[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/po/who-does-that-server-really-s...
From: |
GNUN |
Subject: |
www philosophy/po/who-does-that-server-really-s... |
Date: |
Mon, 20 Nov 2017 18:59:18 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/11/20 18:59:18
Modified files:
philosophy/po : who-does-that-server-really-serve.translist
who-does-that-server-really-serve.zh-cn.po
proprietary/po : malware-microsoft.ja-diff.html
proprietary-surveillance.it-diff.html
proprietary-surveillance.ja-diff.html
Added files:
philosophy : who-does-that-server-really-serve.zh-cn.html
philosophy/po : who-does-that-server-really-serve.zh-cn-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.zh-cn.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.translist?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.zh-cn.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.zh-cn-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.45&r2=1.46
Patches:
Index: philosophy/po/who-does-that-server-really-serve.translist
===================================================================
RCS file:
/web/www/www/philosophy/po/who-does-that-server-really-serve.translist,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- philosophy/po/who-does-that-server-really-serve.translist 4 Aug 2017
07:59:41 -0000 1.19
+++ philosophy/po/who-does-that-server-really-serve.translist 20 Nov 2017
23:59:18 -0000 1.20
@@ -18,6 +18,7 @@
<span dir="ltr"><a lang="ro" hreflang="ro"
href="/philosophy/who-does-that-server-really-serve.ro.html">românÄ</a> [ro]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/philosophy/who-does-that-server-really-serve.ru.html">ÑÑÑÑкий</a> [ru]</span>
<span dir="ltr"><a lang="uk" hreflang="uk"
href="/philosophy/who-does-that-server-really-serve.uk.html">ÑкÑаÑнÑÑка</a> [uk]</span>
+<span dir="ltr"><a lang="zh-cn" hreflang="zh-cn"
href="/philosophy/who-does-that-server-really-serve.zh-cn.html">ç®ä½ä¸æ</a> [zh-cn]</span>
</p>
</div>' -->
<link rel="alternate" type="text/html"
href="/philosophy/who-does-that-server-really-serve.html" hreflang="x-default"
/>
@@ -37,4 +38,5 @@
<link rel="alternate" type="text/html" lang="ro" hreflang="ro"
href="/philosophy/who-does-that-server-really-serve.ro.html" title="românÄ" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/philosophy/who-does-that-server-really-serve.ru.html"
title="ÑÑÑÑкий" />
<link rel="alternate" type="text/html" lang="uk" hreflang="uk"
href="/philosophy/who-does-that-server-really-serve.uk.html"
title="ÑкÑаÑнÑÑка" />
+<link rel="alternate" type="text/html" lang="zh-cn" hreflang="zh-cn"
href="/philosophy/who-does-that-server-really-serve.zh-cn.html"
title="ç®ä½ä¸æ" />
<!-- end translist file -->
Index: philosophy/po/who-does-that-server-really-serve.zh-cn.po
===================================================================
RCS file:
/web/www/www/philosophy/po/who-does-that-server-really-serve.zh-cn.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- philosophy/po/who-does-that-server-really-serve.zh-cn.po 20 Nov 2017
23:52:40 -0000 1.3
+++ philosophy/po/who-does-that-server-really-serve.zh-cn.po 20 Nov 2017
23:59:18 -0000 1.4
@@ -95,11 +95,11 @@
msgid ""
"Our solution to this problem is developing <em>free software</em> and "
"rejecting proprietary software. Free software means that you, as a user, "
-"have four essential freedoms: (0) to run the program as you wish, "
-"(1) to study and change the source code so it does what you wish, "
-"(2) to redistribute exact copies, and (3) to redistribute copies "
-"of your modified versions. (See the <a href=\"/philosophy/free-sw.html"
-"\">free software definition</a>.)"
+"have four essential freedoms: (0) to run the program as you wish, (1)"
+" to study and change the source code so it does what you wish, (2) "
+"to redistribute exact copies, and (3) to redistribute copies of your "
+"modified versions. (See the <a href=\"/philosophy/free-sw.html\">free "
+"software definition</a>.)"
msgstr ""
"æ们对æ¤ç解å³æ¹æ¡æ¯å¼å<em>èªç±è½¯ä»¶</em>并æç»ä¸å±è½¯ä»¶ãèªç±è½¯ä»¶æå³çï¼ä½
ï¼"
"ä½ä¸ºä¸ä¸ªç¨æ·ï¼æ¥æå项åºæ¬èªç±ï¼(0) æç
§èªç±çææ¿è¿è¡è¯¥è½¯ä»¶ï¼(1) "
Index: proprietary/po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/malware-microsoft.ja-diff.html 7 Nov 2017 09:33:14
-0000 1.10
+++ proprietary/po/malware-microsoft.ja-diff.html 20 Nov 2017 23:59:18
-0000 1.11
@@ -301,10 +301,16 @@
user's computer and their use of the computer.</p>
<p>Furthermore, for users who installed the fourth stable build of
-Windows 10, called the “Creators Update,” Windows maximized the
+Windows 10, called the “Creators Update”, Windows maximized the
surveillance <a
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
-by force setting the telemetry mode to
“Full”</a>.</p></li>
+ by force setting the telemetry mode to
“Full”</a>.</p>
+
+<p>The “Full” telemetry mode, allows Microsoft Windows
+ engineers to access, <a
href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">among
other things</a>, registry keys
+ <a
href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
+ can contain sensitive information like administrator's login
+ password</a>.</p></li>
<li><p>Windows DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
@@ -505,7 +511,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/07 09:33:14 $
+$Date: 2017/11/20 23:59:18 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-surveillance.it-diff.html 19 Nov 2017
09:30:41 -0000 1.31
+++ proprietary/po/proprietary-surveillance.it-diff.html 20 Nov 2017
23:59:18 -0000 1.32
@@ -190,11 +190,16 @@
<li><p>Windows <span class="inserted"><ins><em>10 telemetry
program sends information to Microsoft about the
user's computer and their use of the computer.</p>
-<p>Furthermore, for users who installed the fourth stable build of
-Windows 10, called the “Creators Update,” Windows maximized the
-surveillance <a
-href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
-by force setting the telemetry mode to
“Full”</a>.</p></li>
+ <p>Furthermore, for users who installed the fourth stable build of
+ Windows 10, called the “Creators Update”, Windows maximized
the
+ surveillance<a
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
+ by force setting the telemetry mode to
“Full”</a>.</p>
+
+ <p>The “Full” telemetry mode, allows Microsoft Windows
+ engineers to access, <a
href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">among
other things</a>, registry keys
+ <a
href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
+ can contain sensitive information like administrator's login
+ password</a>.</p></li>
<li><p>Windows</em></ins></span> DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
@@ -619,11 +624,12 @@
</div>
<ul>
- <span class="inserted"><ins><em><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></li></em></ins></span>
+ <span class="removed"><del><strong><li><p>According to Edward
Snowden,</strong></del></span>
+ <span class="inserted"><ins><em><li><p>Some portable
phones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over</strong></del></span> <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
<li><p>According to Edward Snowden,
- <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over</em></ins></span> smartphones</a>
by sending hidden text messages which enable them to turn the phones
on and off, listen to the microphone, retrieve geo-location data from the
GPS, take photographs, read text messages, read call, location and web
@@ -676,8 +682,6 @@
</div>
<ul>
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of
surveillance,</strong></del></span>
<span class="inserted"><ins><em><li><p>The Sarahah app
<a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
@@ -691,10 +695,10 @@
on what people are listening to or watching</a>. In addition, it may
be analyzing people's conversations to serve them with targeted
advertisements.</p>
- </li>
+ </li></em></ins></span>
<li>
- <p>Faceapp appears to do lots of
surveillance,</em></ins></span> judging by
+ <p>Faceapp appears to do lots of surveillance, judging by
<a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access it demands to personal data in the
device</a>.
