summaryrefslogtreecommitdiff
path: root/docs/right-to-read.md
blob: 79b40a4b98830574012b58ef5e67f9d06e9a36e3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
---
Generator: 'texi2html 1.82'
description: Untitled Document
distribution: global
keywords: Untitled Document
resource-type: document
title: Untitled Document
...

1. The Right to Read {#the-right-to-read .chapter}
====================

阅读的权利
==========

@firstcopyingnotice{{ 著作权所有 (C) 1996, 2002, 2007, 2009, 2010, 2014
Richard Stallman\
 {本文撰写于 1996 年并以标题 “The Right to Read: A Dystopian Short Story”
(阅读的权利:一段反乌托邦的短故事)于 1997 年二月发表于 Communications of the ACM, vol. 40, n. 2。
此版本是 @fsfsthreecite 的一部分。}

*From <span
class="roman">The Road to Tycho,</span> a collection of articles about
the antecedents of the Lunarian Revolution, published in Luna City in
2096.*\

*本文摘自《第谷之路》,这是一系列关于“月球人革命”的前奏的文章,于 2096 年
发表于月球城。*

 For Dan Halbert, the road to Tycho began in college—when Lissa Lenz
asked to borrow his computer. Hers had broken down, and unless she could
borrow another, she would fail her midterm project. There was no one she
dared ask, except Dan.

对于 Dan Halbert 而言,他的“第谷之路”始于大学时代——当 Lissa Lenz 向他借用
计算机的时候。她的计算机发生了故障,并且除非她能够借到另一台计算机,她将
肯定不能完成中期项目。她不敢向其他任何人求助,除了 Dan。

This put Dan in a dilemma. He had to help her—but if he lent her his
computer, she might read his books. Aside from the fact that you could
go to prison for many years for letting someone else read your books,
the very idea shocked him at first. Like everyone, he had been taught
since elementary school that sharing books was nasty and wrong—something
that only pirates would do.

这将 Dan 置于两难境地,他有责任帮助她——但如果将自己的计算机借给她,她将有
机会阅读他的书籍。抛开如果您允许其他人阅读您的书籍,您将被处以很多年监禁
这一事实,这种想法首先使他感到震惊。与其他任何人一样,他从小学开始就被这
样教育:分享书本是龌龊并且非法的——只有盗版者才会做这些丑事。

And there wasn’t much chance that the SPA—the Software Protection
Authority—would fail to catch him. In his software class, Dan had
learned that each book had a copyright monitor that reported when and
where it was read, and by whom, to Central Licensing. (They used this
information to catch reading pirates, but also to sell personal interest
profiles to retailers.) The next time his computer was networked,
Central Licensing would find out. He, as computer owner, would receive
the harshest punishment—for not taking pains to prevent the crime.

并且,他不被 SPA ——软件保护权力机构——抓住的机会并不大,在他的计算机软件课
上,Dan 知道了每本书都带有一个版权监视器,它将会将此书于何时何地被何人阅
读的信息上报给中央授权许可机构。(它们对于这一信息的利用不仅仅是为了抓住
阅读盗版者,也会将个人阅读兴趣特征出卖给图书零售商。)当他的计算机下一次
联网时,中央授权许可机构将会发现这一切。他作为计算机拥有者将会受到最严厉
的处罚——由于他未能尽力阻止这种犯罪。

Of course, Lissa did not necessarily intend to read his books. She might
want the computer only to write her midterm. But Dan knew she came from
a middle-class family and could hardly afford the tuition, let alone her
reading fees. Reading his books might be the only way she could
graduate. He understood this situation; he himself had had to borrow to
pay for all the research papers he read. (Ten percent of those fees went
to the researchers who wrote the papers; since Dan aimed for an academic
career, he could hope that his own research papers, if frequently
referenced, would bring in enough to repay this loan.)

