 United States <span 
class="removed"><del><strong>License&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>License&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+Commons Attribution-NoDerivs 3.0 United States License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Updated:</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p 
class="unprintable"&gt;Updated:</em></ins></span>
+&lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2014/04/12 13:58:29 $
+$Date: 2015/04/27 16:01:02 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/can-you-trust.ar-diff.html
===================================================================
RCS file: po/can-you-trust.ar-diff.html
diff -N po/can-you-trust.ar-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/can-you-trust.ar-diff.html       27 Apr 2015 16:01:02 -0000      1.1
@@ -0,0 +1,325 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/can-you-trust.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;title&gt;Can You Trust Your Computer?
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;!--#include virtual="/philosophy/po/can-you-trust.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Can You Trust Your Computer?&lt;/h2&gt;
+
+&lt;p&gt;by &lt;a href="http://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/p&gt;
+
+&lt;p&gt;
+Who should your computer take its orders from?  Most people think
+their computers should obey them, not obey someone else.  With a plan
+they call &ldquo;trusted computing&rdquo;, large media corporations
+(including the movie companies and record companies), together with
+computer companies such as Microsoft and Intel, are planning to make
+your computer obey them instead of you.  (Microsoft's version of this
+scheme is called Palladium.)  Proprietary programs have
+included malicious features before, but this plan would make it
+universal.&lt;/p&gt;
+&lt;p&gt;
+Proprietary software means, fundamentally, that you don't control what
+it does; you can't study the source code, or change it.  It's not
+surprising that clever businessmen find ways to use their control to
+put you at a disadvantage.  Microsoft has done this several times: one
+version of Windows was designed to report to Microsoft all the
+software on your hard disk; a recent &ldquo;security&rdquo; upgrade in
+Windows Media Player required users to agree to new restrictions.  But
+Microsoft is not alone: the KaZaa music-sharing software is designed
+so that KaZaa's business partner can rent out the use of your computer
+to its clients.  These malicious features are often secret, but even
+once you know about them it is hard to remove them, since you don't
+have the source code.&lt;/p&gt;
+&lt;p&gt;
+In the past, these were isolated incidents.  &ldquo;Trusted
+computing&rdquo; would make the practice pervasive.  &ldquo;Treacherous
+computing&rdquo; is a more appropriate name, because the plan is
+designed to make sure your computer will systematically disobey you.
+In fact, it is designed to stop your computer from functioning as a
+general-purpose computer.  Every operation may require explicit
+permission.&lt;/p&gt;
+&lt;p&gt;
+The technical idea underlying treacherous computing is that the
+computer includes a digital encryption and signature device, and the
+keys are kept secret from you.  Proprietary programs will use this
+device to control which other programs you can run, which documents or
+data you can access, and what programs you can pass them to.  These
+programs will continually download new authorization rules through the
+Internet, and impose those rules automatically on your work.  If you
+don't allow your computer to obtain the new rules periodically from
+the Internet, some capabilities will automatically cease to function.&lt;/p&gt;
+&lt;p&gt;
+Of course, Hollywood and the record companies plan to use treacherous
+computing for Digital Restrictions Management (DRM), so
+that downloaded videos and music can be played only on one specified
+computer.  Sharing will be entirely impossible, at least using the
+authorized files that you would get from those companies.  You, the
+public, ought to have both the freedom and the ability to share these
+things.  (I expect that someone will find a way to produce unencrypted
+versions, and to upload and share them, so DRM will not entirely
+succeed, but that is no excuse for the system.)&lt;/p&gt;
+&lt;p&gt;
+Making sharing impossible is bad enough, but it gets worse.  There are
+plans to use the same facility for email and documents&mdash;resulting
+in email that disappears in two weeks, or documents that can only be
+read on the computers in one company.&lt;/p&gt;
+&lt;p&gt;
+Imagine if you get an email from your boss telling you to do something
+that you think is risky; a month later, when it backfires, you can't
+use the email to show that the decision was not yours.  &ldquo;Getting
+it in writing&rdquo; doesn't protect you when the order is written in
+disappearing ink.&lt;/p&gt;
+&lt;p&gt;
+Imagine if you get an email from your boss stating a policy that is
+illegal or morally outrageous, such as to shred your company's audit
+documents, or to allow a dangerous threat to your country to move
+forward unchecked.  Today you can send this to a reporter and expose
+the activity.  With treacherous computing, the reporter won't be able
+to read the document; her computer will refuse to obey her.