</p>
@@ -1011,22 +1015,26 @@
<ul>
<li>
- <span class="inserted"><ins><em><p>Every “home security”
camera, if its manufacturer can communicate with it,
- is a surveillance device. <a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ <span class="removed"><del><strong><p>The Nest Cam
“smart” camera</strong></del></span>
+ <span class="inserted"><ins><em><p>Every “home security”
camera, if its manufacturer can communicate with it,</em></ins></span>
+ is <span class="inserted"><ins><em>a surveillance
device.</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+<span
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer, based on
the fact
- that the device is tethered to a server.</p>
+ <p>The article describes wrongdoing by</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>manufacturer, based on</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>fact
+ that the device</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>tethered to a server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
<p>But it also demonstrates that the device gives the company
surveillance capability.</p>
</li>
- <li></em></ins></span>
+ <li>
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using it
to outsmart
+ <p>A “smart” device means the manufacturer is
using</em></ins></span> it to outsmart
you.</p>
</li>
</ul>
@@ -1116,10 +1124,7 @@
<div style="clear: left;"></div>
<ul>
- <span class="removed"><del><strong><li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot</strong></del></span>
- <span class="inserted"><ins><em><li><p>Lots</em></ins></span> of
<span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>“smart” products are
+ <span class="inserted"><ins><em><li><p>Lots of
“smart” products are
designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
listen to everyone in the house, all the time</a>.</p>
@@ -1127,11 +1132,11 @@
making a device that can obey your voice commands without
potentially spying on you. Even if it is air-gapped, it could be
saving up records about you for later examination.</p>
- </li>
+ </li></em></ins></span>
<li><p>Nest thermometers
send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data</em></ins></span> about the user</a>.</p>
+ lot of data about the user</a>.</p>
</li>
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
@@ -1576,7 +1581,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/19 09:30:41 $
+$Date: 2017/11/20 23:59:18 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-surveillance.ja-diff.html 19 Nov 2017
09:30:41 -0000 1.45
+++ proprietary/po/proprietary-surveillance.ja-diff.html 20 Nov 2017
23:59:18 -0000 1.46
@@ -190,11 +190,16 @@
<span class="inserted"><ins><em><li><p>Windows 10 telemetry
program sends information to Microsoft about the
user's computer and their use of the computer.</p>
-<p>Furthermore, for users who installed the fourth stable build of
-Windows 10, called the “Creators Update,” Windows maximized the
-surveillance <a
-href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
-by force setting the telemetry mode to
“Full”</a>.</p></li>
+ <p>Furthermore, for users who installed the fourth stable build of
+ Windows 10, called the “Creators Update”, Windows maximized
the
+ surveillance<a
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
+ by force setting the telemetry mode to
“Full”</a>.</p>
+
+ <p>The “Full” telemetry mode, allows Microsoft Windows
+ engineers to access, <a
href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">among
other things</a>, registry keys
+ <a
href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
+ can contain sensitive information like administrator's login
+ password</a>.</p></li>
<li><p>Windows DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
@@ -389,10 +394,7 @@
just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>read logs
for</em></ins></span> other <span
class="removed"><del><strong>snooping.</p>
</li>
- <li><p>Gratis Android</strong></del></span> apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
and <span class="removed"><del><strong>advertising</a> URLs,
