summaryrefslogtreecommitdiffstats
path: root/script.txt
blob: 676331ce4f045b139f3aa2e7dd602df4f0b9a182 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
History of Software Freedom
===========================

Hacker Subculture
-----------------
~3:00

slide:
	Hacking

notes:
	I'll discuss the hacker subculture first, since hacker values permeate and
	give context to the history of software freedom.
	Can anyone tell me what "hacking" is?
	<expect something about breaking into computers>
	What if I told you that this is a hack?

slide:
	<image of MIT nyan cat>

notes:
	This is a nyan cat that hackers hanged in MIT's Lobby 7 last September.  MIT
	is actually where the hacker subculture flourished.

slide:
	<image of TMRC railroad>

notes:
	Through the 1950s, MIT's Tech Model Railroad Club built a huge train layout.
	Under this layout was a complex matrix of wires, relays, and crossbar
	switches, called "The System".  Members of the Club's Signals and Power
	Subcommittee were obsessed with understanding and improving The System.
	They developed a jargon of terms including "hack", which described any
	innovative project or feat undertaken with wild pleasure.  They proudly
	called themselves "hackers".

slide:
	<photo of MIT hackers with Spacewar!>

notes:
	Eventually, the MIT model train hackers found computers and enthusiastically
	began programming them.  As they honed their skills, a set of beliefs
	formed.  Steven Levy codified these beliefs in the six tenets of the Hacker
	Ethic.

slide:
	The Hacker Ethic:
	 1. Access to computers---and anything that might teach you something about
	    the way the world works---should be unlimited and total.  Always yield
	    to the Hands-On Imperative!
	 2. All information should be free.
	 3. Mistrust Authority: Promote Decentralization.
	 4. Hackers should be judged on their hacking, not bogus criteria such as
	    degrees, age, race, or position.
	 5. You can create art and beauty on a computer.
	 6. Computers can change your life for the better.

notes:
	One: Access to computers---and anything that might teach you something about
	the way the world works---should be unlimited and total.  Always yield to
	the Hands-On Imperative!
	Two: All information should be free.
	Three: Mistrust Authority: Promote Decentralization.
	Four: Hackers should be judged on their hacking, not bogus criteria such as
	degrees, age, race, or position.
	Five: You can create art and beauty on a computer.
	Six: Computers can change your life for the better.

slide:
	> The word hack doesn't really have 69 different meanings.  In fact, hack
	> has only one meaning, an extremely subtle and profound one which defies
	> articulation.
	-- Phil Agre
	>    hacker
	>       A person who delights in having an intimate understanding of the
	>       internal workings of a system, computers and computer networks in
	>       particular.  The term is often misused in a pejorative context,
	>       where "cracker" would be the correct term.  See also: cracker.
	-- RFC 1392

notes:
	As MIT hacker Phil Agre notes, the word "hack" has "one meaning, an
	extremely subtle and profound one which defies articulation".  Renowned 
	hacker Dr. Richard Stallman defines "hacking" as "exploring the limits of
	what is possible, in a spirit of playful cleverness".
	As noted in RFC 1392 and elsewhere, the term "hacking" is often incorrectly
	used to describe breaking into computer systems.  The alternative term
	"cracking" has been offered for such malicious activities.

slide:
	<image of police car on Great Dome>

notes:
	The word "hack" has long been used at MIT to describe elaborate college
	pranks, such as assembling what appeared to be a campus police car atop the
	Great Dome.

slide:
	Network Working Group                                        D. Waitzman
	Request for Comments: 1149                                       BBN STC
	                                                            1 April 1990
	
	
	   A Standard for the Transmission of IP Datagrams on Avian Carriers
	
	Status of this Memo
	
	   This memo describes an experimental method for the encapsulation of
	   IP datagrams in avian carriers.  This specification is primarily
	   useful in Metropolitan Area Networks.  This is an experimental, not
	   recommended standard.  Distribution of this memo is unlimited.

notes:
	On April 1, 1990, the Internet Engineering Task Force displayed its sense of
	humor with RFC 1149, "A Standard for the Transmission of IP Datagrams on
	Avian Carriers".  This hack defined a way to transmit network data over
	carrier pidgeons.

slide:
	<photo of BLUG members with pidgeons>

notes:
	Eleven years later, the Bergen Linux User Group in Norway implemented the
	standard on GNU/Linux, recording a mere 55% packet loss and an average
	round-trip time of one hour and 46 minutes.