+Treacherous computing becomes a paradise for corruption.&lt;/p&gt;
+&lt;p&gt;
+Word processors such as Microsoft Word could use treacherous computing
+when they save your documents, to make sure no competing word
+processors can read them.  Today we must figure out the secrets of
+Word format by laborious experiments in order to make free word
+processors read Word documents.  If Word encrypts documents using
+treacherous computing when saving them, the free software community
+won't have a chance of developing software to read them&mdash;and if
+we could, such programs might even be forbidden by the Digital
+Millennium Copyright Act.&lt;/p&gt;
+&lt;p&gt;
+Programs that use treacherous computing will continually download new
+authorization rules through the Internet, and impose those rules
+automatically on your work.  If Microsoft, or the US government, does
+not like what you said in a document you wrote, they could post new
+instructions telling all computers to refuse to let anyone read that
+document.  Each computer would obey when it downloads the new
+instructions.  Your writing would be subject to 1984-style retroactive
+erasure.  You might be unable to read it yourself.&lt;/p&gt;
+&lt;p&gt;
+You might think you can find out what nasty things a treacherous-computing
+application does, study how painful they are, and decide
+whether to accept them.  Even if you can find this out, it would
+be foolish to accept the deal, but you can't even expect the deal
+to stand still.  Once you come to depend on using the program, you are
+hooked and they know it; then they can change the deal.  Some
+applications will automatically download upgrades that will do
+something different&mdash;and they won't give you a choice about
+whether to upgrade.&lt;/p&gt;
+&lt;p&gt;
+Today you can avoid being restricted by proprietary software by not
+using it.  If you run GNU/Linux or another free operating system, and
+if you avoid installing proprietary applications on it, then you are
+in charge of what your computer does.  If a free program has a
+malicious feature, other developers in the community will take it out,
+and you can use the corrected version.  You can also run free
+application programs and tools on nonfree operating systems; this
+falls short of fully giving you freedom, but many users do it.&lt;/p&gt;
+&lt;p&gt;
+Treacherous computing puts the existence of free operating systems and
+free applications at risk, because you may not be able to run them at
+all.  Some versions of treacherous computing would require the
+operating system to be specifically authorized by a particular
+company.  Free operating systems could not be installed.  Some
+versions of treacherous computing would require every program to be
+specifically authorized by the operating system developer.  You could
+not run free applications on such a system.  If you did figure out
+how, and told someone, that could be a crime.&lt;/p&gt;
+&lt;p&gt;
+There are proposals already for US laws that would require all computers to
+support treacherous computing, and to prohibit connecting old computers to
+the Internet.  The CBDTPA (we call it the Consume But Don't Try Programming
+Act) is one of them.  But even if they don't legally force you to switch to
+treacherous computing, the pressure to accept it may be enormous.  Today
+people often use Word format for communication, although this causes
+several sorts of problems (see
+&lt;a href="/philosophy/no-word-attachments.html"&gt;&ldquo;We Can Put an End 
to Word
+Attachments&rdquo;&lt;/a&gt;).  If only a treacherous-computing machine can 
read the
+latest Word documents, many people will switch to it, if they view the
+situation only in terms of individual action (take it or leave it).  To
+oppose treacherous computing, we must join together and confront the
+situation as a collective choice.&lt;/p&gt;
+&lt;p&gt;
+For further information about treacherous computing, see
+&lt;a 
href="http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html"&gt;http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;
+To block treacherous computing will require large numbers of citizens
+to organize.  We need your help!  Please support
+&lt;a href="http://DefectiveByDesign.org"&gt;Defective by Design&lt;/a&gt;, the
+FSF's campaign against Digital Restrictions Management.&lt;/p&gt;
+
+&lt;h3&gt;Postscripts&lt;/h3&gt;
+
+&lt;ol&gt;
+&lt;li&gt;The computer security field uses the term &ldquo;trusted
+computing&rdquo; in a different way&mdash;beware of confusion
+between the two meanings.
