Privacy and Security the Tangled Web We Have Woven

Total Page:16

File Type:pdf, Size:1020Kb

Privacy and Security the Tangled Web We Have Woven viewpoints DOI:10.1145/2408776.2408784 Eben Moglen VPrivacy and Security The Tangled Web We Have Woven Seeking to protect the fundamental privacy of network interactions. HE LAST GENERATION is being The Net should now universalize permit not only active surveillance born whose brains will devel- that process throughout the human but also extensive data mining of per- op independently of the Net. race, should make it possible for ev- sonal information in the Net, we will From now on, the way the Web ery person on Earth to read, watch, not achieve that promise. Indeed, if works will play a dominant listen, and participate in every form the Net is not engineered to protect Trole in the socialization of the human of learning and culture, everywhere, privacy, it will instead become a jail race. But because we have built Web without discrimination between rich for the human body and the human infrastructure without considering and poor, old and young, male and soul. privacy, we are also endangering our female. This truly universal learn- We are failing at present because basic freedoms. We are on the verge of ing system would immeasurably im- our Net is being used to spy on us, eliminating forever the fundamental prove the welfare of humankind. But constantly, as we use it to enrich our right to be alone in our thoughts. if we do not protect the fundamental lives. The innovations in surveillance At the beginning of the sixteenth privacy of network interactions, if we have come from industry. Record- century, moveable-type printing cre- keeping about how we use the Net— ated the experience of private read- what we search for, what we read, who ing, and with it the Western idea of We are on the verge we contact—is intensively and instan- the individual self freely developed, taneously “mined” for its value to self-made through a private process of eliminating forever those who want to sell us something. of reading and thinking. In religion, the fundamental right What we share with our friends and this led to the revolutionary adoption family, even the content of our email of individualist forms of Protestant to be alone in our and other private communications, is Christianity. Secular society adopted thoughts. scrutinized to the same end by compa- the scientific method, and with it nies that offer us “services” in return began radically improving the hu- for access to our private data. All this man social condition. The opening data, assiduously gathered by busi- of learning also enabled the gradual nesses seeking profit, no matter how transformation of the Western politi- responsibly they manage it, is also at cal landscape toward democratic self- the disposal of any government capa- government and the constitutional ble—by law, force or fraud—of gain- protection of freedom of thought. ing their cooperation. CREDIT TK 1 COMMUNICATIONS OF THE ACM | FEBRUARY 2013 | VOL. 56 | NO. 2 V viewpoints Beyond the data itself lies the new er, they offer others the opportunity to build the operating software of the Net mathematics of inferring from it. “Data control us. in keeping with certain ethical princi- mining,” which now politely refers to Development in the private market ples. This doesn’t mean forcing people itself as “data science,” is a new subdis- of technologies to surveil, predict, and or businesses to change what they are cipline of statistics, directed at using influence individuals through the Net presently doing. It means providing all this individually identifiable and has of course drawn the attention of the equivalent of green technologies, aggregated behavioral data to predict states. Governments are rapidly mov- and helping people shift to them. human social action. Whether one is ing, to the fullest extent of their differ- First, then, we need to build re- selling pharmaceuticals, toys, advertis- ing means, to harness the power of big sponsible replacement software, ing placement, or a political candidate, personal data to improve their social providing existing functions in ways data science is now using our personal control. No matter what your politics, that respect users’ privacy, to replace data to help the seller identify, pursue, somewhere in the world, right now, a systems that are hazardous to privacy. and persuade us. Our consumption government of whose principles you Current webmail and social network- supplies information that can be used completely disapprove is beginning ing services, for example, put all their to read our minds. to use the Net to locate support, influ- users’ communications with their The situation is made still worse be- ence the population, and find its en- respective social circles inside huge cause we are rapidly adopting personal emies. Everywhere in the world, from centralized