当然,也许 Lissa 本意上并不一定是要阅读他的书籍,她有可能只是想借用计算机
来编写她的中期汇报。但是,Dan 知道她来自于中产阶级家庭,并且很难负担得起
学费,遑论她的各种阅读费用。阅读他的书籍可能是她想要顺利毕业的唯一出路。
他理解这种情形;他自己也必须借钱以支持其所需的科研论文阅读费用。(这些费
用的 10% 将会被付给撰写了这些论文的科研人员;由于 Dan 致力于他的学术事业,
他可以指望自己的科研论文被频繁引用,这样他就可以赚到足够的钱来支付这笔阅
读费用。)

Later on, Dan would learn there was a time when anyone could go to the
library and read journal articles, and even books, without having to
pay. There were independent scholars who read thousands of pages without
government library grants. But in the 1990s, both commercial and
nonprofit journal publishers had begun charging fees for access. By
2047, libraries offering free public access to scholarly literature were
a dim memory.

其后,Dan 将会了解到,以前曾经有一段时间,任何人都可以去图书馆阅读期刊文
章甚至是图书而无需支付任何费用。那时也有独立的学者,他们可以阅读数千页的
文献而无需得到政府图书馆的批准。但是,在 20 世纪 90 年代,商业性和非盈利
性的期刊出版者都开始征收访问费用。直到 2047 年,提供对学术文献的免费公开
访问的图书馆已经成为一种灰暗的记忆。

There were ways, of course, to get around the SPA and Central Licensing.
They were themselves illegal. Dan had had a classmate in software, Frank
Martucci, who had obtained an illicit debugging tool, and used it to
skip over the copyright monitor code when reading books. But he had told
too many friends about it, and one of them turned him in to the SPA for
a reward (students deep in debt were easily tempted into betrayal). In
2047, Frank was in prison, not for pirate reading, but for possessing a
debugger.

当然,也有一些方式可用于绕过软件保护权力机构(SPA)和中央授权许可机构的审
查。它们本身是非法的。Dan 曾经有一位计算机软件专业的同学,Frank Martucci,
此人得到了一种非法的查错工具,并且将其应用于在阅读时绕过版权监视器的代码。
但是,他将此事告知了太多的朋友,其中之一将他告发至 SPA 以获取一份奖赏。(
债台高筑的学生很容易被利诱叛变。)2047 年,Frank 被捕入狱,并非由于盗版阅
读,而是由于非法拥有一份查错工具。

Dan would later learn that there was a time when anyone could have
debugging tools. There were even free debugging tools available on CD or
downloadable over the net. But ordinary users started using them to
bypass copyright monitors, and eventually a judge ruled that this had
become their principal use in actual practice. This meant they were
illegal; the debuggers’ developers were sent to prison.

其后,Dan 将会知道曾经有一段时间,任何人都被允许拥有查错工具,那时甚至有可
以从光盘(CD)获得或者从网络上下载得到的自由查错工具。但是,随着普通用户将
其用于绕过版权监视器,最终一位法官裁决这一非法目的成为了它们在实际实践中的
主要用途。这意味着它们是非法的,查错工具的开发者都被捕入狱。

Programmers still needed debugging tools, of course, but debugger
vendors in 2047 distributed numbered copies only, and only to officially
licensed and bonded programmers. The debugger Dan used in software class
was kept behind a special firewall so that it could be used only for
class exercises.

当然,程序员们仍然需要查错工具,但在 2047 年,查错工具厂商限量发布它们,并
且仅对得到政府官方授权许可与担保的程序员分发。Dan 用于计算机软件课上的查错
工具位于一道特殊的防火墙后面,使得它只能被用于课堂练习。

It was also possible to bypass the copyright monitors by installing a
modified system kernel. Dan would eventually find out about the free
kernels, even entire free operating systems, that had existed around the
turn of the century. But not only were they illegal, like debuggers—you
could not install one if you had one, without knowing your computer’s
root password. And neither the FBI nor Microsoft Support would tell you
that.

从前,通过安装某种修改过的操作系统内核来绕过版权监视器也是可能的。Dan 最终
将会了解到这些自由内核,甚至整个自由操作系统。这些东西直到世纪之交前后都还
存在。但是,它们不仅像查错工具那样是非法的——甚至您即使拥有它们也不能安装,
由于您不知道您的计算机的 root 口令。而美国联邦调查局(FBI)或者微软客服都
不会告知您那个口令。

Dan concluded that he couldn’t simply lend Lissa his computer. But he
couldn’t refuse to help her, because he loved her. Every chance to speak
with her filled him with delight. And that she chose him to ask for
help, that could mean she loved him too.

