taler-merchant-demos

Python-based Frontends for the Demonstration Web site
Log | Files | Refs | Submodules | README | LICENSE

right-to-read.html (23338B)


      1 <!--#include virtual="/server/header.html" -->
      2 <!-- Parent-Version: 1.96 -->
      3 <!-- This page is derived from /server/standards/boilerplate.html -->
      4 <!--#set var="TAGS" value="essays cultural access" -->
      5 <!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
      6 <title>The Right to Read
      7 - GNU Project - Free Software Foundation</title>
      8 <style type="text/css" media="print,screen"><!--
      9 .announcement {
     10    text-align: center;
     11    box-sizing: border-box;
     12    background: #f5f5f5;
     13    border-left: .4em solid #5c5;
     14    border-right: .4em solid #5c5;
     15    border-top: .1em solid #5c5;
     16    border-bottom: .1em solid #5c5;
     17    margin: 2.5em auto;
     18 }
     19 #AuthorsNote ul, #AuthorsNote li {
     20    margin: 0;
     21 }
     22 #AuthorsNote li p {
     23    margin: 1em 0;
     24 }
     25 .emph-box {
     26    background: #f7f7f7;
     27    border-color: #e74c3c;
     28 }
     29 #AuthorsNote p.emph-box {
     30    margin: 1em 6%;
     31 }
     32 #BadNews li p { text-indent: -.8em; }
     33 #BadNews li p:before {
     34    content: "\021D2";
     35    display: inline;
     36    position: relative;
     37    right: .5em;
     38 }
     39 #BadNews p.emph-box {
     40    margin: 2.5em 6% 1em;
     41 }
     42 @media (min-width: 55em) {
     43    #AuthorsNote .columns > p:first-child,
     44     #AuthorsNote li p.inline-block { margin-top: 0; }
     45    .update { font-style: italic; text-align: center; }
     46    .table { display: table; }
     47    .table-cell {
     48       display: table-cell;
     49       width: 50%;
     50       vertical-align: middle;