databases maintained by service robots that are not working ex- now on, governments that become the service operator, who in return clusively in our interests. Unlike the ro- tyrannical will have immensely pow- for doing the storing and providing bots living intermixed with humans in erful new tools for remaining perma- sophisticated access services to users, the science fiction of our childhoods, nently in power. gets the right to mine the data, which these robots have no hands and feet— This privacy crisis is ecological. The is now centralized and vulnerable to we are their hands and feet. They see unintended consequences of tiny in- government acquisition. what we point them at; they have ears dividual activities, aggregated over the But email and the Web are by de- to hear everything going on around us; vast scope of the Net, are producing a sign federated services, in which in- they know our location all the time. threat to our common human interests dividual servers can provide storage These robots we call smartphones on a global scale. and access services cheaply, securely, and tablets often contain software we Fortunately, because the parts of and with near-perfect reliability for cannot read or understand, much less this crisis are all our creation, we can individual users. Users began using CREDIT TK change. We do not control them; rath- remedy the problem. We need to re- centralized services that hurt their FEBRUARY 2013 | VOL. 56 | NO. 2 | COMMUNICATIONS OF THE ACM 2 viewpoints privacy because they gained tangible whom the operator “cooperates.” We convenience at no apparent cost. No need to explain that every little deci- one knew how to run her own mail When we act to sion to give away one’s own informa- server or Web server, and we did not improve our own tion also gives away other peoples’. We make it easy to learn. But we can—and can teach people that when we act to we should—help people to use free privacy we are also improve our own privacy we are also software and a coming flood of inex- protecting the privacy protecting the privacy of our children, pensive “personal server” hardware to our families, and our friends. If we make personal privacy appliances. of our children, our help people around us to understand The FreedomBox Foundation I am families, and our the effects their actions have on oth- currently advising is an example of an ers, they will decide for themselves attempt in this direction, making free friends. what changes they should make. personal privacy software for creating Untangling the Web, restoring pri- such appliances. Small, inexpensive, vacy in what we do and anonymity in power-miserly devices you just plug in what we read, will not be easy. Many and forget, they keep your communi- fine businesses will make a little less cations private, help you navigate the money if we do not offer all our per- Web without being spied on, and let sonal data to be mined by intermedi- you share with the world, safely. Let aries on their behalf. Governments— me get technical for a few sentences to pretty much all governments of every describe how. social sharing replace Facebook and stripe—are rapidly discovering how Much of the implementation of similar “services,” that have imposed much real control they can get with- such a software stack involves using centralized storage, data mining, and out showing their hands if they make existing free software tools. A privacy control. use of the currently misconfigured, proxy located in the router between a Soon, such privacy servers will be anti-privacy Net. A consensus of the user’s smartphone or PC browser and available to replace your home wireless great and the good against privacy is the public Net can remove advertising router or other similar device at even forming; the one against anonymity is and Web bugs, manage cookie flow, lower cost, but with enormous overall already full-blown. Imagine how dif- and improve browsing privacy and social benefit. Think of them as per- ferent our world would be if all the security by providing “HTTPS every- sonal coal-scrubbers that cost next to books in the West for the last half-mil- where.” Automating use of SSH prox- nothing and improve the atmosphere lennium had reported their readers to ies and personal VPNs can not only we all breathe. headquarters, including informing protect the privacy of Web access be- But this is not all. We must also the Prince or the Pope how many sec- hind the FreedomBox used as a router, provide clear, factual, technical pub- onds each reader spent on each page. it can also provide secure communi- lic education about privacy and “the The book, which anyone could read to cations and privacy-protected Web cloud.” Currently basic technical in- herself in the privacy of her mind, is access from a mobile device used on formation is either altogether missing being replaced by an appliance that untrusted networks away from home.
