Firefox Confuses UK Government Piracy Laws

Keep on Guard!


The UK government stated:

If Mozilla permit the sale of copied versions of its software, it makes it virtually impossible for us, from a practical point of view, to enforce UK anti-piracy legislation

It seems they really don’t understand the whole open source thing do they? You can’t pirate open source software, you can however sell it however you like. Most companies just charge a nominal fee to cover the cost of the CD and the postage.

I can’t believe that your company would allow people to make money from something that you allow people to have free access to. Is this really the case?

The contact from Mozilla licensing actually responded back attempting to explain the situation.

I wrote back, politely explaining the principles of copyleft & that the software was free, both as in speech and as in price, and that people copying and redistributing it was a feature, not a bug. I said that selling verbatim copies of Firefox on physical media was absolutely fine with us, and we would like her to return any confiscated CDs and allow us to continue with our plan for world domination (or words to that effect).

Source: SlashdotTimes Online

Posted in: Hacking News

,


Latest Posts:


OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.


4 Responses to Firefox Confuses UK Government Piracy Laws

  1. tekse7en March 2, 2008 at 6:54 am #

    Governments need to back off the internet, because they will never be able to catch up with technology or computer culture.

  2. Pantagruel March 2, 2008 at 8:48 am #

    Governments need to be taught in the ways of the GPL, seems a lot of problems arise out of mere ignorance. And instead of consulting someone knowledgeable they burp out some nonsense. They will persist in mingling with the internet whether you like it or not.

  3. zupakomputer March 2, 2008 at 3:49 pm #

    Well, the US military (and universities) did develop the internet originally as a way to keep communications secure and available in the event of nuclear fallout / war, but hey – if there was an intent to make it a type of NWO-style-nightmare-conspiracy-theory trap so’s they could better take a census of every person and what they are up to, then it serves them right anyway that it’d get taken over as a civil communications tool.

    Since it’s their fault there even are nukes.

  4. Pantagruel March 3, 2008 at 9:56 pm #

    @Zupakomputer

    True DARPA started out as a redundant way of comm’s network. the Uni’s quickly understood it’s potential and started using it to transfer research results (I use it on a daily basis, PubMed and such).
    Thing is, you could abuse any object you could think about, even a simple ‘biro’ (ballpoint) can be used to kill a grown man. Knowledge doesn’t kill, malicious use of knowledge can (the stuff we have in our work environment and the biochemical knowledge in my head are good enough to prepare something evil, but I choose not to .

    Too bad the nukes where deviced out of pure fear that the ‘other’ side would have them before ‘we’ would. After the sad Hiroshima and Nagasaki bombing we now know the axis force where far from producing a nuclear weapon.