The most important work for freedom that this culture has seen in generations

The Free Software Foundation and Richard Stallman’s work represents the most important work for freedom that this culture, the American culture, has seen in many many generations because it takes the ideas of freedom and it removes it from the ivory tower, and it removes it from lawyers, and places it in a community—a technology community—that is one of the most important communities defining the contours of freedom that most people in our culture and increasingly around the world will know.

Lawrence Lessig, founder of Creative Commons.

Fellow DRM elimination crew members: As 2010 rolls to an end, we can take this time to reflect on the growing DRM threat that our society faces and the role DRM plays in attacking all our freedoms.

Most notably this year, Apple’s walled garden expanded with their launch of the iPad, and the announcement of their DRM App Store for Mac OS X. But Apple is not alone: Microsoft, Amazon, Sony, Intel and Adobe are increasing their efforts too. 2010 was also a year when video game companies continued to impose ever more draconian DRM on game players.

For our work to continue, for more people to become aware of the fight against DRM, we need to grow. To grow, we need your support: both your continued support as part of the DRM elimination crew — supporting our actions and sending in tips and news for new DRM and DRM-free services, but also your financial support.

In these times, it really is important that we build professional and social solidarity around a core set of ideals. It’s critical that we hang together, both to advance our positive ideas for a better world and to stop those trying to turn computers against their users.

Defective by Design is a campaign of the Free Software Foundation, and associate members of the Free Software Foundation form a society — a society supporting the ethical cause of computer users everywhere, whether that is fighting the danger of DRM, or working to educate and advocate for software freedom.

Join us in a growing society of over 3,000 dedicated members — your friends and peers — in over 45 countries.

This article was first posted on Defective By Design.

Related Posts

Why Ubuntu Business Desktop Remix will be a tough sell Ubuntu Business Desktop Remix is an edition of Ubuntu Desktop tweaked for use by institutional or business users. It was announced by Mark Shuttlewort...
FSF position on GPLv2 & current App Store terms This was written by Brett smith on the VLC development mailing list. Brett is the Licensing Compliance Engineer with the Free Software Foundation: Sal...
Be Confident Storing Information in the Cloud Over the past few years, information explosion has inhibited organizations’ ability to effectively secure, manage and recover data. This complexity is...
E-Book Buyer’s Guide to E-Book Privacy With the 2010 holidays upon us, it's time to update EFF's E-Book Buyer's Guide to E-Book Privacy, which summarizes and comments on the privacy-relat...
HHS Should Require the Encryption of Portable Devices Many companies use encryption on their portable devices, but the continuing parade of health data breaches demonstrates that too many organizations ha...
Egyptian Actions Highlight Dangers in U.S. Cybersecurity Proposals The Egyptian regime's shutdown of the Internet in an attempt to preserve its political power highlights the dangers of any government having unchecked...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*