Recommended publications
  • Download (PDF)
    CULTIVATING OPEN INFORMATION PLATFORMS: A LAND TRUST MODEL MOLLY SHAFFER VAN HOUWELING* INTRODUCTION James Boyle has led a recent call for intellectual property “environmentalism”—a movement to fend off perceived threats to the public interest posed by expansions in the scope and term of intellectual property protection.1 Inspired in part by Boyle’s message, a number of organizations have sprung up that aspire to expand and cultivate the body of intellectual works that are not subject to proprietary control.2 The Internet’s original development as a non-proprietary in- formation platform is another source of inspiration for this incip- ient movement.3 The Internet is built on a suite of protocols— * Assistant Professor of Law, University of Michigan Law School. Thanks to Kenneth Bamberger, Stefan Bechtold, Glenn Otis Brown, Julie Cohen, Bruce Damer, Rebecca Eisenberg, Edward Felten, Frank Hecker, Daphne Keller, Thom LeDoux, Mark Lemley, Lawrence Lessig, Douglas Lichtman, Ronald Mann, Thomas Nachbar, Maureen O’Rourke, Timothy Schoechle, Theodore Ts’o, Robert Van Houweling, and Jonathan Zittrain for comments. This essay was the basis for a presentation at the Silicon Flatirons Telecommunications Program Conference on Regulation of Information Platforms. Thanks to Philip Weiser for organizing the conference and to him and the other conference participants for their comments. 1. See, e.g., James Boyle, A Politics of Intellectual Property: Environmentalism for the Net?, 47 DUKE L.J. 87, 108-16 (1997); James Boyle, The Second Enclosure Movement and the Construction of the Public Domain, 39-43 (paper presented at the Duke conference on the Public Domain, Nov. 2001), discussion draft available at http://www.law.duke.edu/pd/papers/boyle.pdf; see also Seth Shulman, Intellectual- Property Ecology, TECHNOLOGY REVIEW, Mar.
    [Show full text]
  • SFLC V Conservancy
    Trademark Trial and Appeal Board Electronic Filing System. http://estta.uspto.gov ESTTA Tracking number: ESTTA863914 Filing date: 12/11/2017 IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE TRADEMARK TRIAL AND APPEAL BOARD Proceeding 92066968 Party Defendant Software Freedom Conservancy Correspondence PAMELA S CHESTECK Address CHESTEK LEGAL P O BOX 2492 RALEIGH, NC 27602 UNITED STATES Email: [email protected] Submission Motion for Summary Judgment Yes, the Filer previously made its initial disclosures pursuant to Trademark Rule 2.120(a); OR the motion for summary judgment is based on claim or issue pre- clusion, or lack of jurisdiction. The deadline for pretrial disclosures for the first testimony period as originally set or reset: 07/20/2018 Filer's Name Pamela S Chestek Filer's email [email protected] Signature /Pamela S Chestek/ Date 12/11/2017 Attachments Motion for SJ on affirmative defenses-signed.pdf(756280 bytes ) Kuhn-Declara- tion_summary-judgment_as-submitted_reduced-size-signed.pdf(2181238 bytes ) Sandler-declara- tion_summary-judgment_as-submitted-reduced-size-signed.pdf(1777273 bytes ) Chestek declaration_summary-judgment-signed-with-exhibits.pdf(2003142 bytes ) IN THE UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE TRADEMARK TRIAL AND APPEAL BOARD In the Mater of Registraion No. 4212971 Mark: SOFTWARE FREEDOM CONSERVANCY Registraion date: September 25, 2012 Sotware Freedom Law Center Peiioner, v. Cancellaion No. 92066968 Sotware Freedom Conservancy Registrant. RESPONDENT’S MOTION FOR SUMMARY JUDGMENT ON ITS AFFIRMATIVE DEFENSES Introducion The Peiioner, Sotware Freedom Law Center (“SFLC”), is a provider of legal services. It had the idea to create an independent enity that would ofer inancial and administraive services for free and open source sotware projects.
