From c53c74a02bd42c1f986e9e7e9d2caacb4f809ef6 2017-05-09 14:48:00 From: Bradley M. Kuhn Date: 2017-05-09 14:48:00 Subject: [PATCH] Various changes based on Karen's verbal comments. --- diff --git a/presentations/30min-specific-sections/specific-sections.md b/presentations/30min-specific-sections/specific-sections.md index 281e06ae940c75b2c62d4c7d69606d6d4d6b68df..929ae34bf534eed640a326813c85ba850ca85c26 100644 --- a/presentations/30min-specific-sections/specific-sections.md +++ b/presentations/30min-specific-sections/specific-sections.md @@ -17,7 +17,7 @@ # Considering Sections of the GPL -+ GPL ♥ 17 USC§106(2) & 17 USC§106(3) ++ GPL interacts extensively with 17 USC§106(2) & 17 USC§106(3) + GPL hinges on modification and distribution. @@ -37,8 +37,6 @@ # Modification As a Center Provision -+ GPL's primary copyright hook is copyright controls on the right to modify. - + GPL's central tenant: + You can make a modified version of various types privately as much as you'd like. @@ -149,10 +147,9 @@ on the Program. from human-readable + This process can be done ahead of time. -+ Separation of source and binary was the first way proprietary software - companies discovered to subjugate users. ++ Separation of source and binary create first proprietary software. + GPL uses the fact that binaries are modifications (which are often - distribution) to prevent that subjugation. + distribution) to prevent proprietarization. # GPLv2 § 3(a-b)