free_software.xhtml 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. <?xml version="1.0" encoding="utf-8"?>
  2. <!--
  3. h t t :: / / t /
  4. h t t :: // // t //
  5. h ttttt ttttt ppppp sssss // // y y sssss ttttt //
  6. hhhh t t p p s // // y y s t //
  7. h hh t t ppppp sssss // // yyyyy sssss t //
  8. h h t t p s :: / / y .. s t .. /
  9. h h t t p sssss :: / / yyyyy .. sssss t .. /
  10. <https://y.st./>
  11. Copyright © 2017 Alex Yst <mailto:copyright@y.st>
  12. This program is free software: you can redistribute it and/or modify
  13. it under the terms of the GNU General Public License as published by
  14. the Free Software Foundation, either version 3 of the License, or
  15. (at your option) any later version.
  16. This program is distributed in the hope that it will be useful,
  17. but WITHOUT ANY WARRANTY; without even the implied warranty of
  18. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  19. GNU General Public License for more details.
  20. You should have received a copy of the GNU General Public License
  21. along with this program. If not, see <https://www.gnu.org./licenses/>.
  22. -->
  23. <!DOCTYPE html>
  24. <html xmlns="http://www.w3.org/1999/xhtml">
  25. <head>
  26. <base href="https://y.st./en/opinion/free_software.xhtml" />
  27. <title>Free software &lt;https://y.st./en/opinion/free_software.xhtml&gt;</title>
  28. <link rel="icon" type="image/png" href="/link/CC_BY-SA_4.0/y.st./icon.png" />
  29. <link rel="stylesheet" type="text/css" href="/link/basic.css" />
  30. <link rel="stylesheet" type="text/css" href="/link/site-specific.css" />
  31. <script type="text/javascript" src="/script/javascript.js" />
  32. <meta name="viewport" content="width=device-width" />
  33. </head>
  34. <body>
  35. <nav>
  36. <p>
  37. <a href="/en/">Home</a> |
  38. <a href="/en/a/about.xhtml">About</a> |
  39. <a href="/en/a/contact.xhtml">Contact</a> |
  40. <a href="/a/canary.txt">Canary</a> |
  41. <a href="/en/URI_research/"><abbr title="Uniform Resource Identifier">URI</abbr> research</a> |
  42. <a href="/en/opinion/">Opinions</a> |
  43. <a href="/en/coursework/">Coursework</a> |
  44. <a href="/en/law/">Law</a> |
  45. <a href="/en/a/links.xhtml">Links</a> |
  46. <a href="/en/opinion/free_software.xhtml.asc">{this page}.asc</a>
  47. </p>
  48. <hr/>
  49. <p>
  50. <a href="/en/opinion/XML.xhtml"><abbr title="Extensible Markup Language">XML</abbr></a> |
  51. <a href="/en/opinion/code_indentation.xhtml">Code indentation</a> |
  52. <a href="/en/opinion/free_culture.xhtml">Free culture</a> |
  53. <a href="/en/opinion/free_software.xhtml">Free software</a> |
  54. <a href="/en/opinion/holidays.xhtml">Holidays</a> |
  55. <a href="/en/opinion/misuse_of_words.xhtml">Misuse of words</a>
  56. </p>
  57. <hr/>
  58. </nav>
  59. <header>
  60. <h1>Free software</h1>
  61. <p>Vital for trust, privacy, security, freedom, education, competition, and progress</p>
  62. </header>
  63. <p>Free software is absolutely vital for a number of reasons. Some people focus on only some reasons, then claim that people that focus on other reasons are missing the point. However, I think that in cases such as these, both sides are missing part of the point. We should all be insisting on free software and we don&apos;t need the same reason to do so. There are plenty of reasons to support free software and almost no reasons to oppose it.</p>
  64. <h2>Trust</h2>
  65. <p>Companies have proven time and time again that they can&apos;t be trusted. They frequently build malicious features into their works to pad their bottom lines. But what if there was a way to know that you could trust the software that you run? What if the human-readable source code was available for public audit and commentary? With free software, you have that. You don&apos;t even need to know how to read the code yourself. If there&apos;s something particularly malicious in the code and there is a large enough user base, <strong>*someone*</strong> will notice and publicize it. Simply having the source code available is of benefit to everyone, even those that can&apos;t make direct use of it.</p>
  66. <h2>Privacy</h2>
  67. <p>Often times, proprietary software vendors build spyware into their software. A great example of this is the spyware that Microsoft incorporated into Windows 10. There&apos;s no way to even turn it off and it&apos;s been proven to bypass your proxy settings. It sends your private data back to Microsoft, which is an invasion of privacy and is just plain creepy. Let&apos;s pretend for a moment that you fully trust Microsoft with your data though. What then? Because Microsoft doesn&apos;t care about you, they set up their operating system to send back some of your data <a href="http://arstechnica.co.uk./information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">using unencrypted <abbr title="Hypertext Transfer Protocol">HTTP</abbr></a>. Not only is Microsoft able to see anything that they choose to on your computer, anyone listening in can perform a man-in-the-middle attack and see all of that information as well! With Windows 10, you get no privacy with your own machine.</p>
  68. <p>With free software, this is much less of an issue. When the source code is widely available, someone will notice and point out when the software&apos;s doing something that invades the users&apos; privacy. Furthermore, if the software is important enough, people with fork the code and remove the malicious feature. The malicious version of the software will lose popularity and will collapse.</p>