- on the average.</p></strong></del></span> <span
class="inserted"><ins><em>also core system logs. TigerVPN developers
+ <li><p>Gratis Android</strong></del></span> apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free
software</a>)</strong></del></span> <span class="inserted"><ins><em>and
also core system logs. TigerVPN developers
have confirmed this.</dd>
<dt>HideMyAss</dt>
@@ -496,10 +498,10 @@
analyze what users are doing or how. “Analytics” tools that
snoop are
just as wrong as any other snooping.</p>
</li>
- <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)</em></ins></span>
connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on the average.</p></em></ins></span>
+ on the average.</p>
</li>
<li><p>Spyware is present in some Android devices when they are
sold.
Some Motorola phones modify Android to
@@ -1611,7 +1613,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/19 09:30:41 $
+$Date: 2017/11/20 23:59:18 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/who-does-that-server-really-serve.zh-cn.html
===================================================================
RCS file: philosophy/who-does-that-server-really-serve.zh-cn.html
diff -N philosophy/who-does-that-server-really-serve.zh-cn.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ philosophy/who-does-that-server-really-serve.zh-cn.html 20 Nov 2017
23:59:18 -0000 1.1
@@ -0,0 +1,236 @@
+<!--#set var="ENGLISH_PAGE"
value="/philosophy/who-does-that-server-really-serve.en.html" -->
+
+<!--#include virtual="/server/header.zh-cn.html" -->
+<!-- Parent-Version: 1.79 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>æå¡å¨ç©¶ç«ä¸ºè°æå¡ï¼ - GNUå·¥ç¨ -
èªç±è½¯ä»¶åºéä¼</title>
+
+<!--#include
virtual="/philosophy/po/who-does-that-server-really-serve.translist" -->
+<!--#include virtual="/server/banner.zh-cn.html" -->
+<h2>æå¡å¨ç©¶ç«ä¸ºè°æå¡ï¼</h2>
+
+<p><strong>Richard Stallman</strong> è</p>
+
+<blockquote><p>ï¼æ¬æ第ä¸çå表äº<a
+href="http://www.bostonreview.net/richard-stallman-free-software-DRM">波士顿è¯è®º</a>ãï¼</p></blockquote>
+
+<p><strong>å¨ç½ç»ä¸ï¼ä¸å±è½¯ä»¶ä¸æ¯å¯ä¸è®©ä½
失å»èªç±çéå¾ãæå¡ä»£æ¿è½¯ä»¶ï¼æå«SaaSSï¼å°±æ¯å¦ä¸ä¸ªè®©ä½
æ计ç®äº¤ç»å«äººçéå¾ã</strong></p>
+
+<p>åºæ¬çè§ç¹æ¯ï¼ä½ å¯ä»¥æ§å¶å
¶ä»äººç¼åçç¨åºï¼å¦æå®æ¯èªç±è½¯ä»¶ï¼ï¼ä½æ¯ä½
æ°¸è¿ä¸è½æ§å¶å
¶ä»äººæ§è¡çæå¡ï¼æ以ååä¸å¨ç¨åºè½å¤å®æä»»å¡çæ¶åï¼ä¸è¦ä½¿ç¨æå¡ã</p>
+
+
+<p>SaaSSæå³ç使ç¨ä»äººå®ç°çæå¡æ¥ä»£æ¿è¿è¡ä½
èªå·±ç软件ã该æ¯è¯æ¯æ们ç¨çï¼å
¶ä»æç«
å广åä¸ä¼ä½¿ç¨å®ï¼å¹¶ä¸ä»ä»¬ä¸ä¼åè¯ä½
ä¸é¡¹æå¡æ¯å¦ä¸ºSaaSSãå¦ä¸æ¹é¢ï¼ä»ä»¬å¯è½ä¼ç¨å«ç³ååæ£æ³¨æåç“五è¿ä¸æ¯è¯ï¼å®æSaaSSåå
¶ä»ä¸äºå®è·µæå¨ä¸èµ·ï¼å
¶ä¸æçæ¯æ»¥ç¨ï¼æçè¿å¯ä»¥ãéè¿æ¬é¡µç解éå举ä¾ï¼ä½
å°±è½å¤å辨ä¸é¡¹æå¡ç©¶ç«æ¯ä¸æ¯SaaSSã</p>
+
+<h3>èæ¯ï¼ä¸å±è½¯ä»¶å¦ä½æ¿èµ°ä½ çèªç±</h3>
+
+<p>æ°åææ¯è½å¤ç»ä½ èªç±ï¼å®ä¹è½æ¿èµ°ä½
çèªç±ã第ä¸ä¸ªå¯¹æ们èªä¸»æ§å¶è®¡ç®çå¨èæ¥èª<em>ä¸å±è½¯ä»¶</em>å
为å
¶ææè
ï¼è¯¸å¦è¹ææ微软ä¹ç±»çå
¬å¸ï¼ææ§è½¯ä»¶ï¼æ以ç¨æ·æ æ³æ§å¶è¯¥è½¯ä»¶ãå
¶ææè
ç»å¸¸å©ç¨è¿ç§ä¸å
¬å¹³çæåæ¤å
¥æ¶æåè½ï¼æ¯å¦é´è°è½¯ä»¶ãåé¨å<a
+href="http://DefectiveByDesign.org">æ°åæé管çï¼DRMï¼</a>ï¼è¯·åèä»ä»¬å®£ä¼
ç“æ°åçæ管ç”ï¼ã</p>
+
+<p>æ们对æ¤ç解å³æ¹æ¡æ¯å¼å<em>èªç±è½¯ä»¶</em>并æç»ä¸å±è½¯ä»¶ãèªç±è½¯ä»¶æå³çï¼ä½
ï¼ä½ä¸ºä¸ä¸ªç¨æ·ï¼æ¥æå项åºæ¬èªç±ï¼(0) æç
§èªç±çææ¿è¿è¡è¯¥è½¯ä»¶ï¼(1) éè¿å¦ä¹ åä¿®æ¹æºä»£ç
è使软件æç
§èªå·±çææ¿è¿è¡ï¼(2) åååæ¥è½¯ä»¶çæ·è´ï¼(3) ååä¿®æ¹å软件çæ·è´ï¼è¯·åç<a
+href="/philosophy/free-sw.html">èªç±è½¯ä»¶çå®ä¹</a>ãï¼</p>
+
+<p>éè¿ä½¿ç¨èªç±è½¯ä»¶ï¼æ们ä½ä¸ºç¨æ·ï¼æ¿åäºå¯¹æ们计ç®çæ§å¶ãä¸å±è½¯ä»¶ä»ç¶åå¨ï¼ä½æ¯æ们è½å¤æä»ä»¬æé¤å¨æ们ççæ´»ä¹å¤ï¼æ们已ç»åå°äºãå¯æ¯ï¼ç°å¨æå¦ä¸ç§æ¹å¼è¯±ä½¿æ们å²è®©å¯¹è®¡ç®çæ§å¶ï¼æå¡ä»£æ¿è½¯ä»¶ï¼SaaSSï¼ãçå¨èªç±ç份ä¸ï¼æ们ä¹å¿
é¡»æç»å®ã</p>
+
+<h3>æå¡ä»£æ¿è½¯ä»¶å¦ä½æ¿èµ°æ们çèªç±</h3>
+
+<p>æå¡ä»£æ¿è½¯ä»¶ï¼SaaSSï¼æææ¯ä½¿ç¨æå¡ä»£æ¿è¿è¡ç¨åºãå
·ä½å°ï¼å®çæææ¯æ人设置ä¸ä¸ªç½ç»æå¡å¨æ¥ä»äºæç§è®¡ç®å·¥ä½—æ¯å¦ï¼ä¿®æ¹ç
§çãç¿»è¯æ稿ççã—ç¶åé请ç¨æ·ä½¿ç¨è¯¥æå¡å¨å计ç®ã使ç¨æå¡å¨çç¨æ·ä¼æ她çæ°æ®åéå°æå¡å¨ï¼èæå¡å¨ä½¿ç¨è¯¥æ°æ®<em>帮她å计ç®</em>ï¼ç¶åå°ç»æååç»å¥¹æè
ç´æ¥ä»¥å¥¹çåä¹è¡äºã</p>
+
+<p>计ç®æ¯<em>她èªå·±ç</em>å 为ï¼æç
§åå®ï¼ååä¸ï¼å¥¹å¯ä»¥å¨èªå·±ççµèä¸å®æ计ç®ï¼æ
论她ç®åæ¯å¦å¯ä»¥ä½¿ç¨è¯¥ç¨åºï¼ãå¦æ该åå®ä¸æç«ï¼é£ä¹è¿ä¸ªæ
åµä¸æ¯SaaSSã</p>
+
+<p>è¿äºæå¡å¨å¤ºåç¨æ·èªç±çè³æ¯ä¸å±è½¯ä»¶è¿æ æ
ã使ç¨ä¸å±è½¯ä»¶ï¼ç¨æ·é常å¾å°å¯æ§è¡æ件èä¸æ¯æºä»£ç