+&lt;/li&gt;
+&lt;li&gt;The GNU Project distributes the GNU Privacy Guard, a program that
+implements public-key encryption and digital signatures, which you can
+use to send secure and private email.  It is useful to explore how GPG
+differs from treacherous computing, and see what makes one helpful and
+the other so dangerous.
+&lt;p&gt;
+When someone uses GPG to send you an encrypted document, and you use
+GPG to decode it, the result is an unencrypted document that you can
+read, forward, copy, and even reencrypt to send it securely to
+someone else.  A treacherous-computing application would let you read
+the words on the screen, but would not let you produce an unencrypted
+document that you could use in other ways.  GPG, a free software
+package, makes security features available to the users; 
&lt;em&gt;they&lt;/em&gt; use &lt;em&gt;it&lt;/em&gt;.
+Treacherous computing is designed to impose restrictions on the users;
+&lt;em&gt;it&lt;/em&gt; uses &lt;em&gt;them&lt;/em&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+The supporters of treacherous computing focus their discourse on its
+&lt;a name="beneficial"&gt;beneficial uses&lt;/a&gt;.  What they say is often
+correct, just not important.
+&lt;p&gt;
+Like most hardware, treacherous-computing hardware can be used for
+purposes which are not harmful.  But these features can be implemented in
+other ways, without treacherous-computing hardware.  The principal
+difference that treacherous computing makes for users is the nasty
+consequence: rigging your computer to work against you.&lt;/p&gt;
+&lt;p&gt;
+What they say is true, and what I say is true.  Put them together and
+what do you get?  Treacherous computing is a plan to take away our
+freedom, while offering minor benefits to distract us from what we
+would lose.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;Microsoft presents Palladium as a security measure, and claims that
+it will protect against viruses, but this claim is evidently false.  A
+presentation by Microsoft Research in October 2002 stated that one of
+the specifications of Palladium is that existing operating systems and
+applications will continue to run; therefore, viruses will continue to
+be able to do all the things that they can do today.
+&lt;p&gt;
+When Microsoft employees speak of &ldquo;security&rdquo; in connection with
+Palladium, they do not mean what we normally mean by that word:
+protecting your machine from things you do not want.  They mean
+protecting your copies of data on your machine from access by you in
+ways others do not want.  A slide in the presentation listed several
+types of secrets Palladium could be used to keep, including
+&ldquo;third party secrets&rdquo; and &ldquo;user
+secrets&rdquo;&mdash;but it put &ldquo;user secrets&rdquo; in
+quotation marks, recognizing that this is somewhat of an absurdity in the
+context of Palladium.&lt;/p&gt;
+&lt;p&gt;
+The presentation made frequent use of other terms that we frequently
+associate with the context of security, such as &ldquo;attack&rdquo;,
+&ldquo;malicious code&rdquo;, &ldquo;spoofing&rdquo;, as well as
+&ldquo;trusted&rdquo;.  None of them means what it normally means.