  69. <h2>Security</h2>
  70. <p>Security and privacy go hand-in-hand. If your machine is constantly sending your data back home to the developer of the software that you use, I&apos;d argue that that&apos;s not only a breach of privacy and a breach of trust, but also a breach of security. However, let&apos;s put that aside and instead focus on the exploitation of vulnerabilities in the system, both intended and unintended.</p>
  71. <h3>Back doors</h3>
  72. <p>Sometimes, software developers into their software. In doing so, they provide themselves with access to all or part of your machine. Clearly, this is a breach of your security, but it doesn&apos;t stop there. Malicious computer crackers are often very skilled at locating and exploiting these back doors. By building these back doors into their software, developers not only allow themselves access to your machine, but also allow access to your machine by any number of unknown malicious parties. Back doors are quickly spotted by users and removed from software when the source code is available to the public.</p>
  73. <h3>Security bugs</h3>
  74. <p>Security bugs happen, both in free and nonfree software. But how easy are they to find and get fixed? When the source code is available, any user that notices the bug, has the skills, and has the time can fix it. Often times, the developers are more than willing to take bug patches from users that take the time and effort to fix these problems. Critical bug patches are often released within hours of a bug getting found simply because many users want the bug gone and peace of mind restored.</p>
  75. <p>I&apos;m not saying that critical security bugs are always found right away in free software. We all know about the <a href="https://heartbleed.com./">Heartbleed</a> incident, which went undiscovered for about two years. However, when critical bugs are discovered, fixes come almost right away.</p>
  76. <h2>Freedom</h2>
  77. <p>With free software, you have freedom. This should go without saying. If software doesn&apos;t quite work the way that you want it to, you may modify it. You may write your own bug fixes if others aren&apos;t writing them fast enough, you can deploy custom versions, and you may do all your computing your way. There&apos;s very little limit to what you can do with the software that you use when it&apos;s free.</p>
  78. <h2>Education</h2>
  79. <p>Why is proprietary software even <strong>*used*</strong> in the education system? Proprietary software usually doesn&apos;t allow you to see the source code and often forbids reverse engineering. In other words, proprietary software <strong>*forbids you from learning how it functions*</strong>. Is this really conductive to education? I don&apos;t thing so. It can be argued that schools teach about proprietary software because that&apos;s what people will use when they get a job, but that&apos;s a bit misleading. A big part of what software people choose to use is based on what they know. If schools taught about free software instead of proprietary software, we&apos;d see a lot more free software in use by businesses.</p>
  80. <h2>Competition</h2>
  81. <p>One of the biggest problems with proprietary software is the monopolies and vendor lock-in that it creates. This leads to price gouging and often results in users giving in and accepting all of the user-abusing features that the software comes with, such as back doors and spyware. After all, what other choice do users have? However, with free software, it&apos;s easy to develop alternatives. Projects can be forked and user-abusing features can be removed. Custom interfaces can be provided, new features can be added, and users can switch between alternatives as they see fit. Users aren&apos;t bound to the whims of a single company.</p>
  82. <h2>Progress</h2>
  83. <p>Probably my biggest problem with proprietary software is the fact that everyone is having to reinvent the wheel. With free software, that which has already been developed can be reused, so development efforts can be put somewhere more productive. Hoarded knowledge has held us back so far. If people worked together instead of against one another, just imagine how much more technologically advanced we&apos;d be by now.</p>
  84. <hr/>
  85. <p>
  86. Copyright © 2017 Alex Yst;
  87. You may modify and/or redistribute this document under the terms of the <a rel="license" href="/license/gpl-3.0-standalone.xhtml"><abbr title="GNU&apos;s Not Unix">GNU</abbr> <abbr title="General Public License version Three or later">GPLv3+</abbr></a>.
  88. If for some reason you would prefer to modify and/or distribute this document under other free copyleft terms, please ask me via email.
  89. My address is in the source comments near the top of this document.
  90. This license also applies to embedded content such as images.
  91. For more information on that, see <a href="/en/a/licensing.xhtml">licensing</a>.
  92. </p>
  93. <p>
  94. <abbr title="World Wide Web Consortium">W3C</abbr> standards are important.
  95. This document conforms to the <a href="https://validator.w3.org./nu/?doc=https%3A%2F%2Fy.st.%2Fen%2Fopinion%2Ffree_software.xhtml"><abbr title="Extensible Hypertext Markup Language">XHTML</abbr> 5.1</a> specification and uses style sheets that conform to the <a href="http://jigsaw.w3.org./css-validator/validator?uri=https%3A%2F%2Fy.st.%2Fen%2Fopinion%2Ffree_software.xhtml"><abbr title="Cascading Style Sheets">CSS</abbr>3</a> specification.
  96. </p>
  97. </body>
  98. </html>