Displaying posts tagged conservancy
Copyleft compliance misconception #1: Companies check their source builds before publishing
byon February 15, 2018
We often hear from people that are confused about why companies fail to meet their copyleft compliance obligations - it seems fairly straight-forward to do, so why don't they all do it? In its many years of experience attempting to help companies comply with the GPL and other copyleft licenses, Conservancy has seen first-hand how many of the expectations software users have about how a company would release source tend to not be met the majority of the time. This post is Conservancy's first in a series on these common misconceptions about copyleft compliance, which will hopefully provide some insight for people wondering why these expectations are seemingly seldom met.
Misconception #1: Companies check their source builds before publishing
If you use or develop free and open source software, you probably find it natural for software projects to make building and installing their software as easy as posssible (or at least to provide contact points in case it is not). This is because getting people to use or contribute to such projects depends on these projects being straight-forward to build and install, otherwise people would just use something else (since normally they would have little invested in a project they can't build or install).
As a result, when companies publish source code as a result of their obligation to comply with the copyleft licenses in the software they distribute (usually this is their primary motivation - in rare cases (so far as we see it) companies are motivated primarily by engaging with the free software community, which we naturally try to encourage as much as possible), they do not have the same incentives as you would normally expect of a project distributing free and open source software. Consequently, companies tend to spend most of their time ensuring that whatever product they're selling to you (be it a router, Blu-ray player, smartphone, etc.) performs the functions it's intended to perform and meeting their bare obligations when it's shipped. They don't spend very much time working on the build and installation experience for those who would like to modify the software running on it after they receive it.
Furthermore, determining which parts of the device's overall build and installation process a company considers to be confidential is often not done, or is done under pressure so close to release time that the company does not wish to try untangling the portions they consider confidential from the portions that they are required to release in order to fulfill their obligations under the copyleft licenses for the software they chose to use.
What we normally see as the outcome of this (in the hundreds of source releases we've evaluated) is that the source code companies provide is nowhere close to meeting the requirements of GPLv2 (which is the copyleft license we most often see being violated), which state that companies must provide "the complete corresponding machine-readable source code" for all the GPLv2-licensed software on the devices they distribute and that "The source code for a work means the preferred form of the work for making modifications to it [which includes] the scripts used to control compilation and installation of the executable."
There are a variety of reasons that a company's source release might fail to meet the above requirements. In many cases we find that the versions of the source packages they provide are nowhere close to the versions of the binaries they distribute. Or their source release is missing entire source packages - i.e. they distribute a binary for Copylefted Project A, but do not provide any source code for Copylefted Project A, even though they might include source for Copylefted Project B.
Even if the above issues are not present, most often we find that there are no scripts at all for installing the software on the device (either in machine- or human-readable form), and any scripts we might find for controlling compilation of the executable are little more than what the original maintainers of the source package provided (which normally means people outside the company shipping the device). As a result, the compilation does not succeed because any changes the company made to the original source package are not considered in the build instructions (the company likely got it to build at least once, in order to ship it on the device, but decided not to document or share that process in their source release). This is particularly frustrating to the people who report the violations to us, as they often want access to the source code to do something particular with the devices they own.
After seeing this pattern in dozens of different source releases from dozens of different companies, it is clear to us that companies do not normally check to see if the source they release can actually be built and installed. Rather than being motivated primarily by meeting the perceived legal requirements of copyleft licenses and thus releasing markedly incomplete source code, our hope is that more companies will start to see the primary motivation for source releases as a way of engaging with the free software community, from which correct build and installation instructions (and indeed fully compliant source releases!) will naturally follow. We've already seen community development projects like SamyGo and OpenWRT form around Samsung TVs and Linksys routers and we hope other companies will see the benefits and help build such communities right from the start.
Thank you to all our donors and Supporters - we did it!
byon January 17, 2018
On behalf of Conservancy's staff and all of our member projects, I am excited to thank all of the people who contributed to this year's match challenge. Thanks to your generosity, we exceeded the amounts offered by Private Internet Access and an anonymous donor set for this year's annual fundraising drive.
What inspires me the most about this success is that we could not have done it without a high level of engagement from our volunteers. You not only donated your money to help sustain Conservancy, but you also took time to become a promotion machine for us. You blogged about it, you tweeted and tooted about it, you wrote about it on chat forums and you put up banners on websites. One volunteer even forwent payment on a small consulting gig and asked instead that the amount be donated to us.
