The Internet

I Bought a Book About the Internet From 1994 and None of the Links Worked (vice.com) 180

An anonymous reader shares a report (condensed for space and clarity): For crate-diggers of all stripes, the internet is awesome for one reason: The crate never ends. There's always something new to find online, because people keep creating new things to throw into that crate. But that crate has a hole at the bottom. Stuff is falling out just as quickly, and pieces of history that would stick around in meatspace disappear in an instant online. So as a result, there aren't a lot of websites from 1995 that made it through to the present day. Gopher sites? Odds are low. Text files? Perhaps. The endless pace of linkrot has left books about the internet in a curious limbo -- they're dead trees about the dead-tree killer, after all. [...] Recently, I bought a book -- a reference book, the kind that you can still pick up at Barnes and Noble today. The book, titled Free $tuff From the Internet (Coriolis Group Books, 1994), promises to help you find free content online. And, crucially, it focuses less on the web, which was still quite young, than on many of the alternative protocols of the era. This book links to FTP sites, telnet servers, and Gopher destinations, and I've tried many of them in an effort to figure out whether something, anything in this book works in the present day. These FTP servers were often based at universities which have a vested interest in keeping information online for a long-term period -- think the University of North Carolina, or Kansas State University. But despite this, I could not get most of these servers to load -- they were long ago murdered by the World Wide Web.
Google

Google Engineer's Leaked 'Gender Diversity' Essay Draws Massive Response (medium.com) 1122

An anonymous reader writes: An engineer at Google's Mountain View headquarters circulated a 3,400-word essay internally that argued a "moral bias" exists at Google that's "shaming dissenters" and silencing their voices against "encroaching extremist and authoritarian policies." It attributes the gender gap in technology to biology-based differences in abilities (such as "speaking up" and "leading") and different personality traits (including "neuroticism"). Its suggested remedies include "Stop alienating conservatives" (calling it "non-inclusive" and "bad business because conservatives tend to be higher in conscientiousness"), and it also suggests as a solution to "de-emphasize empathy" (which "causes us to focus on anecdotes, favor individuals similar to us, and harbor other irrational and dangerous biases").

As the essay leaked over the weekend, former Google engineer Yonatan Zunger identified its anonymous author as "not someone senior," saying the author didn't seem to understand gender -- or engineering -- or what's going to happen next. "Essentially, engineering is all about cooperation, collaboration, and empathy for both your colleagues and your customers. If someone told you that engineering was a field where you could get away with not dealing with people or feelings, then I'm very sorry to tell you that you have been lied to... It's true that women are socialized to be better at paying attention to people's emotional needs and so on -- this is something that makes them better engineers, not worse ones... You need to learn the difference between 'I think we should adopt Go as our primary language' and 'I think one-third of my colleagues are either biologically unsuited to do their jobs, or if not are exceptions and should be suspected of such until they can prove otherwise to each and every person's satisfaction.'"

The leaked internal essay is now being discussed in literally dozens of news outlets. Click through for some official responses, including leaked reactions from Google's VP of Engineering, from Google's new VP of Diversity, Integrity & Governance -- and from Slashdot's readers.
Facebook

Facebook Fights Fake News With Links To Other Angles (techcrunch.com) 157

Facebook is rolling out "Related Articles" that appear below news links to stories lots of people are posting about on Facebook, or that are suspected to be false news and have been externally fact checked by Facebook's partners. "Appearing before someone reads, Related Articles will surface links to additional reporting on the same topic to provide different view points, and to truthiness reports from the fact checkers," reports TechCrunch. From the report: If users see drastically different angles when they compare a story to its Related Articles, they might deem it suspicious and skip it, be less likely to believe or share it, or could click through the Related Articles and make up their own mind. That could reduce the spread and impact of false news without Facebook itself having to be the honesty police. Related Articles could also balance out some of the radical invective that can subtly polarize the populace. Pre-click Related Articles are rolling out in the U.S., Germany, France, and Nederlands today. These countries were chosen to get the roll out first because Facebook has established fact checking partnerships there. "We don't want to be and are not the arbiters of the truth. The fact checkers can give the signal of whether a story is true or false" says Facebook News Feed integrity product manager Tessa Lyons. Meanwhile, Facebook's machine learning algorithm has improved its accuracy and speed, so the social network will now have it send more potential hoaxes to fact checkers.
Privacy

