right-to-read.sr.po

Mismatched links: 26.

Mismatched ids: 0.

#text
3  
by <a href="https://www.stallman.org/">Richard Stallman</a> 
од <a href="http://www.stallman.org/">Ричарда Сталмана</a> 
20  
<a href="https://www.defectivebydesign.org/ebooks.html"> Join our mailing list about the dangers of e-books</a>. 
 
22  
This story is supposedly a historical article that will be written in the future by someone else, describing Dan Halbert's youth under a repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as propaganda. So it uses the terminology of that society. I have tried to project it forwards into something more visibly oppressive. See <a href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>. 
 
23  
Computer-enforced restrictions on lending or reading books (and other kinds of published works) are known as DRM, short for &ldquo;Digital Restrictions Management.&rdquo; To eliminate DRM, the Free Software Foundation has established the <a href="https://www.defectivebydesign.org/">Defective by Design</a> campaign. We ask for your support. 
 
30  
Nonfree software tends to have <a href="/proprietary/">abusive features of many kinds</a>, which lead to the conclusion that <a href="/philosophy/free-software-even-more-important.html">you can never trust a nonfree program</a>. We must insist on free (libre) software only, and reject nonfree programs. 
 
33 | The proponents of this scheme [-have given it-] {+gave early versions+}
| names such as &ldquo;trusted computing&rdquo; and
| [-&ldquo;Palladium&rdquo;. We call it <a
| href="/philosophy/can-you-trust.html">&ldquo;treacherous
| computing&rdquo;</a> because the effect is to make your computer obey
| companies even to the extent of disobeying and defying you. This was
| implemented in 2007-] {+&ldquo;Palladium&rdquo;, but+} as [-part of <a
| href="http://badvista.org/">Windows Vista</a>; we expect Apple to do
| something similar. In this scheme,-] {+ultimately put into use,+} it is
| [-the manufacturer that keeps the secret code, but the FBI would have
| little trouble getting it.-] {+called &ldquo;secure boot&rdquo;.+} 
The proponents of this scheme gave early versions names such as &ldquo;trusted computing&rdquo; and &ldquo;Palladium,&rdquo; but as ultimately put into use, it is called &ldquo;secure boot.&rdquo; 
Заговорници овог плана су му наденули имена као „рачунање од поверења“ [<em>trusted computing</em>] или „Паладијум“. Ми га зовемо „издајничко рачунање“ [<em>treacherous computing</em>] јер су његове последице да натерају ваш рачунар да слуша разне компаније а не вас. Ово је уведено 2007. као део <a href="http://badvista.org/">Виндоуза Виста</a>; очекујемо да ће и Епл урадити нешто слично. Према овој идеји, тајни ко̂д ће чувати произвођач, али ни ФБИ неће имати потешкоћа да до њега дође. 
34 | What Microsoft keeps is not exactly a password in the traditional sense;
| no person ever types it on a terminal. Rather, it is a signature and
| encryption key that corresponds to a second key stored in your computer.
| This enables Microsoft, and potentially any web sites that cooperate with
| Microsoft, the ultimate control over what the user can do on [-his-]
| {+per+} own computer. {+Microsoft is likely to use that control on behalf
| of the FBI when asked: it already <a
| href="/proprietary/malware-microsoft.html">shows the NSA security bugs
| in Windows</a> to exploit.+} 
What Microsoft keeps is not exactly a password in the traditional sense; no person ever types it on a terminal. Rather, it is a signature and encryption key that corresponds to a second key stored in your computer. This enables Microsoft, and potentially any web sites that cooperate with Microsoft, the ultimate control over what the user can do on per own computer. Microsoft is likely to use that control on behalf of the FBI when asked: it already <a href="/proprietary/malware-microsoft.html">shows the NSA security bugs in Windows</a> to exploit. 
Оно што Мајкрософт има није баш лозинка у традиционалном значењу; нико је уствари неће откуцати на екрану. Наиме, то је потпис и кључ за шифровање који одговара другом кључу смештеном у ваш рачунар. Ово омогућава Мајкрософту, и потенцијално било ком веб сајту који сарађује са Мајкрософтом, коначну контролу над оним што корисник може да ради на свом рачунару. 
42 | The [-<a href="#AuthorsNote">author's note</a> talks about the-] battle
| for the right to read [-and electronic surveillance.-] {+is going against
| us so far.+} The [-battle-] {+enemy+} is [-beginning now; here-]
| {+organized, and we+} are [-links to two articles about technologies now
| being developed to deny you the right to read.-] {+not.+} 
The battle for the right to read is going against us so far. The enemy is organized, and we are not. 
<a href="#AuthorsNote">Ауторова белешка</a> прича о бици за право на читање и електронском надзору. Битка почиње данас; овде су везе према двама чланцима о технологијама које се управо развијају да би вам ускратиле право на читање. 
43  
Today's commercial e-books <a href="/philosophy/the-danger-of-ebooks.html"> abolish readers' traditional freedoms</a>. Amazon's e-book reader product, which I call the &ldquo;<a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>&rdquo; because it's designed to swindle readers out of the traditional freedoms of readers of books, is run by software with several demonstrated <a href="/proprietary/malware-kindle-swindle.html">Orwellian functionalities</a>. Any one of them calls for rejecting the product completely: 
 
