summaryrefslogtreecommitdiff
path: root/src/frontend_blog/articles/scrap1_32.html
diff options
context:
space:
mode:
Diffstat (limited to 'src/frontend_blog/articles/scrap1_32.html')
-rw-r--r--src/frontend_blog/articles/scrap1_32.html339
1 files changed, 339 insertions, 0 deletions
diff --git a/src/frontend_blog/articles/scrap1_32.html b/src/frontend_blog/articles/scrap1_32.html
new file mode 100644
index 00000000..6920b38c
--- /dev/null
+++ b/src/frontend_blog/articles/scrap1_32.html
@@ -0,0 +1,339 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html401/loose.dtd">
+<html>
+<!-- This is the second edition of Free Software, Free Society: Selected Essays of Richard M. Stallman.
+
+Free Software Foundation
+
+51 Franklin Street, Fifth Floor
+
+Boston, MA 02110-1335
+Copyright C 2002, 2010 Free Software Foundation, Inc.
+Verbatim copying and distribution of this entire book are permitted
+worldwide, without royalty, in any medium, provided this notice is
+preserved. Permission is granted to copy and distribute translations
+of this book from the original English into another language provided
+the translation has been approved by the Free Software Foundation and
+the copyright notice and this permission notice are preserved on all
+copies.
+
+ISBN 978-0-9831592-0-9
+Cover design by Rob Myers.
+
+Cover photograph by Peter Hinely.
+ -->
+<!-- Created on February 18, 2016 by texi2html 1.82
+texi2html was written by:
+ Lionel Cons <Lionel.Cons@cern.ch> (original author)
+ Karl Berry <karl@freefriends.org>
+ Olaf Bachmann <obachman@mathematik.uni-kl.de>
+ and many others.
+Maintained by: Many creative people.
+Send bugs and suggestions to <texi2html-bug@nongnu.org>
+-->
+<head>
+<title>Free Software, Free Society, 2nd ed.: 32. Can You Trust Your Computer?</title>
+
+<meta name="description" content="This is the second edition of Richard Stallman's collection of essays.">
+<meta name="keywords" content="Free Software, Free Society, 2nd ed.: 32. Can You Trust Your Computer?">
+<meta name="resource-type" content="document">
+<meta name="distribution" content="global">
+<meta name="Generator" content="texi2html 1.82">
+<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
+<style type="text/css">
+<!--
+a.summary-letter {text-decoration: none}
+blockquote.smallquotation {font-size: smaller}
+pre.display {font-family: serif}
+pre.format {font-family: serif}
+pre.menu-comment {font-family: serif}
+pre.menu-preformatted {font-family: serif}
+pre.smalldisplay {font-family: serif; font-size: smaller}
+pre.smallexample {font-size: smaller}
+pre.smallformat {font-family: serif; font-size: smaller}
+pre.smalllisp {font-size: smaller}
+span.roman {font-family:serif; font-weight:normal;}
+span.sansserif {font-family:sans-serif; font-weight:normal;}
+ul.toc {list-style: none}
+-->
+</style>
+<link rel="stylesheet" type="text/css" href="../style.css">
+
+
+</head>
+
+<body lang="en" bgcolor="#FFFFFF" text="#000000" link="#0000FF" vlink="#800080" alink="#FF0000">
+
+<a name="Can-You-Trust"></a>
+<header><div id="logo"><img src="../gnu.svg" height="100" width="100"></div><h1>Free Software, Free Society, 2nd ed.</h1></header><section id="main"><a name="Can-You-Trust-Your-Computer_003f"></a>
+<h1 class="chapter"> 32. Can You Trust Your Computer? </h1>
+
+<a name="index-proprietary-software-_0028see-also-software_0029-1"></a>
+<a name="index-Microsoft_002c-Palladium-_0028see-also-both-Palladium-and-_0060_0060trusted-computing_0027_0027_0029"></a>
+<a name="index-Intel-_0028see-also-_0060_0060trusted-computing_0027_0027_0029-1"></a>
+<a name="index-_0060_0060trusted-computing_002c_0027_0027-avoid-use-of-term-_0028see-also-treacherous-computing_0029-2"></a>
+<a name="index-treacherous-computing-2"></a>
+<a name="index-traps_002c-treacherous-computing-_0028see-also-treacherous-computing_0029"></a>
+<a name="index-Palladium-1"></a>
+<p>Who should your computer take its orders from? Most people think
+their computers should obey them, not obey someone else. With a plan
+they call &ldquo;trusted computing,&rdquo; large media corporations
+(including the movie companies and record companies), together with
+computer companies such as Microsoft and Intel, are planning to make
+your computer obey them instead of you. (Microsoft&rsquo;s version of this
+scheme is called Palladium.) Proprietary programs have
+included malicious features before, but this plan would make it
+universal.