ãè¿ä½¿å¦ä¹ å
¶ä»£ç
åå¾å°é¾ï¼æ以å¤æ该ç¨åºçæ£çæä½åå¾å°é¾ï¼æ´æ¹å®ä¹åå¾å°é¾ã</p>
+
+<p>使ç¨SaaSSï¼ç¨æ·çè³é½æ²¡æä»äºå
¶è®¡ç®çå¯æ§è¡æ件ï¼å®å¨å«äººçæå¡å¨ä¸ï¼ç¨æ·çä¸å°ä¹æ¸ä¸çãæ以ç¨æ·ä¸å¯è½å¼æ¸
æ¥å®åäºä»ä¹ï¼ä¹ä¸å¯è½æ¹åå®ã</p>
+
+<p>æ´è¿ä¸æ¥ï¼SaaSSèªå¨å°±å¯¼è´äºåæäºä¸å±è½¯ä»¶çæ¶æåè½ç¸åçåæã</p>
+
+<p> ä¾å¦ï¼æäºä¸å±è½¯ä»¶æ¯“é´è°è½¯ä»¶”ï¼è¯¥ç¨åº<a
+href="/philosophy/proprietary-surveillance.html">åå¤åéç¨æ·ç计ç®æ´»å¨æ°æ®</a>ã微软çWindowså°±æç¨æ·çæ´»å¨åéç»å¾®è½¯ãWindowsåªä½ææ¾å¨æ±æ¥æ¯ä¸ªç¨æ·è§çææ¶å¬çå
容ãAmazon
+Kindleæ±æ¥ç¨æ·å¨çåªæ¬ä¹¦çåªä¸é¡µä»¥åä»ä¹æ¶é´ãæ¤æçå°é¸æ±æ¥ç¨æ·çåå²ä½ç½®ã</p>
+
+<p>åä¸å±è½¯ä»¶ä¸åï¼SaaSSä¸éè¦ç§å¯ç代ç
æ¥è·å¾ç¨æ·æ°æ®ãåè¿æ¥ï¼ç¨æ·å¿
é¡»ææ°æ®äº¤ç»æå¡å¨æè½è·å¾æå¡ãè¿åé´è°è½¯ä»¶çææä¸æ
·ï¼æå¡å¨æä½è
è·å¾äºæ°æ®—ä¸å¿
è±åæ°ï¼å
为SaaSSå°±æ¯è¿æ ·çãAmy
+Webbï¼ä»æ¥ä¹æ²¡æè¦å表她女å¿çç
§çï¼é误å°ä½¿ç¨äºSaaSSï¼Instagramï¼æ¥ç¼è¾å¥³å¿çç
§çãæåï¼<a
+href="http://www.slate.com/articles/technology/data_mine_1/2013/09/privacy_facebook_kids_don_t_post_photos_of_your_kids_on_social_media.html">ç
§çè¿æ¯ä»é£éæ³é²äºåºå»</a>ã
+</p>
+
+<p>ç论ä¸ï¼åæå å¯<sup><a
+href="#TransNote1">1</a></sup>å¯è½åå±å°æä¸å¤©æªæ¥çSaaSSæå¡æ
æ³ç解ç¨æ·åæ¥çæäºæ°æ®ãè¿æ ·çæå¡<em>å¯è½</em>æ
æ³çª¥æ¢ç¨æ·ï¼è¿å¹¶ä¸æå³çä»ä»¬<em>ä¸å</em>窥æ¢ã</p>
+
+<p>æäºä¸å±è½¯ä»¶å¸¦æå
¨å±åé¨ï¼å®å
许è¿ç¨å®è£
软件ãä¾å¦ï¼Windowså°±æä¸ä¸ªå
¨å±åé¨ï¼å¾®è½¯å¯ä»¥ç¨å®å¼ºå¶æ¹åçµèä¸çä»»ä½è½¯ä»¶ãå
ä¹ææ移å¨çµè¯ä¹é½æåé¨ãä¸äºä¸å±è½¯ä»¶ä¹æå
¨å±åé¨ï¼ä¾å¦ï¼å·¥ä½å¨GNU/Linuxä¸çSteam客æ·ç«¯å
许å
¶å¼åè
è¿ç¨å®è£
æ´æ¹åççæ¬ã</p>
+
+<p>使ç¨SaaSSï¼æå¡å¨æä½åè½å¤æ¹åæå¡å¨ä½¿ç¨ç软件ãä»åºè¯¥è½å¤è¿æ
·åï¼å 为è¿æ¯ä»ççµèï¼ä½æ¯å
¶ç»æå带æå
¨å±åé¨çä¸å±è½¯ä»¶æ¯ä¸æ
·çï¼æ人ææä¸å¨å£°è²å°æ´æ¹ç¨æ·ç计ç®ã</p>
+
+<p>æ以ï¼SaaSSå带æé´è°è½¯ä»¶åå
¨å±åé¨çä¸å±è½¯ä»¶æ¯ä¸æ
·çãå®ç»äºæå¡å¨æä½åå驾äºç¨æ·ä¹ä¸çæåï¼èè¿æ£æ¯æ们å¿
é¡»åæçæåã</p>
+
+<h3>SaaSSåSaaS</h3>
+
+<p>æåæ们认为è¿ä¸ªæé®é¢çå®è·µæ¯“SaaS”ï¼ææ毓软件å³æå¡”ãè¿æ¯ä¸ä¸ªå¸¸ç¨çæ¯è¯ï¼å®æ¯æå¨æå¡å¨ä¸è®¾ç½®è½¯ä»¶èä¸ç»ç¨æ·æ·è´ï¼èæ们认为该æ¯è¯åç¡®å°æè¿°äºæ¤ç±»å®è·µçé®é¢æå¨ã</p>
+
+<p>åæ¥æ们认è¯å°SaaSè¿ä¸æ¯è¯ææ¶ä¹ç¨äºé讯æå¡—èæ¤é®é¢å¹¶ä¸éç¨äºè¿äºæå¡ãå¦å¤ï¼“软件å³æå¡”è¿ä¸æ¯è¯ä¸è½è§£é<em>为ä»ä¹</em>è¿ç§å®è·µæ¯ä¸å¥½çãæ以æ们åé
亓æå¡ä»£æ¿è½¯ä»¶”è¿ä¸æ¯è¯ï¼å®æ´æ¸
æ¥å°å®ä¹äºè¿ä¸ªä¸å¥½çå®è·µï¼å¹¶ä¸è¯´åºä¸ºä»ä¹å®æ¯ä¸å¥½çã</p>
+
+<h3>åºåSaaSSé®é¢åä¸å±è½¯ä»¶é®é¢</h3>
+
+<p>SaaSSåä¸å±è½¯ä»¶å¯¼è´ç±»ä¼¼çæ害ç»æï¼ä½æ¯å
¶æºå¶åæä¸åã对ä¸å±è½¯ä»¶ï¼è¯¥æºå¶æ¯ä½
æ软件æ·è´ï¼å¹¶ä½¿ç¨è¯¥è½¯ä»¶æ·è´ï¼ä½æ¯ä¿®æ¹è¯¥æ·è´æ¯å°é¾/æè
æ¯éæ³çã对SaaSSï¼è¯¥æºå¶æ¯è½¯ä»¶è¿è¡ä½ ç计ç®ï¼ä½æ¯ä½
并没æ该软件çæ·è´ã</p>
+
+<p>è¿ä¸¤ä¸ªé®é¢å¸¸å¸¸ä»¤äººå°æ°ï¼è¿å¹¶ä¸ä»
ä»
æ¯æå¤ãç½ç»å¼åè
使ç¨å«ç³ä¸æ¸
çæ¯è¯“ç½ç»åºç¨”ææå¡å¨è½¯ä»¶åè¿è¡å¨æ¬å°çµèçæµè§å¨éçç¨åºæå¨ä¸èµ·ãæäºç½é¡µä¼å¨ä½
çæµè§å¨éå®è£
éå¹³å¡çãçè³æ¯å¤§åçJavaScript软件ï¼å¹¶ä¸ä¸åè¯ä½ ã<a
+href="/philosophy/javascript-trap.html">å½è¿äºJavaScriptç¨åºä¸æ¯èªç±è½¯ä»¶æ¶</a>ï¼å®ä»¬å°±åå
¶ä»éèªç±è½¯ä»¶ä¸æ ·å¯¼è´ä¸å
¬æ£ãç¶èï¼å¨è¿éï¼æ们å
³å¿çæ¯ä½¿ç¨æå¡æ¬èº«ã</p>
+
+<p>许å¤èªç±è½¯ä»¶æ¯æè
认为SaaSSé®é¢ä¼ç±äºå¼åæå¡å¨ç«¯çèªç±è½¯ä»¶è解å³ã对æå¡å¨æä½è
æ¥è¯´ï¼æå¡å¨ç«¯çç¨åºæ好æ¯èªç±è½¯ä»¶ï¼å¦æå®æ¯ä¸å±è½¯ä»¶ï¼é£ä¹å
¶å¼åè
/ææè
å°±æå驾äºæå¡å¨ä¹ä¸çæåãè¿å¯¹æå¡å¨æä½è
æ¯ä¸å
¬æ£çï¼èä¸å¯¹æå¡å¨çç¨æ·ä¹æ¯«æ
帮å©ãä½æ¯å¦ææå¡å¨ç«¯çç¨åºæ¯èªç±è½¯ä»¶ï¼å®ä¹æ²¡æä¿æ¤<em>æå¡å¨ç¨æ·</em>ä¸åSaaSSçå½±åã该ç¨åºä½¿æå¡å¨æä½è
èªç±ï¼ä½æ¯æ²¡æç»æå¡å¨ç¨æ·èªç±ã</p>
+
+<p>ææå¡å¨è½¯ä»¶çæºä»£ç
åå¸å¯ä»¥ä½¿ç¤¾åºåçï¼è¿ä½¿æç¸åºææ¯çç¨æ·å¯ä»¥æ建类似çæå¡å¨ï¼ä¹å¯è½ä¿®æ¹è½¯ä»¶ã<a
+href="/licenses/license-recommendations.html">æ们建议使ç¨GNU Affero
+GPL</a>ä½ä¸ºæå¡å¨ç«¯è½¯ä»¶ç许å¯è¯ã</p>
+
+<p>ä½æ¯è¿äºæå¡å¨é½æ²¡æ让ä½
è½å¤æ§å¶èªå·±ç计ç®ï¼é¤éå®æ¯<em>ä½ ç</em>æå¡å¨ï¼ä½
æ§å¶å®ç软件ï¼å°½ç®¡æå¡å¨ç硬件å¯è½ä¸æ¯ä½
çï¼ãä¹è®¸æäºå·¥ä½ä½
å¯ä»¥æ¾å¿å°ä½¿ç¨æåçæå¡å¨ï¼å°±åä½ è®©æåå¨ä½
çæºå¨ä¸ç»´æ¤è½¯ä»¶ä¸æ ·ãé¤æ¤ä¹å¤çæå¡å¨å¯¹ä½
é½åºè¯¥æ¯SaaSSãSaaSSæ»æ¯ä½¿ä½ åå¶äºæå¡å¨æä½è
çæåï¼èå¯ä¸ç解è¯æ¯ï¼<em>ä¸è¦ä½¿ç¨SaaSSï¼</em>ä¸è¦ä½¿ç¨ä»äººçæå¡å¨æ¥å¯¹ä½
æ交çæ°æ®è¿è¡è®¡ç®ã</p>
+
+<p>è¿ä¸ªé®é¢å±ç¤ºäº“å¼æ¾”å“èªç±”ç深度ä¸åãæºä»£ç
æ¯å¼æº<a
+href="/philosophy/free-open-overlap.html">æå³çï¼å·®ä¸å¤æ»æ¯ï¼èªç±è½¯ä»¶</a>ãä½æ¯ï¼<a
+href="http://opendefinition.org/software-service">“å¼æºè½¯ä»¶”æå¡</a>ï¼æå³çæå¡å¨è½¯ä»¶æ¯å¼æºææ¯èªç±è½¯ä»¶ï¼å´é失äºSaaSSçé®é¢ã</p>
+
+<p>æå¡ä»æ ¹æ¬ä¸ä¸åäºç¨åºï¼ç±å®å¸¦æ¥çéå¾·é®é¢ä»æ
¹æ¬ä¸ä¹åç¨åºçä¸åã为äºé¿å
æ··æ·ï¼æ们<a
+href="/philosophy/network-services-arent-free-or-nonfree.html">é¿å
