Re: Metrics and your privacy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Bruno Wolff III wrote:

Hi Bruno -

However, when I do an install on a machine there isn't a good reason that
I should need to provide a public IP address for that machine in order to
do the install. I might for instance do downloads at one machine and then
use them on several machines in different physical locations.

Yes, this is a fair enough complaint, it would be wrong to link the install action with a *requirement* to touch anything external. But it should be okay to propose to the user on firstboot to check for updates, which he probably wants to do anyway, is in his interests and he can deny it.

I consider any software that makes network connections back to the supplier
for reasons not part of the function the software is providing to me to
be spyware since it is supplying my IP address to the provider.

It's not a bad definition. The yum traffic generated by a user is legitimate to use under that definition.

Just to be clear in general given some of the things said by others on this thread, if I was running a mirror so people could choose to connect to it and get the benefit of their free updates, for sure I will keep logs and process then how I like without asking anyone's permission, for abuse monitoring or anything else I felt like. This is the implicit TOS of contacting ANY server on the Internet. Anyone here running a public server NOT keeping logs, to be consistent with any deeply held feelings about privacy?

employees, I think it would be unlikely that a TLA could convince Red Hat to
secretly put back doors into their products. I don't believe that is true
of most software companies. While the odds of me being affected by this are very low, I want to support companies that I feel are supporting freedom.
(I'm probably more at risk of marketting getting my data and annoying me with
sales propositions.)

This is a different issue, but it wouldn't be RHAT but an upstream project that got perverted, like that attack on the kernel a while back where someone changed an if(uid==0) to an if(uid=0) to get root powers almost invisibly just by going down that code path. Given the way the OS is composed assuming there are no backdoors already is a matter of faith (but I agree it is unlikely there are remote backdoors, or we might have seen the resulting traffic floating by).

-Andy


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux