1 |
<!DOCTYPE html PUBLIC "-//IETF//DTD HTML 3.2 Final//EN"> |
2 |
<HTML> |
3 |
<HEAD> |
4 |
<TITLE>能夠信賴你的電腦嗎? - GNU 計畫 - 自由軟體基金會(FSF)</TITLE> |
5 |
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; CHARSET=big5"> |
6 |
<LINK REV="made" HREF="mailto:webmasters@gnu.org"> |
7 |
</HEAD> |
8 |
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#1F00FF" ALINK="#FF0000" VLINK="#9900DD"> |
9 |
<H3>能夠信賴你的電腦嗎?</H3> |
10 |
|
11 |
<P> |
12 |
|
13 |
<A HREF="http://www.stallman.org/"><STRONG>理查•史托曼</STRONG></A> 著 |
14 |
|
15 |
<P> |
16 |
|
17 |
<A HREF="/graphics/philosophicalgnu.html"><IMG SRC="/graphics/philosophical-gnu-sm.jpg" |
18 |
ALT=" [image of a Philosophical Gnu] " |
19 |
WIDTH="160" HEIGHT="200"></A> |
20 |
|
21 |
[ |
22 |
<!-- Please keep this list alphabetical --> |
23 |
<!-- PLEASE UPDATE THE LIST AT THE BOTTOM (OR TOP) OF THE PAGE TOO! --> |
24 |
<A HREF="/philosophy/can-you-trust.zh-cn.html">簡體中文</A> |
25 |
| <A HREF="/philosophy/can-you-trust.zh-tw.html">繁體中文</A> |
26 |
| <A HREF="/philosophy/can-you-trust.en.html">英文</A> |
27 |
| <A HREF="/philosophy/can-you-trust.de.html">德文</A> |
28 |
| <A HREF="/philosophy/can-you-trust.es.html">西班牙文</A> |
29 |
<!-- Please keep this list alphabetical --> |
30 |
<!-- PLEASE UPDATE THE LIST AT THE BOTTOM (OR TOP) OF THE PAGE TOO! --> |
31 |
] |
32 |
<P> |
33 |
|
34 |
<em> |
35 |
【本文是重要的 GNU 哲學頁面, |
36 |
請不吝於提供對於本文翻譯的意見。 |
37 |
<<a href="mailto:chliu@gnu.org">chliu@gnu.org</a>> |
38 |
同時為了便於讀者引用查找, |
39 |
於中譯文本上的每一段都附有參考標號。 |
40 |
我們也歡迎關於本文的各種討論: |
41 |
<<a href="mailto:chinese-translators@gnu.org">chinese-translators@gnu.org</a>> 。】 |
42 |
</em> |
43 |
|
44 |
<p> |
45 |
Who should your computer take its orders from? Most people think |
46 |
their computers should obey them, not obey someone else. With a plan |
47 |
they call "trusted computing", large media corporations (including the |
48 |
movie companies and record companies), together with computer |
49 |
companies such as Microsoft and Intel, are planning to make your |
50 |
computer obey them instead of you. (Microsoft's version of this |
51 |
scheme is called "Palladium".) Proprietary programs have included |
52 |
malicious features before, but this plan would make it universal. |
53 |
<p> |
54 |
<sup><b>1</b></sup> 您的電腦應該聽取誰的命令? |
55 |
大部份的人認為他們的電腦應該服從他們而不是某個其他人。 |
56 |
經由一項他們稱之為“可信賴的計算”(trusted computing)的打算, |
57 |
大型的媒體公司(包括電影和錄製公司) |
58 |
以及像是 Microsoft 和 Intel 的電腦公司, |
59 |
正打算要使您的電腦服從他們而不是您。 |
60 |
(這項方案的 Microsoft 版本稱之為“安全裝備”: Palladium 。) |
61 |
私權的程式在以前就已經有包括了一些惡意的功能特色(features), |
62 |
但是這項打算將會使其普遍化。 |
63 |
|
64 |
<p> |
65 |
Proprietary software means, fundamentally, that you don't control what |
66 |
it does; you can't study the source code, or change it. It's not |
67 |
surprising that clever businessmen find ways to use their control to |
68 |
put you at a disadvantage. Microsoft has done this several times: one |
69 |
version of Windows was designed to report to Microsoft all the |
70 |
