www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy right-to-read.html surveillance-...


From: Therese Godefroy
Subject: www/philosophy right-to-read.html surveillance-...
Date: Sun, 6 Nov 2016 21:17:44 +0000 (UTC)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 16/11/06 21:17:44

Modified files:
        philosophy     : right-to-read.html 
                         surveillance-vs-democracy.html 

Log message:
        Fix HTML and style for 2-column layout.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.html?cvsroot=www&r1=1.45&r2=1.46

Patches:
Index: right-to-read.html
===================================================================
RCS file: /webcvs/www/www/philosophy/right-to-read.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- right-to-read.html  18 Oct 2016 16:06:55 -0000      1.102
+++ right-to-read.html  6 Nov 2016 21:17:43 -0000       1.103
@@ -3,30 +3,60 @@
 <title>The Right to Read
 - GNU Project - Free Software Foundation</title>
 <style type="text/css" media="print,screen"><!--
-hr { margin: 1.2em 0; }
-#content ul li p { margin-top: 1em; }
-#AuthorsNote ul li { margin-top: 1.3em; }
-#content div.announcement { margin-bottom: 2em; }
+.info {
+   margin: 0 0 1.5em;
+}
+.announcement {
+   text-align: center;
+   margin: 2em 3%;
+   background: #f5f5f5;
+   border-right: .3em solid #fc7;
+}
+#AuthorsNote ul, #AuthorsNote li {
+   margin: 0;
+}
+#AuthorsNote li p {
+   margin-top: 1em;
+}
+#AuthorsNote li p.emph-box {
+   margin: .5em 3%;
+   background: #f7f7f7;
+   border-color: #e74c3c;
+}
address@hidden (min-width: 53em) {
+   .announcement {
+      width: 75%;
+      margin: 2em auto;
+   }
+   #AuthorsNote .columns > p:first-child,
+    #AuthorsNote li p.inline-block {
+      margin-top: 0;
+   }
+   #AuthorsNote .columns p.emph-box {
+      margin: .5em 6%;
+   }
+}
 --></style>
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>The Right to Read</h2>
+<h2 class="center">The Right to Read</h2>
 
-<p>
+<p class="byline center">
 by <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
-
-<p>
+<p class="center">
 <em>This article appeared in the February 1997 issue
 of <cite>Communications of the ACM</cite> (Volume 40, Number
 2).</em></p>
-<hr />
+<hr class="thin" />
 
-<blockquote><p>
+<div class="article">
+<blockquote class="info center"><p>
             From <cite>The Road To Tycho</cite>, a collection of
             articles about the antecedents of the Lunarian
             Revolution, published in Luna City in 2096.
 </p></blockquote>
 
+<div class="columns">
 <p>
 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
 Lenz asked to borrow his computer.  Hers had broken down, and unless
@@ -62,7 +92,10 @@
 fees went to the researchers who wrote the papers; since Dan aimed for
 an academic career, he could hope that his own research papers, if
 frequently referenced, would bring in enough to repay this loan.)</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Later on, Dan would learn there was a time when anyone could go to the
 library and read journal articles, and even books, without having to
@@ -106,7 +139,10 @@
 knowing your computer's root password.  And neither
 the FBI nor
 Microsoft Support would tell you that.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Dan concluded that he couldn't simply lend Lissa his computer.  But he
 couldn't refuse to help her, because he loved her.  Every chance to
@@ -143,7 +179,10 @@
 using computers.  Previously, universities maintained a different
 approach to student discipline; they punished activities that were
 harmful, not those that merely raised suspicion.</p>
+</div>
+<div class="column-limit"></div>
 
+<div class="columns">
 <p>
 Lissa did not report Dan to the SPA.  His decision to help her led to
 their marriage, and also led them to question what they had been
@@ -153,6 +192,7 @@
 to Luna, where they found others who had likewise gravitated away from
 the long arm of the SPA.  When the Tycho Uprising began in 2062, the
 universal right to read soon became one of its central aims.</p>
+</div>
 
 <div class="announcement">
 <blockquote>
@@ -163,35 +203,46 @@
 <div id="AuthorsNote">
 <h3>Author's Notes</h3>
 