ææå¡æ述为“èªç±”æ“ä¸å±ã”</a></p>
+
+<h3>åºåSaaSSåå
¶ä»ç½ç»æå¡</h3>
+
+<p>åªäºå¨çº¿æå¡æ¯SaaSSï¼ææç¡®çä¾åæ¯ç¿»è¯æå¡ï¼æ¯å¦å®æè±è¯æåç¿»è¯æ西ççè¯æåãä½
è¦ç¿»è¯è¿ä»¶äºçº¯ç²¹æ¯ä½ èªå·±ç计ç®ãä½
å¯ä»¥éè¿å¨èªå·±ççµèä¸è¿è¡ä¸ä¸ªç¨åºå®æãï¼éä¹ä¸è¯´ï¼è¯¥ç¨åºåºè¯¥æ¯èªç±è½¯ä»¶ãï¼ç¿»è¯æå¡ä»£æ¿äºè¯¥ç¨åºï¼æ以è¿æ¯æå¡ä»£æ¿è½¯ä»¶ï¼å³SaaSSãç±äºå®å¥å¤ºäºä½
对èªå·±è®¡ç®çæ§å¶ï¼æ以å®å¯¹ä½ ä½æ¶ã</p>
+
+<p>å¦ä¸ä¸ªæç¡®çä¾åæ¯ä½¿ç¨è¯¸å¦FlickræInstagramä¹ç±»çæå¡æ¥ç¼è¾ç
§çãå å年以æ¥ï¼äººä»¬é½æ¯å¨èªå·±ççµèä¸ç¼è¾ç
§çï¼å¨ä½
æ æ³æ§å¶çæå¡å¨ä¸ç¼è¾ç
§çï¼èä¸æ¯å¨èªå·±ççµèä¸ï¼å°±æ¯SaaSSã</p>
+
+<p>æç»SaaSS并ä¸æ¯è¯´è¦æç»ææçå
¶ä»äººè¿è¡çç½ç»æå¡ã大å¤æ°æå¡å¨ä¸æ¯SaaSSï¼å
为å®ä»¬çä»»å¡æ¯é讯ï¼èä¸æ¯ä¸ºç¨æ·å计ç®ã</p>
+
+<p>ç½ç»æå¡å¨æåçæ¦å¿µä¸æ¯ä¸ºä½ å计ç®ï¼èæ¯è®©ä½
è½å¤è®¿é®å®åå¸çä¿¡æ¯ãå³ä½¿å¨ä»å¤©è¿ä¹æ¯å¤§å¤æ°ç½ç«åçäºï¼è¿ä¸ªæ²¡æSaaSSçé®é¢ï¼å
为访é®å«äººåå¸çä¿¡æ¯ä¸æ¯å¨åä½
ç计ç®ã使ç¨å客ç½ç«åå¸èªå·±çææä¹ä¸æ¯ï¼ä½¿ç¨è¯¸å¦TwitteræStatusNetçæå¡åå¸å¾®åä¹ä¸æ¯ãï¼è¿äºæå¡å¯è½ä¼æå
¶ä»é®é¢ï¼æ ¹æ®å
·ä½æ
åµèä¸åãï¼è¿ä¸ªéç对å
¶ä»éç§äººçé讯æå¡ä¹éç¨ï¼æ¯å¦è天室ã</p>
+
+<p>究å
¶æ¬è´¨ï¼ç¤¾äº¤ç½ç»æ¯ä¸ç§æ²éååºççå½¢å¼ï¼ä¸æ¯SaaSSãç¶èï¼å¦æä¸ä¸ªæå¡ç主è¦è®¾æ½æ¯ç¤¾äº¤ç½ç»çè¯ï¼å®å°±å¯è½å¸¦æSaaSSçåè½åæ©å±ã</p>
+
+<p>å¦æä¸é¡¹æå¡ä¸æ¯SaaSSï¼å¹¶ä¸æå³çå®å°±æ²¡æé®é¢ãæå¡æå
¶ä»çéå¾·é®é¢ãæ¯å¦ï¼Facebook使ç¨Flashåå¸è§é¢ï¼å°±æ¯è¿«ä½¿ç¨æ·ä½¿ç¨éèªç±è½¯ä»¶ï¼å®è¦æ±ä½¿ç¨éèªç±çJavaScript代ç
ï¼å¹¶ä¸å®éè¿è®©ç¨æ·å±ç¤ºèªå·±ççæ´»æ¥è¯¯å¯¼ä»ä»¬å¯¹éç§çæè§ãè¿äºé½æ¯éè¦çé®é¢ï¼ä¸è¿ä¸åäºSaaSSã
+</p>
+
+<p>æç´¢å¼æä¹ç±»çæå¡æ¯ä»ç½ç»ä¸æ¶éæ°æ®å¹¶è®©ä½
æ¥çãæ¥çä»ä»¬æ¶éçæ°æ®ä¸æ¯æ®éæä¹ä¸çç¨æ·è®¡ç®æ´»å¨—ä½
并没ææä¾è¿ä¸ªæ¶é活娗æ以使ç¨æ¤ç±»ç½ç»æç´¢ä¸æ¯SaaSSãç¶èï¼ä½¿ç¨å
¶ä»äººçæå¡å¨ä¸ºä½
èªå·±çç½ç«é¨ç½²æ索设æ½<em>æ¯</em>SaaSSã</p>
+
+<p>ç½è´ä¸æ¯SaaSSï¼å 为è¿ä¸ªè®¡ç®ä¸æ¯<em>ä½
èªå·±ç</em>æ´»å¨ï¼èæ¯ä½ åååºå
±åå®æçæ´»å¨ãç½è´ççæ£é®é¢å¨äºä½
æ¯å¦ç¸ä¿¡æ¶é±çä¸æ¹ä»¥åå
¶ä»ä¸ªäººä¿¡æ¯ï¼ä»ä½
çå§åç®èµ·ï¼ã</p>
+
+<p>ä»åºç½ç«ï¼å¦SavannahåSourceForgeï¼æ¬èº«ä¸æ¯SaaSSï¼å
为ä»åºçå·¥ä½æ¯åå¸äº¤ç»å®çæ°æ®ã</p>
+
+<p>使ç¨èå项ç®çæå¡å¨ä¸æ¯SaaSSï¼å ä¸ºä½ åç计ç®ä¸æ¯ä½
èªå·±çãä¾å¦ï¼å¦æä½ ä¿®æ¹äºWikipedia页é¢ï¼é£ä¹ä½
并ä¸æ¯å¨åèªå·±ç计ç®ï¼èæ¯ä½
å¨åWikipediaçèå计ç®ãWikipediaæ§å¶èªå·±çæå¡å¨ï¼ä½æ¯å¦æä»ä»¬ä½¿ç¨çæ¯å
¶ä»äººçæå¡å¨ï¼é£ä¹æºæå个人é½é¢ä¸´SaaSSçé®é¢ã</p>
+
+<p>æäºç½ç«æä¾å¤ç§æå¡ï¼å¦æå
¶ä¸ä¸ä¸ªä¸æ¯SaaSSï¼å¦ä¸ç§ä¹å¯è½æ¯SaaSSãä¾å¦ï¼Facebookç主è¦æå¡æ¯ç¤¾äº¤ç½ç»ï¼è¿ä¸æ¯SaaSSï¼ç¶èï¼å®æ¯æ第ä¸æ¹åºç¨ï¼å
¶ä¸æäºæ¯SaaSSãFlickrç主è¦æå¡æ¯åå¸ç
§çï¼è¿ä¸æ¯SaaSSï¼ä½æ¯å®è¿æç¼è¾ç
§ççåè½ï¼è¿å°±æ¯SaaSSã类似å°ï¼å¨Instagramåå¸ç
§çä¸æ¯SaaSSï¼ä½æ¯ä½¿ç¨å®æ¥è½¬æ¢ç
§çæ ¼å¼å°±æ¯SaaSSã</p>
+
+<p>Google
Docså±ç¤ºäºè¯ä»·ä¸ä¸ªæå¡æå¤ä¹å¤æãå®è®©äººä»¬éè¿è¿è¡ä¸ä¸ªå¤§åç<a
+href="/philosophy/javascript-trap.html">éèªç±JavaScriptç¨åº</a>æ¥ç¼è¾ææ¡£ï¼ææ¾æ¯é误çãç¶èï¼å®è¿æä¾ä¸ä¼
åä¸è½½æ åæ
¼å¼ææ¡£çAPIãä¸ä¸ªèªç±è½¯ä»¶ç¼è¾å¨ä¹å¯ä»¥éè¿æ¤APIä¼
è¾ææ¡£ãè¿ä¸ªåºç¨åºæ¯ä¸æ¯SaaSSï¼å 为Google
+Docsåªæ¯ä½ä¸ºä»åºæ¥ä½¿ç¨ãæèªå·±çæ°æ®å±ç¤ºç»ä¸ä¸ªå
¬å¸æ¯ä¸ä»¶åäºï¼ä½è¿ä¹åªæ¯éç§çé®é¢ï¼ä¸æ¯SaaSSï¼ä¾èµæ个æå¡æ¥è®¿é®èªå·±çæ°æ®ä¹æ¯ä¸ä»¶åäºï¼ä½å®ä¹åªæ¯é£é©çé®é¢ï¼ä¸æ¯SaaSSãå¦ä¸æ¹é¢ï¼ä½¿ç¨æå¡æ¥è½¬æ¢ææ¡£çæ
¼å¼<em>æ¯</em>SaaSSï¼å 为ä½
å¯ä»¥ä½¿ç¨èªå·±çµèéçåéç¨åºï¼å¸ææ¯ï¼èªç±è½¯ä»¶ï¼æ¥å®æè¿ä»¶äºã</p>
+
+<p>å½ç¶ï¼éè¿èªç±è½¯ä»¶ä½¿ç¨Google
+Docs并ä¸å¸¸è§ãæ常è§çæ¯ï¼äººä»¬éè¿éèªç±çJavaScriptç¨åºæ¥ä½¿ç¨å®ï¼è¿å使ç¨å
¶ä»éèªç±è½¯ä»¶ä¸æ ·ç³ç³ãè¿ä¸ªåºæ¯è¿ä¼å¼å
¥SaaSSï¼è¿åå³äºåªäºæä½æ¯JavaScriptç¨åºåçï¼åªäºæ¯æå¡å¨åçãæ们ä¸ç¥éï¼ä½æ¯ç±äºSaaSSåä¸å±è½¯ä»¶é½å¯¹ç¨æ·ä½æ¶ï¼ç¥ä¸ç¥é并ä¸æ¯å
³é®ã</p>
+
+<p>éè¿ä»äººçä»åºè¿è¡åå¸ä¸ä¼æéç§çé®é¢ï¼ä½æ¯éè¿Google
+Docsåå¸å´æä¸ä¸ªç¹å«çé®é¢ï¼ä¸è¿è¡éèªç±çJavaScript代ç
ï¼ä½ çè³ä¸è½å¨æµè§å¨é<em>æ¥çGoogle
+Docsææ¬</em>ãæ以ï¼ä½ ä¸åºè¯¥ä½¿ç¨Google
Docsåå¸ææ¡£—ä½æ¯è¿ä¸æ¯ç±äºSaaSSçåå ã</p>
+
+<p>IT产ä¸å¹¶ä¸é¼å±ç¨æ·åè¿äºåºåãè¿å°±æ¯“äºè®¡ç®”è¿ä¸æ¶é«¦è¯æ±çç¨éã该è¯æ¯å¦æ¤ç模ç³ä¸æ¸
ï¼ä»¥è³äºå®å ä¹å¯ä»¥è¡¨ç¤ºä»»ä½äºèç½ç使ç¨å½¢å¼ãå®å
å«SaaSSï¼ä¹å
å«è®¸å¤å
¶ä»çç½ç»ä½¿ç¨æ
åµãå¨ä¸ä¸ªç¹å®çè¯å¢ï¼ä½¿ç¨è
å¯è½ç¨“五ï¼å¦ææ¯ææ¯èæ¯ç使ç¨è
ï¼è¡¨ç¤ºèæµ·éä¸ä¸ªç¹å®çææï¼ä½æ¯é常ä¸ä¼è§£é说该è¯å¨å
¶ä»æç« ä¸æå
¶ä»çææã该æ¯è¯å¼å¯¼äººä»¬å¯¹æ¬åºè¯¥åç¬å¤ççæ
åµè¿è¡æ®éåã</p>
+
+<p>å¦æ“äºè®¡ç®”æå®ä¹ï¼é£ä¹å®ä¸æ¯ä¸ä¸ªè®¡ç®çæ¹å¼ï¼èæ¯å¯¹è®¡ç®çä¸ç§æèæ¹æ³ï¼ä¸ç§é鬼æä¼èèçæ¹æ³ï¼æææ¯ï¼“ä¸è¦æé®ãä¸è¦æ
å¿æ¯è°æ§å¶ä½ ç计ç®æè
æ¯è°ææ¡ä½ çæ°æ®ãå¨ä½
åæ鱼饵ä¹åä¸è¦æ£æ¥èå¨æå¡ä¹é¥µéçéé©ãè¦æ¯«ä¸æçå°ç¸ä¿¡è¿äºå
¬å¸ã”æ¢å¥è¯è¯´ï¼“åä¸ä¸ªæ²¡æ主è§ç人ã”ææ³éçäºå°±æ¯è¦é»ç¢æ¸