software on your hard disk; a recent "security" upgrade in Windows |
71 |
Media Player required users to agree to new restrictions. But |
72 |
Microsoft is not alone: the KaZaa music-sharing software is designed |
73 |
so that KaZaa's business partner can rent out the use of your computer |
74 |
to their clients. These malicious features are often secret, but even |
75 |
once you know about them it is hard to remove them, since you don't |
76 |
have the source code. |
77 |
<p> |
78 |
<sup><b>2</b></sup> 私權軟體在本質上即表示: |
79 |
您無法控制它要做些什麼; |
80 |
您不能研究源碼或是更動它。 |
81 |
聰明的商人找出一些方法利用他們的控制, |
82 |
來使您處於劣勢的行為並不讓人感到驚訝。 |
83 |
Microsoft 已經做過許多次了: |
84 |
有一個版本的 Windows 被設計來將在您的硬碟上的所有軟體回報給 |
85 |
Microsoft ; |
86 |
一個最近在 Windows Media Player 上的“安全” |
87 |
昇級要求使用者同意新的限制(restrictions)。 |
88 |
但 Microsoft 並不孤單: |
89 |
KaZaa 這個音樂分享(music-sharing)軟體被設計成, |
90 |
使 KaZaa 的商業夥伴可以將您的電腦的使用出租給他們的客戶。 |
91 |
這些惡意的功能特色通常是隱密的, |
92 |
但是就算您發現到, |
93 |
也很難將它們移除, |
94 |
因為您並沒有源碼。 |
95 |
|
96 |
<p> |
97 |
In the past, these were isolated incidents. "Trusted computing" would |
98 |
make it pervasive. "Treacherous computing" is a more appropriate |
99 |
name, because the plan is designed to make sure your computer will |
100 |
systematically disobey you. In fact, it is designed to stop your |
101 |
computer from functioning as a general-purpose computer. Every |
102 |
operation may require explicit permission. |
103 |
<p> |
104 |
<sup><b>3</b></sup> 在過去, |
105 |
這些都是個別〔發生〕的事件。 |
106 |
“可信賴的計算”(Trusted computing)將可能使它變得普遍。 |
107 |
“背判了的計算”是一個較為合適的名稱, |
108 |
因為這項打算是設計用來確保您的電腦將會有系統地不服從您。 |
109 |
事實上, |
110 |
它是設計用來使您的電腦無法作為一台通用的計算機(general-purpose computer)。 |
111 |
每一項操作都將會需要明確的許可〔才得以進行〕。 |
112 |
|
113 |
<p> |
114 |
The technical idea underlying treacherous computing is that the |
115 |
computer includes a digital encryption and signature device, and the |
116 |
keys are kept secret from you. Proprietary programs will use this |
117 |
device to control which other programs you can run, which documents or |
118 |
data you can access, and what programs you can pass them to. These |
119 |
programs will continually download new authorization rules through the |
120 |
Internet, and impose those rules automatically on your work. If you |
121 |
don't allow your computer to obtain the new rules periodically from |
122 |
the Internet, some capabilities will automatically cease to function. |
123 |
<p> |
124 |
<sup><b>4</b></sup> 在「背判了的計算」底下的技術想法是: |
125 |
電腦包括了一個數位加密(digital encryption) |
126 |
以及簽章(signature)裝置, |
127 |
而其鍵值(keys)對您來說則是〔無法取得的〕祕密。 |
128 |
私權程式將會使用這項裝置來控制「您可以執行的其它程式」、 |
129 |
「您可以儲存的文件或資料」以及「您可以傳遞的程式」。 |
130 |
這些程式將會持續地經由互聯網下載新的認證規則(authorization rules), |
131 |
並且自動地將那些規則加諸到您的工作上。 |
132 |
如果您不允許您的電腦定期地從互聯網取得新的規則, |
133 |
〔那麼〕一些功能(capabilities)將會自動地停止作用(function)。 |
134 |
|
135 |
<p> |
136 |
Of course, Hollywood and the record companies plan to use treacherous |
137 |
computing for "DRM" (Digital Restrictions Management), so that |
138 |
downloaded videos and music can be played only on one specified |