-<ul>
-<li>This story is supposedly a historical article that will be written in
+<ul class="no-bullet">
+<li>
+<div class="columns">
+<p>This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
 I have tried to project it forwards into something more visibly
 oppressive. See <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
+</p>
+</div>
+<div class="column-limit"></div>
 </li>
 
 <li>
+<div class="reduced-width">
 <p>Computer-enforced restrictions on lending or reading books (and other
 kinds of published works) are known as DRM, short for
 &ldquo;Digital Restrictions Management&rdquo;.  To
 eliminate DRM, the Free Software Foundation has
 established the <a href="http://DefectiveByDesign.org";>Defective by
 Design</a> campaign.  We ask for your support.</p>
-</li>
 
-<li>
 <p>The Electronic Frontier Foundation, a separate organization not
 related to the Free Software Foundation, also campaigns against
 DRM.</p>
+</div>
+<div class="column-limit"></div>
 </li>
+</ul>
 
-<li>
+<blockquote class="info center">
 <p>The following note has been updated several times since the first
 publication of the story.</p>
+</blockquote>
 
+<ul class="no-bullet">
+<li>
+<div class="columns">
 <p>
 The battle for the right to read is already being fought.  Although it
 may take 50 years for our past freedoms to fade into obscurity, most
@@ -228,15 +279,20 @@
 Even the World Wide Web Consortium has fallen under the shadow of the
 copyright industry; it is on the verge of approving a DRM system as an
 official part of the web specifications.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
-<p>
+<li>
+<div class="columns">
+<p class="emph-box">
 Nonfree software tends to have <a href="/proprietary/">abusive
 features of many kinds</a>, which lead to the conclusion that
 <a href="/philosophy/free-software-even-more-important.html">you can
 never trust a nonfree program</a>.  We must insist on free (libre)
 software only, and reject nonfree programs.</p>
 
-<p>
+<p class="inline-block">
 With Windows Vista, Microsoft admitted it had built in a back door:
 Microsoft can use it to forcibly install software
 &ldquo;upgrades,&rdquo; even if users consider them rather to be
@@ -244,7 +300,12 @@
 run a certain device driver.  The main purpose of Vista's clampdown on
 users was to impose DRM that users can't overcome.  Of course, Windows
 10 is no better</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 One of the ideas in the story was not proposed in reality until 2002.
 This is the idea that the FBI and Microsoft will keep the
@@ -274,7 +335,12 @@
 whether the machine's owner can install any other system (such as
 GNU/Linux) is under Microsoft's control.  We call this <em>restricted
 boot</em>.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="columns">
 <p>
 In 1997, when this story was first published, the SPA was
 threatening small Internet service providers, demanding they permit
@@ -293,7 +359,12 @@
 on their coworkers and friends.  A BSA terror campaign in
 Argentina in 2001 made slightly veiled threats that people sharing
 software would be raped in prison.</p>
+</div>
+<div class="column-limit"></div>
+</li>
 
+<li>
+<div class="reduced-width">
 <p>
 The university security policies described above are not imaginary.
 For example, a computer at one Chicago-area university displayed this
@@ -315,12 +386,15 @@
 <p>
 This is an interesting approach to the Fourth Amendment: pressure most
 everyone to agree, in advance, to waive their rights under it.</p>
+</div>
 </li>
 </ul>
+<div class="column-limit"></div>
 </div>
 
 <h3 id="BadNews">Bad News</h3>
 
+<div class="columns">
 <p>
 The battle for the right to read is going against us so far.
 The enemy is organized, and we are not.
@@ -344,10 +418,10 @@
 <li><p>It has DRM, which is intended to block users from
 sharing copies.</p></li>
 
-<li><p>It has a back door with which Amazon can remotely erase any book.
+<li><p class="inline-block">It has a back door with which Amazon can remotely 
erase any book.
 In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
 