+&ldquo;Attack&rdquo; doesn't mean someone trying to hurt you, it means
+you trying to copy music.  &ldquo;Malicious code&rdquo; means code
+installed by you to do what someone else doesn't want your machine to
+do.  &ldquo;Spoofing&rdquo; doesn't mean someone's fooling you, it means
+your fooling Palladium.  And so on.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;A previous statement by the Palladium developers stated the basic
+premise that whoever developed or collected information should have
+total control of how you use it.  This would represent a revolutionary
+overturn of past ideas of ethics and of the legal system, and create
+an unprecedented system of control.  The specific problems of these
+systems are no accident; they result from the basic goal.  It is the
+goal we must reject.&lt;/li&gt;
+&lt;/ol&gt;
+
+&lt;hr /&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;As of 2015, treacherous computing has 
been implemented for PCs in
+the form of the &ldquo;Trusted Platform Module&rdquo;; however, for
+practical reasons, the TPM has proved a total failure for the goal of
+providing a platform for remote attestation to verify Digital
+Restrictions Management.  Thus, companies implement DRM using other
+methods.  At present, &ldquo;Trusted Platform Modules&rdquo; are not
+being used for DRM at all, and there are reasons to think that it will
+not be feasible to use them for DRM.  Ironically, this means that the
+only current uses of the &ldquo;Trusted Platform Modules&rdquo; are
+the innocent secondary uses&mdash;for instance, to verify that no one
+has surreptitiously changed the system in a computer.&lt;/p&gt;
+
+&lt;p&gt;Therefore, we conclude that the &ldquo;Trusted Platform
+Modules&rdquo; available for PCs are not dangerous, and there is no
+reason not to include one in a computer or support it in system
+software.&lt;/p&gt;
+
+&lt;p&gt;This does not mean that everything is rosy.  Other hardware systems
+for blocking the owner of a computer from changing the software in it
+are in use in some ARM PCs as well as processors in portable phones,
+cars, TVs and other devices, and these are fully as bad as we
+expected.&lt;/p&gt;
+
+&lt;p&gt;This also does not mean that remote attestation is harmless.  If
+ever a device succeeds in implementing that, it will be a grave threat
+to users' freedom.  The current &ldquo;Trusted Platform Module&rdquo;
+is harmless only because it failed in the attempt to make remote
+attestation feasible.  We must not presume that all future attempts
+will fail too.&lt;/p&gt;
+
+&lt;hr /&gt;</em></ins></span>
+
+&lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
+in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.  There are 
also &lt;a
+href="/contact/"&gt;other ways to contact&lt;/a&gt; the FSF.  Broken links and 
other
+corrections or suggestions can be sent to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations 
README&lt;/a&gt; for
+information on coordinating and submitting translations of this 
article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Copyright &copy; 2002, 2007, <span 
class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2015</em></ins></span> Richard 
Stallman&lt;/p&gt;
+  
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative
+Commons Attribution-NoDerivs 3.0 United States License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2015/04/27 16:01:02 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/can-you-trust.tr-diff.html
===================================================================
RCS file: po/can-you-trust.tr-diff.html
diff -N po/can-you-trust.tr-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/can-you-trust.tr-diff.html       27 Apr 2015 16:01:02 -0000      1.1
@@ -0,0 +1,325 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/can-you-trust.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.77 --&gt;
+&lt;title&gt;Can You Trust Your Computer?
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;!--#include virtual="/philosophy/po/can-you-trust.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2&gt;Can You Trust Your Computer?&lt;/h2&gt;
+
+&lt;p&gt;by &lt;a href="http://www.stallman.org/"&gt;Richard 
Stallman&lt;/a&gt;&lt;/p&gt;
+
+&lt;p&gt;
+Who should your computer take its orders from?  Most people think
+their computers should obey them, not obey someone else.  With a plan
+they call &ldquo;trusted computing&rdquo;, large media corporations
+(including the movie companies and record companies), together with
+computer companies such as Microsoft and Intel, are planning to make
+your computer obey them instead of you.  (Microsoft's version of this
+scheme is called Palladium.)  Proprietary programs have
+included malicious features before, but this plan would make it
+universal.&lt;/p&gt;
+&lt;p&gt;
+Proprietary software means, fundamentally, that you don't control what
+it does; you can't study the source code, or change it.  It's not
+surprising that clever businessmen find ways to use their control to
+put you at a disadvantage.  Microsoft has done this several times: one
+version of Windows was designed to report to Microsoft all the
+software on your hard disk; a recent &ldquo;security&rdquo; upgrade in
+Windows Media Player required users to agree to new restrictions.  But
+Microsoft is not alone: the KaZaa music-sharing software is designed
+so that KaZaa's business partner can rent out the use of your computer
+to its clients.  These malicious features are often secret, but even
+once you know about them it is hard to remove them, since you don't
+have the source code.&lt;/p&gt;
+&lt;p&gt;
+In the past, these were isolated incidents.  &ldquo;Trusted
+computing&rdquo; would make the practice pervasive.  &ldquo;Treacherous
+computing&rdquo; is a more appropriate name, because the plan is
+designed to make sure your computer will systematically disobey you.