139 |
computer. Sharing will be entirely impossible, at least using the |
140 |
authorized files that you would get from those companies. You, the |
141 |
public, ought to have both the freedom and the ability to share these |
142 |
things. (I expect that someone will find a way to produce unencrypted |
143 |
versions, and to upload and share them, so DRM will not entirely |
144 |
succeed, but that is no excuse for the system.) |
145 |
<p> |
146 |
<sup><b>5</b></sup> 當然, |
147 |
好萊塢(Hollywood)以及錄製公司打算要將「背判了的計算」用到“DRM” |
148 |
(數位限制管理: Digital Restrictions Management)上, |
149 |
這樣一來下載的錄像品(videos)和音樂就只能夠在一台指定的電腦上播放。 |
150 |
分享將是完全的不可能, |
151 |
至少使用您可能從那些公司下載的認證檔案是如此。 |
152 |
您,也就是公眾, |
153 |
應當同時擁有自由和能力來分享這些事物。 |
154 |
(我期望將有某個人能找出一個製作出沒有加密版本的方法, |
155 |
並且上載分享它們, |
156 |
這樣子 DRM 將不會完全地成功, |
157 |
但那不能作為這個體系〔合理化〕的藉口。) |
158 |
|
159 |
<p> |
160 |
Making sharing impossible is bad enough, but it gets worse. There are |
161 |
plans to use the same facility for email and documents--resulting in |
162 |
email that disappears in two weeks, or documents that can only be read |
163 |
on the computers in one company. |
164 |
<p> |
165 |
<sup><b>6</b></sup> 使得分享變得不可能已經是夠糟的了, |
166 |
但還有更糟的。 |
167 |
他們打算要使用同樣的設施(facility)到電子郵件和文件上 -- |
168 |
造成電子郵件會在兩個星期內消失, |
169 |
或是文件只可以在一間公司內的電腦上被閱讀。 |
170 |
|
171 |
<p> |
172 |
Imagine if you get an email from your boss telling you to do something |
173 |
that you think is risky; a month later, when it backfires, you can't |
174 |
use the email to show that the decision was not yours. "Getting it in |
175 |
writing" doesn't protect you when the order is written in disappearing |
176 |
ink. |
177 |
<p> |
178 |
<sup><b>7</b></sup> 設想如果您從您的老闆那裡收到一封電子郵件, |
179 |
要求您去做一件您認為太過於冒險的事; |
180 |
一個月後, |
181 |
這事情與〔他的〕預期相反時, |
182 |
您無法使用那封電子郵件來顯示那個決定並不是您所作出的。 |
183 |
當這個命令是以會消失的墨水撰寫時, |
184 |
“白紙黑字地寫下來”並不足以保護您。 |
185 |
|
186 |
<p> |
187 |
Imagine if you get an email from your boss stating a policy that is |
188 |
illegal or morally outrageous, such as to shred your company's audit |
189 |
documents, or to allow a dangerous threat to your country to move |
190 |
forward unchecked. Today you can send this to a reporter and expose |
191 |
the activity. With treacherous computing, the reporter won't be able |
192 |
to read the document; her computer will refuse to obey her. |
193 |
Treacherous computing becomes a paradise for corruption. |
194 |
<p> |
195 |
<sup><b>8</b></sup> 設想如果您自您的老闆那裡收到一封電子郵件, |
196 |
陳述了一個違反了法律或道德的政策, |
197 |
像是將您的公司的帳簿丟進碎紙機, |
198 |
或是允許一個對您的國家的嚴重威脅繼續進行而不受檢查。 |
199 |
在今天您可以將這類事情送給〔新聞〕記者並揭露這個活動。 |
200 |
但是經由「背判了的計算」, |
201 |
記者將無法閱讀這份文件, |
202 |
她的電腦將會拒絕服從她。 |
203 |
「背判了的計算」變成了舞弊的天堂。 |
204 |
|
205 |
<p> |
206 |
Word processors such as Microsoft Word could use treacherous computing |
207 |
when they save your documents, to make sure no competing word |
208 |
processors can read them. Today we must figure out the secrets of |
209 |
Word format by laborious experiments in order to make free word |
210 |
