0 2 0
Denver Gingerich - 4 months ago 2020-07-15 23:59:24
denver@ossguy.com
Copyleft Compliance: mostly minor fixes to new pgs These are mostly minor edits (typo fixes, etc.) to the enforcement strategy and firmware liberation pages that were just added. The one large change was to replace the first paragraph of the enforcement strategy page with the full Conservancy description used previously. The glue text used to shorten it appeared unsalvageable and it wasn't immediately obvious how to replace it with something better, so we used the full description instead.
2 files changed with 27 insertions and 22 deletions:
↑ Collapse Diff ↑
...
 
@@ -6,7 +6,12 @@
6 6
 
<h1 id="software-freedom-conservancy-proposal-for-gpl-enforcement-grant">History and Future Strategy</h1>
7 7
 

	
8 8
 
<p>The Software Freedom Conservancy is a 501(c)(3) non-profit charity
9
 
  registered in New York that continues it work in the are of important
9
 
  registered in New York.  Founded in 2006, Conservancy helps people take control
10
 
  of their computing by growing the software freedom movement, supporting
11
 
  community-driven alternatives to proprietary software, and defending free
12
 
  software with practical initiatives.  Conservancy accomplishes these goals
13
 
  with various initiatives including fiscal sponsorship, licensing and project
14
 
  governance policy, and public advocacy.  Some of Conservancy's most important
10 15
 
  licensing policy work involves defending and upholding the rights of
11 16
 
  software users and consumers under copyleft licenses, such as the GPL.</p>
12 17
 

	
...
 
@@ -24,7 +29,7 @@
24 29
 
  the router, but Linksys and Cisco had failed to provide source code or any
25 30
 
  offer for source code to its customers.</p>
26 31
 

	
27
 
<p>A coalition formed including organizations and individuals — including
32
 
<p>A coalition formed made up of organizations and individuals — including
28 33
 
  Erik Andersen (major contributor to and former leader of the BusyBox
29 34
 
  project) and Harald Welte (major contributor to Linux’s netfilter
30 35
 
  subsystem) — to enforce the
...
 
@@ -32,7 +37,7 @@
32 37
 
    M. Kuhn</a>, who is now Conservancy’s Policy Analyst and
33 38
 
  Hacker-in-Residence, led and coordinated that coalition when he was
34 39
 
  Executive Director of the FSF. By early 2004, this coalition, through the
35
 
  process of GPL enforcement,compelled Linksys to release an
40
 
  process of GPL enforcement, compelled Linksys to release an
36 41
 
  almost-GPL-compliant source release for the
37 42
 
  WRT54G. A <a href="https://openwrt.org/about/history">group of volunteers
38 43
 
    quickly built a new project, called OpenWRT</a> based on that source
...
 
@@ -115,10 +120,10 @@
115 120
 
<p>There is one overarching irony to this growing dystopia: nearly all these
116 121
 
  devices are based primarily on software licensed under the GPL: most
117 122
 
  notably, Linux. While Linux-based systems do allow proprietary user-space
118
 
  applications not licensed under GPL, the kernel (and many other system
123
 
  applications not licensed under GPL, the kernel and many other system
119 124
 
  utilities routinely used in embedded systems, such as Conservancy’s BusyBox
120
 
  project) are under that license (or similar copyleft licenses such as the
121
 
  LGPL). These licenses require device markers to provide complete,
125
 
  project, are under that license (or similar copyleft licenses such as the
126
 
  LGPL). These licenses require device makers to provide complete,
122 127
 
  corresponding source code to everyone in possession of their
123 128
 
  devices. Furthermore, Linux’s specific license (GPL, version 2), mandates
124 129
 
  that source code must also include “the scripts used to control compilation
...
 