Dan 得出结论,他不能简单地将计算机借给 Lissa,但他又不能拒绝帮助她,因为他
爱着她。每次和她说话的机会都会使他充满愉悦。而她选择向他求助,这意味着她也
爱着他。

Dan resolved the dilemma by doing something even more unthinkable—he
lent her the computer, and told her his password. This way, if Lissa
read his books, Central Licensing would think he was reading them. It
was still a crime, but the SPA would not automatically find out about
it. They would only find out if Lissa reported him.

Dan 做出了一些更加不可想象的举动来解决这种两难境地——他将计算机借给了她,并
且将他的口令告知了她。通过这种方式,如果 Lissa 阅读了他的书籍,中央授权许
可机构将会认为实际上是他在阅读这些书。这仍然是一种犯罪,但是 SPA 不会自动
发现这一点,除非 Lissa 将他举报。

Of course, if the school ever found out that he had given Lissa his own
password, it would be curtains for both of them as students, regardless
of what she had used it for. School policy was that any interference
with their means of monitoring students’ computer use was grounds for
disciplinary action. It didn’t matter whether you did anything
harmful—the offense was making it hard for the administrators to check
on you. They assumed this meant you were doing something else forbidden,
and they did not need to know what it was.

当然,如果学校最终发现他将自己的口令给了 Lissa,这将使得他们二人的学生身
份终结,不论她使用这个口令做了什么。学校的政策是这样的,任何对其监控学生
如何使用计算机的行为的干涉是惩戒行为的底线,不论您是否做了任何有害的事——
这种所谓的攻击行为使得学校管理人员难于对您进行监控。他们认为这意味着您正
在做一些其他的被禁止的事情,并且他们不需要知道这些事情到底是什么。

Students were not usually expelled for this—not directly. Instead they
were banned from the school computer systems, and would inevitably fail
all their classes.

学生们通常不会因此被开除——不是直接被开除。而是他们将会被禁止使用学校的计
算机系统,这将使他们不可避免地不能通过他们的任何课程。

Later, Dan would learn that this kind of university policy started only
in the 1980s, when university students in large numbers began using
computers. Previously, universities maintained a different approach to
student discipline; they punished activities that were harmful, not
those that merely raised suspicion.

其后,Dan 将会知道,这种大学政策只是始于 20 世纪 80 年代,那时大学生们开
始大规模使用计算机。在此之前,大学一直保持着另一种学生惩戒制度;它们将会
惩罚那些有害的行为,而非那些仅仅是引起它们的怀疑的行为。

Lissa did not report Dan to the SPA. His decision to help her led to
their marriage, and also led them to question what they had been taught
about piracy as children. The couple began reading about the history of
copyright, about the Soviet Union and its restrictions on copying, and
even the original United States Constitution. They moved to Luna, where
they found others who had likewise gravitated away from the long arm of
the SPA. When the Tycho Uprising began in 2062, the universal right to
read soon became one of its central aims.

Lissa 没有向 SPA 举报 Dan,而他关于帮助她的决定使得他们终成眷属。这也促使
他们质问他们在儿时曾被教给的关于盗版的东西。这对夫妇开始阅读关于版权的历
史的东西,关于苏联以及它对复制的限制的东西,甚至是关于最初的美国宪法的东
西。他们移居月球,在那里他们遇到了其他类似地选择了逃离 SPA 魔掌的人们。当
第谷起义于 2062 年开始时,普遍的阅读权利立即成为这场起义的核心诉求。

### Author’s Notes {#authors-notes .subheading}

### 作者注记

-   This story is supposedly a historical article that will be written
    in the future by someone else, describing Dan Halbert’s youth under
    a repressive society shaped by the enemies that use “pirate”
    as propaganda. So it uses the terminology of that society. I have
    tried to project it from today so as to sound even more oppressive.
    See “Piracy,” on @pageref{Piracy}.