    [Show full text]
  • Anarchism Triumphant: Free Software and the Death of Copyright
    Anarchism Triumphant: Free Software and the Death of Copyright Eben Moglen£ May 17, 1999 I Software as Property: The Theoretical Paradox SOFTWARE: no other word so thoroughly connotes the practical and social effects of the digital revolution. Originally, the term was purely tech- nical, and denoted the parts of a computer system that, unlike “hardware,” which was unchangeably manufactured in system electronics, could be al- tered freely. The first software amounted to the plug configuration of ca- bles or switches on the outside panels of an electronic device, but as soonas linguistic means of altering computer behavior had been developed, “soft- ware” mostly denoted the expressions in more or less human-readable lan- guage that both described and controlled machine behavior.1 £ Professor of Law & Legal History, Columbia Law School. Prepared for delivery at the Buchmann International Conference on Law, Technology and Information, at Tel Aviv Uni- versity, May 1999; my thanks to the organizers for their kind invitation. I owe much as always to Pamela Karlan for her insight and encouragement. Thanks are due to Jerome Saltzer, Richard Stallman, and numerous others who freely contributed corrections and im- povements to this paper. I especially wish to thank the programmers throughout the world who made free software possible. 1The distinction was only approximate in its original context. By the late 1960s cer- tain portions of the basic operation of hardware were controlled by programs digitally en- coded in the electronics of computer equipment, not subject to change after the units left the factory. Such symbolic but unmodifiable components were known in the trade as “mi- crocode,” but it became conventional to refer to them as “firmware.” Softness, the term “firmware” demonstrated, referred primarily to users’ ability to alter symbols determining machine behavior.
    [Show full text]
  • Coase's Penguin, Or, Linux and the Nature of the Firm
    Coase’s Penguin, or, Linux and The Nature of the Firm Yochai Benkler* Abstract For decades our common understanding of the organization of economic production has been that individuals order their productive activities in one of two ways: either as employees in firms, following the directions of managers, or as individuals in markets, following price signals. This dichotomy was first identified in the early work of Ronald Coase and was developed most explicitly in the work of institutional economist Oliver Williamson. In this paper I explain why we are beginning to see the emergence of a new, third mode of production, in the digitally networked environment, a mode I call commons-based peer production. In the past three or four years, public attention has focused on a fifteen-year- old social-economic phenomenon in the software development world. This phenomenon, called free software or open source software, involves thousands or even tens of thousands of programmers contributing to large and small scale projects, where the central organizing principle is that the software remains free of most constraints on copying and use common to proprietary materials. No one “owns” the software in the traditional sense of being able to command how it is used or developed, or to control its disposition. The result has been the emergence of a vibrant, innovative and productive collaboration, whose participants are not organized in firms and do not choose their projects in response to price signals. This paper explains that while free software is highly visible, it is in fact only one example of a much broader social-economic phenomenon.
    [Show full text]
  • Annual Report
    [Credits] Licensed under Creative Commons Attribution license (CC BY 4.0). All text by John Hsieh and Georgia Young, except the Letter from the Executive Director, which is by John Sullivan. Images (name, license, and page location): Wouter Velhelst: cover image; Kori Feener, CC BY-SA 4.0: inside front cover, 2-4, 8, 14-15, 20-21, 23-25, 27-29, 32-33, 36, 40-41; Michele Kowal: 5; Anonymous, CC BY 3.0: 7, 16, 17; Ruben Rodriguez, CC BY-SA 4.0: 10, 13, 34-35; Anonymous, All rights reserved: 16 (top left); Pablo Marinero & Cecilia e. Camero, CC BY 3.0: 17; Free This report highlights activities Software Foundation, CC BY-SA 4.0: 18-19; Tracey Hughes, CC BY-SA 4.0: 30; Jose Cleto Hernandez Munoz, CC BY-SA 3.0: 31, Pixabay/stevepb, CC0: 37. and detailed financials for Fiscal Year 2016 Fonts: Letter Gothic by Roger Roberson; Orator by John Scheppler; Oswald by (October 1, 2015 - September 30, 2016) Vernon Adams, under the OFL; Seravek by Eric Olson; Jura by Daniel Johnson. Created using Inkscape, GIMP, and PDFsam. Designer: Tammy from Creative Joe. 1] LETTER FROM THE EXECUTIVE DIRECTOR 2] OUR MISSION 3] TECH 4] CAMPAIGNS 5] LIBREPLANET 2016 6] LICENSING & COMPLIANCE 7] CONFERENCES & EVENTS 7 8] LEADERSHIP & STAFF [CONTENTS] 9] FINANCIALS 9 10] OUR DONORS CONTENTS our most important [1] measure of success is support for the ideals of LETTER FROM free software... THE EXECUTIVE we have momentum DIRECTOR on our side. LETTER FROM THE 2016 EXECUTIVE DIRECTOR DEAR SUPPORTERS For almost 32 years, the FSF has inspired people around the Charity Navigator gave the FSF its highest rating — four stars — world to be passionate about computer user freedom as an ethical with an overall score of 99.57/100 and a perfect 100 in the issue, and provided vital tools to make the world a better place.