     51    }
     52    .left { padding-right: .75em; }
     53    .right { padding-left: .75em; }
     54 }-->
     55 <!--#if expr="$RTL_SCRIPT = yes" -->
     56 <!--
     57 @media (min-width: 55em) {
     58    .left { padding-left: .75em; padding-right: 0; }
     59    .right { padding-right: .75em; padding-left: 0; }
     60 }-->
     61 <!--#endif -->
     62 </style>
     63 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
     64 <!--#include virtual="/server/banner.html" -->
     65 <!--#include virtual="/philosophy/ph-breadcrumb.html" -->
     66 <!--GNUN: OUT-OF-DATE NOTICE-->
     67 <!--#include virtual="/server/top-addendum.html" -->
     68 <div class="article">
     69 <h2 class="center">The Right to Read</h2>
     70 
     71 <address class="byline center">
     72 by <a href="https://www.stallman.org/">Richard Stallman</a></address>
     73 
     74 <p class="infobox c">
     75 	     From <cite>The Road To Tycho</cite>, a collection of
     76 	     articles about the antecedents of the Lunarian
     77 	     Revolution, published in Luna City in 2096.
     78 </p>
     79 <hr class="thin" />
     80 
     81 <div class="columns">
     82 <p>
     83 For Dan Halbert, the road to Tycho began in college&mdash;when Lissa
     84 Lenz asked to borrow his computer.  Hers had broken down, and unless
     85 she could borrow another, she would fail her midterm project.  There
     86 was no one she dared ask, except Dan.</p>
     87 
     88 <p>
     89 This put Dan in a dilemma.  He had to help her&mdash;but if he lent
     90 her his computer, she might read his books.  Aside from the fact that
     91 you could go to prison for many years for letting someone else read
     92 your books, the very idea shocked him at first.  Like everyone, he had
     93 been taught since elementary school that sharing books was nasty and
     94 wrong&mdash;something that only pirates would do.</p>
     95 
     96 <p>
     97 And there wasn't much chance that the SPA&mdash;the Software
     98 Protection Authority&mdash;would fail to catch him.  In his software
     99 class, Dan had learned that each book had a copyright monitor that
    100 reported when and where it was read, and by whom, to Central
    101 Licensing.  (They used this information to catch reading pirates, but
    102 also to sell personal interest profiles to retailers.)  The next time
    103 his computer was networked, Central Licensing would find out.  He, as
    104 computer owner, would receive the harshest punishment&mdash;for not
    105 taking pains to prevent the crime.</p>
    106 
    107 <p>
    108 Of course, Lissa did not necessarily intend to read his books.  She
    109 might want the computer only to write her midterm.  But Dan knew she
    110 came from a middle-class family and could hardly afford the tuition,
    111 let alone her reading fees.  Reading his books might be the only way
    112 she could graduate.  He understood this situation; he himself had had
    113 to borrow to pay for all the research papers he read.  (Ten percent of those
    114 fees went to the researchers who wrote the papers; since Dan aimed for
    115 an academic career, he could hope that his own research papers, if
    116 frequently referenced, would bring in enough to repay this loan.)</p>
    117 </div>
    118 <div class="column-limit"></div>
    119 
    120 <div class="columns">
    121 <p>
    122 Later on, Dan would learn there was a time when anyone could go to the
    123 library and read journal articles, and even books, without having to
    124 pay.  There were independent scholars who read thousands of pages
    125 without government library grants.  But in the 1990s, both commercial
    126 and nonprofit journal publishers had begun charging fees for access.
    127 By 2047, libraries offering free public access to scholarly literature
    128 were a dim memory.</p>
    129 
    130 <p>
    131 There were ways, of course, to get around the SPA and Central
    132 Licensing.  They were themselves illegal.  Dan had had a classmate in
    133 software, Frank Martucci, who had obtained an illicit debugging tool,
    134 and used it to skip over the copyright monitor code when reading
    135 books.  But he had told too many friends about it, and one of them
    136 turned him in to the SPA for a reward (students deep in debt were
    137 easily tempted into betrayal).  In 2047, Frank was in prison, not for
    138 pirate reading, but for possessing a debugger.</p>
    139 
    140 <p>
    141 Dan would later learn that there was a time when anyone could have
    142 debugging tools.  There were even free debugging tools available on CD
    143 or downloadable over the net.  But ordinary users started using them
    144 to bypass copyright monitors, and eventually a judge ruled that this
    145 had become their principal use in actual practice.  This meant they
    146 were illegal; the debuggers' developers were sent to prison.</p>
    147 
    148 <p>
    149 Programmers still needed debugging tools, of course, but debugger
    150 vendors in 2047 distributed numbered copies only, and only to
    151 officially licensed and bonded programmers.  The debugger Dan used in
    152 software class was kept behind a special firewall so that it could be
    153 used only for class exercises.</p>
    154 
    155 <p>
    156 It was also possible to bypass the copyright monitors by installing a
    157 modified system kernel.  Dan would eventually find out about the free
    158 kernels, even entire free operating systems, that had existed around
    159 the turn of the century.  But not only were they illegal, like
    160 debuggers&mdash;you could not install one if you had one, without
    161 knowing your computer's root password.  And neither
    162 the FBI nor
    163 Microsoft Support would tell you that.</p>
    164 </div>
    165 <div class="column-limit"></div>
    166 
    167 <div class="columns">
    168 <p>
    169 Dan concluded that he couldn't simply lend Lissa his computer.  But he
    170 couldn't refuse to help her, because he loved her.  Every chance to
    171 speak with her filled him with delight.  And that she chose him to ask
    172 for help, that could mean she loved him too.</p>
    173 
    174 <p>
    175 Dan resolved the dilemma by doing something even more
    176 unthinkable&mdash;he lent her the computer, and told her his password.
