in ,

What usage restrictions can we place in a free software license ?, Hacker News

[personal profile] JSON license ‘s requirement that the software be used for good, not evil, is arguably an earlier version of the theme). The problem with these licenses is that they’re pretty much universally considered to fall outside the definition of free software or open source licenses due to their restrictions on use, and there’s a whole bunch of people who have very strong feelings that this is a very important thing. There’s also the more fundamental basis point that it’s hard to write a license like this where everyone agrees on whether a specific thing is bad or not (eg, while many people working on a project may feel that it’s reasonable to prohibit the software being used to Support drone strikes, others may feel that the project shouldn’t have a position on the use of the software to support drone strikes and some may even feel that some people should be the victims of drone strikes). This is, it turns out, all quite complicated.

But there is something that many (but not all) people in the free software community agree on – certain restrictions are legitimate if they ultimately provide more freedom. Traditionally this was limited to restrictions on distribution (eg, the GPL requires that your recipient be able to obtain corresponding source code, and for GPLv3 must also be able to obtain the necessary signing keys to be able to replace it in covered devices), but more recently there’s been some restrictions that don’t require distribution. The best known is probably the clause in the Affero GPL (or AGPL) that requires that users interacting with covered code over a network be able to download the source code, but the Cryptographic Autonomy License (recently approved as an Open Source license goes further and requires that users be able to obtain their data in order to self-host an equivalent instance.

We can construct examples of where these prevent certain fields of endeavor, but the tradeoff has been deemed worth it – the benefits to user freedom that these licenses provide is greater than the corresponding cost to what you can do . How far can that tradeoff be pushed? So, here’s a thought experiment. What if we write a license that’s something like the following:

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. All permissions granted by this license must be passed on to all recipients of modified or unmodified versions of this work 2. This work may not be used in any way that impairs any individual’s ability to exercise the permissions granted by this license, whether or not they have received a copy of the covered work

This feels like the logical extreme of the argument. Any way you could use the covered work that would restrict someone else’s ability to do the same is prohibited. This means that, for example, you couldn’t use the software to implement a DRM mechanism that the user couldn’t replace (along the lines of GPLv3’s anti-Tivoisation clause), but it would also mean that you couldn’t use the software to kill someone with a drone (doing so would impair their ability to make use of the software). The net effect is along the lines of the Hippocratic license, but it’s framed in a way that is focused on user freedom.

To be clear, I don’t think this is a good license – it has a bunch of unfortunate consequences like it being impossible to use covered code in self-defense if doing so would impair your attacker’s ability to use the software. I’m not advocating this as a solution to anything. But I am interested in seeing whether the perception of the argument changes when we refocus it on user freedom as opposed to an independent ethical goal. (Thoughts?

Edit: Rich Felker on Twitter had an interesting thought – if clause 2 above is replaced with: 2. Your rights under this license terminate if you impair any individual’s ability to exercise the permissions granted by this license, even if the covered work is not used to do so

how does that change things? My gut feeling is that covering actions that are unrelated to the use of the software might be a reach too far, but it gets away from the idea that it’s your use of the software that triggers the clause.

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Internet in a box, Hacker News

Internet in a box, Hacker News

Why does WebAssembly need the relooper algorithm, instead of gotos? (2019), Hacker News

Why does WebAssembly need the relooper algorithm, instead of gotos? (2019), Hacker News