-   本文据说应该是由其他人在未来撰写的一篇历史文章,描述了 Dan Halbert 在
    一种专制社会下的青年生活,这种专制社会是由那些将“盗版”作为宣传口号的
    敌人创立的。因此本文使用那种社会下的用语。我尝试从今天的视角呈现它,
    使其看起来更具压迫性。

-   The following note has been updated several times since the first
    publication of the story.\

-   以下注记自本文初次发表之后经过数次更新。\

     The right to read is a battle being fought today. Although it may
    take 50 years for our present way of life to fade into obscurity,
    most of the specific laws and practices described above have already
    been proposed; many have been enacted into law in the US
    and elsewhere. In the US, the 1998 Digital Millennium Copyright
    Act (DMCA) established the legal basis to restrict the reading and
    lending of computerized books (and other works as well). The
    European Union imposed similar restrictions in a 2001
    copyright directive. In France, under the DADVSI law adopted in
    2006, mere possession of a copy of DeCSS, the free program to
    decrypt video on a DVD, is a crime.

    阅读的权利是一场于今天打响的斗争,尽管可能需要经过 50 年的时间才能使
    我们现在的生活方式成为灰暗的记忆,上文所述的大部分特定法律和实践已经
    被提议,它们中的许多已经在美国和其他地区被通过并成为正式的法律。在美
    国,1998 年的数字千年版权法案(DMCA)为限制阅读与出借计算机化的图书
    (及其他形式的作品)建立了法律基础。欧盟在 2001 年通过的一项版权指导
    意见中实施了类似的限制。在法国,随着“信息社会的作者权利与相关权利法
    案”(DADVSI)于 2006 年通过,仅仅是拥有 DeCSS,一款用于解密数码多功
    能影像光盘(DVD)的自由软件,的一份副本即被视为犯罪。

    In 2001, Disney-funded Senator Hollings proposed a bill called the
    SSSCA that would require every new computer to have mandatory
    copy-restriction facilities that the user cannot bypass. Following
    the Clipper chip and similar US government key-escrow proposals,
    this shows a long-term trend: computer systems are increasingly set
    up to give absentees with clout control over the people actually
    using the computer system. The SSSCA was later renamed to the
    unpronounceable CBDTPA, which was glossed as the “Consume But Don’t
    Try Programming Act.”

    在 2001 年,由迪士尼赞助的参议员 Hollings 提出了一项称为“安全系统与
    标准认证法案”(SSSCA)的法律,其要求每台新计算机带有强制性的限制复制
    设备并且禁止用户绕过它。继 Clipper 芯片及类似的美国政府关于密钥保管
    的提案之后,这显示了一种长期趋势:计算机系统越来越倾向于赋予不在场者
    对该计算机系统的实际使用者进行有效控制的权力。SSSCA 随后更名为“消费
    者宽带和数字电视促进法案”(CBDTPA)这一不可拼读的名称,它被评注为“消
    灭但不要尝试编程法案”(Consume But Don't Try Programming Act)。

    The Republicans took control of the US Senate shortly thereafter.
    They are less tied to Hollywood than the Democrats, so they did not
    press these proposals. Now that the Democrats are back in control,
    the danger is once again higher.

    随后不久,共和党人控制了美国参议院。他们与好莱坞的联系不如民主党人那
    样密切,因此他们没有强行推动这些提案。现在民主党人重新获得控制权,我
    们所面临的威胁进一步升高。

    In 2001 the US began attempting to use the proposed “Free Trade”
    Area of the Americas (FTAA) treaty to impose the same rules on all
    the countries in the Western Hemisphere. The FTAA is one of the
    so-called “free trade” treaties, which are actually designed to give
    business increased power over democratic governments; imposing laws
    like the DMCA is typical of this spirit. The FTAA was effectively
    killed by Lula, President of Brazil, who rejected the DMCA
    requirement and others.

