However because of the size of the community, there are various phases in the patch development, review, and merging cycle when Linux is updated. Therefore making the process much more robust and secure.
In 2005 Torvalds created GIT a version control system for tracking changes in computer files and coordinating work on those files among multiple people. This eventually lead to the development of sites such as GitHub, which are used for the development and review of all code changes made to Bitcoin.
You can go to this link right now and see all the changes that have been made to Bitcoin. Every change is reviewed and tested by an entire community making this a technology that doesn’t belong to just one company or individual.
It is truly open source and users are free to run it, share it, study it and modify it as they wish.
You’ll be able to get a Taler token from your bank, or a whole bunch of Taler tokens, and then you’ll be able to use those to pay anonymously.
Then if the store can send the thing you bought to a delivery box in your neighborhood, the store doesn’t ever have to know who you are.
But there’s another issue Stallman touched on earlier in his talk: There is a proposed U.S. law called KOSA which would require mandatory age-verification of users — which means mandatory identification of users, which is likely to mean via face recognition. And it would be in every commercial software application or electronic service that connects to the internet…. [It’s] supposedly for protecting children. That’s one of the favorite excuses for surveillance and repression: to protect the children.
Whether it would actually protect anyone is dubious, but they hope that won’t actually be checked….
What they say is often correct, just not important.
Like most hardware, treacherous-computing hardware can be used for purposes which are not harmful. But these features can be implemented in other ways, without treacherous-computing hardware. The principal difference that treacherous computing makes for users is the nasty consequence: rigging your computer to work against you.
What they say is true, and what I say is true.
Put them together and what do you get? Treacherous computing is a plan to take away our freedom, while offering minor benefits to distract us from what we would lose.
Microsoft presents Palladium as a security measure, and claims that it will protect against viruses, but this claim is evidently false.
When someone uses GPG to send you an encrypted document, and you use GPG to decode it, the result is an unencrypted document that you can read, forward, copy, and even reencrypt to send it securely to someone else. A treacherous-computing application would let you read the words on the screen, but would not let you produce an unencrypted document that you could use in other ways. GPG, a free software package, makes security features available to the users; they use it.
Treacherous computing is designed to impose restrictions on the users; it uses them.
The supporters of treacherous computing focus their discourse on its beneficial uses.
So instead, Stallman suggests that age verification could be handled by…. GNU Taler: Suppose there’s some sort of service which charges money, or even a tiny amount of money, and is only for people over 16, or people over 18 or whatever it is. Well, you could get from your bank a Taler token that says the person using this token is over 16.
This bank has verified that…. So then the site only needs to insist on a 16-or-over Taler token, and your age is verified, but the site has no idea who you are. Unfortunately that won’t help if user-identifying age-tracking systems are legislated now. The code of Taler works, but it’s still being integrated with a bank so that people could actually start to use it with real businesses.
Read on for Slashdot’s report on Stallman’s remarks on cryptocurrencies and encryption, or jump ahead to…
Some may argue that this is the case today, but at least you have the tools to protect yourself if you want to.
Without Zimmermann and many others who tirelessly worked on encryption all our communication would be open for anyone to see and the internet may never have developed as it did.
Open Source software
Surprising to most is that fact that there was once a time when most software was open and free for use. You could buy and edit software as you pleased to suite your own needs. A programmer working at the MIT AI labs Richard Stallman did exactly this.
All of the printers at MIT were on a different floor, so he added an electronic messaging system that would let a user know when their job was printed or if the printer was jammed.
Then if the store can send the thing you bought to a delivery box in your neighborhood, the store doesn’t ever have to know who you are. But there’s another issue Stallman touched on earlier in his talk: There is a proposed U.S. law called KOSA which would require mandatory age-verification of users — which means mandatory identification of users, which is likely to mean via face recognition. And it would be in every commercial software application or electronic service that connects to the internet….
Most other languages have nothing comparable to `read’, nothing comparable to `eval’, and nothing comparable to `print’. What gaping deficiencies!
While I love the power of Lisp, I am not a devotee of functional programming. I see nothing bad about side effects and I do not make efforts to avoid them unless there is a practical reason. There is code that is natural to write in a functional way, and code that is more natural with side effects, and I do not campaign about the question. I limit my campaigning to issues of freedom and justice, such as to eliminate nonfree software from the world.
Lisp is no harder to understand than other languages. So if you have never learned to program, and you want to start, start with Lisp. If you learn to edit with Emacs, you can learn Lisp by writing editing commands for Emacs.
To oppose treacherous computing, we must join together and confront the situation as a collective choice.
For further information about treacherous computing, see the “Trusted Computing” Frequently Asked Questions.
To block treacherous computing will require large numbers of citizens to organize. We need your help! Please support Defective by Design, the FSF’s campaign against Digital Restrictions Management.
The computer security field uses the term “trusted computing” in a different way—beware of confusion between the two meanings.
The GNU Project distributes the GNU Privacy Guard, a program that implements public-key encryption and digital signatures, which you can use to send secure and private email.
Code released under this licensed can be reused in other computer programs as long as it is also released under the same or a compatible license.
One of the most famous programs that runs on this license today is Linux created by Linus Torvalds in 1991 (the same year PGP was released). You may know it better as the operating system that runs your smartphones and tablet computers, or the system that runs 99% of the world’s top 500 supercomputers.
What makes Linux different from any other software is the fact that it is completely open source and at any point in time there are up to 10,000 people working on it.
With the open nature of Linux, some may argue that it weakens the system because hackers can also see and modify the code.