processors read Word documents. If Word encrypts documents using |
211 |
treacherous computing when saving them, the free software community |
212 |
won't have a chance of developing software to read them--and if we |
213 |
could, such programs might even be forbidden by the Digital Millennium |
214 |
Copyright Act. |
215 |
<p> |
216 |
<sup><b>9</b></sup> 像是 Microsoft Word 的文書處理器, |
217 |
可以在當它們儲存您的文件時使用「背判了的計算」, |
218 |
以確保沒有與之競爭的文書處理器可以閱讀它們。 |
219 |
今天我們必須費力地嚐試來理解 Word 格式〔為何〕, |
220 |
以製作出可以閱讀 Word 文件的自由文書處理器。 |
221 |
如果 Word 在當它儲存文件時使用「背判了的計算」, |
222 |
自由軟體社群將不會有機會開發出可以閱讀它們的軟體 -- |
223 |
即便我們辦得到, |
224 |
這樣子的程式甚至也會被“數位千禧年版權法案” |
225 |
(Digital Millennium Copyright Act)所禁止。 |
226 |
|
227 |
<p> |
228 |
Programs that use treacherous computing will continually download new |
229 |
authorization rules through the Internet, and impose those rules |
230 |
automatically on your work. If Microsoft, or the US government, does |
231 |
not like what you said in a document you wrote, they could post new |
232 |
instructions telling all computers to refuse to let anyone read that |
233 |
document. Each computer would obey when it downloads the new |
234 |
instructions. Your writing would be subject to 1984-style retroactive |
235 |
erasure. You might be unable to read it yourself. |
236 |
<p> |
237 |
<sup><b>10</b></sup> 使用「背判了的計算」的程式, |
238 |
將會持續地自互聯網下載新的認證規則, |
239 |
並且將這些自動地加諸到您的工作上。 |
240 |
如果 Microsoft 或是美國政府不喜歡在某份您所撰寫的文件中所說的事, |
241 |
他們可以發出新的指示, |
242 |
告訴所有的電腦拒絕讓任何人閱讀那份文件。 |
243 |
每一台電腦在它下載了新的指示後都將會遵守。 |
244 |
您的著述將會受到有如小說《一九八四》中所描述的(1984-style) |
245 |
「追溯既往而有效的刪去」(retroactive erasure)。 |
246 |
【《一九八四》(1984)是英國作家喬治•歐威爾(George Orwell) |
247 |
於一九四九年發表的科幻小說; |
248 |
相對應的則是赫胥黎(Aldous Huxley) |
249 |
於一九三二年所發表的《美麗新世界》(Brave New World) -- |
250 |
它也是《勇敢 GNU 世界》(Brave GNU World)名稱的由來。】 |
251 |
您有可能連您自己都無法閱讀它。 |
252 |
|
253 |
<p> |
254 |
You might think you can find out what nasty things a treacherous |
255 |
computing application does, study how painful they are, and decide |
256 |
whether to accept them. It would be short-sighted and foolish to |
257 |
accept, but the point is that the deal you think you are making won't |
258 |
stand still. Once you come depend on using the program, you are |
259 |
hooked and they know it; then they can change the deal. Some |
260 |
applications will automatically download upgrades that will do |
261 |
something different--and they won't give you a choice about whether to |
262 |
upgrade. |
263 |
<p> |
264 |
<sup><b>11</b></sup> 您也許會想: |
265 |
您可以看穿「“背判了的計算”的程式在做的卑鄙事」, |
266 |
研究〔使用它們〕將會付出什麼代價, |
267 |
然後再來決定是否要使用它們。 |
268 |
接受將會是短視而且愚蠢的, |
269 |
重點在於您認為您所作出的協議並不會保持不變。 |
270 |
一旦您變得依賴於使用〔那些〕程式, |
271 |
您就被套牢了(hooked), |
272 |
而且他們清楚得很; |
273 |
然後他們就可以更動這項協議。 |
274 |
一些應用程式將會自動地下載「將會做出某些不一樣的事情的」昇級 -- |
275 |
而他們可不會給您一個是否要昇級的選擇。 |
276 |
|
277 |
<p> |
278 |
Today you can avoid being restricted by proprietary software by not |
279 |
using it. If you run GNU/Linux or another free operating system, and |
280 |