CNET Warns 'Everything Looks Like A Hack' At DEFCON (cnet.com) 45

From a CNET report:The hacker convention, which is in its 25th year in Las Vegas, typically has hotels on alert for its three days of Sin City talk, demos and mischief. Guests are encouraged not to pick up any flash drives lying around, and employees are trained to be wary of social engineering -- that is, bad guys pretending to be someone innocent and in need of just a little help. Small acts of vandalism pop up around town. At Caesars Palace, where Defcon is happening, the casino's UPS store told guests it was not accepting any print requests from USB drives or links, and only printing from email attachments. Hackers who saw this laughed, considering that emails are hardly immune from malware. But the message is clear: During these next few days, hackers are going to have their fun, whether it's through a compromised Wi-Fi network or an open-to-tinkering website.
NOTE: CNET also originally reported that the Wet Republic web site "had two images vandalized" with digital graffiti. But their reporter now writes that "my paranoia finally got the best of me, and it turned out to be an ad campaign."
Programming

How a VC-Funded Company Is Undermining the Open-Source Community (theoutline.com) 84

Adrianne Jeffries, reporting for The Outline: Is a $4 million venture capital-funded startup stealthily taking over popular coding tools and injecting ads and spyware into them? That's what some programmers fear may be happening. It is one of the most troubling scandals to hit the open-source community -- a robust network of programmers who work on shared tools for free -- in recent memory. It started back in April, when a programmer noticed a strange change to an open-source tool called Minimap. Minimap has had more than 3.5 million downloads, but like many open-source tools, it was maintained by a single person who no one knew much about other than their username: @abe33. At some point, @abe33, whose real name is Cedric Nehemie, was hired by Kite. Kite was started by Adam Smith, a successful tech entrepreneur who raised funding from a slew of big names including the CEO of Dropbox and the creator of WordPress. It is unclear what Kite's business model is, but it says it uses machine-learning techniques to make coding tools. Its tools are not open source. After being hired by Kite, @abe33 made an update to Minimap. The update was titled "Implement Kite promotion," and it appeared to look at a user's code and insert links to related pages on Kite's website. Kite called this a useful feature. Programmers said it was not useful and was therefore just an ad for an unrelated service, something many programmers would consider a violation of the open-source spirit. "It's not a feature, it's advertising -- and people don't want it, you want it," wrote user @p-e-w. "The least you can do is own up to that." "I have to wonder if your goal was to upset enough people that you'd generate real attention on various news sites and get Kite a ton of free publicity before your next funding round," @DevOpsJohn wrote. "That's the only sane explanation I can find for suddenly dropping ads into the core of one of the oldest and most useful Atom plugins." [...] Although Kite has no business model yet, it's widely thought in Silicon Valley that having users is the first step toward profitability. Adding users potentially benefits the company in another way, by giving it access to precious data. Kite says it uses machine learning tactics to make the best coding helper tools possible. In order to do that, it needs tons of data to learn from. The more code it can look at, the better its autocomplete suggestions will get, for example.
PlayStation (Games)

Sony Using Copyright Requests To Remove Leaked PS4 SDK From the Web (arstechnica.com) 156