    在 2001 年,美国开始试图利用它所倡议的美洲“自由贸易”区(FTAA)条约来
    向整个西半球强制施加相同规则。FTAA 是一种所谓的“自由贸易”条约,它们
    实际上是被设计用于赋予商业企业更多凌驾于民主政府之上的权力;强制推行
    诸如 DMCA 的法律正式这种精神的典型体现。而 FTAA 事实上由时任巴西总统
    卢拉否决,此人拒绝接受 DMCA 及其他类似法规的条件。

    Since then, the US has imposed similar requirements on countries
    such as Australia and Mexico through bilateral “free trade”
    agreements, and on countries such as Costa Rica through another
    treaty, CAFTA. Ecuador’s President Correa refused to sign a “free
    trade” agreement with the US, but I’ve heard Ecuador had adopted
    something like the DMCA in 2003.

    此后,美国通过一系列“自由贸易”协定将类似的条件强行施加给诸如澳大利亚
    和墨西哥等国,并且通过另一纸条约,中美洲自由贸易协定(CAFTA),将其
    强行施加给哥斯达黎加等国。时任厄瓜多尔总统科雷亚拒绝与美国签署一项
    “自由贸易”协定,但我听说厄瓜多尔已经于 2003 年采纳了类似于 DMCA 的法案。

    One of the ideas in the story was not proposed in reality
    until 2002. This is the idea that the FBI and Microsoft will keep
    the root passwords for your personal computers, and not let you
    have them.

    这个故事中的某一种理念直到 2002 年还未在现实中被提议,这种理念是由 FBI 
    和微软掌控您的个人计算机的 root 口令并且不会让您得到它们。

    The proponents of this scheme have given it names such as “trusted
    computing” and “Palladium.” We call it “treacherous
    computing”[(1)](#FOOT1) because the effect is to make your computer
    obey companies even to the extent of disobeying and defying you.
    This was implemented in 2007 as part of Windows Vista;[(2)](#FOOT2)
    we expect Apple to do something similar. In this scheme, it is the
    manufacturer that keeps the secret code, but the FBI would have
    little trouble getting it.

    这一阴谋的倡导者将其命名为诸如“信任计算”或者“Palladium”。我们称之为
    “背叛计算”[(1)](#FOOT1),由于其效果是使您的计算机听命于商业公司,甚至
    到了不再听命于您而是违抗您的地步。这在 2007 年作为 Windows Vista 的一
    部分被实施[(2)](#FOOT2);我们可以预见苹果也会做出类似的事情。在这种阴
    谋中,由计算机制造商掌控其秘密代码,但 FBI 对它同样是唾手可得。

    What Microsoft keeps is not exactly a password in the traditional
    sense; no person ever types it on a terminal. Rather, it is a
    signature and encryption key that corresponds to a second key stored
    in your computer. This enables Microsoft, and potentially any web
    sites that cooperate with Microsoft, the ultimate control over what
    the user can do on his own computer.

    确切地说,微软所掌控的并不是传统意义上的口令;由于无人能够在终端上输
    入它。与之相反,它是一种数字签名和加密密钥,它对应着存储在您的计算机
    上的另一个密钥。这将允许微软以及任何潜在与微软合作的网站对于用户能够
    在其计算机上做的事情进行完全控制。

    Vista also gives Microsoft additional powers; for instance,
    Microsoft can forcibly install upgrades, and it can order all
    machines running Vista to refuse to run a certain device driver. The
    main purpose of Vista’s many restrictions is to impose DRM (Digital
    Restrictions Management) that users can’t overcome. The threat of
    DRM is why we have established the Defective by Design campaign, at
    [DefectiveByDesign.org](DefectiveByDesign.org).

    Vista 同样赋予了微软额外的权力;例如,微软可以强制安装更新,它可以命
    令所有运行 Vista 的计算机拒绝运行某一特定的设备驱动程序。Vista 所施加
    的诸多限制的主要目的是强制实施用户所不能克服的数字版权管理(DRM)。DRM 
    的威胁正是我们发起 Defective by Design 运动的原因,它位于 [DefectiveByDesign.org](DefectiveByDesign.org)。

    When this story was first written, the SPA was threatening small
    Internet service providers, demanding they permit the SPA to monitor
    all users. Most ISPs surrendered when threatened, because they
    cannot afford to fight back in court. One ISP, Community ConneXion
    in Oakland, California, refused the demand and was actually sued.
    The SPA later dropped the suit, but obtained the DMCA, which gave
    them the power they sought. The SPA, which actually stands for
    Software Publishers Association, has been replaced in its
    police-like role by the Business Software Alliance. The BSA is not,
    today, an official police force; unofficially, it acts like one.
    Using methods reminiscent of the erstwhile Soviet Union, it invites
    people to inform on their coworkers and friends. A BSA terror
    campaign in Argentina in 2001 made slightly veiled threats that
    people sharing software would be raped.

