Chris Nandor wrote:
>At 10:41 -0600 2000.09.11, Tom Christiansen wrote:
> >I suggest that one explore the answer to this question:
> >
> >    What does one wish to prohibit people from doing?
>That is an excellent question.  Bradley Kuhn asked we hold off on more
>discussion until he can release some RFCs tomorrow.  I will put aside other
>related discussions, but this is the one discussion, which Rush proposed,
>which I don't think has any need to wait.
Your answers to this explain a lot!

If I may summarize.

It seems that you are asking for better recognition than
the BSD license supplies.

I am asking for some protection against an Embrace, Extend,
Extinguish attack.
>In broad, inexact, and incomplete terms:
>I wish to prohibit people from presenting my work as their own.
>I wish to prohibit people from releasing modified versions of my work that
>do not clearly, without question, note the modifications and
>incompatibilies, so they are not misrepresented as my work, while they are
>I wish to prohibit people from distributing my work in any form without
>prominent, working pointers to the complete, free of charge, unmodified
So you would not like to see something called "perlex" or
something called "oraperl" distributed with no instructions
on how to get "perl"?  By contrast I would not mind that.
>Let me disagree (?) with Ben, who wrote:
> >I wish to prohibit people from distributing something that they call
> >Perl which differs significantly from Perl and has changes which Perl
> >cannot choose to reincorporate into the standard version.
>I was going to disagree, but then I just decided I don't know what this
>means.  What I don't understand is this thing about incorporating changes
>into the Standard Version.  Why does it matter?

Because if you are going to embrace and extend, I want the
extension distributed on terms where the maintainer of the
standard version does not have to play catch-up if you had
some good ideas.  And I don't want your extension to wind
up in due course of time under a license which leaves you
with essentially absolute control.

This is also why I am focused on examples from Sun and
Microsoft that fit into attacks of this nature.

Does that clarify the underlying philosophical difference?

Get Your Private, Free E-mail from MSN Hotmail at

Share information about yourself, create your own public profile at

Reply via email to