www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy right-to-read.html


From: Richard M. Stallman
Subject: www/philosophy right-to-read.html
Date: Wed, 13 Jul 2016 17:04:49 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     Richard M. Stallman <rms>       16/07/13 17:04:49

Modified files:
        philosophy     : right-to-read.html 

Log message:
        Major rewrite of author's note.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.html?cvsroot=www&r1=1.92&r2=1.93

Patches:
Index: right-to-read.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- right-to-read.html  30 Jun 2016 09:26:07 -0000      1.92
+++ right-to-read.html  13 Jul 2016 17:04:49 -0000      1.93
@@ -166,64 +166,79 @@
 <ul>
 <li>This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
-repressive society shaped by the enemies that use &ldquo;pirate&rdquo; as
+repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
-I have tried to project it from today so as to sound even more
+I have tried to project it forwards into something more visibly
 oppressive. See <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
 </li>
 
 <li>
+Computer-enforced restrictions on lending or reading books (and other
+kinds of published works) are known as <abbr>DRM</abbr>, short for
+&ldquo;Digital Restrictions Management&rdquo;.  To
+eliminate <abbr>DRM</abbr>, the Free Software Foundation has
+established the <a href="http://DefectiveByDesign.org";>Defective by
+Design</a> campaign.  We ask for your support.</p>
+</li>
+
+<li>
 <p>The following note has been updated several times since the first
 publication of the story.</p>
 
 <p>
-The right to read is a battle being fought today.  Although it may
-take 50 years for our present way of life to fade into obscurity, most
-of the specific laws and practices described above have already been
-proposed; many have been enacted into law in the US and elsewhere.  In
-the US, the 1998 Digital Millennium Copyright Act (DMCA) established the legal
-basis to restrict the reading and lending of computerized books (and
-other works as well).  The European Union imposed similar restrictions
-in a 2001 copyright directive.  In France, under the DADVSI law
-adopted in 2006, mere possession of a copy of DeCSS, the free program
-to decrypt video on a DVD, is a crime.</p>
-
-<p>
-In 2001, Disney-funded Senator Hollings proposed a bill called the
-SSSCA that would require every new computer to have mandatory
-copy-restriction facilities that the user cannot bypass.  Following
-the Clipper chip and similar US government key-escrow proposals, this
-shows a long-term trend: computer systems are increasingly set up to
-give absentees with clout control over the people actually using the
-computer system.  The SSSCA was later renamed to the unpronounceable
-CBDTPA, which was glossed as the &ldquo;Consume But Don't Try
-Programming Act&rdquo;.
-</p>
-
-<p>
-The Republicans took control of the US senate shortly thereafter.
-They are less tied to Hollywood than the Democrats, so they did not
-press these proposals.  Now that the Democrats are back in control,
-the danger is once again higher.</p>
-
-<p>
-In 2001 the US began attempting to use the proposed &ldquo;Free Trade&rdquo; 
Area of
-the Americas (FTAA) treaty to impose the same rules on all the countries in
-the Western Hemisphere.  The FTAA is one of the so-called free
-trade treaties, which are actually designed to give business
-increased power over democratic governments; imposing laws like the
-DMCA is typical of this spirit.  The FTAA was effectively killed by
-Lula, President of Brazil, who rejected the DMCA requirement and
-others.</p>
+The battle for the right to read is already being fought.  Although it
+may take 50 years for our past freedoms to fade into obscurity, most
+of the specific repressive laws and practices described above have
+already been proposed; some have been enacted into law in the US and
+elsewhere.  In the US, the 1998 Digital Millennium Copyright Act
+(<abbr>DMCA</abbr>) gave explicit government backing to the
+computer-enforced restrictions known as DRM, by making the
+distribution of programs that can break DRM a crime.  The European
+Union imposed similar restrictions in a 2001 copyright directive, in a
+form not quite as strong.</p>
+
+<p>
+The US campaigns to impose such rules on the rest of the world through
+so-called &ldquo;free trade&rdquo; treaties.
+<a href="https://stallman.org/business-supremacy-treaties.html";>
+Business-supremacy treaties</a> is a more fitting term for them, since
+they are designed to give business dominion over nominally democratic
+states.  The <abbr>DMCA</abbr>'s policy of criminalizing programs that
+break DRM is one of many unjust policies that these treaties impose
+across a wide range of fields.</p>
 
