S
Susan Bugher
»Q« said:I don't see how that follows. Those two apps will remove spyware
which has been inadvertently installed by a user, very different from
taking someone else's code and modifying and redistributing it
without permission.
And the end result is not the same either. E.g., using either of
those apps to get rid of the ad/spyware components of Kazaa will
cause Kazaa not to function anymore.
We must not take the website's content, modify it so that the stuff
we don't like is not gone, then redistribute it by hosting it in our
own webspace.
Well, I don't think it is ok to download spyware/adware and then
modify it so that the ads and spying are removed, as long as the EULA
does not give permission to do so. Even if that is ok, it has never
been ok in this group, and neutered spyware has never been considered
freeware. Back when spyware was relatively new, there were often
ways to circumvent its spying capabilities and still use it; that
was frowned on here then, though it was brought up quite a bit.
But this leaves out the question of redistribution.
If it's ok to take someone's code, modify and redistribute it without
their permission (and there are plenty of people who think that is
ok, that IP rights should not apply to software), then any piece of
software could be turned into "freeware" in that manner.
I said:
These things are part of the *terms of use*. A web site owner could (and
no doubt would) argue that by viewing their site the user has agreed to
have a trojan installed, cookies implanted etc. etc.
I don't think we are always morally obligated to accept someone else's
terms of use. I think that's especially true when the consequences of
accepting those terms are not clearly spelled out.
IMO visiting a web site and using a program are two sides of the same
coin. To me your arguments against cracking imply that we must always
accept someone else's terms of use or abstain. I think that is overly
broad. IMO malware is the *primary* consideration - and judgements about
what is or is not acceptable should not ignore that aspect.
Companies collect personal information without my knowledge or consent.
Telemarketers argue that their free speech rights are being infringed by
the do-not-call act. (*Their* interpretation of free speech includes the
right to inflict unwanted phone calls on me.) Spammers flood my mailbox
with unwanted emails.
Companies put code into programs for their own benefit that can create
problems for the user and do not fully disclose what they have done.
(last year's TurboTax for example).
If a company adds code to software that is detrimental to my interests I
think the waters become very murky indeed - and the answers are not
always clearcut.
I agree with most of your conclusions. I *disagree* with the premise the
conclusions were based on.
Susan