+</p>
+<p>Proprietary software means, fundamentally, that you don&rsquo;t control what
+it does; you can&rsquo;t study the source code, or change it. It&rsquo;s not
+surprising that clever businessmen find ways to use their control to
+put you at a disadvantage. Microsoft has done this several times: one
+version of Windows was designed to report to Microsoft all the
+software on your hard disk; a recent &ldquo;security&rdquo; upgrade in
+<a name="index-Windows-Media-Player-_0028see-also-both-DRM-and-treacherous-computing_0029"></a>
+Windows Media Player required users to agree to new restrictions. But
+Microsoft is not alone: the
+<a name="index-KaZaA-_0028see-also-both-DRM-and-treacherous-computing_0029"></a>
+KaZaA music-sharing software is designed
+so that KaZaA&rsquo;s business partner can rent out the use of your computer
+to its clients. These malicious features are often secret, but even
+once you know about them it is hard to remove them, since you don&rsquo;t
+have the source code.
+</p>
+<p>In the past, these were isolated incidents. &ldquo;Trusted
+computing&rdquo; would make the practice pervasive. &ldquo;Treacherous
+computing&rdquo; is a more appropriate name, because the plan is
+designed to make sure your computer will systematically disobey you.
+In fact, it is designed to stop your computer from functioning as a
+general-purpose computer. Every operation may require explicit
+permission.
+</p>
+<p>The technical idea underlying treacherous computing is that the
+computer includes a digital encryption and signature device, and the
+keys are kept secret from you. Proprietary programs will use this
+device to control which other programs you can run, which documents or
+data you can access, and what programs you can pass them to. These
+programs will continually download new authorization rules through the
+Internet, and impose those rules automatically on your work. If you
+don&rsquo;t allow your computer to obtain the new rules periodically from
+the Internet, some capabilities will automatically cease to function.
+</p>
+<a name="index-DRM_002c-treacherous-computing-and"></a>
+<a name="index-Hollywood-1"></a>
+<p>Of course, Hollywood and the record companies plan to use treacherous
+computing for Digital Restrictions Management (DRM), so
+that downloaded videos and music can be played only on one specified
+computer. Sharing will be entirely impossible, at least using the
+authorized files that you would get from those companies. You, the
+public, ought to have both the freedom and the ability to share these
+things. (I expect that someone will find a way to produce unencrypted
+versions, and to upload and share them, so DRM will not entirely
+succeed, but that is no excuse for the system.)
+</p>
+<p>Making sharing impossible is bad enough, but it gets worse. There are
+plans to use the same facility for email and documents&mdash;resulting
+in email that disappears in two weeks, or documents that can only be
+read on the computers in one company.
+</p>
+<p>Imagine if you get an email from your boss telling you to do something
+that you think is risky; a month later, when it backfires, you can&rsquo;t
+use the email to show that the decision was not yours. &ldquo;Getting
+it in writing&rdquo; doesn&rsquo;t protect you when the order is written in
+disappearing ink.
+</p>
+<p>Imagine if you get an email from your boss stating a policy that is
+illegal or morally outrageous, such as to shred your company&rsquo;s audit
+documents, or to allow a dangerous threat to your country to move
+forward unchecked. Today you can send this to a reporter and expose
+the activity. With treacherous computing, the reporter won&rsquo;t be able
+to read the document; her computer will refuse to obey her.
+Treacherous computing becomes a paradise for corruption.
+</p>
+<p>Word processors such as
+<a name="index-Word_002c-and-treacherous-computing-_0028see-also-treacherous-computing_0029-2"></a>
+Microsoft Word could use treacherous computing
+when they save your documents, to make sure no competing word
+processors can read them. Today we must figure out the secrets of
+Word format by laborious experiments in order to make free word
+processors read Word documents. If Word encrypts documents using
+treacherous computing when saving them, the free software community
+won&rsquo;t have a chance of developing software to read them&mdash;and if
+we could, such programs might even be forbidden by the
+<a name="index-DMCA-_0028see-also-_0060_0060Right-to-Read_002c_0027_0027-fair-use_002c-DRM_002c-and-libraries_0029-3"></a>
+Digital
+Millennium Copyright Act.