An anonymous reader quotes a report from Ars Technica: Sony appears to be using copyright law in an attempt to remove all traces of a leaked PlayStation 4 Software Development Kit (PS4 SDK) from the Web. That effort also seems to have extended in recent days to the forced removal of the mere discussion of the leak and the posting of a separate open source, homebrew SDK designed to be used on jailbroken systems. The story began a few weeks ago, when word first hit that version 4.5 of the PS4 SDK had been leaked online by a hacker going by the handle Kromemods. These SDKs are usually provided only to authorized PS4 developers inside development kits. The SDKs contain significant documentation that, once made public, can aid hackers in figuring out how to jailbreak consoles, create and install homebrew software, and enable other activities usually prohibited by the hardware maker (as we've seen in the wake of previous leaks of PlayStation 3 SDKs). While you can still find reference to the version 4.5 SDK leak on places like Reddit and MaxConsole, threads discussing and linking to those leaked files on sites like GBATemp and PSXhax, for example, appear to have been removed after the fact. Cached versions of those pages show links (now defunct) to download those leaked files, along with a message from KromeMods to "Please spread this as much as possible since links will be taken down... We will get nowhere if everything keeps private; money isn't everything." KromeMods notes on Twitter that his original tweet posting a link to the leaked files was also hit with a copyright notice from Sony.
EU

EU Court to Rule On 'Right to Be Forgotten' Outside Europe (wsj.com) 182

The European Union's top court is set to decide whether the bloc's "right to be forgotten" policy stretches beyond Europe's borders, a test of how far national laws can -- or should -- stretch when regulating cyberspace. From a report: The case stems from France, where the highest administrative court on Wednesday asked the EU's Court of Justice to weigh in on a dispute between Alphabet's Google and France's privacy regulator over how broadly to apply the right (Editor's note: the link could be paywalled; alternative source), which allows EU residents to ask search engines to remove some links from searches for their own names. At issue: Can France force Google to apply it not just to searches in Europe, but anywhere in the world? The case will set a precedent for how far EU regulators can go in enforcing the bloc's strict new privacy law. It will also help define Europe's position on clashes between governments over how to regulate everything that happens on the internet -- from political debate to online commerce. France's regulator says enforcement of some fundamental rights -- like personal privacy -- is too easily circumvented on the borderless internet, and so must be implemented everywhere. Google argues that allowing any one country to apply its rules globally risks upsetting international law and, when it comes to content, creates a global censorship race among autocrats.
Social Networks

Nearly 90,000 Sex Bots Invaded Twitter in 'One of the Largest Malicious Campaigns Ever Recorded on a Social Network' (gizmodo.com) 53

An anonymous reader shares a report: Last week, Twitter's security team purged nearly 90,000 fake accounts after outside researchers discovered a massive botnet peddling links to fake "dating" and "romance" services. The accounts had already generated more than 8.5 million posts aimed at driving users to a variety of subscription-based scam websites with promises of -- you guessed it -- hot internet sex. The accounts were first identified by ZeroFOX, a Baltimore-based security firm that specializes in social-media threat detection. The researchers dubbed the botnet "SIREN" after sea-nymphs described in Greek mythology as half-bird half-woman creatures whose sweet songs often lured horny, drunken sailors to their rocky deaths. ZeroFOX's research into SIREN offers a rare glimpse into how efficient scammers have become at bypassing Twitter's anti-spam techniques. Further, it demonstrates how effective these types of botnets can be: The since-deleted accounts collectively generated upwards of 30 million clicks -- easily trackable since the links all used Google's URL shortening service.
Businesses

Work From Home People Earn More, Quit Less, and Are Happier Than Their Office-bound Counterparts (qz.com) 217