æ¥å°æèã为äºæ¸
æ¥å°æè计ç®ï¼è®©æ们é¿å
使稓五è¿ä¸ªè¯ã</p>
+
+<h3 id="renting">åºåç§ç¨æå¡å¨åSaaSSçä¸å</h3>
+
+<p>å¦æä½ ç§ç¨æå¡å¨ï¼çå®çæèæçï¼ï¼ä½ å¯ä»¥æ§å¶å
¶è½¯ä»¶ï¼å®å°±ä¸æ¯SaaSSãå¨SaaSSçæ
å½¢ï¼å
¶ä»äººå³å®æå¡å¨è¿è¡ç软件ï¼å èä»ä»¬æ§å¶çä½
ç计ç®ãå¨ä½ å®è£
æå¡å¨è½¯ä»¶çæ
å½¢ï¼ä½ æ§å¶çä½
ç计ç®ãæ以ï¼ç§ç¨æå¡å¨å®é
ä¸æ¯ä½
ççµèãæ¤æ¶ï¼æ们认为å®å°±æ¯ä½ çã</p>
+
+<p>ç§ç¨çè¿ç¨æå¡å¨ä¸ç<em>æ°æ®</em>没æå¨èªå·±å®¶éçæå¡å¨ä¸çæ°æ®å®å
¨ï¼ä½æ¯è¿ä¸ªæ¯SaaSSä¹å¤çé®é¢ã</p>
+
+<h3>SaaSSé®é¢çåºå¯¹</h3>
+
+<p>åªæå°é¨åç½ç«å®æ½SaaSSï¼å¤§å¤æ°ç½ç«æ²¡æè¿ä¸ªé®é¢ãä½æ¯æ们å¦ä½åºå¯¹æè¿ä¸ªé®é¢çç½ç«å¢ï¼</p>
+
+<p>对ç®åçæ
åµï¼ä½
ç¨èªå·±çæ°æ®è¿è¡èªå·±ç计ç®ï¼è§£å³æ¹æ³ä¹ç®åï¼ä½¿ç¨ä¸ä»½ä½
èªå·±çèªç±è½¯ä»¶æ·è´ãç¨ä¸ä»½è¯¸å¦GNU
+Emacsæèªç±åå¤çç¨åºçèªç±è½¯ä»¶æ¥è¿è¡èªå·±çææ¬ç¼è¾ã使ç¨è¯¸å¦GIMPçèªç±è½¯ä»¶æ¥ç¼è¾ç
§çãå¦æ没æå¯ç¨çèªç±è½¯ä»¶æä¹åï¼ä¸å±è½¯ä»¶æSaaSSä¼æ¿èµ°ä½
çèªç±ï¼æä»¥ä½ ä¸åºè¯¥ä½¿ç¨å®ä»¬ãä½
å¯ä»¥è´¡ç®æ¶é´æèµéæ¥å¼åä¸æ¬¾å¯ä»¥æ¿ä»£ä¸å±è½¯ä»¶çèªç±è½¯ä»¶ã</p>
+
+<p>åå
¶ä»äººç»æåä½å¢éæä¹æ ·ï¼ç°å¨å¨ä¸ç¨æå¡å¨çæ
åµä¸å·¥ä½å¯è½æå°é¾ï¼èå¢éå¯è½å¹¶ä¸ç¥éå¦ä½è¿ä½èªå·±çæå¡å¨ãå¦æä½
è¦ä½¿ç¨ä»äººçæå¡å¨ï¼è³å°ä¸è¦ç¸ä¿¡ç±å
¬å¸è¿ä½çæå¡å¨ãä¸çº¸å®¢æ·ååå¯¹ä½ ä¸æ¯ä¿æ¤ï¼é¤éä½
è½å¤ä¾¦æµå°è¿è§å¹¶çæ£èµ·è¯ï¼èå
¬å¸å¶ä½çååå¯è½å
许宽æ³ç滥ç¨ãæ¿åºå¯ä»¥ä»è¯¥å
¬å¸å¼ºè¡è°åä½ ç以åå
¶ä»äººçæ°æ®ï¼æ£å¦å¥¥å·´é©¬æ»ç»å¯¹çµè¯å
¬å¸æåçï¼è¿è¦å设该å
¬å¸ä¸èªæ¿äº¤åºæ°æ®ï¼ä¸è¿ç¾å½çµè¯å
¬å¸æ¯éæ³ä¸ºå¸ä»æ¿åºçå¬å
¶ç¨æ·çãå¦æä½ å¿
须使ç¨æå¡å¨ï¼è¯·ä½¿ç¨é¤äºåä¸å
³ç³»ä¹å¤è¿æå
¶ä»å¯ä¿¡åºç¡çæå¡å¨æä½æ¹ã</p>
+
+<p>ç¶èï¼é¿è¿æ¥çï¼æ们è½å¤æ建æ¿ä»£æå¡å¨çæºå¶ãä¾å¦ï¼æ们å¯ä»¥æ建è½å¤å享å
å¯æ°æ®çç¹å¯¹ç¹ç¨åºãèªç±è½¯ä»¶ç¤¾åºåºè¯¥å¼ååå¸å¼ç¹å¯¹ç¹ç¨åºæ¥ä»£æ¿éè¦ç“ç½ç»åºç¨”ãæç
§<a
+href="/licenses/why-affero-gpl.html">GNU Affero
+GPL</a>åå¸è¿äºç¨åºæ¯ææºçï¼å
为å®ä»¬æå¯è½è¢«æäºäººè½¬æ¢æåºäºæå¡å¨çç¨åºã<a
+href="/">GNUå·¥ç¨</a>æ£å¨å¯»æ±åæ¤å¼åçå¿æ¿è
ãæ们ä¹é请å
¶ä»èªç±è½¯ä»¶é¡¹ç®å¨å
¶è®¾è®¡ä¸èèè¿ä¸ªé®é¢ã</p>
+
+<p>åæ¶ï¼å¦ææå
¬å¸éè¯·ä½ ä½¿ç¨å®ä»¬çæå¡å¨æ¥åä½
ç计ç®ï¼ä¸è¦æ¥åï¼ä¸è¦ä½¿ç¨SaaSSãä¸è¦è´ä¹°æå®è£
“轻客æ·ç«¯”ï¼è¿äºåªæ¯ç®åççµèï¼å®ä»¬ç计ç®è½åæ¯å¦æ¤ä¹å¼±ï¼ä½
ç计ç®åªè½å¨æå¡å¨ä¸çæ£å®æï¼é¤éä½ é
å<em>ä½
ç</em>æå¡å¨æ¥ä½¿ç¨è¿äºå®¢æ·ç«¯ã使ç¨çæ£ççµè并ææ°æ®éå¶å¨è¯¥çµèä¸ã为ä½
çèªç±èµ·è§ï¼è¯·ç¨ä½ èªå·±çèªç±è½¯ä»¶æ·è´æ¥å计ç®ã</p>
+
+<h3>请åæ¶åçï¼</h3>
+<p><a
href="/philosophy/bug-nobody-allowed-to-understand.html">ä¸è®¸ä»»ä½äººäºè§£ç缺é·</a>ã</p>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+<h3>è¯æ³¨</h3>
+<ol>
+<li id="TransNote1">homomorphic
+encryptionï¼åæå å¯ï¼æ对å å¯å
容ç计ç®ç»æå对éå å¯å
容ç计ç®ç»æä¸æ ·çå å¯ç®æ³ã</li>
+</ol></div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.zh-cn.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>请å°æå
³èªç±è½¯ä»¶åºéä¼(FSF) &
GNUçä¸è¬æ§é®é¢åéå°<a
+href="mailto:address@hidden"><address@hidden></a>ãä¹å¯ä»¥éè¿<a
+href="/contact/">å
¶ä»èç³»æ¹æ³</a>èç³»èªç±è½¯ä»¶åºéä¼(FSF)ãæå
³å¤±æé¾æ¥æå
¶ä»é误å建议ï¼è¯·åéé®ä»¶å°<a
+href="mailto:address@hidden"><address@hidden></a>ã</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+è¥æ¨æ³ç¿»è¯æ¬æï¼è¯·åç<a
+href="/server/standards/README.translations.html">ç¿»è¯é¡»ç¥</a>è·åæå
³åè°åæ交翻è¯çç¸å
³äºé¡¹ã</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2010, 2013, 2015, 2016 Richard Stallman</p>
+
+<p>æ¬é¡µé¢ä½¿ç¨<a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
+Attribution-NoDerivatives 4.0 International License</a>ææã</p>
+
+<!--#include virtual="/server/bottom-notes.zh-cn.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+<b>ç¿»è¯å¢é</b>ï¼<a rel="team"
+href="https://savannah.gnu.org/projects/www-zh-cn/"><CTT></a>ï¼2017ã</div>
+
+<p class="unprintable"><!-- timestamp start -->
+æåæ´æ°ï¼
+
+$Date: 2017/11/20 23:59:18 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
Index: philosophy/po/who-does-that-server-really-serve.zh-cn-en.html
===================================================================
RCS file: philosophy/po/who-does-that-server-really-serve.zh-cn-en.html
diff -N philosophy/po/who-does-that-server-really-serve.zh-cn-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ philosophy/po/who-does-that-server-really-serve.zh-cn-en.html 20 Nov
2017 23:59:18 -0000 1.1
@@ -0,0 +1,469 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.79 -->
+<title>Who Does That Server Really Serve?