    当这段故事初次编写之时,SPA 威胁小型互联网服务供应商(ISP),要求它们
    允许 SPA 监控所有用户。大多数 ISP 在受到威胁的时候都妥协了,由于它们
    打不起官司。一家位于加利福尼亚州奥克兰的 ISP,Community ConneXion 拒
    绝了这一要求,并且确实被起诉了。SPA 随后撤诉,但它得到了 DMCA 的支持,
    这赋予了它们一直渴求的权力。SPA,实际上是软件发行商协会之意,由商业软
    件联盟(BSA)取代了其类似于警察的职责。在今天,BSA 不是一支官方警察力
    量,但它却在以非官方的方式行使这种权力。通过使用使我们想起前苏联的手
    段,它邀请人们举报其同事和朋友。于 2001 年在阿根廷发生的一起 BSA 恐怖
    行动几乎毫无遮掩地威胁人们:分享软件将被处以酷刑。

    The university security policies described above are not imaginary.
    For example, a computer at one Chicago-area university displayed
    this message upon login:

    上文描述的大学安全政策并非毫无实据。例如,芝加哥地区的某大学的一台计算
    机在登录时显示了以下信息:

    > This system is for the use of authorized users only. Individuals
    > using this computer system without authority or in the excess of
    > their authority are subject to having all their activities on this
    > system monitored and recorded by system personnel. In the course
    > of monitoring individuals improperly using this system or in the
    > course of system maintenance, the activities of authorized user
    > may also be monitored. Anyone using this system expressly consents
    > to such monitoring and is advised that if such monitoring reveals
    > possible evidence of illegal activity or violation of University
    > regulations system personnel may provide the evidence of such
    > monitoring to University authorities and/or law
    > enforcement officials.

    > 本系统仅供授权用户使用。对于任何未经授权或者超出其授权范围使用本系
    > 统的个人,其在本系统上进行的所有活动将被监控并且记录。在对任何人不
    > 当使用本系统进行监控或者系统维护期间,授权用户的行为也可能被监控。
    > 任何使用本系统的个人必须明确同意接受这种监控,并且此监控一旦发现可
    > 能指证非法行为或者侵犯大学规定的行为的证据,本系统可能将通过此监控
    > 发现的证据移交至大学权利结构和/或官方执法机构。

    This is an interesting approach to the Fourth Amendment: pressure
    most everyone to agree, in advance, to waive their rights under it.

    这是一种类似于美国宪法第四修正案的有趣方式:首先施压以迫使几乎所有人
    放弃他们的权利。

### Bad News {#bad-news .subheading}

### 坏消息

The battle for the right to read is already in progress. The enemy is is
organized, while we are not, so it is going against us. Examples of bad
things that have happened since the original publication of this article
include:

关于阅读的权利的斗争已经在进行中了,敌人已经有备而来严阵以待,而我们还没
有。因此这场斗争正在向着对我们不利的方向进行。自本文初次发表之日起发生的
一些代表性的坏消息包括:

-   Today’s commercial e-books abolish readers’ traditional freedoms.
    See “The Danger of E-Books” (@pageref{E-Books Danger}) for more
    on this.

-   今天的商业性电子书剥夺了读者的传统自由。参见(@pageref{E-Books Danger})
    的“电子书的威胁”一文以获得更多信息;

-   The publication of a “biology textbook” web site[(3)](#FOOT3) that
    you can access only by signing a contract not to lend it to anyone
    else,[(4)](#FOOT4) which the publisher can revoke at will.