 <p>
-Since then, the US has imposed similar requirements on countries such
-as Australia and Mexico through bilateral &ldquo;free trade&rdquo;
+The US has imposed <abbr>DMCA</abbr> requirements on Australia, New
+Zealand, Panama, Colombia and South Korea through bilateral
 agreements, and on countries such as Costa Rica through another
-treaty, CAFTA.  Ecuador's President Correa refused to sign a
-&ldquo;free trade&rdquo; agreement with the US, but I've heard Ecuador
-had adopted something like the DMCA in 2003.</p>
+treaty, <abbr>CAFTA</abbr>.  Obama has escalated the campaign with two
+new proposed treaties, the TPP and the TTIP.  The <abbr>TPP</abbr>
+would impose the DMCA, along with many other wrongs, on 12 countries
+on the Pacific Ocean.  The <abbr>TTIP</abbr> would impose similar
+strictures on Europe.  Americans should demand their congressional
+representatives reject the attempt to approve the <abbr>TPP</abbr> in
+the lame-duck session after the 2016 election.</p>
+
+<p>
+With Windows Vista, Microsoft admitted it had built in a back door:
+Microsoft can use it to forcibly install software
+&ldquo;upgrades,&rdquo; even if users consider them rather to be
+downgrades.  It can also order all machines running Vista to refuse to
+run a certain device driver.  The main purpose of Vista's clampdown on
+users was to impose DRM that users can't overcome.</p>
+
+<p>
+Even the World Wide Web Consortium has fallen under the shadow of the
+copyright industry; it is on the verge of approving a DRM system as an
+official part of the web specifications.</p>
+
+<p>
+Nonfree software tends to have <a href="/proprietary/">abusive
+features of many kinds</a>, which support the conclusion that
+<a href="/philosophy/free-software-even-more-important.html">you can
+never trust a nonfree program</a>.  We must insist on free (libre)
+software only, and reject nonfree programs.</p>
 
 <p>
 One of the ideas in the story was not proposed in reality until 2002.
@@ -232,15 +247,9 @@
 them.</p>
 
 <p>
-The proponents of this scheme have given it names such as
-&ldquo;trusted computing&rdquo; and &ldquo;Palladium&rdquo;.  We call
-it <a href="/philosophy/can-you-trust.html">&ldquo;treacherous
-computing&rdquo;</a> because the effect is to make your computer obey
-companies even to the extent of disobeying and defying you.  This was
-implemented in 2007 as part of <a href="http://badvista.org/";>Windows
-Vista</a>; we expect Apple to do something similar.  In this scheme,
-it is the manufacturer that keeps the secret code, but
-the FBI would have little trouble getting it.</p>
+The proponents of this scheme gave early versions names such as
+&ldquo;trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as
+ultimately put into use, it is called &ldquo;secure boot&rdquo;.</p>
 
 <p>
 What Microsoft keeps is not exactly a password in the traditional
@@ -248,34 +257,37 @@
 signature and encryption key that corresponds to a second key stored
 in your computer.  This enables Microsoft, and potentially any web
 sites that cooperate with Microsoft, the ultimate control over what
-the user can do on his own computer.</p>
-
-<p>
-Vista also gives Microsoft additional powers; for instance, Microsoft
-can forcibly install upgrades, and it can order all machines running
-Vista to refuse to run a certain device driver.  The main purpose of
-Vista's many restrictions is to impose DRM (Digital Restrictions
-Management) that users can't overcome.  The threat of DRM is why we
-have established the <a href="http://DefectiveByDesign.org";>
-Defective by Design</a> campaign.</p>
-
-<p>
-When this story was first written, the SPA was threatening small
-Internet service providers, demanding they permit the SPA to monitor
-all users.  Most ISPs surrendered when threatened, because they cannot
-afford to fight back in court.  One ISP, Community ConneXion in
-Oakland, California, refused the demand and was actually sued.  The
-SPA later dropped the suit, but obtained the DMCA, which gave them the
-power they sought.</p>
-
-<p>
-The SPA, which actually stands for Software Publishers Association,
-has been replaced in its police-like role by the Business
-Software Alliance.  The BSA is not, today, an official police force;
-unofficially, it acts like one.  Using methods reminiscent of the
-erstwhile Soviet Union, it invites people to inform on their coworkers
-and friends.  A BSA terror campaign in Argentina in 2001 made
-slightly veiled threats that people sharing software would be raped.</p>
+the user can do on per own computer.  Microsoft is likely to use that
+control on behalf of the <abbr>FBI</abbr> when asked: it
+already <a href="http://gnu.org/proprietary/malware-microsoft.html";>shows
+the <abbr>NSA</abbr> security bugs in Windows</a> to exploit.</p>
+
+<p>
+Secure boot can be implemented in a way that permits the user to
+specify the signature key and decide what software to sign.  In
+practice, PCs designed for Windows 10 carry only Microsoft's key, and
+whether the machine's owner can install any other system (such as
+GNU/Linux) is under Microsoft's control.  We call this <em>restricted
+boot</em>.</p>
+
+<p>
+In 1997, when this story was first published, the <abbr>SPA</abbr> was
+threatening small Internet service providers, demanding they permit
+the <abbr>SPA</abbr> to monitor all users.  Most ISPs surrendered when
+threatened, because they could not afford to fight back in court.  One
+ISP, Community ConneXion in Oakland, California, refused the demand
+and was actually sued.  The <abbr>SPA</abbr> later dropped the suit,
+but the <abbr>DMCA</abbr> gave it the power it sought.</p>
+
+<p>
+The <abbr>SPA</abbr>, which actually stands for Software Publishers
+Association, has been replaced in its police-like role by the Business
+Software Alliance.  The <abbr>BSA</abbr> is not, today, an official
+police force; unofficially, it acts like one.  Using methods
+reminiscent of the erstwhile Soviet Union, it invites people to inform
+on their coworkers and friends.  A <abbr>BSA</abbr> terror campaign in
+Argentina in 2001 made slightly veiled threats that people sharing
+software would be raped in prison.</p>
 