+</p>
+<p>Programs that use treacherous computing will continually download new
+authorization rules through the Internet, and impose those rules
+automatically on your work. If Microsoft, or the US government, does
+not like what you said in a document you wrote, they could post new
+instructions telling all computers to refuse to let anyone read that
+document. Each computer would obey when it downloads the new
+instructions. Your writing would be subject to 1984-style retroactive
+erasure. You might be unable to read it yourself.
+</p>
+<p>You might think you can find out what nasty things a treacherous-computing
+application does, study how painful they are, and decide
+whether to accept them. Even if you can find this out, it would
+be foolish to accept the deal, but you can&rsquo;t even expect the deal
+to stand still. Once you come to depend on using the program, you are
+hooked and they know it; then they can change the deal. Some
+applications will automatically download upgrades that will do
+something different&mdash;and they won&rsquo;t give you a choice about
+whether to upgrade.
+</p>
+<p>Today you can avoid being restricted by proprietary software by not
+using it. If you run GNU/Linux or another free operating system, and
+if you avoid installing proprietary applications on it, then you are
+in charge of what your computer does. If a free program has a
+malicious feature, other developers in the community will take it out,
+and you can use the corrected version. You can also run free
+application programs and tools on nonfree operating systems; this
+falls short of fully giving you freedom, but many users do it.
+</p>
+<p>Treacherous computing puts the existence of free operating systems and
+free applications at risk, because you may not be able to run them at
+all. Some versions of treacherous computing would require the
+operating system to be specifically authorized by a particular
+company. Free operating systems could not be installed. Some
+versions of treacherous computing would require every program to be
+specifically authorized by the operating system developer. You could
+not run free applications on such a system. If you did figure out
+how, and told someone, that could be a crime.
+</p>
+<p>There are proposals already for US laws that would require all computers to
+support treacherous computing, and to prohibit connecting old computers to
+the Internet. The
+<a name="index-Consumer-Broadband-and-Digital-Television-Promotion-Act-_0028CBDTPA_0029-3"></a>
+CBDTPA (we call it the Consume But Don&rsquo;t Try Programming
+Act) is one of them. But even if they don&rsquo;t legally force you to switch to
+treacherous computing, the pressure to accept it may be enormous. Today
+people often use
+<a name="index-Word_002c-and-treacherous-computing-_0028see-also-treacherous-computing_0029-3"></a>
+Word format for communication, although this causes
+several sorts of problems (see &ldquo;We Can Put an End to Word
+Attachments,&rdquo; on p.&nbsp;@refx{No Word Attachments-pg}{). If only a treacherous-computing machine can read the
+latest Word documents, many people will switch to it, if they view the
+situation only in terms of individual action (take it or leave it). To
+oppose treacherous computing, we must join together and confront the
+situation as a collective choice.
+</p>
+<p>For further information about treacherous computing, see <a href="http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html">http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html</a>.
+</p>
+<a name="index-call-to-action_002c-block-treacherous-computing"></a>
+<p>To block treacherous computing will require large numbers of citizens
+to organize. We need your help! Please support
+<a name="index-Defective-by-Design-_0028see-also-DRM_0029-3"></a>
+Defective by Design, the
+FSF&rsquo;s campaign against Digital Restrictions Management.
+</p>
+<a name="Postscripts"></a>
+<h3 class="subheading"> Postscripts </h3>
+
+<ol>
+<li>
+The computer security field uses the term &ldquo;trusted
+computing&rdquo; in a different way&mdash;beware of confusion
+between the two meanings.
+
+</li><li>
+The GNU Project distributes the
+<a name="index-Privacy-Guard-_0028GPG_0029_002c-GNU-1"></a>
+<a name="index-GNU_002c-GNU-Privacy-Guard-_0028GPG_0029-1"></a>
+<a name="index-GPG-_0028GNU-Privacy-Guard_0029-1"></a>
+GNU Privacy Guard, a program that
+implements public-key encryption and digital signatures, which you can
+use to send secure and private email. It is useful to explore how GPG
+differs from treacherous computing, and see what makes one helpful and
+the other so dangerous.
+
+<p>When someone uses GPG to send you an encrypted document, and you use
+GPG to decode it, the result is an unencrypted document that you can
+read, forward, copy, and even reencrypt to send it securely to
+someone else. A treacherous-computing application would let you read
+the words on the screen, but would not let you produce an unencrypted
+document that you could use in other ways. GPG, a free software
+package, makes security features available to the users; <em>they</em> use <em>it.</em>
+Treacherous computing is designed to impose restrictions on the users;
+<em>it</em> uses <em>them.</em>
+</p>
+</li><li>
+The supporters of treacherous computing focus their discourse on its
+beneficial uses. What they say is often
+correct, just not important.