    [Show full text]
  • Coase's Penguin, Or, Linux and the Nature of the Firm
    Articles Coase's Penguin, or, Linux and The Nature of the Firm Yochai Benklert CONTENTS INTROD UCTION ..........................................................................................371 I. PEER PRODUCTION ALL AROUND ......................................................381 A . Content .........................................................................................384 B. Relevance/Accreditation.............................................................. 390 C. Value-Added Distribution............................................................ 396 D . Sum m ary ......................................................................................399 t Professor of Law, New York University School of Law. Research for this Article was partly supported by a grant from the Filomen D'Agostino and Max E. Greenberg Research Fund at the New York University School of Law. I owe thanks to many for comments on this and earlier drafts, including: Bruce Ackerman, Ed Baker, Elazar Barkan, Jamie Boyle, Dan Burk, Ben Damstedt, Bob Ellickson, Terry Fisher, Natalie Jeremijenko, David Johnson, Dan Kahan, Niva Elkin Koren, Tara Lenmey, Larry Lessig, Doug Lichtman, Jerry Mashaw, Eben Moglen, Mark Nadel, Helen Nissenbaum, George Priest, Peggy Radin, Carol Rose, Chuck Sabel, Alan Schwartz, Clay Shirky, Richard Stallman, and Kenji Yoshino. I owe special thanks to Steve Snyder for his invaluable research assistance on the peer production enterprises described here. I have gotten many questions about the "Coase's Penguin" portion of the title.
    [Show full text]
  • Grassmuck.Pdf
    Volker Grassmuck Freie Software Zwischen Privat- und Gemeineigentum Schriftenreihe Band 458 Volker Grassmuck Freie Software Zwischen Privat- und Gemeineigentum Mit Dank an alle, die Bug-Reports geschickt haben. Bonn 2004 © Bundeszentrale für politische Bildung (bpb) 2., korrigierte Auflage Redaktionsschluss: 30. November 2004 Redaktion: Thorsten Schilling Lektorat: Cornelia Schmitz, M.A., Bonn Projektmanagement: Sabine Berthold Diese Veröffentlichung stellt keine Meinungsäußerung der Bundeszentrale für politische Bildung dar. Für inhaltliche Aussagen trägt der Autor die Verantwortung. Die Website zum Buch: http://freie-software.bpb.de Typografie: Hans Schlimbach AGD, Köln; Satz: Medienhaus Froitzheim AG, Bonn, Berlin Umschlagmotiv: Mieke Gerritzen, nl.design, Amsterdam Umschlaggestaltung: Michael Rechl, Kassel, Wanfried Druck: Bercker, Kevelaer ISBN 3-89331-569-1 Inhalt Vorworte 1. Teil: Thorsten Schilling Die rechtliche Ordnung Georg Greve des Wissens 31 Free Software Foundation Europe 13 Volker Grassmuck Eigentum 36 Initialize 16 Allmende – vom Kollektiveigentum History 25 zum Privateigentum 37 Credits 27 Wissen: vom Eigentum zur Allmende Navigation 29 (Museen, Bibliotheken, Universitäten) 43 Wissen: von der Allmende zum Eigentum – Immaterialrecht 48 Patente 50 Die angloamerikanische Copyright-Tradition 51 Die kontinentaleuropäische Droit d’auteur-Tradition 58 Internationale Regelungen 62 Balance 65 Akteure der rechtlichen Ordnung des Wissens 72 Autorinnen 73 Verwertungsgesellschaften 76 Rechteindustrie 81 Öffentlichkeit 85 Medientechnologie
    [Show full text]
  • Table of Contents