    177 This way, if Lissa read his books, Central Licensing would think he
    178 was reading them.  It was still a crime, but the SPA would not
    179 automatically find out about it.  They would only find out if Lissa
    180 reported him.</p>
    181 
    182 <p>
    183 Of course, if the school ever found out that he had given Lissa his
    184 own password, it would be curtains for both of them as students,
    185 regardless of what she had used it for.  School policy was that any
    186 interference with their means of monitoring students' computer use was
    187 grounds for disciplinary action.  It didn't matter whether you did
    188 anything harmful&mdash;the offense was making it hard for the
    189 administrators to check on you.  They assumed this meant you were
    190 doing something else forbidden, and they did not need to know what it
    191 was.</p>
    192 
    193 <p>
    194 Students were not usually expelled for this&mdash;not directly.
    195 Instead they were banned from the school computer systems, and would
    196 inevitably fail all their classes.</p>
    197 
    198 <p>
    199 Later, Dan would learn that this kind of university policy started
    200 only in the 1980s, when university students in large numbers began
    201 using computers.  Previously, universities maintained a different
    202 approach to student discipline; they punished activities that were
    203 harmful, not those that merely raised suspicion.</p>
    204 </div>
    205 <div class="column-limit"></div>
    206 
    207 <div class="columns">
    208 <p>
    209 Lissa did not report Dan to the SPA.  His decision to help her led to
    210 their marriage, and also led them to question what they had been
    211 taught about piracy as children.  The couple began reading about the
    212 history of copyright, about the Soviet Union and its restrictions on
    213 copying, and even the original United States Constitution.  They moved
    214 to Luna, where they found others who had likewise gravitated away from
    215 the long arm of the SPA.  When the Tycho Uprising began in 2062, the
    216 universal right to read soon became one of its central aims.</p>
    217 </div>
    218 
    219 <div class="announcement reduced-width comment" role="complementary">
    220 <hr class="no-display" />
    221 <p><a href="https://www.defectivebydesign.org/ebooks.html">
    222 Join our mailing list about the dangers of e-books</a>.</p>
    223 <hr class="no-display" />
    224 </div>
    225 
    226 <div id="AuthorsNote">
    227 <h3>Author's Notes</h3>
    228 
    229 <ul class="no-bullet">
    230 <li>
    231 <div class="reduced-width">
    232 <p>This story is supposedly a historical article that will be written in
    233 the future by someone else, describing Dan Halbert's youth under a
    234 repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
    235 propaganda. So it uses the terminology of that society.
    236 I have tried to project it forwards into something more visibly
    237 oppressive. See <a
    238 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
    239 </p>
    240 </div>
    241 <div class="column-limit"></div>
    242 </li>
    243 
    244 <li>
    245 <div class="reduced-width">
    246 <p>Computer-enforced restrictions on lending or reading books (and other
    247 kinds of published works) are known as DRM, short for
    248 &ldquo;Digital Restrictions Management.&rdquo;  To
    249 eliminate DRM, the Free Software Foundation has
    250 established the <a href="https://www.defectivebydesign.org/">Defective by
    251 Design</a> campaign.  We ask for your support.</p>
    252 
    253 <p>The Electronic Frontier Foundation, a separate organization not
    254 related to the Free Software Foundation, also campaigns against
    255 DRM.</p>
    256 </div>
    257 <div class="column-limit"></div>
    258 </li>
    259 </ul>
    260 
    261 <p class="update">
    262 The following note has been updated several times since the first
    263 publication of the story.</p>
    264 
    265 <ul class="no-bullet">
    266 <li>
    267 <div class="columns">
    268 <p>
    269 The battle for the right to read is already being fought.  Although it
    270 may take 50 years for our past freedoms to fade into obscurity, most
    271 of the specific repressive laws and practices described above have
    272 already been proposed; some have been enacted into law in the US and
    273 elsewhere.  In the US, the 1998 Digital Millennium Copyright Act
    274 (DMCA) gave explicit government backing to the
    275 computer-enforced restrictions known as DRM, by making the
    276 distribution of programs that can break DRM a crime.  The European
    277 Union imposed similar restrictions in a 2001 copyright directive, in a
    278 form not quite as strong.</p>
    279 
    280 <p>
    281 The US campaigns to impose such rules on the rest of the world through
    282 so-called &ldquo;free trade&rdquo; treaties.