+
+<p>Like most hardware, treacherous-computing hardware can be used for
+purposes which are not harmful. But these features can be implemented in
+other ways, without treacherous-computing hardware. The principal
+difference that treacherous computing makes for users is the nasty
+consequence: rigging your computer to work against you.
+</p>
+<p>What they say is true, and what I say is true. Put them together and
+what do you get? Treacherous computing is a plan to take away our
+freedom, while offering minor benefits to distract us from what we
+would lose.
+</p>
+</li><li>
+Microsoft presents
+<a name="index-Microsoft_002c-Palladium-_0028see-also-both-Palladium-and-_0060_0060trusted-computing_0027_0027_0029-1"></a>
+Palladium as a security measure, and claims that
+it will protect against viruses, but this claim is evidently false. A
+presentation by Microsoft Research in October 2002 stated that one of
+the specifications of Palladium is that existing operating systems and
+applications will continue to run; therefore, viruses will continue to
+be able to do all the things that they can do today.
+
+<p>When Microsoft employees speak of &ldquo;security&rdquo; in connection with
+Palladium, they do not mean what we normally mean by that word:
+protecting your machine from things you do not want. They mean
+protecting your copies of data on your machine from access by you in
+ways others do not want. A slide in the presentation listed several
+types of secrets Palladium could be used to keep, including
+&ldquo;third party secrets&rdquo; and &ldquo;user
+secrets&rdquo;&mdash;but it put &ldquo;user secrets&rdquo; in
+quotation marks, recognizing that this is somewhat of an absurdity in the
+context of Palladium.
+</p>
+<p>The presentation made frequent use of other terms that we frequently
+associate with the context of security, such as &ldquo;attack,&rdquo;
+&ldquo;malicious code,&rdquo; &ldquo;spoofing,&rdquo; as well as
+&ldquo;trusted.&rdquo; None of them means what it normally means.
+&ldquo;Attack&rdquo; doesn&rsquo;t mean someone trying to hurt you, it means
+you trying to copy music. &ldquo;Malicious code&rdquo; means code
+installed by you to do what someone else doesn&rsquo;t want your machine to
+do. &ldquo;Spoofing&rdquo; doesn&rsquo;t mean someone&rsquo;s fooling you, it means
+your fooling Palladium. And so on.
+</p>
+</li><li>
+A previous statement by the Palladium developers stated the basic
+premise that whoever developed or collected information should have
+total control of how you use it. This would represent a revolutionary
+overturn of past ideas of ethics and of the legal system, and create
+an unprecedented system of control. The specific problems of these
+systems are no accident; they result from the basic goal. It is the
+goal we must reject.
+
+</li></ol>
+<a name="index-_0060_0060trusted-computing_002c_0027_0027-avoid-use-of-term-_0028see-also-treacherous-computing_0029-3"></a>
+<a name="index-treacherous-computing-3"></a>
+<a name="index-traps_002c-treacherous-computing-_0028see-also-treacherous-computing_0029-1"></a>
+<a name="index-proprietary-software-_0028see-also-software_0029-2"></a>
+<a name="index-Palladium-2"></a>
+<hr size="2">
+<table cellpadding="1" cellspacing="1" border="0">
+<tr><td valign="middle" align="left">[<a href="scrap1_31.html#FDL" title="Previous section in reading order"> &lt; </a>]</td>
+<td valign="middle" align="left">[<a href="scrap1_33.html#Server" title="Next section in reading order"> &gt; </a>]</td>
+<td valign="middle" align="left"> &nbsp; </td>
+<td valign="middle" align="left">[Contents]</td>
+<td valign="middle" align="left">[<a href="scrap1_U.4.html#Index" title="Index">Index</a>]</td>
+<td valign="middle" align="left">[<a href="scrap1_abt.html#SEC_About" title="About (help)"> ? </a>]</td>
+</tr></table>
+<p>
+ <font size="-1">
+ This document was generated by <em>Christian Grothoff</em> on <em>February 18, 2016</em> using <a href="http://www.nongnu.org/texi2html/"><em>texi2html 1.82</em></a>.
+ </font>
+ <br>
+
+</p>
+</body>
+</html>