@@ -139,9 +144,9 @@
139 144
 
  solutions. E-recyclers
140 145
 
  like <a href="https://www.freegeek.org/">Freegeek</a> do this regularly for
141 146
 
  desktop and laptop machines with GNU/Linux distributions like Debian, and
142
 
  with OpenWRT for wireless routers. We seek to assure they can do this for
147
 
  with OpenWRT for wireless routers. We seek to ensure they can do this for
143 148
 
  other types of electronic products. However, without the complete,
144
 
  corresponding source code and the scripts to control its compilation and
149
 
  corresponding source code, including the scripts to control its compilation and
145 150
 
  installation, the fundamental purpose of copyleft is frustrated. Consumers,
146 151
 
  hobbyists, non-profit e-recyclers and the general public are left without
147 152
 
  the necessary tools they need and deserve, and which the license promises
...
 
@@ -168,7 +173,7 @@
168 173
 

	
169 174
 
<p>“Internet of Things” firmware should never rely on one vendor — even the
170 175
 
  vendor of the hardware itself. This centralized approach is brittle and
171
 
  inevitably leads to invasions of the public’s privacy and control of their
176
 
  inevitably leads to invasions of the public’s privacy and loss of control of their
172 177
 
  technology. Conservancy’s GPL enforcement work is part of the puzzle that
173 178
 
  ensures users can choose who their devices connect to, and how they
174 179
 
  connect. Everyone deserves control over their own computing — from their
...
 
@@ -182,7 +187,7 @@
182 187
 
  Project for Linux Developers</h2>
183 188
 

	
184 189
 
<p>In May 2012, Software Freedom Conservancy
185
 
  formed <a href="https://sfconservancy.org/copyleft-compliance/">The GPL
190
 
  formed <a href="https://sfconservancy.org/copyleft-compliance/#linux">The GPL
186 191
 
    Compliance Project for Linux Developers</a> in response to frustration by
187 192
 
  upstream Linux developers about the prevalence of noncompliance in the
188 193
 
  field, and their desire to stand with Conservancy’s BusyBox, Git and Samba
...
 
@@ -286,13 +291,13 @@
286 291
 
  in the unfunded work to make an MVP alternative firmware. While volunteer
287 292
 
  involvement remains essential to the success of alternative firmware
288 293
 
  projects, we know from our fiscal sponsorship work that certain aspects of
289
 
  FOSS projects require an experienced charity to initiate and jump start
294
 
  FOSS projects require an experienced charity to initiate and jump-start
290 295
 
  some of the less exciting aspects of FOSS project creation and
291 296
 
  development.</p>
292 297
 

	
293 298
 
<p>Conservancy plans to select a specific class of device. Upon achieving
294 299
 
  compliant source releases in that subindustry through GPL enforcement,
295
 
  Conservancy will <a href="firmware-liberation">launch an alternative
296
 
  firmware project</> for that class of device.</p>
300
 
  Conservancy will <a href="firmware-liberation.html">launch an alternative
301
 
  firmware project</a> for that class of device.</p>
297 302
 

	
298 303
 
{% endblock %}
...
 
@@ -20,7 +20,7 @@
20 20
 
  projects.</p>
21 21
 

	
22 22
 
<p>A coalition successfully enforced the GPL in this case, and Linksys
23
 
  released source code A <a href="https://openwrt.org/about/history">group of
23
 
  released source code. A <a href="https://openwrt.org/about/history">group of
24 24
 
    volunteers quickly built a new project, called OpenWRT</a> based on that
25 25
 
  source release. In the years that have followed, OpenWRT has been ported to
26 26
 
  almost every major wireless router product. Now, more than 15 years later,
...
 
@@ -42,7 +42,7 @@
42 42
 
  cameras, police body cameras, cars, AV receivers, and televisions.</p>
43 43
 

	
44 44
 
<p>This wide deployment of general purpose computers into mundane household
45
 
  devices raises profound privacy and consumer rights
45
 
  devices has profound privacy and consumer rights
46 46
 
  implications. <a href="https://www.nytimes.com/2019/12/15/us/Hacked-ring-home-security-cameras.html">Home</a> <a href="https://www.washingtonpost.com/technology/2019/01/23/family-says-hacked-nest-camera-warned-them-north-korean-missile-attack/">security</a> <a href="https://www.npr.org/sections/thetwo-way/2018/06/05/617196788/s-c-mom-says-baby-monitor-was-hacked-experts-say-many-devices-are-vulnerable">cameras</a> <a href="https://www.cnn.com/2019/12/12/tech/ring-security-camera-hacker-harassed-girl-trnd/index.html">are</a> <a href="https://abc7.com/baby-monitor-hack-leads-to-kidnap-scare/4931822/">routinely</a> <a href="https://www.bbc.com/news/av/uk-44117337/security-footage-viewed-by-thousands">compromised</a>
47 47
 
  — invading the privacy and security of individual homes. Even when
48 48
 
  companies succeed in keeping out third parties, consumers
...
 
