From mboxrd@z Thu Jan 1 00:00:00 1970 Path: news.gmane.io!.POSTED.blaine.gmane.org!not-for-mail From: Jean Louis Newsgroups: gmane.emacs.tangents Subject: Re: no to war in Ukraine Date: Mon, 28 Feb 2022 16:08:53 +0300 Message-ID: References: <87ee3p4xn4.fsf@zoho.eu> <87tucl18rp.fsf@zoho.eu> <3cf3a903-10fb-76e4-24f8-d2e48d045f5c@rixotstudio.cz> <7f8b6dc4-a621-2ab4-86ab-79325a1f2a0c@yandex.ru> <95a64961-9a77-bd7a-a4c2-77ae3f9e5bb7@rixotstudio.cz> <625c786e-ddde-4320-8feb-fc6341b01c87@rixotstudio.cz> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Injection-Info: ciao.gmane.io; posting-host="blaine.gmane.org:116.202.254.214"; logging-data="25471"; mail-complaints-to="usenet@ciao.gmane.io" User-Agent: Mutt/2.2.0 (2022-02-12) Cc: emacs-tangents@gnu.org, Dmitry Gutov , Yuri Khan To: Jacob Hrbek Original-X-From: emacs-tangents-bounces+get-emacs-tangents=m.gmane-mx.org@gnu.org Mon Feb 28 14:11:47 2022 Return-path: Envelope-to: get-emacs-tangents@m.gmane-mx.org Original-Received: from lists.gnu.org ([209.51.188.17]) by ciao.gmane.io with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1nOfoY-0006P6-1X for get-emacs-tangents@m.gmane-mx.org; Mon, 28 Feb 2022 14:11:46 +0100 Original-Received: from localhost ([::1]:58618 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nOfoW-0000iE-Uo for get-emacs-tangents@m.gmane-mx.org; Mon, 28 Feb 2022 08:11:45 -0500 Original-Received: from eggs.gnu.org ([209.51.188.92]:57352) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nOfnz-0000fm-DX for emacs-tangents@gnu.org; Mon, 28 Feb 2022 08:11:11 -0500 Original-Received: from stw1.rcdrun.com ([217.170.207.13]:43413) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nOfnx-0002wi-Ox for emacs-tangents@gnu.org; Mon, 28 Feb 2022 08:11:11 -0500 Original-Received: from localhost ([::ffff:102.82.153.31]) (AUTH: PLAIN admin, TLS: TLS1.3,256bits,ECDHE_RSA_AES_256_GCM_SHA384) by stw1.rcdrun.com with ESMTPSA id 0000000000055D6B.00000000621CC9EB.00003F9C; Mon, 28 Feb 2022 06:11:07 -0700 Content-Disposition: inline In-Reply-To: <625c786e-ddde-4320-8feb-fc6341b01c87@rixotstudio.cz> Received-SPF: pass client-ip=217.170.207.13; envelope-from=bugs@gnu.support; helo=stw1.rcdrun.com X-Spam_score_int: -18 X-Spam_score: -1.9 X-Spam_bar: - X-Spam_report: (-1.9 / 5.0 requ) BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: emacs-tangents@gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Emacs news and miscellaneous discussions outside the scope of other Emacs mailing lists List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: emacs-tangents-bounces+get-emacs-tangents=m.gmane-mx.org@gnu.org Original-Sender: "Emacs-tangents" Xref: news.gmane.io gmane.emacs.tangents:785 Archived-At: * Jacob Hrbek [2022-02-28 15:53]: > Your argument that we shouldn't deny access to all free software to russians > is valid. I am mainly concerned about things that can be used to do major > war crimes I think you look at wrong causes. For products like software you cannot possibly know for what they will be used. And you cannot "forbid" it really. For example, US could produce some weapons and sell such weapons to country X with condition NOT to sell weapons to country Y. Though country X eventually sells it to country Y. It is difficult to forbid selling weapons unspoken how difficult it would be to find out who used software and under which circumstances. To win in the court you would need proofs, and which court will go after whatever generals in far countries where you do not have jurisdiction. You would need to go into that country or hire attorney in that country to represent your copyrights, that means you would still need to communicate to people related to bloody enemy who used your software; then you would spend money and be subjugated to their laws; and you would need to prove that software was used under terms not given by you. Good luck with it. However, if you do change licenses to your software, that software becomes proprietary. -- Jean Take action in Free Software Foundation campaigns: https://www.fsf.org/campaigns In support of Richard M. Stallman https://stallmansupport.org/