An Age of Freedom
-----------------
~2:00

slide:
	In the beginning, there was freedom.
	  * Software freedom is as old as computing.
	  * Sharing software is to computing as sharing recipes is to cooking.
	  * Software was free out of necessity and culture.

notes:
	Having defined hacking and detailing hacker values, I'd like to explore the
	history of software freedom.
	Free software and open source are not new ideas.  Software freedom is in
	fact as old as computing is.  Roughly, sharing software is to computing as
	sharing recipes is to cooking.
	Software was normally distributed in a human-readable form because users
	often modified it to run on different computers and operating systems, to
	fix bugs, or to add features.

slide:
	<image of PDP-1>

notes:
	Here we see the PDP-1, produced by Digital Equipment Corporation in 1959.
	This was one of the first minicomputers produced.  After its donation to MIT
	in 1962, it became the favorite machine of the budding hacker culture.
	But the PDP-1 was sold without software.  Users wrote their own software,
	and they realized that it would be terribly inefficient for everyone to
	write from scratch all the software they needed to run their computers.  So
	instead, they shared what they wrote.

slide:
	<image of DECUS No. 85 cover>

notes:
	In 1961, the Digital Equipment Computer Users' Society was founded to
	facilitate the free exchange of information between users and the
	manufacturer.  Over the years, they collected and published a large number
	of programs to run on the PDP-1.

slide:

notes:
	In 1969, four AT&T employees wrote for the PDP-7 an operating system called
	Unix.  It was to be "a system around which a fellowship could form".  Under
	the settlement terms of a 1958 antitrust case, AT&T was required to license
	non-telephone technology to anyone who asked.  Subsequently, Unix was
	distributed, with source code, to universities, corporations, and the U.S.
	government.  Lion's Commentary, a book published in 1976, documented Unix's
	source code.  Throughout the 1970s, universities worldwide contributed
	greatly to the development of Unix.


Proprietarization
-----------------
~2:30

slide:
	<Bill Gates's Arizona mugshot>

notes:
	Then things started to change.  Many people attribute this to this man, Bill
	Gates.  But it actually began even before Gates entered college.

slide:
	???

notes:
	In 1969, IBM stopped providing software in source form along with their
	hardware.  Instead, they began separately selling binary copies of software
	at a high cost.  Thus, they pioneered what is now called the "software
	industry".

slide:
	<some excerpt of "Open Letter to Hobbyists">

notes:
	In 1976, Bill Gates, General Partner of Micro-Soft, was fed up with members
	of the Homebrew Computing Club sharing software.  He published in the Club's
	newsletter an "Open Letter to Hobbyists", accusing Club members of
	"stealing".  He claimed that sharing is unfair and prevents the writing of
	good software, apparently forgetting about the software that was good
	*because* it was shared for years.

slide:
	???

notes:
	But note that sharing software was still perfectly legal.  This was fixed in
	1980 when Congress passed the Computer Software Copyright Act.  This
	legislation did two things.  First, it added to Copyright Law a definition
	for "computer program", thus making software copyrightable.  Second, it
	amended Title 17 of the United States Code, section 117 to declare that
	running a computer program is not an infringement of copyright.  So, sharing
	and modifying software without a license became illegal.  But no license was
	necessary to run a program.

slide:
	???

notes:
	Then companies started writing contracts called "End-user license
	agreements".  How many of you have read every such contract to which you've
	agreed?
	<expect no hands>
	These contracts typically circumvent section 117 by arguing that the
	software they cover is "licensed, not sold".  That is, a contract claims
	that you don't own the Microsoft Windows CD you buy from a store.  Microsoft
	owns the disk and gives you permission to run it.  The legality of this
	practice is disputed.
	Furthermore, these contracts take away many otherwise legally-protected
	rights.  By agreeing to one, you forfeit rights to make fair use of the
	software, to use it in a house with more than five computers, to reverse
	engineer it to learn how it works, or even to talk about how well it works.


The GNU Project
---------------


Linux
-----


Open Source
-----------