+In fact, it is designed to stop your computer from functioning as a
+general-purpose computer.  Every operation may require explicit
+permission.&lt;/p&gt;
+&lt;p&gt;
+The technical idea underlying treacherous computing is that the
+computer includes a digital encryption and signature device, and the
+keys are kept secret from you.  Proprietary programs will use this
+device to control which other programs you can run, which documents or
+data you can access, and what programs you can pass them to.  These
+programs will continually download new authorization rules through the
+Internet, and impose those rules automatically on your work.  If you
+don't allow your computer to obtain the new rules periodically from
+the Internet, some capabilities will automatically cease to function.&lt;/p&gt;
+&lt;p&gt;
+Of course, Hollywood and the record companies plan to use treacherous
+computing for Digital Restrictions Management (DRM), so
+that downloaded videos and music can be played only on one specified
+computer.  Sharing will be entirely impossible, at least using the
+authorized files that you would get from those companies.  You, the
+public, ought to have both the freedom and the ability to share these
+things.  (I expect that someone will find a way to produce unencrypted
+versions, and to upload and share them, so DRM will not entirely
+succeed, but that is no excuse for the system.)&lt;/p&gt;
+&lt;p&gt;
+Making sharing impossible is bad enough, but it gets worse.  There are
+plans to use the same facility for email and documents&mdash;resulting
+in email that disappears in two weeks, or documents that can only be
+read on the computers in one company.&lt;/p&gt;
+&lt;p&gt;
+Imagine if you get an email from your boss telling you to do something
+that you think is risky; a month later, when it backfires, you can't
+use the email to show that the decision was not yours.  &ldquo;Getting
+it in writing&rdquo; doesn't protect you when the order is written in
+disappearing ink.&lt;/p&gt;
+&lt;p&gt;
+Imagine if you get an email from your boss stating a policy that is
+illegal or morally outrageous, such as to shred your company's audit
+documents, or to allow a dangerous threat to your country to move
+forward unchecked.  Today you can send this to a reporter and expose
+the activity.  With treacherous computing, the reporter won't be able
+to read the document; her computer will refuse to obey her.
+Treacherous computing becomes a paradise for corruption.&lt;/p&gt;
+&lt;p&gt;
+Word processors such as Microsoft Word could use treacherous computing
+when they save your documents, to make sure no competing word
+processors can read them.  Today we must figure out the secrets of
+Word format by laborious experiments in order to make free word
+processors read Word documents.  If Word encrypts documents using
+treacherous computing when saving them, the free software community
+won't have a chance of developing software to read them&mdash;and if
+we could, such programs might even be forbidden by the Digital
+Millennium Copyright Act.&lt;/p&gt;
+&lt;p&gt;
+Programs that use treacherous computing will continually download new
+authorization rules through the Internet, and impose those rules
+automatically on your work.  If Microsoft, or the US government, does
+not like what you said in a document you wrote, they could post new
+instructions telling all computers to refuse to let anyone read that
+document.  Each computer would obey when it downloads the new
+instructions.  Your writing would be subject to 1984-style retroactive
+erasure.  You might be unable to read it yourself.&lt;/p&gt;
+&lt;p&gt;
+You might think you can find out what nasty things a treacherous-computing
+application does, study how painful they are, and decide
+whether to accept them.  Even if you can find this out, it would
+be foolish to accept the deal, but you can't even expect the deal
+to stand still.  Once you come to depend on using the program, you are
+hooked and they know it; then they can change the deal.  Some
+applications will automatically download upgrades that will do
+something different&mdash;and they won't give you a choice about
+whether to upgrade.&lt;/p&gt;
+&lt;p&gt;
+Today you can avoid being restricted by proprietary software by not
+using it.  If you run GNU/Linux or another free operating system, and
+if you avoid installing proprietary applications on it, then you are
+in charge of what your computer does.  If a free program has a
+malicious feature, other developers in the community will take it out,
+and you can use the corrected version.  You can also run free