    283 <a href="https://stallman.org/business-supremacy-treaties.html">
    284 Business-supremacy treaties</a> is a more fitting term for them, since
    285 they are designed to give business dominion over nominally democratic
    286 states.  The DMCA's policy of criminalizing programs that
    287 break DRM is one of many unjust policies that these treaties impose
    288 across a wide range of fields.</p>
    289 
    290 <p>
    291 The US has imposed DMCA requirements on Australia, Panama, Colombia
    292 and South Korea through bilateral agreements, and on countries such as
    293 Costa Rica through another treaty, CAFTA.  Obama has escalated the
    294 campaign with two new proposed treaties, the TPP and the TTIP.  The
    295 TPP would impose the DMCA, along with many other wrongs, on 12
    296 countries on the Pacific Ocean.  The TTIP would impose similar
    297 strictures on Europe.  All these treaties must be defeated, or
    298 abolished.</p>
    299 
    300 <p>
    301 Even the World Wide Web Consortium has fallen under the shadow of the
    302 copyright industry; it is on the verge of approving a DRM system as an
    303 official part of the web specifications.</p>
    304 </div>
    305 <div class="column-limit"></div>
    306 </li>
    307 
    308 <li>
    309 <div class="table">
    310 <div class="table-cell left">
    311 <p class="emph-box">
    312 Nonfree software tends to have <a href="/proprietary/">abusive
    313 features of many kinds</a>, which lead to the conclusion that
    314 <a href="/philosophy/free-software-even-more-important.html">you can
    315 never trust a nonfree program</a>.  We must insist on free (libre)