    Table of Contents Preface . ix 1. Open Source Licensing, Contract, and Copyright Law . 1 Basic Principles of Copyright Law 1 Contract and Copyright 3 Open Source Software Licensing 4 Issues with Copyrights and Patents 7 The Open Source Definition 8 Warranties 11 2. The MIT, BSD, Apache, and Academic Free Licenses . 14 The MIT (or X) License 14 The BSD License 15 The Apache License, v1.1 and v2.0 17 The Academic Free License 24 Application and Philosophy 30 3. The GPL, LGPL, and Mozilla Licenses . 34 GNU General Public License 35 GNU Lesser General Public License 49 The Mozilla Public License 1.1 (MPL 1.1) 62 Application and Philosophy 81 4. Qt, Artistic, and Creative Commons Licenses . 85 The Q Public License 85 Artistic License (Perl) 90 Creative Commons Licenses 98 vii 5. Non-Open Source Licenses . 114 Classic Proprietary License 114 Sun Community Source License 120 Microsoft Shared Source Initiative 144 6. Legal Impacts of Open Source and Free Software Licensing . 147 Entering Contracts 148 Statutory Developments Related to Software Contracts 150 The Self-Enforcing Nature of Open Source and Free Software Licenses 151 The Global Scope of Open Source and Free Software Licensing 153 The “Negative Effects” of Open Source and Free Software Licensing 154 Community Enforcement of Open Source and Free Software Licenses 158 Compatible and Incompatible Licensing: Multiple and Cross Licensing 159 7. Software Development Using Open Source and Free Software Licenses . 164 Models of Open Source and Free Software Development 164 Forking 171 Choosing an Open Source or Free Software License 174 Drafting Open Source Licenses 176 Appendix: Creative Commons Attribution-NoDerivs License .
    [Show full text]
  • Anarquismo Triunfante: El Software Libre Y La Muerte Del Copyright Eben Moglen
    Anarquismo triunfante: el software libre y la muerte del copyright Eben Moglen La propagación del kernel del sistema operativo Linux ha llamado la atención hacia el movimiento del Software Libre. El presente ensayo muestra por qué el Software Libre, lejos de ser un participante marginal en el Mercado del Software comercial, es el vital primer paso hacia el marchitamiento del sistema de propiedad intelectual. Universidad Libre de Santiago Ediciones RedHack.Lab / 2010 Pirateado desde: El Infinito Perpendicular Original en: BlagBlagBlag Anarquismo triunfante: el software libre y la muerte del copyright - Eben Moglen Contenidos I. El software como propiedad: la paradoja teórica II. El software como propiedad: el problema práctico III. El anarquismo como un modo de producción IV. ¿Mueren sus señorías en la oscuridad? Eben Moglen es un profesor de derecho e historia en la Universidad de Columbia. Es director del Software Freedom Law Center, que fundó en 2005. Y colabora como consejero general para la Fundación del Software Libre. Wikipedia Universidad Libre de Santiago – Ediciones RedHack.Lab- 2011 Anarquismo triunfante: el software libre y la muerte del copyright - Eben Moglen Universidad Libre de Santiago – Ediciones RedHack.Lab- 2011 Anarquismo triunfante: el software libre y la muerte del copyright - Eben Moglen I. El software como propiedad: la paradoja teórica SOFTWARE: ninguna otra palabra connota tan exhaustivamente tanto los efectos prácticos como los sociales de la revolución digital. En sus inicios, el término era exclusivamente técnico, y denotaba las partes de algún sistema de cómputo que, en contraste con el hardware (el cual era manufacturado en sistemas electrónicos sin la posibilidad de realizarle ajustes posteriores al gusto y necesidad del usuario), podía ser cambiado libremente.
