judge-internet-usage.html (12419B)
1 <!--#include virtual="/server/header.html" --> 2 <!-- Parent-Version: 1.96 --> 3 <!-- This page is derived from /server/standards/boilerplate.html --> 4 <!--#set var="TAGS" value="essays cultural ns" --> 5 <!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --> 6 <title>A Wise User Judges Each Internet Usage Scenario Carefully - GNU 7 Project - Free Software Foundation</title> 8 <!--#include virtual="/philosophy/po/judge-internet-usage.translist" --> 9 <!--#include virtual="/server/banner.html" --> 10 <!--#include virtual="/philosophy/ph-breadcrumb.html" --> 11 <!--GNUN: OUT-OF-DATE NOTICE--> 12 <!--#include virtual="/server/top-addendum.html" --> 13 <div class="article reduced-width"> 14 <h2>A Wise User Judges Each Internet Usage Scenario Carefully</h2> 15 16 <address class="byline">by Richard Stallman</address> 17 18 <p>Businesses now offer computing users tempting opportunities to 19 let others keep their data and do their computing. In other words, 20 to toss caution and responsibility to the winds.</p> 21 22 <p>These businesses, and their boosters, like to call these computing 23 practices “cloud computing.” They apply the same term 24 to other quite different scenarios as well, such as renting a remote 25 server, making the term so broad and nebulous that nothing meaningful 26 can be said with it. If it has any meaning, it can only be a certain 27 attitude towards computing: an attitude of not thinking carefully about 28 what a proposed scenario entails or what risks it implies. Perhaps the 29 cloud they speak of is intended to form inside the customer's mind.</p> 30 31 <p>To replace that cloud with clarity, this article discusses 32 several different products and services that involve very different 33 usage scenarios (please don't think of them as “cloud 34 computing”), and the distinctive issues that they raise.</p> 35 36 <p>First, let's classify the kinds of issues that a usage scenario 37 <em>can</em> raise. In general, there are two kinds of issues to 38 be considered. One is the issue of <em>treatment of your data</em>, 39 and the other is <em>control of your computing</em>.</p> 40 41 <p>Within treatment of your data, several issues can be distinguished: 42 a service could lose your data, alter it, show it to someone else 43 without your consent, and/or make it hard for you to get the data 44 back. Each of those issues is easy to understand; how important they 45 are depends on what kind of data is involved.</p> 46 47 <p>Keep in mind that a US company (or a subsidiary of one) is required 48 to hand over nearly all data it has about a user on request of the 49 FBI, without a court order, under “USA PATRIOT Act,” 50 whose blackwhiting name is as orwellian as its provisions. We know 51 that although the requirements this law places on the FBI are very 52 loose, the FBI systematically violates them. Senator Wyden says 53 that if he could publicly say how the FBI stretches the law, <a 54 href="https://www.wired.com/2011/05/secret-patriot-act/">the 55 public would be angry at it</a>. European organizations might well 56 violate their countries' data protection laws if they entrust data 57 to such companies.</p> 58 59 <p>Control of your computing is the other category of issue. 60 Users deserve to have control of their computing. Unfortunately, 61 most of them have already given up such control through the use of 62 proprietary software (not free/libre).</p> 63 64 <p>With software, there are two possibilities: either the users control 65 the software or the software controls the users. The first case we 66 call “free software,” free as in freedom, because the users 67 have effective control of the software if they have certain essential 68 freedoms. We also call it “free/libre” to emphasize that 69 this is a <a href="/philosophy/free-sw.html">question of freedom, not 70 price</a>. The second case is proprietary software. Windows and MacOS 71 are proprietary; so is iOS, the software in the iPhone. Such a system 72 controls its users, and a company controls the system.</p> 73 74 <p>When a corporation has power over users in that way, it is likely to 75 abuse that power. No wonder that Windows and iOS are known to have spy 76 features, features to restrict the user, and back doors. When users 77 speak of “jailbreaking” the iPhone, they acknowledge that 78 this product shackles the user.