    316 software only, and reject nonfree programs.</p>
    317 </div>
    318 
    319 <p class="table-cell right">
    320 With Windows Vista, Microsoft admitted it had built in a back door:
    321 Microsoft can use it to forcibly install software
    322 &ldquo;upgrades,&rdquo; even if users consider them rather to be
    323 downgrades.  It can also order all machines running Vista to refuse to
    324 run a certain device driver.  The main purpose of Vista's clampdown on
    325 users was to impose DRM that users can't overcome.  Of course, Windows
    326 10 is no better.</p>
    327 </div>
    328 <div class="column-limit"></div>
    329 </li>
    330 
    331 <li>
    332 <div class="columns">
    333 <p>
    334 One of the ideas in the story was not proposed in reality until 2002.
    335 This is the idea that the FBI and Microsoft will keep the
    336 root passwords for your personal computers, and not let you have
    337 them.</p>
    338 
    339 <p>
    340 The proponents of this scheme gave early versions names such as
    341 &ldquo;trusted computing&rdquo; and &ldquo;Palladium,&rdquo; but as
    342 ultimately put into use, it is called &ldquo;secure boot.&rdquo;</p>
    343 
    344 <p>
    345 What Microsoft keeps is not exactly a password in the traditional
    346 sense; no person ever types it on a terminal.  Rather, it is a
    347 signature and encryption key that corresponds to a second key stored
    348 in your computer.  This enables Microsoft, and potentially any web
    349 sites that cooperate with Microsoft, the ultimate control over what
    350 the user can do on per own computer.  Microsoft is likely to use that
    351 control on behalf of the FBI when asked: it
    352 already <a href="/proprietary/malware-microsoft.html">shows
    353 the NSA security bugs in Windows</a> to exploit.</p>
    354 
    355 <p>
    356 Secure boot can be implemented in a way that permits the user to
    357 specify the signature key and decide what software to sign.  In
    358 practice, PCs designed for Windows 10 carry only Microsoft's key, and
    359 whether the machine's owner can install any other system (such as
    360 GNU/Linux) is under Microsoft's control.  We call this <em>restricted
    361 boot</em>.</p>
    362 </div>
    363 <div class="column-limit"></div>
    364 </li>
    365 
    366 <li>
    367 <div class="columns">
    368 <p>
    369 In 1997, when this story was first published, the SPA was
    370 threatening small Internet service providers, demanding they permit
    371 the SPA to monitor all users.  Most ISPs surrendered when
    372 threatened, because they could not afford to fight back in court.  One
    373 ISP, Community ConneXion in Oakland, California, refused the demand
    374 and was actually sued.  The SPA later dropped the suit,
    375 but the DMCA gave it the power it sought.</p>
    376 
    377 <p>
    378 The SPA, which actually stands for Software Publishers
    379 Association, has been replaced in its police-like role by the Business
    380 Software Alliance.  The BSA is not, today, an official
    381 police force; unofficially, it acts like one.  Using methods
    382 reminiscent of the erstwhile Soviet Union, it invites people to inform
    383 on their coworkers and friends.  A BSA terror campaign in
    384 Argentina in 2001 made slightly veiled threats that people sharing
    385 software would be raped in prison.</p>
    386 </div>
    387 <div class="column-limit"></div>
    388 </li>
    389 
    390 <li>
    391 <div class="reduced-width">
    392 <p>
    393 The university security policies described above are not imaginary.
    394 For example, a computer at one Chicago-area university displayed this
    395 message upon login:</p>
    396 
    397 <blockquote><p>
    398 This system is for the use of authorized users only.  Individuals using
    399 this computer system without authority or in the excess of their authority
    400 are subject to having all their activities on this system monitored and
    401 recorded by system personnel.  In the course of monitoring individuals
    402 improperly using this system or in the course of system maintenance, the
    403 activities of authorized user may also be monitored.  Anyone using this
    404 system expressly consents to such monitoring and is advised that if such
    405 monitoring reveals possible evidence of illegal activity or violation of
    406 University regulations system personnel may provide the evidence of such
    407 monitoring to University authorities and/or law enforcement officials.
    408 </p></blockquote>
    409 
    410 <p>
    411 This is an interesting approach to the Fourth Amendment: pressure most
    412 everyone to agree, in advance, to waive their rights under it.</p>
    413 </div>
    414 </li>
    415 </ul>
    416 <div class="column-limit"></div>
    417 </div>
    418 
    419 <div id="BadNews">
    420 <h3>Bad News</h3>
    421 
    422 <p class="reduced-width">
    423 The battle for the right to read is going against us so far.
    424 The enemy is organized, and we are not.
    425 </p>
    426 
    427 <div class="columns">
    428 <p>Today's commercial
    429 e-books <a href="/philosophy/the-danger-of-ebooks.html"> abolish
    430 readers' traditional freedoms</a>.  Amazon's e-book reader product,
    431 which I call the &ldquo;<a
    432 href="/philosophy/why-call-it-the-swindle.html">Amazon
    433 Swindle</a>&rdquo; because it's designed to
    434 swindle readers out of the traditional freedoms of readers of books,
    435 is run by software with several
    436 demonstrated <a href="/proprietary/malware-kindle-swindle.html">Orwellian
    437 functionalities</a>.  Any one of them calls for rejecting the product
    438 completely:</p>
    439 
    440 <ul class="no-bullet">
    441 <li><p>It spies on everything the user does: it reports which book the
    442 user is reading, and which page, and it reports when the user highlights
    443 text, and any notes the user enters.</p></li>
    444 
    445 <li><p>It has DRM, which is intended to block users from
    446 sharing copies.</p></li>
    447 
    448 <li><p>It has a back door with which Amazon can remotely erase any book.
    449 In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
    450 
    451 <li><p class="inline-block">In case all that isn't Orwellian enough, there is a universal
    452 back door with which Amazon can remotely change the software, and
    453 introduce any other form of nastiness.</p></li>
    454 </ul>
    455 
    456 <p>Amazon's e-book distribution is oppressive, too.  It identifies the
    457 user and records what books the user obtains.  It also requires users
    458 to agree to an antisocial contract that they won't share copies with
    459 others.  My conscience tells me that, if I had agreed to such a
    460 contract, the lesser evil would be to defy it and share copies anyway;
    461 however, to be entirely good, I should not agree to it in the first
    462 place.  Therefore, I refuse to agree to such contracts, whether for
    463 software, for e-books, for music, or for anything else.</p>
    464 
    465 <p class="emph-box">
    466 If we want to stop the bad news and create some good news, we need
    467 to organize and fight.  Subscribe to the
    468 FSF's <a href="https://www.defectivebydesign.org/"> Defective by Design</a>
    469 campaign to lend a hand.  You
    470 can <a href="https://www.fsf.org/associate">join the FSF</a> to support
    471 our work more generally.  There is also a <a href="/help/help.html">list of ways
    472 to participate in our work</a>.