44 | [-<a
| href="http://www.zdnet.com/article/seybold-opens-chapter-on-digital-books/">Electronic
| Publishing:</a> An article about distribution of books in electronic
| form,-]{+It spies on everything the user does: it reports which book the
| user is reading, and which page, and it reports when the user highlights
| text,+} and [-copyright issues affecting-] {+any notes+} the [-right to
| read a copy.-] {+user enters.+} 
It spies on everything the user does: it reports which book the user is reading, and which page, and it reports when the user highlights text, and any notes the user enters. 
<em><a href="http://www.zdnet.com/article/seybold-opens-chapter-on-digital-books/">Electronic Publishing</a></em>: Чланак о достављању књига у електронском облику, и ауторскоправним проблемима који утичу на право читања копије. 
45 | [-<a
| href="http://news.microsoft.com/1999/08/30/microsoft-announces-new-software-for-reading-on-screen/">
| Books inside Computers:</a> Software-]{+It has DRM, which is intended+} to
| [-control who can read books and documents on a PC.-] {+block users from
| sharing copies.+} 
It has DRM, which is intended to block users from sharing copies. 
<em><a href="http://news.microsoft.com/1999/08/30/microsoft-announces-new-software-for-reading-on-screen/"> Books inside Computers</a></em>: Програм који контролише ко може да чита књиге и документе на рачунару. 
49  
If we want to stop the bad news and create some good news, we need to organize and fight. Subscribe to the FSF's <a href="https://www.defectivebydesign.org/"> Defective by Design</a> campaign to lend a hand. You can <a href="https://www.fsf.org/associate">join the FSF</a> to support our work more generally. There is also a <a href="/help/help.html">list of ways to participate in our work</a>. 
 
52  
<a href="https://www.wired.com/1996/01/white-paper/">An explanation of the White Paper: The Copyright Grab</a>, Pamela Samuelson, <cite>Wired</cite>, January 1st, 1996. 
<em><a href="http://www.wired.com/wired/archive/4.01/white.paper_pr.html">An explanation of the White Paper: The Copyright Grab</a></em>, Памела Самјуелсон, Вајрд, 1.&nbsp;јануар&nbsp;1996. 
53  
<a href="https://law.duke.edu/boylesite/sold_out.htm">Sold Out</a>, James Boyle, <cite>New York Times</cite>, March 31, 1996. 
<em><a href="http://www.law.duke.edu/boylesite/sold_out.htm">Sold Out</a></em>, Џејмс Бојл, Њујорк тајмс, 31.&nbsp;март&nbsp;1996. 
54  
<a href="https://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public Data or Private Data</a>, Dave Farber, <cite>Washington Post</cite>, November 4, 1996. 
<em><a href="http://web.archive.org/web/20130508120533/http://www.interesting-people.org/archives/interesting-people/199611/msg00012.html">Public Data or Private Data</a></em>, Давид Фарбер [<em>Dave Farber</em>], Вашингтон пост, 4.&nbsp;новембар&nbsp; 1996. 
57  
This essay is published in <a href="https://shop.fsf.org/product/free-software-free-society/"><cite>Free Software, Free Society: The Selected Essays of Richard M. Stallman</cite></a>. 
Овај есеј је објављен у књизи <a href="http://shop.fsf.org/product/free-software-free-society/"><cite>Слободни софтвер, слободно друштво: Одабрани есеји Ричарда М. Сталмана</cite></a>. 
59  
Please send general FSF &amp; GNU inquiries to <a href="mailto:gnu@gnu.org">&lt;gnu@gnu.org&gt;</a>. There are also <a href="/contact/">other ways to contact</a> the FSF. Broken links and other corrections or suggestions can be sent to <a href="mailto:webmasters@gnu.org">&lt;webmasters@gnu.org&gt;</a>. 
Молимо вас да шаљете питања у вези са ЗСС-ом и ГНУ-ом на адресу <a href="mailto:gnu@gnu.org">&lt;gnu@gnu.org&gt;</a>. Постоје и <a href="/contact/">други начини да се обратите</a> ЗСС-у. Молимо вас да шаљете неисправне везе и друге исправке (или предлоге) на адресу <a href="mailto:mailto:webmasters@gnu.org">&lt;mailto:webmasters@gnu.org&gt;</a>.