CVSROOT: /web/www Module name: www Changes by: Pavel Kharitonov <ineiev> 11/12/12 06:56:39
Modified files: philosophy : free-digital-society.html Log message: Write "nonfree" without dash; use <h3> for section titles (RT #717081) CVSWeb URLs: http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/free-digital-society.html?cvsroot=www&r1=1.9&r2=1.10 Patches: Index: free-digital-society.html =================================================================== RCS file: /web/www/www/philosophy/free-digital-society.html,v retrieving revision 1.9 retrieving revision 1.10 diff -u -b -r1.9 -r1.10 --- free-digital-society.html 29 Nov 2011 09:28:27 -0000 1.9 +++ free-digital-society.html 12 Dec 2011 06:55:49 -0000 1.10 @@ -28,7 +28,7 @@ doesn't respect their freedom; or we have to make it respect their freedom.</p> -<strong>[Surveillance]</strong> +<h3>Surveillance</h3> <p>What are the threats? First, surveillance. Computers are Stalin's dream: they are ideal tools for surveillance, because anything we @@ -63,7 +63,7 @@ <p>We can stop our own computers from doing surveillance on us if we have control of the software that they run. But the software these people are running, they don't have control over. It's -non-free software, and that's why it has malicious features, such as +nonfree software, and that's why it has malicious features, such as surveillance. However, the surveillance is not always done with our own computers, it's also done at one remove. For instance ISPs in Europe are required to keep data about the user's internet communications @@ -125,7 +125,7 @@ could get there, because their car was tracked through this universal car tracking system.</p> -<strong>[Censorship]</strong> +<h3>Censorship</h3> <p>The second threat is censorship. Censorship is not new, it existed long before computers. But 15 years ago, we thought that @@ -179,7 +179,7 @@ Internet is not a free country. And is not a legitimate government either.</p> -<strong>[Restricted data formats]</strong> +<h3>Restricted data formats</h3> <p>The next threat to our freedom comes from data formats that restrict the users.</p> @@ -192,13 +192,13 @@ <p>Now, evidently, if the program implements a secret format, that's because the program is not free software. So this is another kind of malicious feature. Surveillance is one kind of malicious feature that -you find in some non-free programs; using secret formats to restrict +you find in some nonfree programs; using secret formats to restrict the users is another kind of malicious feature that you also find in -some non-free programs.</p> +some nonfree programs.</p> <p>But if you have a free program that handles a certain format, <em>ipso facto</em> that format is not secret. This kind of malicious -feature can only exist in a non-free program. Surveillance features +feature can only exist in a nonfree program. Surveillance features could theoretically exist in a free program but you don't find them happening. Because the users would fix it. The users wouldn't like this, so they would fix it.</p> @@ -255,7 +255,7 @@ views. If it were a lecture for a course, if it were didactic, then it ought to be free, but statements of opinion are different.</p> -<strong>[Software that isn't free]</strong> +<h3>Software that isn't free</h3> <p>Now this leads me to the next threat which comes from software that the users don't have control over. In other words: software @@ -280,9 +280,9 @@ controls the users. But somebody controls that program and, through it, has <em>power</em> over the users. </p> -<p>So, a non-free program is an instrument to give somebody +<p>So, a nonfree program is an instrument to give somebody <em>power</em> over a lot of other people and this is unjust -power that nobody should ever have. This is why non-free software +power that nobody should ever have. This is why nonfree software (les logiciels privateurs, qui privent de la liberté), why proprietary software is an injustice and should not exist; because it leaves the users without freedom.</p> @@ -318,7 +318,7 @@ but not on the Amazon “Swindle”.</p> <p>Anyway, malicious features are present in the most widely used -non-free programs, but they are rare in free software, because +nonfree programs, but they are rare in free software, because with free software the users have control: they can read the source code and they can change it. So, if there were a malicious feature, somebody would sooner or later spot it and fix it. This means that @@ -329,7 +329,7 @@ you're going to fail. And that's why we find that malicious features are rare in free software, and common in proprietary software.</p> -<strong>[The 4 freedoms of free software]</strong> +<h3>The 4 freedoms of free software</h3> <p>Now the essential freedoms are four:</p> @@ -374,7 +374,7 @@ to include the freedom to use your version, not just the freedom to make some source code that won't run.</p> -<strong>[The GNU project and the free software movement]</strong> +<h3>The GNU project and the free software movement</h3> <p>I launched the free software movement in 1983, when I announced the plan to develop a free software operating system whose name is GNU. Now @@ -440,7 +440,7 @@ stand, you're free to say what you think. If you agree with them, you can say open source. If you agree with us, show it: say libre!</p> -<strong>[Free software and education]</strong> +<h3>Free software and education</h3> <p>Now the most important point about free software is that schools must teach exclusively free software. All levels of schools from @@ -550,7 +550,7 @@ or less.” So don't get distracted with those secondary issues, and ignore what really matters!</p> -<strong>[Internet services]</strong> +<h3>Internet services</h3> <p>So, moving on to the next menace. There are two issues that arise from the use of internet services. One of them is that the server @@ -659,11 +659,11 @@ for you on data supplied by you—things that you should do on your own computer but they invite you to let somebody else's computer do that computing work for you. And the result is you lose control -over it. It's just as if you used a non-free program.</p> +over it. It's just as if you used a nonfree program.</p> <p>Two different scenarios but they lead to the same problem. If -you do your computing with a non-free program—well, the users -don't control the non-free program, it controls the users, which +you do your computing with a nonfree program—well, the users +don't control the nonfree program, it controls the users, which would include you. So you've lost control of the computing that's being done. But if you do your computing in his server—well, the programs that are doing it are the ones he chose. You can't touch @@ -756,7 +756,7 @@ <p>I wouldn't want my country to be the pioneer in this. So, use paper for voting. Make sure there are ballots that can be recounted.</p> -<strong>[The war on sharing]</strong> +<h3>The war on sharing</h3> <p>The next threat to our freedom in a digital society comes from the war on sharing.</p> @@ -904,7 +904,7 @@ better. I appreciate their work and I realize if we want them to do more work we should support them.</p> -<strong>[Supporting the arts]</strong> +<h3>Supporting the arts</h3> <p>I have two proposals for how to support artists, methods that are compatible with sharing. That would allow us to end the war on @@ -977,7 +977,7 @@ propose cruel and draconian measures. They're trying to do something that's nasty by nature. So let's support artists in other ways.</p> -<strong>[Rights in cyberspace]</strong> +<h3>Rights in cyberspace</h3> <p>The last threat to our freedom in digital society is the fact that we don't have a firm right to do the things we do, in cyberspace. In @@ -1080,7 +1080,7 @@ <p>Updated: <!-- timestamp start --> -$Date: 2011/11/29 09:28:27 $ +$Date: 2011/12/12 06:55:49 $ <!-- timestamp end --> </p> </div>