    473 </p>
    474 </div>
    475 </div>
    476 <div class="column-limit"></div>
    477 
    478 <h3 class="footnote">References</h3>
    479 
    480 <ul>
    481   <li>The administration's &ldquo;White Paper&rdquo;: Information
    482        Infrastructure Task Force, Intellectual Property [<a
    483        href="/philosophy/not-ipr.html">sic</a>] and the
    484        National Information Infrastructure: The Report of the Working
    485        Group on Intellectual Property [sic] Rights (1995).</li>
    486 
    487   <li><a href="https://www.wired.com/1996/01/white-paper/">An
    488        explanation of the White Paper:
    489        The Copyright Grab</a>, Pamela Samuelson, <cite>Wired</cite>,
    490        January 1st, 1996.</li>
    491 
    492   <li><a href="https://law.duke.edu/boylesite/sold_out.htm">Sold Out</a>,
    493        James Boyle, <cite>New York Times</cite>, March 31, 1996.</li>
    494 
    495   <li><a href="https://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public Data or Private Data</a>, 
    496        Dave Farber, <cite>Washington Post</cite>, November 4, 1996.</li>
    497  
    498   <li><a href="https://web.archive.org/web/20151113122141/http://public-domain.org/">Union for the Public
    499        Domain</a>&mdash;an organization which aims to resist and
    500        reverse the overextension of copyright and patent powers.</li>
    501 </ul>
    502 
    503 <div class="infobox extra" role="complementary">
    504 <hr />
    505 <p>This article appeared in the February 1997 issue of <cite>Communications
    506 of the ACM</cite> (Volume 40, Number 2).</p>
    507 </div>
    508 
    509 <div class="edu-note c"><p id="fsfs">This essay is published in
    510 <a href="https://shop.fsf.org/product/free-software-free-society/"><cite>Free
    511 Software, Free Society: The Selected Essays of Richard
    512 M. Stallman</cite></a>.</p></div>
    513 </div>
    514 
    515 </div><!-- for id="content", starts in the include above -->
    516 <!--#include virtual="/server/footer.html" -->
    517 <div id="footer" role="contentinfo">
    518 <div class="unprintable">
    519 
    520 <p>Please send general FSF &amp; GNU inquiries to
    521 <a href="mailto:gnu@gnu.org">&lt;gnu@gnu.org&gt;</a>.
    522 There are also <a href="/contact/">other ways to contact</a>
    523 the FSF.  Broken links and other corrections or suggestions can be sent
    524 to <a href="mailto:webmasters@gnu.org">&lt;webmasters@gnu.org&gt;</a>.</p>
    525 
    526 <p><!-- TRANSLATORS: Ignore the original text in this paragraph,
    527         replace it with the translation of these two:
    528 
    529         We work hard and do our best to provide accurate, good quality
    530         translations.  However, we are not exempt from imperfection.
    531         Please send your comments and general suggestions in this regard
    532         to <a href="mailto:web-translators@gnu.org">
    533         &lt;web-translators@gnu.org&gt;</a>.</p>
    534 
    535         <p>For information on coordinating and contributing translations of
    536         our web pages, see <a
    537         href="/server/standards/README.translations.html">Translations
    538         README</a>. -->
    539 Please see the <a
    540 href="/server/standards/README.translations.html">Translations
    541 README</a> for information on coordinating and contributing translations
    542 of this article.</p>
    543 </div>
    544 
    545 <!-- Regarding copyright, in general, standalone pages (as opposed to
    546      files generated as part of manuals) on the GNU web server should
    547      be under CC BY-ND 4.0.  Please do NOT change or remove this
    548      without talking with the webmasters or licensing team first.
    549      Please make sure the copyright date is consistent with the
    550      document.  For web pages, it is ok to list just the latest year the
    551      document was modified, or published.
    552      
    553      If you wish to list earlier years, that is ok too.
    554      Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
    555      years, as long as each year in the range is in fact a copyrightable
    556      year, i.e., a year in which the document was published (including
    557      being publicly visible on the web or in a revision control system).
    558      
    559      There is more detail about copyright years in the GNU Maintainers
    560      Information document, www.gnu.org/prep/maintain. -->
    561 
    562 <p>Copyright &copy; 1996, 2002, 2007, 2009, 2012, 2014, 2016, 2021
    563 Richard Stallman</p>
    564 
    565 <p>This page is licensed under a <a rel="license"
    566 href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
    567 Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
    568 
    569 <!--#include virtual="/server/bottom-notes.html" -->
    570 
    571 <p class="unprintable">Updated:
    572 <!-- timestamp start -->
    573 $Date: 2021/12/27 16:59:10 $
    574 <!-- timestamp end -->
    575 </p>
    576 </div>
    577 </div><!-- for class="inner", starts in the banner include -->
    578 </body>
    579 </html>