An anonymous reader shares a report: Working from home gets a bad rap. Google the phrase and examine the results -- you'll see scams or low-level jobs, followed by links calling out "legitimate" virtual jobs. But Stanford Graduate School of Business professor Nicholas Bloom says requiring employees to be in the office is an outdated work tradition, set up during the Industrial Revolution. Such inflexibility ignores today's sophisticated communications methods and long commutes, and actually hurts firms and employees. "Working from home is a future-looking technology," Bloom told an audience during a conference, which took place in April. "I think it has enormous potential." To test his claim, Bloom studied China's largest travel agency, Ctrip. Headquartered in Shanghai, the company has 20,000 employees and a market capitalization of about $20 billion. The company's leaders -- conscious of how expensive real estate is in Shanghai -- were interested in the impact of working from home. Could they continue to grow while avoiding exorbitant office space costs? They solicited worker volunteers for a study in which half worked from home for nine months, coming into the office one day a week, and half worked only from the office. Bloom tracked these two groups for about two years. The results? "We found massive, massive improvement in performance -- a 13% improvement in performance from people working at home," Bloom says.
Businesses

Tech Giants Rally Today in Support of Net Neutrality (theverge.com) 126

From a report: Technology giants like Amazon, Spotify, Reddit, Facebook, Google, Twitter and many others are rallying today in a so-called "day of action" in support of net neutrality, five days ahead of the first deadline for comments on the US Federal Communications Commission's planned rollback of the rules. In a move that's equal parts infuriating and exasperating, Ajit Pai, the FCC's new chairman appointed by President Trump, wants to scrap the open internet protections installed in 2015 under the Obama administration. Those consumer protections mean providers such as AT&T, Charter, Comcast, and Verizon are prevented from blocking or slowing down access to the web. Sites across the web will display alerts on their homepages showing "blocked," "upgrade," and "spinning wheel of death" pop-ups to demonstrate what the internet would look like without net neutrality, according to advocacy group Battle for the Net. But most of the pop-ups The Verge has seen have been simple banners or static text with links offering more information.
Google

Google Slapped With $2.7 Billion By EU For Skewing Searches (bloomberg.com) 362

Google suffered a major regulatory blow on Tuesday after European antitrust officials fined the search giant 2.4 billion euros, or $2.7 billion, for unfairly favoring some of its own search services over those of rivals. The European Commission concluded that the search giant abused its near-monopoly in online search to "give illegal advantage" to its own Shopping service. Margrethe Vestager, the EU's competition commissioner, said Google "denied other companies the chance to compete" and left consumers without "genuine choice." The hefty fine marks the latest chapter in a lengthy standoff between Europe and Google, which also faces two separate charges under the region's competition rules related to Android, its popular mobile software, and to some of its advertising products. From a report: Google has 90 days to "stop its illegal conduct" and give equal treatment to rival price-comparison services, according to a binding order from the European Commission on Tuesday. It's up to Google to choose how it does this and it must tell the EU within 60 days of its plans. Failure to comply brings a risk of fines of up to 5 percent of its daily revenue. [...] "I expect the Commission now to swiftly conclude the other two ongoing investigations against Google," Markus Ferber, a member of the European Parliament from Germany. "Unfortunately, the Google case also illustrates that competition cases tend to drag on for far too long before they are eventually resolved. In a fast-moving digital economy this means often enough that market abuse actually pays off and the abuser succeeds in eliminating the competition." Google has been pushing its own comparison shopping service since 2008, systematically giving it prominent placement when people search for an item, the EU said. Rival comparison sites usually only appear on page four of search results, effectively denying them a massive audience as the first page attracts 95 percent of all clicks. In a blog post, Google said the EU has "underestimated" the value Google's services brings to the table. "We believe the European Commission's online shopping decision underestimates the value of those kinds of fast and easy connections. While some comparison shopping sites naturally want Google to show them more prominently, our data show that people usually prefer links that take them directly to the products they want, not to websites where they have to repeat their searches. We think our current shopping results are useful and are a much-improved version of the text-only ads we showed a decade ago. Showing ads that include pictures, ratings, and prices benefits us, our advertisers, and most of all, our users. And we show them only when your feedback tells us they are relevant. Thousands of European merchants use these ads to compete with larger companies like Amazon and eBay. [...] Given the evidence, we respectfully disagree with the conclusions announced today. We will review the Commission's decision in detail as we consider an appeal, and we look forward to continuing to make our case," wrote Kent Walker, SVP and General Counsel at Google.
Security