-   某一“生物课本”网站[(3)](#FOOT3)允许您访问其出版物,仅当您签订合同以
    保证不会将其借给任何人阅读[(4)](#FOOT4)。而出版商可以随意废除此合同;

-   Electronic publishing’s curtailment of user freedom.[(5)](#FOOT5)

-   电子出版物限制其用户的自由[(5)](#FOOT5);

-   Books inside computers:[(6)](#FOOT6) software to control who can
    read books and documents on a computer.

-   计算机中的图书[(6)](#FOOT6):用于控制谁可以在一台计算机上阅读图书和
    文档的软件。

If we want to stop the bad news and create some good news, we need to
organize and fight. The FSF’s Defective by Design campaign has made a
start; subscribe to the campaign’s mailing list to lend a hand. And join
the FSF, at <http://my.fsf.org/join>, to help fund our work.

如果我们想要阻止这样的坏消息并且带来一些好消息,我们需要组织起来并且进行
斗争。自由软件基金会(FSF)的 Defective by Design 运动已经为这场斗争拉开
序幕;订阅该运动的邮件列表以提供支持。并且加入 FSF 以资助我们的工作。

### References {#references .subheading}

### 参考文献

-   @raggedright

-   美国专利及商标局(USPTO),Intellectual Property
    \[*sic*\] and the National Information Infrastructure: The Report of
    the Working Group on Intellectual Property \[*sic*\] Rights,
    Washington, DC: GPO, 1995. (参见 “Did You Say ‘Intellectual
    Property’? It’s a Seductive Mirage” (@pageref{Not IPR}) 一文以获知为何
    “Intellectual Property” 这一短语是含混不清的并且永远不应被使用。)

-   Samuelson, Pamela, “The Copyright Grab,” *Wired,* January 1996,
    4.01, <http://wired.com/wired/archive/4.01/white.paper_pr.html>.

-   Boyle, James, “Sold Out,” *New York Times,* 31 March 1996, sec.
    4, p. 15; 也可以在这里找到:
    <https://law.duke.edu/boylesite/sold_out.htm>.

-   社论, *Washington Post,* “Public Data or Private Data,”
    3 November 1996, sec. C, p. 6, [http://web.archive.org/web/\
    20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html](http://web.archive.org/web/%3Cbr%3E20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html).

-   公有领域联盟(Union for the Public Domain)——一个致力于抵抗并且逆转版权和专利的权力过度扩张的组织。
    @end raggedright

<div class="footnote">

------------------------------------------------------------------------

### Footnotes

### [(1)](#DOCF1)

@raggedright 参见 “Can You Trust Your Computer?” (@pageref{Can You
Trust}) 一文以获得更多关于“信任计算”的信息。 @end raggedright

### [(2)](#DOCF2)

@raggedright 参见 <http://badvista.fsf.org/> 以了解我们反对 Windows Vista
的运动。 @end raggedright

### [(3)](#DOCF3)

@raggedright Nature America Inc., “Announcing Principles of Biology, an
Interactive Textbook by Nature Education,”
<http://nature.com/nature_education/biology.html>. @end raggedright

### [(4)](#DOCF4)

@raggedright Nature America Inc., “Principles of Science Privacy
Notice,” accessed August 2015,
<http://nature.com/principles/viewTermsOfUse>. @end raggedright

### [(5)](#DOCF5)

@raggedright 参见 Don Clark 的文章 “Seybold Opens Chapter on Digital
Books” (31 August 1999,
[http://www.zdnet.com/article/seybold-opens-chapter-on-\
digital-books/](http://www.zdnet.com/article/seybold-opens-chapter-on-%3Cbr%3Edigital-books/)),
以获知有关以电子形式发布图书以及影响到阅读其副本的权利的版权问题的信息。
@end raggedright

### [(6)](#DOCF6)

@raggedright “Microsoft Announces New Software for Reading on Screen,”
30 August 1999,
<http://microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx>. @end
raggedright

</div>

------------------------------------------------------------------------

This document was generated by *tonghuix* on *March 25, 2016* using
[*texi2html 1.82*](http://www.nongnu.org/texi2html/).\

汉化:Nadebula