------- Authored by: bloggsie on Wednesday, August 02 2006 @ 05:27 AM EDT PJ: Please consider for one moment this situation. You are running an organization which collects sensitive data from a large network of many thousands of machines. They are set up to deliver the numbers, in a very timely fashion, to a central repository. Remember that these machines collect sensitive data, upon which decisions of real consequence will be made. Now please remember that because they are networked they could well be interfered with, in spite of the best will in the world and with all precautions taken. The only way for you to be able to trust this veritable army of machines is for you to test that each and every one has not been interferred with in such a way that it corrupts the data it records. The only way I know of to guarantee this is to make sure that the program running in the machines reports a crypto hash of the contents of its program memory via a cryptographically secure communications channel. If my understanding of the GPLV3 is correct, and I sincerely believe it is, GPLV3, in effect prohibits the use of GPL software in, for example: Voting machines; EFTPOS and cash dispensing terminals; Casino machines; etc., etc.
PJ, Whilst I appreciate your concern for individual freedoms. Is that really what you want? ------- regards, alexander. _______________________________________________ gnu-misc-discuss mailing list [email protected] http://lists.gnu.org/mailman/listinfo/gnu-misc-discuss