NSA Links WannaCry To North Korea (washingtonpost.com) 99

An anonymous reader quotes a report from The Washington Post: The National Security Agency has linked the North Korean government to the creation of the WannaCry computer worm that affected more than 300,000 people in some 150 countries last month, according to U.S. intelligence officials. The assessment, which was issued internally last week and has not been made public, is based on an analysis of tactics, techniques and targets that point with "moderate confidence" to North Korea's spy agency, the Reconnaissance General Bureau, according to an individual familiar with the report. The assessment states that "cyber actors" suspected to be "sponsored by" the RGB were behind two versions of WannaCry, a worm that was built around an NSA hacking tool that had been obtained and posted online last year by an anonymous group calling itself the Shadow Brokers. Though the assessment is not conclusive, the preponderance of the evidence points to Pyongyang. It includes the range of computer Internet protocol addresses in China historically used by the RGB, and the assessment is consistent with intelligence gathered recently by other Western spy agencies. It states that the hackers behind WannaCry are also called "the Lazarus Group," a name used by private-sector researchers.
Security

New Malware Downloader Can Infect PCs Without A Mouse Click (engadget.com) 151

An anonymous reader quotes Engadget: You think you're safe from malware since you never click suspicious-looking links, then somebody finds a way to infect your PC anyway. Security researchers have discovered that cybercriminals have recently started using a malware downloader that installs a banking Trojan to your computer even if you don't click anything. All it takes to trigger the download is to hover your mouse pointer over a hyperlink in a carrier PowerPoint file. According to researchers from Trend Micro and Dodge This Security the technique was used by a recent spam email campaign targeting companies and organizations in Europe, the Middle East and Africa. The emails' subjects were mostly finance-related, such as "Invoice" and "Order #," with an attached PowerPoint presentation. The PowerPoint file has a single hyperlink in the center that says "Loading... please wait" that has an embedded malicious PowerShell script. When you hover your mouse pointer over the link, it executes the script.
Trend Micro writes that "while the numbers aren't impressive, it can also be construed as a dry run for future campaigns, given the technique's seeming novelty," adding "It wouldn't be far-fetched for other malware like ransomware to follow suit."
Iphone

Apple's New iPhones May Miss Out On Higher-Speed Data Links (bloomberg.com) 114

Due to Apple's complicated way of managing the supply of the components embedded in its flagship devices, the company's upcoming iPhones may miss out on the higher-speed data links that many rival smartphones employ. "One of Apple's suppliers, Qualcomm, sells a modem capable of the 1 gigabit download speeds," reports Bloomberg. "Another supplier, Intel, is working on a modem with the same capability, but it won't be ready for the iPhone's introduction, according to people familiar with Apple's decision." From the report: Apple could in theory just use Qualcomm's chips, but it has an aversion to being dependent on a single supplier, and its relationship with San Diego-based Qualcomm is particularly thorny. Cupertino, California-based Apple is embroiled in a bitter legal fight with the chipmaker, accusing the supplier of maintaining an illegal monopoly, and it's seeking to loosen Qualcomm's grip on the market for high-end smartphone modems. That's why Apple will stick with Qualcomm modems for some of its new iPhones while relying on Intel for others. Until Intel is able to offer its chips with matching features, Apple won't enable some of capabilities of the phones running with Qualcomm modems, said the people, who asked not to be identified because the plan isn't public. Apple, Qualcomm and Intel declined to comment. Apple's decision clashes with the marketing plans of a cellular industry desperate to show off faster network speeds to grab market share. The top U.S. wireless carriers -- Verizon AT&T, T-Mobile US Inc. and Sprint Corp. -- have declared 2017 the year of 1 gigabit speeds.
United States