if you avoid installing proprietary applications on it, then you are |
281 |
in charge of what your computer does. If a free program has a |
282 |
malicious feature, other developers in the community will take it out, |
283 |
and you can use the corrected version. You can also run free |
284 |
application programs and tools on non-free operating systems; this |
285 |
falls short of fully giving you freedom, but many users do it. |
286 |
<p> |
287 |
<sup><b>12</b></sup> 今天您可以經由不去使用它來避免被私權軟體所限制。 |
288 |
如果您執行 GNU/Linux 或是其它的自由作業系統, |
289 |
並且如果您避免在它上面安裝私權應用程式, |
290 |
那麼您就換得了〔完全地掌握〕您的電腦做些什麼〔的自由〕。 |
291 |
如果一個自由程式有一個惡意的功能特色, |
292 |
在社群裡的其他程式員將會把它除去, |
293 |
然後您就可以使用修正過的版本了。 |
294 |
您也可以在不自由的作業系統上執行自由的應用程式和工具; |
295 |
這並不足以給予您完全的自由, |
296 |
但是有許多使用者這麼做。 |
297 |
|
298 |
<p> |
299 |
Treacherous computing puts the existence of free operating systems and |
300 |
free applications at risk, because you may not be able to run them at |
301 |
all. Some versions of treacherous computing would require the |
302 |
operating system to be specifically authorized by a particular |
303 |
company. Free operating systems could not be installed. Some |
304 |
versions of treacherous computing would require every program to be |
305 |
specifically authorized by the operating system developer. You could |
306 |
not run free applications on such a system. If you did figure out |
307 |
how, and told someone, that could be a crime. |
308 |
<p> |
309 |
<sup><b>13</b></sup> 「背判了的計算」 |
310 |
將自由作業系統和自由應用程式的存續置於危險的境地, |
311 |
因為您將根本無法執行它們。 |
312 |
一些版本的「背判了的計算」, |
313 |
將會需要作業系統被某個特定的公司明確地給予認證。 |
314 |
自由的作業系統將無法被安裝。 |
315 |
一些版本的「背判了的計算」, |
316 |
將會需要每一個程式都要被作業系統開發者明確地給予認證。 |
317 |
您無法在這樣的一個作業系統上執行自由的應用程式。 |
318 |
如果您真的瞭解了要如何做, |
319 |
並且告訴了某人, |
320 |
那可能是一種犯罪行為。 |
321 |
|
322 |
<p> |
323 |
There are proposals already for US laws that would require all computers to |
324 |
support treacherous computing, and to prohibit connecting old computers to |
325 |
the Internet. The CBDTPA (we call it the Consume But Don't Try Programming |
326 |
Act) is one of them. But even if they don't legally force you to switch to |
327 |
treacherous computing, the pressure to accept it may be enormous. Today |
328 |
people often use Word format for communication, although this causes |
329 |
several sorts of problems (see <a |
330 |
href="/philosophy/no-word-attachments.html">"We Can Put an End to Word |
331 |
Attachments"</a>). If only a treacherous computing machine can read the |
332 |
latest Word documents, many people will switch to it, if they view the |
333 |
situation only in terms of individual action (take it or leave it). To |
334 |
oppose treacherous computing, we must join together and confront the |
335 |
situation as a collective choice. |
336 |
<p> |
337 |
<sup><b>14</b></sup> 已經有一些在美國法律上的提議: |
338 |
要求所有的電腦都支持「背判了的計算」, |
339 |
並且禁止將舊電腦連結到互聯網上。 |
340 |
CBDTPA (我們稱它為“消費就好,不要試著編寫程式”法案: |
341 |
Consume But Don't Try Programming Act)就是其中之一。 |
342 |
但是即使他們並沒有在法律上強制您切換到「背判了的計算」, |
343 |