-<li><p>In case all that isn't Orwellian enough, there is a universal
+<li><p class="inline-block">In case all that isn't Orwellian enough, there is 
a universal
 back door with which Amazon can remotely change the software, and
 introduce any other form of nastiness.</p></li>
 </ul>
@@ -369,6 +443,7 @@
 our work more generally.  There is also a <a href="/help/help.html">list of 
ways
 to participate in our work</a>.
 </p>
+</div>
 
 <h3 id="References">References</h3>
 
@@ -394,13 +469,7 @@
        reverse the overextension of copyright and patent powers.</li>
 </ul>
 
-<hr />
-<blockquote id="fsfs"><p class="big">This essay is published
-in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
-Software, Free Society: The Selected Essays of Richard
-M. Stallman</cite></a>.</p></blockquote>
-
-<h5>Other Texts to Read</h5>
+<h4>Other Texts to Read</h4>
 
 <ul>
        <li><a href="/philosophy/philosophy.html">Philosophy of the
@@ -409,6 +478,13 @@
                id="copy-protection">Copy Protection: Just Say No</a>,
                published in Computer World.</li>
 </ul>
+</div>
+
+<hr class="thin" />
+<blockquote id="fsfs"><p class="big">This essay is published
+in <a href="http://shop.fsf.org/product/free-software-free-society/";><cite>Free
+Software, Free Society: The Selected Essays of Richard
+M. Stallman</cite></a>.</p></blockquote>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -467,7 +543,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/18 16:06:55 $
+$Date: 2016/11/06 21:17:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: surveillance-vs-democracy.html
===================================================================
RCS file: /webcvs/www/www/philosophy/surveillance-vs-democracy.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- surveillance-vs-democracy.html      22 Oct 2016 18:17:37 -0000      1.45
+++ surveillance-vs-democracy.html      6 Nov 2016 21:17:43 -0000       1.46
@@ -2,19 +2,31 @@
 <!-- Parent-Version: 1.77 -->
 <title>How Much Surveillance Can Democracy Withstand?
 - GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--></style>
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.html" -->
-<h2>How Much Surveillance Can Democracy Withstand?</h2>
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
 
-<p>by <a href="http://www.stallman.org/";>Richard Stallman</a></p>
+<p class="byline center">by <a href="http://www.stallman.org/";>Richard 
Stallman</a></p>
 
 <!-- rms: I deleted the link because of Wired's announced
      anti-ad-block system -->
-<blockquote><p>A version of this article was first published in Wired
+<blockquote class="center"><p>A version of this article was first published in 
Wired
 in October 2013.</p></blockquote>
 
-<div class="pict medium">
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /></a>
 <p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
@@ -30,7 +42,8 @@
 is not exceeded?  It is the level beyond which surveillance starts to
 interfere with the functioning of democracy, in that whistleblowers
 (such as Snowden) are likely to be caught.</p>
-
+</div>
+<div class="columns" style="clear:both">
 <p>Faced with government secrecy, we the people depend on
 whistleblowers
 to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama";>tell
@@ -60,9 +73,11 @@
 suffice to protect whistleblowers if &ldquo;catching the
 whistleblower&rdquo; is grounds for access sufficient to identify him
 or her.  We need to go further.</p>
+</div>
 
-<h3>The Upper Limit on Surveillance in a Democracy</h3>
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a 
Democracy</h3>
 
+<div class="columns">
 <p>If whistleblowers don't dare reveal crimes and lies, we lose the
 last shred of effective control over our government and institutions.
 That's why surveillance that enables the state to find out who has
@@ -91,9 +106,11 @@
 that there might be terrorists among them.  The point at which
 surveillance is too much is the point at which the state can find who
 spoke to a known journalist or a known dissident.</p>
+</div>
 
-<h3>Information, Once Collected, Will Be Misused</h3>
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
 
+<div  class="columns">
 <p>When people recognize that the level of general surveillance is too
 high, the first response is to propose limits on access to the
 accumulated data.  That sounds nice, but it won't fix the problem, not
@@ -140,9 +157,11 @@
 launch a massive fishing expedition against any person.  To make
 journalism and democracy safe, we must limit the accumulation of data
 that is easily accessible to the state.</p>
+</div>
 
