Changeset - 6648ed63ca6b
[Not reviewed]
0 2 0
Denver Gingerich - 22 months ago 2020-07-15 23:59:24
denver@ossguy.com
Copyleft Compliance: mostly minor fixes to new pgs

These are mostly minor edits (typo fixes, etc.) to the enforcement
strategy and firmware liberation pages that were just added.

The one large change was to replace the first paragraph of the
enforcement strategy page with the full Conservancy description used
previously. The glue text used to shorten it appeared unsalvageable
and it wasn't immediately obvious how to replace it with something
better, so we used the full description instead.
2 files changed with 27 insertions and 22 deletions:
0 comments (0 inline, 0 general)
www/conservancy/static/copyleft-compliance/enforcement-strategy.html
Show inline comments
...
 
@@ -8,3 +8,8 @@
 
<p>The Software Freedom Conservancy is a 501(c)(3) non-profit charity
 
  registered in New York that continues it work in the are of important
 
  registered in New York.  Founded in 2006, Conservancy helps people take control
 
  of their computing by growing the software freedom movement, supporting
 
  community-driven alternatives to proprietary software, and defending free
 
  software with practical initiatives.  Conservancy accomplishes these goals
 
  with various initiatives including fiscal sponsorship, licensing and project
 
  governance policy, and public advocacy.  Some of Conservancy's most important
 
  licensing policy work involves defending and upholding the rights of
...
 
@@ -26,3 +31,3 @@
 

	
 
<p>A coalition formed including organizations and individuals — including
 
<p>A coalition formed made up of organizations and individuals — including
 
  Erik Andersen (major contributor to and former leader of the BusyBox
...
 
@@ -34,3 +39,3 @@
 
  Executive Director of the FSF. By early 2004, this coalition, through the
 
  process of GPL enforcement,compelled Linksys to release an
 
  process of GPL enforcement, compelled Linksys to release an
 
  almost-GPL-compliant source release for the
...
 
@@ -117,6 +122,6 @@
 
  notably, Linux. While Linux-based systems do allow proprietary user-space
 
  applications not licensed under GPL, the kernel (and many other system
 
  applications not licensed under GPL, the kernel and many other system
 
  utilities routinely used in embedded systems, such as Conservancy’s BusyBox
 
  project) are under that license (or similar copyleft licenses such as the
 
  LGPL). These licenses require device markers to provide complete,
 
  project, are under that license (or similar copyleft licenses such as the
 
  LGPL). These licenses require device makers to provide complete,
 
  corresponding source code to everyone in possession of their
...
 
@@ -141,5 +146,5 @@
 
  desktop and laptop machines with GNU/Linux distributions like Debian, and
 
  with OpenWRT for wireless routers. We seek to assure they can do this for
 
  with OpenWRT for wireless routers. We seek to ensure they can do this for
 
  other types of electronic products. However, without the complete,
 
  corresponding source code and the scripts to control its compilation and
 
  corresponding source code, including the scripts to control its compilation and
 
  installation, the fundamental purpose of copyleft is frustrated. Consumers,
...
 
@@ -170,3 +175,3 @@
 
  vendor of the hardware itself. This centralized approach is brittle and
 
  inevitably leads to invasions of the public’s privacy and control of their
 
  inevitably leads to invasions of the public’s privacy and loss of control of their
 
  technology. Conservancy’s GPL enforcement work is part of the puzzle that
...
 
@@ -184,3 +189,3 @@
 
<p>In May 2012, Software Freedom Conservancy
 
  formed <a href="https://sfconservancy.org/copyleft-compliance/">The GPL
 
  formed <a href="https://sfconservancy.org/copyleft-compliance/#linux">The GPL
 
    Compliance Project for Linux Developers</a> in response to frustration by
...
 