+application programs and tools on nonfree operating systems; this
+falls short of fully giving you freedom, but many users do it.&lt;/p&gt;
+&lt;p&gt;
+Treacherous computing puts the existence of free operating systems and
+free applications at risk, because you may not be able to run them at
+all.  Some versions of treacherous computing would require the
+operating system to be specifically authorized by a particular
+company.  Free operating systems could not be installed.  Some
+versions of treacherous computing would require every program to be
+specifically authorized by the operating system developer.  You could
+not run free applications on such a system.  If you did figure out
+how, and told someone, that could be a crime.&lt;/p&gt;
+&lt;p&gt;
+There are proposals already for US laws that would require all computers to
+support treacherous computing, and to prohibit connecting old computers to
+the Internet.  The CBDTPA (we call it the Consume But Don't Try Programming
+Act) is one of them.  But even if they don't legally force you to switch to
+treacherous computing, the pressure to accept it may be enormous.  Today
+people often use Word format for communication, although this causes
+several sorts of problems (see
+&lt;a href="/philosophy/no-word-attachments.html"&gt;&ldquo;We Can Put an End 
to Word
+Attachments&rdquo;&lt;/a&gt;).  If only a treacherous-computing machine can 
read the
+latest Word documents, many people will switch to it, if they view the
+situation only in terms of individual action (take it or leave it).  To
+oppose treacherous computing, we must join together and confront the
+situation as a collective choice.&lt;/p&gt;
+&lt;p&gt;
+For further information about treacherous computing, see
+&lt;a 
href="http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html"&gt;http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;
+To block treacherous computing will require large numbers of citizens
+to organize.  We need your help!  Please support
+&lt;a href="http://DefectiveByDesign.org"&gt;Defective by Design&lt;/a&gt;, the
+FSF's campaign against Digital Restrictions Management.&lt;/p&gt;
+
+&lt;h3&gt;Postscripts&lt;/h3&gt;
+
+&lt;ol&gt;
+&lt;li&gt;The computer security field uses the term &ldquo;trusted
+computing&rdquo; in a different way&mdash;beware of confusion
+between the two meanings.
+&lt;/li&gt;
+&lt;li&gt;The GNU Project distributes the GNU Privacy Guard, a program that
+implements public-key encryption and digital signatures, which you can
+use to send secure and private email.  It is useful to explore how GPG
+differs from treacherous computing, and see what makes one helpful and
+the other so dangerous.
+&lt;p&gt;
+When someone uses GPG to send you an encrypted document, and you use
+GPG to decode it, the result is an unencrypted document that you can
+read, forward, copy, and even reencrypt to send it securely to
+someone else.  A treacherous-computing application would let you read
+the words on the screen, but would not let you produce an unencrypted
+document that you could use in other ways.  GPG, a free software
+package, makes security features available to the users; 
&lt;em&gt;they&lt;/em&gt; use &lt;em&gt;it&lt;/em&gt;.
+Treacherous computing is designed to impose restrictions on the users;
+&lt;em&gt;it&lt;/em&gt; uses &lt;em&gt;them&lt;/em&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+The supporters of treacherous computing focus their discourse on its
+&lt;a name="beneficial"&gt;beneficial uses&lt;/a&gt;.  What they say is often
+correct, just not important.
+&lt;p&gt;
+Like most hardware, treacherous-computing hardware can be used for
+purposes which are not harmful.  But these features can be implemented in
+other ways, without treacherous-computing hardware.  The principal
+difference that treacherous computing makes for users is the nasty
+consequence: rigging your computer to work against you.&lt;/p&gt;
+&lt;p&gt;
+What they say is true, and what I say is true.  Put them together and
+what do you get?  Treacherous computing is a plan to take away our
+freedom, while offering minor benefits to distract us from what we
+would lose.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;Microsoft presents Palladium as a security measure, and claims that
+it will protect against viruses, but this claim is evidently false.  A
+presentation by Microsoft Research in October 2002 stated that one of
+the specifications of Palladium is that existing operating systems and
+applications will continue to run; therefore, viruses will continue to
+be able to do all the things that they can do today.