+- GNU Project - Free Software Foundation</title>
+
+<!--#include
virtual="/philosophy/po/who-does-that-server-really-serve.translist" -->
+<!--#include virtual="/server/banner.html" -->
+
+<h2>Who does that server really serve?</h2>
+
+<p>by <strong>Richard Stallman</strong></p>
+
+<blockquote><p>(The first version was published
+in <a href="http://www.bostonreview.net/richard-stallman-free-software-DRM">
+Boston Review</a>.)</p></blockquote>
+
+<p><strong>On the Internet, proprietary software isn't the only way to
+lose your freedom. Service as a Software Substitute, or SaaSS, is
+another way to give someone else power over your computing.</strong></p>
+
+<p>The basic point is, you can have control over a program someone else
+wrote (if it's free), but you can never have control over a service
+someone else runs, so never use a service where in principle a program
+would do.</p>
+
+
+<p>SaaSS means using a service implemented by someone else as a
+substitute for running your copy of a program. The term is ours;
+articles and ads won't use it, and they won't tell you whether a
+service is SaaSS. Instead they will probably use the vague and
+distracting term “cloud”, which lumps SaaSS together with
+various other practices, some abusive and some ok. With the
+explanation and examples in this page, you can tell whether a service
+is SaaSS.</p>
+
+<h3>Background: How Proprietary Software Takes Away Your Freedom</h3>
+
+<p>Digital technology can give you freedom; it can also take your
+freedom away. The first threat to our control over our computing came
+from <em>proprietary software</em>: software that the users cannot
+control because the owner (a company such as Apple or Microsoft)
+controls it. The owner often takes advantage of this unjust power by
+inserting malicious features such as spyware, back doors, and <a
+href="http://DefectiveByDesign.org">Digital Restrictions Management
+(DRM)</a> (referred to as “Digital Rights Management” in
+their propaganda).</p>
+
+<p>Our solution to this problem is developing <em>free software</em>
+and rejecting proprietary software. Free software means that you, as
+a user, have four essential freedoms: (0) to run the program as
+you wish, (1) to study and change the source code so it does what
+you wish, (2) to redistribute exact copies, and (3) to
+redistribute copies of your modified versions. (See
+the <a href="/philosophy/free-sw.html">free software
+definition</a>.)</p>
+
+<p>With free software, we, the users, take back control of our
+computing. Proprietary software still exists, but we can exclude it
+from our lives and many of us have done so. However, we are now
+offered another tempting way to cede control over our computing:
+Service as a Software Substitute (SaaSS). For our freedom's sake, we
+have to reject that too.</p>
+
+<h3>How Service as a Software Substitute Takes Away Your Freedom</h3>
+
+<p>Service as a Software Substitute (SaaSS) means using a service as a
+substitute for running your copy of a program. Concretely, it means
+that someone sets up a network server that does certain computing
+tasks—for instance, modifying a photo, translating text into
+another language, etc.—then invites users to do computing via
+that server. A user of the server would send her data to the server,
+which does <em>her own computing</em> on the data thus provided, then
+sends the results back to her or acts directly on her behalf.</p>
+
+<p>The computing is <em>her own</em> because, by assumption, she
+could, in principle, have done it by running a program on her own
+computer (whether or not that program is available to her at
+present). In cases where this assumption is not so, it isn't SaaSS.</p>
+
+<p>These servers wrest control from the users even more inexorably
+than proprietary software. With proprietary software, users typically
+get an executable file but not the source code. That makes it hard to
+study the code that is running, so it's hard to determine what the
+program really does, and hard to change it.</p>
+
+<p>With SaaSS, the users do not have even the executable file that
+does their computing: it is on someone else's server, where the users
+can't see or touch it. Thus it is impossible for them to ascertain
+what it really does, and impossible to change it.</p>
+
+<p>Furthermore, SaaSS automatically leads to consequences equivalent
+to the malicious features of certain proprietary software.</p>
+
+<p> For instance, some proprietary programs are “spyware”:
+the program <a href="/philosophy/proprietary-surveillance.html">
+sends out data about users' computing activities</a>.
+Microsoft Windows sends information about users' activities to
+Microsoft. Windows Media Player reports what each user watches or
+listens to. The Amazon Kindle reports which pages of which books the
+user looks at, and when. Angry Birds reports the user's geolocation
+history.</p>
+
+<p>Unlike proprietary software, SaaSS does not require covert code to
+obtain the user's data. Instead, users must send their data to the
+server in order to use it. This has the same effect as spyware: the
+server operator gets the data—with no special effort, by the
+nature of SaaSS. Amy Webb, who intended never to post any photos of
+her daughter, made the mistake of using SaaSS (Instagram) to edit
+photos of her. Eventually
+<a
href="http://www.slate.com/articles/technology/data_mine_1/2013/09/privacy_facebook_kids_don_t_post_photos_of_your_kids_on_social_media.html">
they
+leaked from there</a>.
+</p>
+
+<p>Theoretically, homomorphic encryption might some day advance to the
+point where future SaaSS services might be constructed to be unable to
+understand some of the data that users send them. Such
+services <em>could</em> be set up not to snoop on users; this does not
+mean they <em>will</em> do no snooping.</p>
+
+<p>Some proprietary operating systems have a universal back door,
+permitting someone to remotely install software changes. For
+instance, Windows has a universal back door with which Microsoft can
+forcibly change any software on the machine. Nearly all portable
+phones have them, too. Some proprietary applications also have
+universal back doors; for instance, the Steam client for GNU/Linux
+allows the developer to remotely install modified versions.</p>
+
+<p>With SaaSS, the server operator can change the software in use on
+the server. He ought to be able to do this, since it's his computer;
+but the result is the same as using a proprietary application program
+with a universal back door: someone has the power to silently impose
+changes in how the user's computing gets done.</p>
+
+<p>Thus, SaaSS is equivalent to running proprietary software with
+spyware and a universal back door. It gives the server operator
+unjust power over the user, and that power is something we must
+resist.</p>
+
+<h3>SaaSS and SaaS</h3>
+
+<p>Originally we referred to this problematical practice as
+“SaaS”, which stands for “Software as a
+Service”. It's a commonly used term for setting up software on a
+server rather than offering copies of it to users, and we thought it
+described precisely the cases where this problem occurs.</p>
+
+<p>Subsequently we became aware that the term SaaS is sometimes used for
+communication services—activities for which this issue is not
+applicable. In addition, the term “Software as a Service”
+doesn't explain <em>why</em> the practice is bad. So we coined the term
+“Service as a Software Substitute”, which defines the bad
+practice more clearly and says what is bad about it.</p>
+
+<h3>Untangling the SaaSS Issue from the Proprietary Software Issue</h3>
+
+<p>SaaSS and proprietary software lead to similar harmful results, but
+the mechanisms are different. With proprietary software, the
+mechanism is that you have and use a copy which is difficult and/or
+illegal to change. With SaaSS, the mechanism is that you don't have
+the copy that's doing your computing.</p>
+
+<p>These two issues are often confused, and not only by accident. Web
+developers use the vague term “web application” to lump
+the server software together with programs run on your machine in your
+browser. Some web pages install nontrivial, even large JavaScript
+programs into your browser without informing
+you. <a href="/philosophy/javascript-trap.html">When these JavaScript
+programs are nonfree</a>, they cause the same sort of injustice as any
+other nonfree software. Here, however, we are concerned with the
+issue of using the service itself.</p>
+
+<p>Many free software supporters assume that the problem of SaaSS will
+be solved by developing free software for servers. For the server
+operator's sake, the programs on the server had better be free; if
+they are proprietary, their developers/owners have power over the
+server. That's unfair to the server operator, and doesn't help the
+server's users at all. But if the programs on the server are free,
+that doesn't protect <em>the server's users</em> from the effects of
+SaaSS. These programs liberate the server operator, but not the
+server's users.</p>
+
+<p>Releasing the server software source code does benefit the
+community: it enables suitably skilled users to set up similar
+servers, perhaps changing the
+software. <a href="/licenses/license-recommendations.html"> We
+recommend using the GNU Affero GPL</a> as the license for programs
+often used on servers.</p>
+
+<p>But none of these servers would give you control over computing you
+do on it, unless it's <em>your</em> server (one whose software load
+you control, regardless of whether the machine is your property). It
+may be OK to trust your friend's server for some jobs, just as you
+might let your friend maintain the software on your own computer.
+Outside of that, all these servers would be SaaSS for you. SaaSS
+always subjects you to the power of the server operator, and the only
+remedy is, <em>Don't use SaaSS!</em> Don't use someone else's server
+to do your own computing on data provided by you.</p>
+
+<p>This issue demonstrates the depth of the difference between
+“open” and “free”. Source code that is open
+source <a href="/philosophy/free-open-overlap.html">is, nearly always,
+free</a>. However, the idea of
+an <a href="http://opendefinition.org/software-service">“open
+software” service</a>, meaning one whose server software is open
+source and/or free, fails to address the issue of SaaSS.</p>
+
+<p>Services are fundamentally different from programs, and the ethical
+issues that services raise are fundamentally different from the issues
+that programs raise. To avoid confusion,
+we <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+avoid describing a service as “free” or
+“proprietary.”</a></p>
+
+<h3>Distinguishing SaaSS from Other Network Services</h3>
+
+<p>Which online services are SaaSS? The clearest example is a
+translation service, which translates (say) English text into Spanish
+text. Translating a text for you is computing that is purely yours.