@@ -288,3 +293,3 @@
 
  projects, we know from our fiscal sponsorship work that certain aspects of
 
  FOSS projects require an experienced charity to initiate and jump start
 
  FOSS projects require an experienced charity to initiate and jump-start
 
  some of the less exciting aspects of FOSS project creation and
...
 
@@ -294,4 +299,4 @@
 
  compliant source releases in that subindustry through GPL enforcement,
 
  Conservancy will <a href="firmware-liberation">launch an alternative
 
  firmware project</> for that class of device.</p>
 
  Conservancy will <a href="firmware-liberation.html">launch an alternative
 
  firmware project</a> for that class of device.</p>
 

	
www/conservancy/static/copyleft-compliance/firmware-liberation.html
Show inline comments
...
 
@@ -22,3 +22,3 @@
 
<p>A coalition successfully enforced the GPL in this case, and Linksys
 
  released source code A <a href="https://openwrt.org/about/history">group of
 
  released source code. A <a href="https://openwrt.org/about/history">group of
 
    volunteers quickly built a new project, called OpenWRT</a> based on that
...
 
@@ -44,3 +44,3 @@
 
<p>This wide deployment of general purpose computers into mundane household
 
  devices raises profound privacy and consumer rights
 
  devices has profound privacy and consumer rights
 
  implications. <a href="https://www.nytimes.com/2019/12/15/us/Hacked-ring-home-security-cameras.html">Home</a> <a href="https://www.washingtonpost.com/technology/2019/01/23/family-says-hacked-nest-camera-warned-them-north-korean-missile-attack/">security</a> <a href="https://www.npr.org/sections/thetwo-way/2018/06/05/617196788/s-c-mom-says-baby-monitor-was-hacked-experts-say-many-devices-are-vulnerable">cameras</a> <a href="https://www.cnn.com/2019/12/12/tech/ring-security-camera-hacker-harassed-girl-trnd/index.html">are</a> <a href="https://abc7.com/baby-monitor-hack-leads-to-kidnap-scare/4931822/">routinely</a> <a href="https://www.bbc.com/news/av/uk-44117337/security-footage-viewed-by-thousands">compromised</a>
...
 
@@ -57,3 +57,3 @@
 
  vendor of the hardware itself. This centralized approach is brittle and
 
  inevitably leads to invasions of the public’s privacy and control of their
 
  inevitably leads to invasions of the public’s privacy and loss of control of their
 
  technology. Conservancy plans to address this issue in the manner that the
...
 
@@ -79,3 +79,3 @@
 
<h3 id="demonstrating-the-power-of-software-freedom">Demonstrating the power
 
  of software freedom,</h3>
 
  of software freedom</h3>
 

	
...
 
@@ -91,3 +91,3 @@
 
  non-technical users can replace the software on their devices and benefit
 
  from custom, community-controled software. Technical users are more likely
 
  from custom, community-controlled software. Technical users are more likely
 
  to contribute knowing their efforts will be meaningful.</p>
...
 
@@ -119,3 +119,3 @@
 
<p><a href="enforcement-strategy.html">Conservancy plans to select a specific
 
  violation and engage in litigation. Based on past experience, we expect
 
  violation and engage in litigation.</a> Based on past experience, we expect
 
  that the press and attention to that ongoing litigation will yield
...
 
@@ -144,5 +144,5 @@
 
  creation and development. (In our last fiscal year, Conservancy funded 160
 
  contributors to work on FOSS)</p>
 
  contributors to work on FOSS.)</p>
 

	
 
<p>In the initial phase of this grant, Conservancy will to select a specific
 
<p>In the initial phase of this grant, Conservancy will select a specific
 
  class of device. Upon achieving compliant source releases in that
...
 
@@ -157,3 +157,3 @@
 
  project. Ideally, Conservancy would run the project with a single full-time
 
  staffer for a about a year, and achieve a volunteer base sufficient to
 
  staffer for about a year, and achieve a volunteer base sufficient to
 
  reduce funding to one part-time staffer.</p>
0 comments (0 inline, 0 general)