+&lt;p&gt;
+When Microsoft employees speak of &ldquo;security&rdquo; in connection with
+Palladium, they do not mean what we normally mean by that word:
+protecting your machine from things you do not want.  They mean
+protecting your copies of data on your machine from access by you in
+ways others do not want.  A slide in the presentation listed several
+types of secrets Palladium could be used to keep, including
+&ldquo;third party secrets&rdquo; and &ldquo;user
+secrets&rdquo;&mdash;but it put &ldquo;user secrets&rdquo; in
+quotation marks, recognizing that this is somewhat of an absurdity in the
+context of Palladium.&lt;/p&gt;
+&lt;p&gt;
+The presentation made frequent use of other terms that we frequently
+associate with the context of security, such as &ldquo;attack&rdquo;,
+&ldquo;malicious code&rdquo;, &ldquo;spoofing&rdquo;, as well as
+&ldquo;trusted&rdquo;.  None of them means what it normally means.
+&ldquo;Attack&rdquo; doesn't mean someone trying to hurt you, it means
+you trying to copy music.  &ldquo;Malicious code&rdquo; means code
+installed by you to do what someone else doesn't want your machine to
+do.  &ldquo;Spoofing&rdquo; doesn't mean someone's fooling you, it means
+your fooling Palladium.  And so on.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;A previous statement by the Palladium developers stated the basic
+premise that whoever developed or collected information should have
+total control of how you use it.  This would represent a revolutionary
+overturn of past ideas of ethics and of the legal system, and create
+an unprecedented system of control.  The specific problems of these
+systems are no accident; they result from the basic goal.  It is the
+goal we must reject.&lt;/li&gt;
+&lt;/ol&gt;
+
+&lt;hr /&gt;
+
+<span class="inserted"><ins><em>&lt;p&gt;As of 2015, treacherous computing has 
been implemented for PCs in
+the form of the &ldquo;Trusted Platform Module&rdquo;; however, for
+practical reasons, the TPM has proved a total failure for the goal of
+providing a platform for remote attestation to verify Digital
+Restrictions Management.  Thus, companies implement DRM using other
+methods.  At present, &ldquo;Trusted Platform Modules&rdquo; are not
+being used for DRM at all, and there are reasons to think that it will
+not be feasible to use them for DRM.  Ironically, this means that the
+only current uses of the &ldquo;Trusted Platform Modules&rdquo; are
+the innocent secondary uses&mdash;for instance, to verify that no one
+has surreptitiously changed the system in a computer.&lt;/p&gt;
+
+&lt;p&gt;Therefore, we conclude that the &ldquo;Trusted Platform
+Modules&rdquo; available for PCs are not dangerous, and there is no
+reason not to include one in a computer or support it in system
+software.&lt;/p&gt;
+
+&lt;p&gt;This does not mean that everything is rosy.  Other hardware systems
+for blocking the owner of a computer from changing the software in it
+are in use in some ARM PCs as well as processors in portable phones,
+cars, TVs and other devices, and these are fully as bad as we
+expected.&lt;/p&gt;
+
+&lt;p&gt;This also does not mean that remote attestation is harmless.  If
+ever a device succeeds in implementing that, it will be a grave threat
+to users' freedom.  The current &ldquo;Trusted Platform Module&rdquo;
+is harmless only because it failed in the attempt to make remote
+attestation feasible.  We must not presume that all future attempts
+will fail too.&lt;/p&gt;
+
+&lt;hr /&gt;</em></ins></span>
+
+&lt;blockquote id="fsfs"&gt;&lt;p class="big"&gt;This essay is published
+in &lt;a 
href="http://shop.fsf.org/product/free-software-free-society/"&gt;&lt;cite&gt;Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman&lt;/cite&gt;&lt;/a&gt;.&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.  There are 
also &lt;a
+href="/contact/"&gt;other ways to contact&lt;/a&gt; the FSF.  Broken links and 
other
+corrections or suggestions can be sent to &lt;a
+href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations 
README&lt;/a&gt; for
+information on coordinating and submitting translations of this 
article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Copyright &copy; 2002, 2007, <span 
class="removed"><del><strong>2014</strong></del></span> <span 
class="inserted"><ins><em>2014, 2015</em></ins></span> Richard 
Stallman&lt;/p&gt;
+  
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/"&gt;Creative
+Commons Attribution-NoDerivs 3.0 United States License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2015/04/27 16:01:02 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]