33 |
|
|
34 |
<ul> |
<ul> |
35 |
<li>The freedom to run the program, for any purpose (freedom 0).</li> |
<li>The freedom to run the program, for any purpose (freedom 0).</li> |
36 |
<li>The freedom to study how the program works, and change it to make |
<li>The freedom to study how the program works, and change it so it |
37 |
it do what you wish (freedom 1). Access to the source code is a |
does your computing as you wish (freedom 1). Access to the source |
38 |
precondition for this. |
code is a precondition for this. |
39 |
</li> |
</li> |
40 |
<li>The freedom to redistribute copies so you can help your neighbor |
<li>The freedom to redistribute copies so you can help your neighbor |
41 |
(freedom 2). |
(freedom 2). |
97 |
<p> |
<p> |
98 |
Freedom 1 includes the freedom to use your changed version in place of |
Freedom 1 includes the freedom to use your changed version in place of |
99 |
the original. If the program is delivered in a product designed to |
the original. If the program is delivered in a product designed to |
100 |
run someone else's modified versions but refuse to run yours — |
run someone else's modified versions but refuse to run yours — a |
101 |
a practice known as “tivoization” or (in its practitioners' |
practice known as “tivoization” or “lockdown”, |
102 |
perverse terminology) as “secure boot” — freedom 1 becomes a |
or (in its practitioners' perverse terminology) as “secure |
103 |
theoretical fiction rather than a practical freedom. This is not |
boot” — freedom 1 becomes a theoretical fiction rather |
104 |
sufficient. In other words, these binaries are not free software |
than a practical freedom. This is not sufficient. In other words, |
105 |
even if the source code they are compiled from is free. |
these binaries are not free software even if the source code they are |
106 |
|
compiled from is free. |
107 |
</p> |
</p> |
108 |
|
|
109 |
<p> |
<p> |
312 |
|
|
313 |
<ul> |
<ul> |
314 |
|
|
315 |
|
<li><a href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.103&r2=1.104">Version |
316 |
|
1.104</a>: Reflect, in the brief statement of freedom 1, the point |
317 |
|
(already stated in version 1.80) that it includes really using your modified |
318 |
|
version for your computing.</li> |
319 |
|
|
320 |
<li><a href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.91&r2=1.92">Version |
<li><a href="http://web.cvs.savannah.gnu.org/viewvc/www/philosophy/free-sw.html?root=www&r1=1.91&r2=1.92">Version |
321 |
1.92</a>: Clarify that obfuscated code does not qualify as source code.</li> |
1.92</a>: Clarify that obfuscated code does not qualify as source code.</li> |
322 |
|
|