Is Russia Conducting A Social Media War On America? (time.com) 469

An anonymous reader writes: Time magazine ran a cover story about "a dangerous new route for antidemocratic forces" -- social media. "Using these technologies, it is possible to undermine democratic government, and it's becoming easier every day," says Rand Waltzman of the Rand Corp., who ran a major Pentagon research program to understand the propaganda threats posed by social media technology." The article cites current and former FBI and CIA officials who now believe Russia's phishing emails against politicians were "just the most visible battle in an ongoing information war against global democracy." They cite, for example, a March report by U.S. counterintelligence which found "Russians had sent expertly tailored messages carrying malware to more than 10,000 Twitter users in the Defense Department." Each message contained links tailored to the interests of the recipient, but "When clicked, the links took users to a Russian-controlled server that downloaded a program allowing Moscow's hackers to take control of the victim's phone or computer -- and Twitter account...

"In 2016, Russia had used thousands of covert human agents and robot computer programs to spread disinformation referencing the stolen campaign emails of Hillary Clinton, amplifying their effect. Now counterintelligence officials wondered: What chaos could Moscow unleash with thousands of Twitter handles that spoke in real time with the authority of the armed forces of the United States?" The article also notes how algorithms now can identify hot-button issues and people susceptible to suggestion, so "Propagandists can then manually craft messages to influence them, deploying covert provocateurs, either humans or automated computer programs known as bots, in hopes of altering their behavior. That is what Moscow is doing, more than a dozen senior intelligence officials and others investigating Russia's influence operations tell Time."

The article describes a Russian soldier in the Ukraine pretending to be a 42-year-old American housewife. Meanwhile, this week Time's cover shows America's White House halfway-covered with Kremlin-esque spires -- drawing a complaint from the humorists at Mad magazine, who say Time copied the cover of Mad's December issue.
IBM

New OS/2 Warp Operating System 'ArcaOS' 5.0 Released (arcanoae.com) 145

The long-awaited modern OS/2 distribution from Arca Noae was released Monday. martiniturbide writes: ArcaOS 5.0 is an OEM distribution of IBM's discontinued OS/2 Warp operating system. ArcaOS offers a new set of drivers for ACPI, network, USB, video and mouse to run OS/2 in newer hardware. It also includes a new OS installer and open source software like Samba, Libc libraries, SDL, Qt, Firefox and OpenOffice... It's available in two editions, Personal ($129 with an introductory price of $99 for the first 90 days [and six months of support and maintenance updates]) and Commercial ($239 with one year of support and maintenance).

The OS/2 community has been called upon to report supported hardware, open source any OS/2 software, make public as much OS/2 documentation as possible and post the important platform links. OS2World insists that open source has helped OS/2 in the past years and it is time to look under the hood to try to clone internal components like Control Program, Presentation Manager, SOM and Workplace Shell.

By Tuesday Arca Noae was reporting "excessive traffic on the server which is impacting our ordering and delivery process," though the actual downloads of the OS were unaffected, the server load issues were soon mitigated, and they thanked OS/2 enthusiasts for a "truly overwhelming response."
Operating Systems

ReactOS 0.4.5 Released (reactos.org) 118

An anonymous reader shares Colin Finck's forum post announcing ReactOS version 0.4.5: The ReactOS Project is pleased to release version 0.4.5 as a continuation of its three month cadence. Beyond the usual range of bug fixes and syncs with external dependencies, a fair amount of effort has gone into the graphical subsystem. Thanks to the work of Katayama Hirofumi and Mark Jansen, ReactOS now better serves requests for fonts and font metrics, leading to an improved rendering of applications and a more pleasant user experience. Your continued donations have also funded a contract for Giannis Adamopoulos to fix every last quirk in our theming components. The merits of this work can be seen in ReactOS 0.4.5, which comes with a smoother themed user interface and the future promises to bring even more improvements. In another funded effort, Hermes Belusca-Maito has got MS Office 2010 to run under ReactOS, another application from the list of most voted apps. On top of this, there have been several major fixes in the kernel and drivers that should lead to stability improvements on real hardware and on long-running machines. The general notes, tests, and changelog for the release can be found at their respective links. ISO images and prepared VMs for testing can be downloaded here.
Security