    [Show full text]
  • Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
    Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M.
    [Show full text]
  • Op E N So U R C E Yea R B O O K 2 0
    OPEN SOURCE YEARBOOK 2016 ..... ........ .... ... .. .... .. .. ... .. OPENSOURCE.COM Opensource.com publishes stories about creating, adopting, and sharing open source solutions. Visit Opensource.com to learn more about how the open source way is improving technologies, education, business, government, health, law, entertainment, humanitarian efforts, and more. Submit a story idea: https://opensource.com/story Email us: [email protected] Chat with us in Freenode IRC: #opensource.com . OPEN SOURCE YEARBOOK 2016 . OPENSOURCE.COM 3 ...... ........ .. .. .. ... .... AUTOGRAPHS . ... .. .... .. .. ... .. ........ ...... ........ .. .. .. ... .... AUTOGRAPHS . ... .. .... .. .. ... .. ........ OPENSOURCE.COM...... ........ .. .. .. ... .... ........ WRITE FOR US ..... .. .. .. ... .... 7 big reasons to contribute to Opensource.com: Career benefits: “I probably would not have gotten my most recent job if it had not been for my articles on 1 Opensource.com.” Raise awareness: “The platform and publicity that is available through Opensource.com is extremely 2 valuable.” Grow your network: “I met a lot of interesting people after that, boosted my blog stats immediately, and 3 even got some business offers!” Contribute back to open source communities: “Writing for Opensource.com has allowed me to give 4 back to a community of users and developers from whom I have truly benefited for many years.” Receive free, professional editing services: “The team helps me, through feedback, on improving my 5 writing skills.” We’re loveable: “I love the Opensource.com team. I have known some of them for years and they are 6 good people.” 7 Writing for us is easy: “I couldn't have been more pleased with my writing experience.” Email us to learn more or to share your feedback about writing for us: https://opensource.com/story Visit our Participate page to more about joining in the Opensource.com community: https://opensource.com/participate Find our editorial team, moderators, authors, and readers on Freenode IRC at #opensource.com: https://opensource.com/irc .
    [Show full text]
  • Dyne.Org Hackers Network
    dyne.org hackers network Denis J. Roio GNU hackers meeting, Den Haag July 2010 Denis J. Roio (2010) dyne.org hackers network July 2010 1 / 14 Dyne.org hackers network Free Software Movement Started in 1984 by Richard Stallman, with help by Eben Moglen, drafting the GNU General Public License, granting users the rights to: Run for any purpose Study and adapt Redistribute Distribute modifications Denis J. Roio (2010) dyne.org hackers network July 2010 2 / 14 Dyne.org hackers network So why yet another org? Started in 2000 publishing low-consumption software creations for broadcasting and freedom of speech, granting users with the rights to: Promote ideas and practices of knowledge sharing Democratize access to on-line and on-site communities Foster use of free software in artistic creativity Support free software development also when non-profitable Grounded as an EU Foundation in NL (Dutch Stichting) in 2005 with support by NIMk.nl, Servus.at, UNESCO and more institutions and individuals. Denis J. Roio (2010) dyne.org hackers network July 2010 3 / 14 Dyne.org hackers network Theoretical background Collaboration instead of competition No strings attached to marketed products Ownership of production means Global knowledge for local economies Denis J. Roio (2010) dyne.org hackers network July 2010 4 / 14 Dyne.org hackers network Dyne Operating System The dyne:bolic GNU/Linux liveCD multimedia operating system, developed from scratch (LFS) since 2001 as a nomadic OS, focusing on: Ease of use, non invasive installation that co-exists with other systems Recycling of existing infrastructure, support for game consoles Oriented to production and not only fruition of media Enforcing privacy of users and independent distribution of information Self contained: the full set of tools for development are on the CD 100% Free as in Market (and for real!) Denis J.
    [Show full text]