+You could do it by running a program on your own computer, if only you
+had the right program. (To be ethical, that program should be free.)
+The translation service substitutes for that program, so it is Service
+as a Software Substitute, or SaaSS. Since it denies you control
+over your computing, it does you wrong.</p>
+
+<p>Another clear example is using a service such as Flickr or
+Instagram to modify a photo. Modifying photos is an activity that
+people have done in their own computers for decades; doing it in a
+server you don't control, rather than your own computer, is SaaSS.</p>
+
+<p>Rejecting SaaSS does not mean refusing to use any network servers
+run by anyone other than you. Most servers are not SaaSS because the
+jobs they do are some sort of communication, rather than the user's
+own computing.</p>
+
+<p>The original idea of web servers wasn't to do computing for you, it
+was to publish information for you to access. Even today this is what
+most web sites do, and it doesn't pose the SaaSS problem, because
+accessing someone's published information isn't doing your own
+computing. Neither is use of a blog site to publish your own works,
+or using a microblogging service such as Twitter or StatusNet. (These
+services may or may not have other problems, depending on details.)
+The same goes for other communication not meant to be private, such as
+chat groups.</p>
+
+<p>In its essence, social networking is a form of communication and
+publication, not SaaSS. However, a service whose main facility is
+social networking can have features or extensions which are SaaSS.</p>
+
+<p>If a service is not SaaSS, that does not mean it is OK. There are
+other ethical issues about services. For instance, Facebook
+distributes video in Flash, which pressures users to run nonfree
+software; it requires running nonfree JavaScript code; and it gives
+users a misleading impression of privacy while luring them into baring
+their lives to Facebook. Those are important issues, different from
+the SaaSS issue.
+</p>
+
+<p>Services such as search engines collect data from around the web
+and let you examine it. Looking through their collection of data
+isn't your own computing in the usual sense—you didn't provide
+that collection—so using such a service to search the web is not
+SaaSS. However, using someone else's server to implement a search
+facility for your own site <em>is</em> SaaSS.</p>
+
+<p>Purchasing online is not SaaSS, because the computing
+isn't <em>your own</em> activity; rather, it is done jointly by and
+for you and the store. The real issue in online shopping is whether
+you trust the other party with your money and other personal
+information (starting with your name).</p>
+
+<p>Repository sites such as Savannah and SourceForge are not
+inherently SaaSS, because a repository's job is publication of data
+supplied to it.</p>
+
+<p>Using a joint project's servers isn't SaaSS because the computing
+you do in this way isn't your own. For instance, if you edit pages on
+Wikipedia, you are not doing your own computing; rather, you are
+collaborating in Wikipedia's computing. Wikipedia controls its own
+servers, but organizations as well as individuals encounter the
+problem of SaaSS if they do their computing in someone else's
+server.</p>
+
+<p>Some sites offer multiple services, and if one is not SaaSS,
+another may be SaaSS. For instance, the main service of Facebook is
+social networking, and that is not SaaSS; however, it supports
+third-party applications, some of which are SaaSS. Flickr's main
+service is distributing photos, which is not SaaSS, but it also has
+features for editing photos, which is SaaSS. Likewise, using
+Instagram to post a photo is not SaaSS, but using it to transform the
+photo is SaaSS.</p>
+
+<p>Google Docs shows how complex the evaluation of a single service
+can become. It invites people to edit a document by running a
+large <a href="/philosophy/javascript-trap.html">nonfree JavaScript
+program</a>, clearly wrong. However, it offers an API for uploading
+and downloading documents in standard formats. A free software editor
+can do so through this API. This usage scenario is not SaaSS, because
+it uses Google Docs as a mere repository. Showing all your data to a
+company is bad, but that is a matter of privacy, not SaaSS; depending
+on a service for access to your data is bad, but that is a matter of
+risk, not SaaSS. On the other hand, using the service for converting
+document formats <em>is</em> SaaSS, because it's something you could
+have done by running a suitable program (free, one hopes) in your own
+computer.</p>
+
+<p>Using Google Docs through a free editor is rare, of course. Most
+often, people use it through the nonfree JavaScript program, which is
+bad like any nonfree program. This scenario might involve SaaSS, too;
+that depends on what part of the editing is done in the JavaScript
+program and what part in the server. We don't know, but since SaaSS
+and proprietary software do similar wrong to the user, it is not
+crucial to know.</p>
+
+<p>Publishing via someone else's repository does not raise privacy
+issues, but publishing through Google Docs has a special problem: it
+is impossible even to <em>view the text</em> of a Google Docs document
+in a browser without running the nonfree JavaScript code. Thus, you
+should not use Google Docs to publish anything—but the reason
+is not a matter of SaaSS.</p>
+
+<p>The IT industry discourages users from making these distinctions.
+That's what the buzzword “cloud computing” is for. This
+term is so nebulous that it could refer to almost any use of the
+Internet. It includes SaaSS as well as many other network usage
+practices. In any given context, an author who writes
+“cloud” (if a technical person) probably has a specific
+meaning in mind, but usually does not explain that in other articles
+the term has other specific meanings. The term leads people to
+generalize about practices they ought to consider individually.</p>
+
+<p>If “cloud computing” has a meaning, it is not a way of
+doing computing, but rather a way of thinking about computing: a
+devil-may-care approach which says, “Don't ask questions. Don't
+worry about who controls your computing or who holds your data. Don't
+check for a hook hidden inside our service before you swallow it.
+Trust companies without hesitation.” In other words, “Be a
+sucker.” A cloud in the mind is an obstacle to clear thinking.
+For the sake of clear thinking about computing, let's avoid the term
+“cloud.”</p>
+
+<h3 id="renting">Renting a Server Distinguished from SaaSS</h3>
+
+<p>If you rent a server (real or virtual), whose software load you
+have control over, that's not SaaSS. In SaaSS, someone else decides
+what software runs on the server and therefore controls the computing
+it does for you. In the case where you install the software on the
+server, you control what computing it does for you. Thus, the rented
+server is virtually your computer. For this issue, it counts as
+yours.</p>
+
+<p>The <em>data</em> on the rented remote server is less secure than
+if you had the server at home, but that is a separate issue from
+SaaSS.</p>
+
+<h3>Dealing with the SaaSS Problem</h3>
+
+<p>Only a small fraction of all web sites do SaaSS; most don't raise
+the issue. But what should we do about the ones that raise it?</p>
+
+<p>For the simple case, where you are doing your own computing on data
+in your own hands, the solution is simple: use your own copy of a free
+software application. Do your text editing with your copy of a free
+text editor such as GNU Emacs or a free word processor. Do your photo
+editing with your copy of free software such as GIMP. What if there
+is no free program available? A proprietary program or SaaSS would
+take away your freedom, so you shouldn't use those. You can contribute
+your time or your money to development of a free replacement.</p>
+
+<p>What about collaborating with other individuals as a group? It may
+be hard to do this at present without using a server, and your group
+may not know how to run its own server. If you use someone else's
+server, at least don't trust a server run by a company. A mere
+contract as a customer is no protection unless you could detect a
+breach and could really sue, and the company probably writes its
+contracts to permit a broad range of abuses. The state can subpoena
+your data from the company along with everyone else's, as Obama has
+done to phone companies, supposing the company doesn't volunteer them
+like the US phone companies that illegally wiretapped their customers
+for Bush. If you must use a server, use a server whose operators give
+you a basis for trust beyond a mere commercial relationship.</p>
+
+<p>However, on a longer time scale, we can create alternatives to
+using servers. For instance, we can create a peer-to-peer program
+through which collaborators can share data encrypted. The free
+software community should develop distributed peer-to-peer
+replacements for important “web applications”. It may be
+wise to release them under
+the <a href="/licenses/why-affero-gpl.html"> GNU Affero GPL</a>, since
+they are likely candidates for being converted into server-based
+programs by someone else. The <a href="/">GNU project</a> is looking
+for volunteers to work on such replacements. We also invite other
+free software projects to consider this issue in their design.</p>
+
+<p>In the meantime, if a company invites you to use its server to do
+your own computing tasks, don't yield; don't use SaaSS. Don't buy or
+install “thin clients”, which are simply computers so weak
+they make you do the real work on a server, unless you're going to use
+them with <em>your</em> server. Use a real computer and keep your
+data there. Do your own computing with your own copy of a free
+program, for your freedom's sake.</p>
+
+<h3>See also:</h3>
+<p><a href="/philosophy/bug-nobody-allowed-to-understand.html">The
+Bug Nobody is Allowed to Understand</a>.</p>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2010, 2013, 2015, 2016 Richard Stallman</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/11/20 23:59:18 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www philosophy/po/who-does-that-server-really-s...,
GNUN <=