Two years ago, we decided to become an individual supported charity to ensure independence from large corporate donors.Your support demonstrates that we can succeed and be vibrantly independent. We are humbled by your commitment to our mission and your trust in us and our work. We will use the money as best as we can to advance software freedom. We're so excited for the work we can all do together in 2018!
Why Scènes À Faire Should Apply to Command-Line Interfaces
byon January 3, 2018
Today, Conservancy joined other amici in the Cisco v. Arista case. Specifically, the amicus brief discusses why the scènes à faire affirmative defense for copyright infringement is appropriate and actually necessary regarding imitation of command-line interfaces. I hope this blog post will convince you that software freedom contributors should care about the issue.
The easiest example to understand these issues is Unix. Most of us know
the basics of Unix's user interface, which primarily consists of commands
that live in
/usr/bin, that each include various command-line options that
we've memorized. When the GNU project started, as RMS has described in his
talks, he chose to imitate this user interface. Many reasons were obvious,
but the most important one was that Unix was already an industry standard and
users already knew its interface.
At the time, no one would have considered that you'd be liable for copyright infringement merely writing some new programs — 100% from scratch — that happened to have the same names and the same command-line options that were found in Unix. That interface, in fact, has been reimplemented at least a hundred times — by many Unix vendors and by various software freedom projects (GNU of course, but also by Conservancy's BusyBox project and others). As developers, we'd be incredulous if told that GNU infringed Unix's original copyrights. But that's exactly the argument that Cisco made about Arista's imitation of Cisco's command-line interface.
I'm not a fan of either Cisco nor Arista; all the software in question is proprietary software. Indeed, GitHub, which is one of our joined amici here, produces much proprietary software around Git, and that's bothers me too. I don't like it when any company writes proprietary software to work along with FLOSS. However, I agree with GitHub and Arista that copyright restrictions should not extend too far; copyright should not stifle simple command-line interoperatiblity. Merely imitating a command-line interface of one program in another should not cause (by itself) a copyright infringement.
Now, the last part to discuss are the questions: What is an affirmative defense, and what is scènes à faire? So, to explain it roughly with as little legalese (IANAL) as possible, an affirmative defense is one that you must prove after you're accused, usually through a trial (which is what occurred here). The burden is on the Defendant to prove that affirmative defense. (By contrast, if Arista had shown that, in fact, their command-line interface bore no similarity to Cisco's, that would have been a “negating defense”. Such defenses are much more assured to win, as they don't place such a burden on the defense.)
So, what, specifically, is the affirmative defense of scènes à faire? It's a concept originally from fictional works that generally expresses this idea: “if you're going to tell this story at all, you need at least these elements”. In this example, the analogy works like this: if your users will give a router textual commands via the command-line, that user will expect certain commands to work. Cisco's commands are industry standard and expected by users, similar to those in Unix. The amicus brief argues that this is a reasonable application of scènes à faire, because there is great benefit to the public and users if such imitation is permitted on command-lines without copyright restriction. Remember, under the USA Constitution, copyright exists as an “exclusive Right to … Writings” only because such exclusive controls “promote the Progress of Science and useful Arts”. Copyright is not an absolute right of control over written works by the authors, and its tentacles must be shortened by the public interest.
Finally, I call on the Linux Foundation to publicly ask their platinum member, Cisco, to stop this aggressive litigation on an edge case of copyright. Such a request would be consistent with the Linux Foundation's public criticism of others for copyright enforcement. This case is one where we all should stand together in the interests of free innovation.
Judy Gichoya, Doctor & Developer of LibreHealth, Asks You to Support Conservancy
byon December 31, 2017
About a year ago, we announced the joining of a newly formed project, LibreHealth, as a Conservancy member project. This year, I had the opportunity to meet, at various conferences, Judy Gichoya, who is a medical doctor specializing in Radiology from Kenya, and is also a software developer on the LibreHealth project.
Judy represents so much about why we at Conservancy continue to fight for software freedom: we foster technology that everyone can examine, improve, and share, and allow people from different backgrounds — including geographically, professionally and culturally — to come together to make that technology better.
Invariably, every time I go to a doctor's office here in the USA, the staff complains (or makes an excuse) for the proprietary software they use to handle my medical data. My colleague, Karen Sandler, has researched and spoken extensively about the health dangers of proprietary software on medical devices. LibreHealth is one of many projects which seeks to solve some of these problems by creating more medical-related software that gives doctors and patients the software freedom they deserve.
Judy recorded this video to ask you to become a Supporter of Conservancy. On this last day of 2017, we all ask you to donate generously to help our work continue!