IRCNow

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
opensoftware:start [2020/01/18 07:37]
jrmu
opensoftware:start [2020/01/25 01:35] (current)
jrmu
Line 31: Line 31:
 ==== Equal Access ==== ==== Equal Access ====
  
-Closed, proprietary software is often very expensive. Buying a legal copy of Microsoft Windows, for example, can easily cost your monthly salary in a poorer country. Basic tools that we need for work, like our operating system, photo editors, word processors, and movie editors often cost more than what average people in poor countries can afford. It forces them into poverty and theft, and it puts them at a serious disadvantage.+Closed, proprietary software is often very expensive. Buying a legal copy of Microsoft Windows, for example, can easily cost your monthly salary in a poorer country. Buying a legal Mac is something only the rich can afford. Basic tools that we need for work, like our operating system, photo editors, word processors, and movie editors often cost more than what average people in poor countries can afford. It forces them into poverty and often theft, and closed info puts them at a serious disadvantage.
  
 Even when users can afford these services, they are denied access to study, modify, and share that information. As a result, any new work they produce will become part of the property of that company rather than helping the rest of society as a whole. All this does is reinforce their monopoly and control over the disadvantaged. Even when users can afford these services, they are denied access to study, modify, and share that information. As a result, any new work they produce will become part of the property of that company rather than helping the rest of society as a whole. All this does is reinforce their monopoly and control over the disadvantaged.
Line 39: Line 39:
 ==== Avoiding Vendor Lock-In ==== ==== Avoiding Vendor Lock-In ====
  
-When designs follow open protocols, open standards, and open designs, it has much greater interoperability. You are no longer ​stuck with a single provider and forced to pay unreasonable prices. Instead, you get greater choice from more vendors. No more abusive monopolies!+Closed info providers deliberately design their systems so it is difficult or impossible to leave. They do this to ensure you become dependent on their ecosystem. For example, if you shop with Apple, you become dependent on their expensive ecosystem of iPhones and Macs. You must regularly pay them taxes in the form of new hardware/​software upgrades and iCloud fees. These are part of the taxes they force you to pay. Over time, you find yourself becoming part of their property. But if you try to leave, you find it is extremely difficult to get out, often requiring months of work. This is their deliberate design -- closed info is designed to enforce economic feudalism. 
 + 
 +When designs follow open protocols, open standards, and open designs, it has much greater interoperability. You become the owner of your own info. Your data, software, and hardware are free, so you can choose any provider from the marketplace. In fact, you could become your own provider. You are no longer forced to pay unreasonable prices, ​and you are no longer treated like chattel. No more abusive monopolies!
  
 ==== Privacy ==== ==== Privacy ====
  
-Open Info is the only+Closed info services are full of spyware and malware. For example, Kape technologies used to package a piece of closed malware that posed as a flash installer. This installer would then inject ads into your browser without your permission. Google will track all your browsing habits and computer details, selling this data to advertisers.
  
-==== Control ​and Customization ====+Facebook'​s WhatsApp claims to protect your privacy with end to end encryption, but it is nothing but marketing whitewashing. Because we lack the source code, it is impossible for us to audit their claims about using secure encryption. In fact, we later discovered that they intercept your traffic ​and decrypt it in their client application. Moreover, WhatsApp requires a phone number connected to your real-world ID in order to register. So much for their claims of end-to-end privacy.
  
-  ​and networks to ensure that we have software that protects acy.+Now that our lives are becoming more dependent upon information technology, our credit cards, bank accounts, health records, telephone calls, business documents ​and more are at risk of being stolen or leaked because of the horrible privacy record of closed info services.
  
 +The only solution for this is software that allows you to audit the source code, and where the developers are transparent about what their software does. Having source code that anyone can audit helps keep developers honest. Open info services is the only real way to ensure your privacy.
 +
 +==== Control and Customization ====
 +
 +With Open Info software, it is possible to customize
  
 ==== Cultural ==== ==== Cultural ====
Line 54: Line 61:
 ==== Cost-effective ==== ==== Cost-effective ====
  
-==== Education ​and Transparency ====+==== Education ​==== 
 + 
 + 
 +==== Transparency ====
  
 ==== Quality ==== ==== Quality ====
Line 63: Line 73:
  
 Our team's [[opensoftware:​contract|contract]] to each other and to our users. Our team's [[opensoftware:​contract|contract]] to each other and to our users.
 +
 +https://​tech.slashdot.org/​story/​20/​01/​24/​2156219/​ge-fridges-wont-dispense-ice-or-water-unless-your-water-filter-authenticates-via-rfid-chip