-<h3>Robust Protection for Privacy Must Be Technical</h3>
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
 
+<div class="columns">
 <p>The Electronic Frontier Foundation and other organizations propose
 a set of legal principles designed to <a
 href="https://en.necessaryandproportionate.org/text";>prevent the
@@ -170,9 +189,11 @@
 regime would have to implement surveillance afresh, and it would only
 collect data starting at that date.  As for suspending or momentarily
 ignoring this law, the idea would hardly make sense.</p>
+</div>
 
-<h3>First, Don't Be Foolish</h3>
+<h3 class="subheader">First, Don't Be Foolish</h3>
 
+<div class="columns">
 <p>To have privacy, you must not throw it away: the first one who has
 to protect your privacy is you.  Avoid identifying yourself to web
 sites, contact them with Tor, and use browsers that block the schemes
@@ -213,9 +234,11 @@
 movements, but not all of them.  Clearly, the better solution is to
 make all these systems stop surveilling people other than legitimate
 suspects.</p>
+</div>
 
-<h3>We Must Design Every System for Privacy</h3>
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
 
+<div class="columns">
 <p>If we don't want a total surveillance society, we must consider
 surveillance a kind of social pollution, and limit the surveillance
 impact of each new digital system just as we limit the environmental
@@ -233,9 +256,11 @@
 period.  The same benefit, with no surveillance!</p>
 
 <p>We need to design such privacy into all our digital systems.</p>
+</div>
 
-<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
 
+<div class="columns">
 <p>One way to make monitoring safe for privacy is
 to <a name="dispersal">keep the data dispersed and inconvenient to
 access</a>.  Old-fashioned security cameras were no threat to privacy(<a 
href="#privatespace">*</a>).
@@ -267,9 +292,11 @@
 camera points at the inside of a store, or at the street.  Any camera
 pointed at someone's private space by someone else violates privacy,
 but that is another issue.</p>
+</div>
 
-<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce 
Surveillance</h3>
 
+<div class="columns">
 <p>Most data collection comes from people's own digital activities.
 Usually the data is collected first by companies.  But when it comes
 to the threat to privacy and democracy, it makes no difference whether
@@ -325,9 +352,11 @@
 customers' credit card details.  An anonymous payment system would end
 this danger: a security hole in the site can't hurt you if the site
 knows nothing about you.</p>
+</div>
 
-<h3>Remedy for Travel Surveillance</h3>
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
 
+<div class="columns">
 <p>We must convert digital toll collection to anonymous payment (using
 digital cash, for instance).  License-plate recognition systems
 recognize all license plates, and
@@ -382,9 +411,11 @@
 remains &ldquo;out&rdquo; for too long, the station where it was
 borrowed can inform headquarters; in that case, it could send the
 borrower's identity immediately.</p>
+</div>
 
-<h3>Remedy for Communications Dossiers</h3>
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
 
+<div class="columns">
 <p>Internet service providers and telephone companies keep extensive
 data on their users' contacts (browsing, phone calls, etc).  With
 mobile phones, they
@@ -422,9 +453,11 @@
 some user of my email service, and my email service would know only
 that I received mail from some user of your email service, but it
 would be hard to determine that you had sent mail to me.</p>
+</div>
 
-<h3>But Some Surveillance Is Necessary</h3>
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
 
+<div class="columns">
 <p>For the state to find criminals, it needs to be able to investigate
 specific crimes, or specific suspected planned crimes, under a court
 order.  With the Internet, the power to tap phone conversations would
@@ -458,9 +491,10 @@
 
 <p>However, journalism must be protected from surveillance even when
 it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
 
-<hr />
-
+<div class="reduced-width">
 <p>Digital technology has brought about a tremendous increase in the
 level of surveillance of our movements, actions, and communications.
 It is far more than we experienced in the 1990s, and <a
@@ -480,6 +514,8 @@
 a grave surveillance deficit, and ought to be surveilled more than the
 Soviet Union and East Germany were, we must reverse this increase.
 That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -538,7 +574,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/22 18:17:37 $
+$Date: 2016/11/06 21:17:43 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]