</p> 79 80 <p>When a service does the user's computing, the user loses control 81 over that computing. We call this practice “Software as 82 a Service” or “SaaS,” and it is equivalent to 83 running a proprietary program with a spy feature and a back door. <a 84 href="/philosophy/who-does-that-server-really-serve.html">It is 85 definitely to be avoided.</a></p> 86 87 <p>Having classified the possible issues, let's consider how several 88 products and services raise them.</p> 89 90 <p>First, let's consider iCloud, a coming Apple service, whose 91 functionality (according to advance information) will be that users 92 can copy information to a server and access it later from elsewhere, 93 or let users access it from there. This is not Software as a Service 94 since it doesn't do any of the user's computing, so that issue 95 doesn't arise.</p> 96 97 <p>How will iCloud treat the user's data? As of this writing, we don't 98 know, but we can speculate based on what other services do. Apple 99 will probably be able to look at that data, for its own purposes 100 and for others' purposes. If so, courts will be able to get it with 101 a subpoena to Apple (<em>not</em> to the user). The FBI may be able 102 to get it without a subpoena. Movie and record companies, or their 103 lawsuit mills, may be able to look at it too. The only way this might 104 be avoided is if the data is encrypted on the user's machine before 105 upload, and decrypted on the user's machine after it is accessed.</p> 106 107 <p>In the specific case of iCloud, all the users will be running Apple 108 software, so Apple will have total control over their data anyway. A 109 spy feature was discovered in the iPhone and iPad software early in 110 2011, leading people to speak of the “spyPhone.” Apple 111 could introduce another spy feature in the next “upgrade,” 112 and only Apple would know. If you're foolish enough to use an iPhone 113 or iPad, maybe iCloud won't make things any worse, but that is no 114 recommendation.</p> 115 116 <p>Now let's consider Amazon EC2, a service where a customer leases 117 a virtual computer (hosted on a server in an Amazon data center) 118 that does whatever the customer programs it to do.</p> 119 120 <p>These computers run the <a href="/gnu/linux-and-gnu.html">GNU/Linux 121 operating system</a>, and the customer gets to choose all the 122 installed software, with one exception: Linux, the lowest-level 123 component (or “kernel”) of the system. Customers must 124 select one of the versions of Linux that Amazon offers; they cannot 125 make and run their own. But they can replace the rest of the system. 126 Thus, they get almost as much control over their computing as they 127 would with their own machines, but not entirely.</p> 128 129 <p>EC2 does have some drawbacks. One is, since users cannot install 130 their own versions of the kernel Linux, it is possible that Amazon 131 has put something nasty, or merely inconvenient, into the versions 132 they offer. But this may not really matter, given the other flaws. One 133 other flaw is that Amazon does have ultimate control of the computer 134 and its data. The state could subpoena all that data from Amazon. If 135 you had it in your home or office, the state would have to subpoena 136 it from you, and you would have the chance to fight the subpoena in 137 court. Amazon may not care to fight the subpoena on your behalf.</p> 138 139 <p>Amazon places conditions on what you can do with these servers, 140 and can cut off your service if it construes your actions to conflict 141 with them. Amazon has no need to prove anything, so in practice it 142 can cut you off if it finds you inconvenient. As Wikileaks found out, 143 the customer has no recourse if Amazon stretches the facts to make 144 a questionable judgment.</p> 145 146 <p>Now let's consider Google ChromeOS, a variant of GNU/Linux which is 147 still in development. According to what Google initially said, it will 148 be free/libre software, at least the basic system, though experience 149 with Android suggests it may come with nonfree programs too.