Firefox Confuses UK Government Piracy Laws


The UK government stated:

If Mozilla permit the sale of copied versions of its software, it makes it virtually impossible for us, from a practical point of view, to enforce UK anti-piracy legislation

It seems they really don’t understand the whole open source thing do they? You can’t pirate open source software, you can however sell it however you like. Most companies just charge a nominal fee to cover the cost of the CD and the postage.

I can’t believe that your company would allow people to make money from something that you allow people to have free access to. Is this really the case?

The contact from Mozilla licensing actually responded back attempting to explain the situation.

I wrote back, politely explaining the principles of copyleft & that the software was free, both as in speech and as in price, and that people copying and redistributing it was a feature, not a bug. I said that selling verbatim copies of Firefox on physical media was absolutely fine with us, and we would like her to return any confiscated CDs and allow us to continue with our plan for world domination (or words to that effect).

Source: SlashdotTimes Online

Posted in: Hacking News

,


Latest Posts:


zBang - Privileged Account Threat Detection Tool zBang – Privileged Account Threat Detection Tool
zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations & red teams can use it to identify attack vectors
Memhunter - Automated Memory Resident Malware Detection Memhunter – Automated Memory Resident Malware Detection
Memhunter is an Automated Memory Resident Malware Detection tool for the hunting of memory resident malware at scale, improving threat hunter analysis process.
Sandcastle - AWS S3 Bucket Enumeration Tool Sandcastle – AWS S3 Bucket Enumeration Tool
Sandcastle is an Amazon AWS S3 Bucket Enumeration Tool, formerly known as bucketCrawler. The script takes a target's name as the stem argument (e.g. shopify).
Astra - API Automated Security Testing For REST Astra – API Automated Security Testing For REST
Astra is a Python-based tool for API Automated Security Testing, REST API penetration testing is complex due to continuous changes in existing APIs.
Judas DNS - Nameserver DNS Poisoning Attack Tool Judas DNS – Nameserver DNS Poisoning Attack Tool
Judas DNS is a Nameserver DNS Poisoning Attack Tool which functions as a DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation.
dsniff Download - Tools for Network Auditing & Password Sniffing dsniff Download – Tools for Network Auditing & Password Sniffing
Dsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network


4 Responses to Firefox Confuses UK Government Piracy Laws

  1. tekse7en March 2, 2008 at 6:54 am #

    Governments need to back off the internet, because they will never be able to catch up with technology or computer culture.

  2. Pantagruel March 2, 2008 at 8:48 am #

    Governments need to be taught in the ways of the GPL, seems a lot of problems arise out of mere ignorance. And instead of consulting someone knowledgeable they burp out some nonsense. They will persist in mingling with the internet whether you like it or not.

  3. zupakomputer March 2, 2008 at 3:49 pm #

    Well, the US military (and universities) did develop the internet originally as a way to keep communications secure and available in the event of nuclear fallout / war, but hey – if there was an intent to make it a type of NWO-style-nightmare-conspiracy-theory trap so’s they could better take a census of every person and what they are up to, then it serves them right anyway that it’d get taken over as a civil communications tool.

    Since it’s their fault there even are nukes.

  4. Pantagruel March 3, 2008 at 9:56 pm #

    @Zupakomputer

    True DARPA started out as a redundant way of comm’s network. the Uni’s quickly understood it’s potential and started using it to transfer research results (I use it on a daily basis, PubMed and such).
    Thing is, you could abuse any object you could think about, even a simple ‘biro’ (ballpoint) can be used to kill a grown man. Knowledge doesn’t kill, malicious use of knowledge can (the stuff we have in our work environment and the biochemical knowledge in my head are good enough to prepare something evil, but I choose not to .

    Too bad the nukes where deviced out of pure fear that the ‘other’ side would have them before ‘we’ would. After the sad Hiroshima and Nagasaki bombing we now know the axis force where far from producing a nuclear weapon.