 <p>
 The university security policies described above are not imaginary.
@@ -307,26 +319,42 @@
 <p>
 The battle for the right to read is already in progress,
 The enemy is organized, while we are not, so it is going against us.
-Here are articles about bad things that have happened since the
-original publication of this article.</p>
+</p>
+
+Today's commercial
+ebooks <a href="/philosophy/the-danger-of-ebooks.html"> abolish
+readers' traditional freedoms.</a>  Amazon's e-book reader product,
+which I call the &ldquo;Amazon Swindle&rdquo; because it's designed to
+swindle readers out of the traditional freedoms of readers of books,
+is run by software with several
+demonstrated <a 
href="http://gnu.org/proprietary/malware-kindle-swindle.html";>Orwellian
+functionalities</a>.  Any one of them calls for rejecting the product
+completely:</p>
 
 <ul>
-<li>Today's commercial ebooks <a href="/philosophy/the-danger-of-ebooks.html">
-     abolish readers' traditional freedoms.</a></li>
-<li><a href="http://www.nature.com/nature_education/biology.html";>
-     A "biology textbook" web site</a> that you can access only by signing
-     a <a href="http://www.nature.com/principles/viewTermsOfUse";>
-     contract not to lend it to anyone else</a>, which the publisher can
-     revoke at will.</li>
-<li><a 
href="http://www.zdnet.com/article/seybold-opens-chapter-on-digital-books/";>Electronic
-     Publishing:</a> An article about distribution of books in
-     electronic form, and copyright issues affecting the right to read
-     a copy.</li>
-<li><a 
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx";>Books
-     inside Computers:</a> Software to control who can read
-     books and documents on a PC.</li>
+<li><p>It spies on everything the user does: it reports which book the
+user is reading, and which page, and it reports when the user highlights
+text, and any notes the user enters.</p></li>
+
+<li><p>It has <abbr>DRM</abbr>, which is intended to block users from
+sharing copies.</p></li>
+
+<li><p>It has a back door with which Amazon can remotely erase any book.
+In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
+
+<li><p>In case all that isn't Orwellian enough, there is a universal
+back door with which Amazon can remotely change the software, and
+introduce any other form of nastiness.</p></li>
 </ul>
 
+<p>Amazon's e-book distribution is oppressive, too.  It identifies the
+user and records what books the user obtains.  It also also requires
+users to agree to an antisocial contract that they won't share copies
+with others.  My conscience tells me that, if I had agreed to such a
+contract, that the lesser evil would be to defy it and share copies
+anyway; however, to be entirely good, we should not agree to it in the
+first place.</p>
+
 <p>If we want to stop the bad news and create some good news, we need
 to organize and fight.  The
 FSF's <a href="http://defectivebydesign.org";> Defective by Design</a>
@@ -432,7 +460,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/06/30 09:26:07 $
+$Date: 2016/07/13 17:04:49 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]