@@ -55,7 +55,7 @@
55 55
 

	
56 56
 
<p>“Internet of Things” firmware should never rely on one vendor — even the
57 57
 
  vendor of the hardware itself. This centralized approach is brittle and
58
 
  inevitably leads to invasions of the public’s privacy and control of their
58
 
  inevitably leads to invasions of the public’s privacy and loss of control of their
59 59
 
  technology. Conservancy plans to address this issue in the manner that the
60 60
 
  FOSS community knows best: put one foot in front of the other, and work to
61 61
 
  create FOSS for every possible task that users want to accomplish. For IoT
...
 
@@ -77,7 +77,7 @@
77 77
 
  market.</p>
78 78
 

	
79 79
 
<h3 id="demonstrating-the-power-of-software-freedom">Demonstrating the power
80
 
  of software freedom,</h3>
80
 
  of software freedom</h3>
81 81
 

	
82 82
 
<p>To many, the benefits of software freedom are abstract. For less technical
83 83
 
  users, the idea of modifying or even reviewing the software on their
...
 
@@ -89,7 +89,7 @@
89 89
 

	
90 90
 
<p>When alternative firmware projects like OpenWRT exist for IoT devices,
91 91
 
  non-technical users can replace the software on their devices and benefit
92
 
  from custom, community-controled software. Technical users are more likely
92
 
  from custom, community-controlled software. Technical users are more likely
93 93
 
  to contribute knowing their efforts will be meaningful.</p>
94 94
 

	
95 95
 
<p>However, decades of corporate involvement in copyleft have demonstrated
...
 
@@ -117,7 +117,7 @@
117 117
 
  Enforcement</h2>
118 118
 

	
119 119
 
<p><a href="enforcement-strategy.html">Conservancy plans to select a specific
120
 
  violation and engage in litigation. Based on past experience, we expect
120
 
  violation and engage in litigation.</a> Based on past experience, we expect
121 121
 
  that the press and attention to that ongoing litigation will yield
122 122
 
  increased responsiveness by violators throughout the industry. (A similar
123 123
 
  outcome occurred after our litigation in 2006.) This expected change in
...
 
@@ -142,9 +142,9 @@
142 142
 
  that certain aspects of FOSS projects require an experienced charity to
143 143
 
  initiate and jump-start some of the less exciting aspects of FOSS project
144 144
 
  creation and development. (In our last fiscal year, Conservancy funded 160
145
 
  contributors to work on FOSS)</p>
145
 
  contributors to work on FOSS.)</p>
146 146
 

	
147
 
<p>In the initial phase of this grant, Conservancy will to select a specific
147
 
<p>In the initial phase of this grant, Conservancy will select a specific
148 148
 
  class of device. Upon achieving compliant source releases in that
149 149
 
  subindustry through GPL enforcement, Conservancy will launch an alternative
150 150
 
  firmware project for that class of device.</p>
...
 
@@ -155,7 +155,7 @@
155 155
 
  periods for a grassroots hobbyist activity is quite challenging; we seek to
156 156
 
  use this grant to bootstrap and catalyze interest and contribution to the
157 157
 
  project. Ideally, Conservancy would run the project with a single full-time
158
 
  staffer for a about a year, and achieve a volunteer base sufficient to
158
 
  staffer for about a year, and achieve a volunteer base sufficient to
159 159
 
  reduce funding to one part-time staffer.</p>
160 160
 

	
161 161
 
<h3 id="criteria-for-device-selection">Criteria for Device Selection</h3>
0 comments (0 inline, 0 general)