Breach at DocuSign Led To Targeted Email Malware Campaign (krebsonsecurity.com) 20

Digital signature service DocuSign said Monday that an unnamed third-party had got access to email addresses of its users after hacking into its systems. From a report: DocuSign, a major provider of electronic signature technology, acknowledged today that a series of recent malware phishing attacks targeting its customers and users was the result of a data breach at one of its computer systems. The company stresses that the data stolen was limited to customer and user email addresses, but the incident is especially dangerous because it allows attackers to target users who may already be expecting to click on links in emails from DocuSign. [...] In an update late Monday, DocuSign confirmed that this malicious third party was able to send the messages to customers and users because it had broken in and stolen DocuSign's list of customers and users.
Advertising

Facebook Downranks News Feed Links To Crappy Sites Smothered In Ads (techcrunch.com) 95

Facebook's New Feed algorithm is targeting links that send people to crappy websites filled with advertisements. According to their blog post, Facebook defines a "low-quality site" as one "containing little substantive content, and that is covered in disruptive, shocking or malicious ads." TechCrunch reports: The change could help Facebook fight fake news, as fakers are often financially motivated and blanket their false information articles in ads. High-quality sites may see a slight boost in referral traffic, while crummy sites will see a decline as the update rolls out gradually over the coming months. Facebook tells me that the change will see it refuse an immaterial number of ad impressions that earned it negligible amounts of money, so it shouldn't have a significant impact on Facebook's revenue. Facebook product manager for News Feed Greg Marra tells me Facebook made the decision based on surveys of users about what disturbed their News Feed experience. One pain point they commonly cited was links that push them to "misleading, sensational, spammy, or otherwise low-quality experiences... [including] sexual content, shocking content, and other things that are going to be really disruptive." Today's change is important because if users don't trust the content on the other side of the links and ads they see in News Feed, they'll click them less. That could reduce Facebook's advertising revenue and the power it derives from controlling referral traffic. Getting sent to a low-quality, shocking site from News Feed could also frustrate users and cause them to end their Facebook browsing session, depriving the social network of further ad views, engagement and content sharing.
GNU is Not Unix

How Psychology Today Sees Richard Stallman (psychologytoday.com) 247

After our article about Richard Stallman's new video interview, Slashdot reader silverjacket shared this recent profile from Psychology Today that describes Richard Stallman's quest "to save us from a web of spyware -- and from ourselves." By using proprietary software, Stallman believes, we are forfeiting control of our computers, and thus of our digital lives. In his denunciation of all nonfree software as inherently abusive and unethical, he has alienated many possible allies and followers. But he is not here to make friends. He is here to save us from a software industry he considers predatory in ways we've yet to recognize... for Stallman, moralism is the whole point. If you write or use free software only for practical reasons, you'll stop when it's inconvenient, and freedom will disappear.
Stallman collaborator Eben Moglen -- a law professor at Columbia, as well as the FSF's general counsel -- assesses Stallman's legacy by saying "the idea of copyleft and the proposition that social and political freedom can't happen in a society without technological freedom -- those are his long-term meanings. And humanity will be aware of those meanings for centuries, whatever it does about them." The article also includes quotes from Linus Torvalds and Eric S. Raymond -- along with some great artwork.

In addition to insisting the reporter refer to Linux as "GNU/Linux," Stallman also required that the article describe free software without using the term open source, a phrase he sees as "a way that people who disagree with me try to cause the ethical issues to be forgotten." And he ultimately got Psychology Today to tell its readers that "Nearly all the software on our phones and computers, as well as on other machines, is nonfree or 'proprietary' software and is riddled with spyware and back doors installed by Apple, Google, Microsoft, and the like."

Slashdot Top Deals