</p> 150 151 <p>The special feature of this system, its purpose, was to deny 152 users two fundamental capabilities that GNU/Linux and other operating 153 systems normally provide: to store data locally and to run applications 154 locally. Instead, ChromeOS would be designed to require users to save 155 their data in servers (normally Google servers, I expect) and to let 156 these servers do their computing too. This immediately raises both 157 kinds of issues in their fullest form. The only way ChromeOS as thus 158 envisaged could become something users ought to accept is if they 159 install a modified version of the system, restoring the capabilities 160 of local data storage and local applications.</p> 161 162 <p>More recently I've heard that Google has reconsidered this decision 163 and may reincorporate those local facilities. If so, ChromeOS might 164 just be something people can use in freedom—if it avoids the 165 many other problems that we <a 166 href="/philosophy/android-and-users-freedom.html">observe today in 167 Android</a>.</p> 168 169 <p>As these examples show, each Internet usage scenario raises its own 170 set of issues, and they need to be judged based on the specifics. 171 Vague statements, such as any statement formulated in terms of 172 “cloud computing,” can only get in the way.</p> 173 174 <div class="infobox extra" role="complementary"> 175 <hr /> 176 <p>First published in <a 177 href="https://web.archive.org/web/20201126031912/https://www.europeanbusinessreview.com/a-wise-user-judges-each-internet-usage-scenario-carefully/"> 178 <cite>The European Business Review</cite></a>.</p> 179 </div> 180 </div> 181 182 </div><!-- for id="content", starts in the include above --> 183 <!--#include virtual="/server/footer.html" --> 184 <div id="footer" role="contentinfo"> 185 <div class="unprintable"> 186 187 <p>Please send general FSF & GNU inquiries to 188 <a href="mailto:gnu@gnu.org"><gnu@gnu.org></a>. 189 There are also <a href="/contact/">other ways to contact</a> 190 the FSF. Broken links and other corrections or suggestions can be sent 191 to <a href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>.</p> 192 193 <p><!-- TRANSLATORS: Ignore the original text in this paragraph, 194 replace it with the translation of these two: 195 196 We work hard and do our best to provide accurate, good quality 197 translations. However, we are not exempt from imperfection. 198 Please send your comments and general suggestions in this regard 199 to <a href="mailto:web-translators@gnu.org"> 200 <web-translators@gnu.org></a>.</p> 201 202 <p>For information on coordinating and contributing translations of 203 our web pages, see <a 204 href="/server/standards/README.translations.html">Translations 205 README</a>. --> 206 Please see the <a 207 href="/server/standards/README.translations.html">Translations 208 README</a> for information on coordinating and contributing translations 209 of this article.</p> 210 </div> 211 212 <!-- Regarding copyright, in general, standalone pages (as opposed to 213 files generated as part of manuals) on the GNU web server should 214 be under CC BY-ND 4.0. Please do NOT change or remove this 215 without talking with the webmasters or licensing team first. 216 Please make sure the copyright date is consistent with the 217 document. For web pages, it is ok to list just the latest year the 218 document was modified, or published. 219 220 If you wish to list earlier years, that is ok too. 221 Either "2001, 2002, 2003" or "2001-2003" are ok for specifying 222 years, as long as each year in the range is in fact a copyrightable 223 year, i.e., a year in which the document was published (including 224 being publicly visible on the web or in a revision control system). 225 226 There is more detail about copyright years in the GNU Maintainers 227 Information document, www.gnu.org/prep/maintain. --> 228 229 <p>Copyright © 2011, 2022 Richard Stallman</p> 230 231 <p>This page is licensed under a <a rel="license" 232 href="http://creativecommons.org/licenses/by-nd/4.0/">Creative 233 Commons Attribution-NoDerivatives 4.0 International License</a>.</p> 234 235 <!--#include virtual="/server/bottom-notes.html" --> 236 237 <p class="unprintable">Updated: 238 <!-- timestamp start --> 239 $Date: 2022/04/17 09:26:47 $ 240 <!-- timestamp end --> 241 </p> 242 </div> 243 </div><!-- for class="inner", starts in the banner include --> 244 </body> 245 </html>