〔被迫〕接受它的壓力還是很大。 |
344 |
今天人們通常使用 Word 格式來通信, |
345 |
雖然這會造成許多類型的問題。 |
346 |
(請見 <a href="/philosophy/no-word-attachments.html">“我們可以終結使用 Word 附加檔案”:We Can Put an End to Word Attachments</a>) |
347 |
〔但是〕如果只有「背判了的計算」的機器可以閱讀最新的 Word 文件, |
348 |
並且如果他們所看到的形勢只是以個別的動作(接受或離開)來表現時, |
349 |
許多人將會切換到它。 |
350 |
為了反制「背判了的計算」, |
351 |
我們必須結合在一起面對這個形勢, |
352 |
以作為我們集體的選擇。 |
353 |
|
354 |
<p> |
355 |
For further information about treacherous computing, see <a |
356 |
href="http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html"><http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html></a>. |
357 |
<p> |
358 |
<sup><b>15</b></sup> 關於「背判了的計算」的更多資訊, |
359 |
請見 <a href="http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html"><http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html></a> 。 |
360 |
|
361 |
<p> |
362 |
To block treacherous computing will require large numbers of citizens to |
363 |
organize. We need your help! The <a href="http://www.eff.org">Electronic |
364 |
Frontier Foundation</a> and <a href="http://www.publicknowledge.org">Public |
365 |
Knowledge</a> are campaigning against treacherous computing, and so is the |
366 |
FSF-sponsored <a href="http://www.digitalspeech.org">Digital Speech |
367 |
Project</a>. Please visit these Web sites so you can sign up to support |
368 |
their work. |
369 |
<p> |
370 |
<sup><b>16</b></sup> 要阻擋「背判了的計算」將會需要很大數目的公民組織起來。 |
371 |
我們需要您的幫助! |
372 |
<a href="http://www.eff.org">電子先鋒基金會(Electronic Frontier Foundation)</a> 和 |
373 |
<a href="http://www.publicknowledge.org">公眾知識(Public Knowledge)</a> |
374 |
正在發起對抗「背判了的計算」的活動, |
375 |
由自由軟體基金會資助的 |
376 |
<a href="http://www.digitalspeech.org">數位言論計畫(Digital Speech Project)</a> |
377 |
也有參與。 |
378 |
請拜訪這些網站, |
379 |
這樣您就可以簽名來支持他們的工作了。 |
380 |
|
381 |
<p> |
382 |
You can also help by writing to the public affairs offices of Intel, |
383 |
IBM, HP/Compaq, or anyone you have bought a computer from, explaining |
384 |
that you don't want to be pressured to buy "trusted" computing systems |
385 |
so you don't want them to produce any. This can bring consumer power |
386 |
to bear. If you do this on your own, please send copies of your |
387 |
letters to the organizations above. |
388 |
<p> |
389 |
<sup><b>17</b></sup> 您也可以經由撰寫給 Intel 、 IBM 、 HP/Compaq |
390 |
或任何您從他那裡購買電腦的人, |
391 |
解釋您不想要被強迫購買“可信賴”的計算系統, |
392 |
因此您不希望他們製造任何這樣子的系統。 |
393 |
這可以帶給消費者維持〔自由〕的力量。 |
394 |
如果您自行採取行動, |
395 |
請將您的信件副本送到上述的機構。 |
396 |
|
397 |
<p> |
398 |
<h3>後記</h3> |
399 |
<p> |
400 |
<ol> |
401 |
<li>The GNU Project distributes the GNU Privacy Guard, a program that |
402 |
implements public-key encryption and digital signatures, which you can |
403 |
use to send secure and private email. It is useful to explore how GPG |
404 |
differs from treacherous computing, and see what makes one helpful and |
405 |
the other so dangerous. |
406 |
<p> |
407 |
<sup><b>18</b></sup> GNU 計畫散佈了 GNU Privacy Guard (GNU 隱私守衛), |
408 |
那是一個實作了公開鍵加密(public-key encryption) |
409 |
以及數位簽章的程式, |
410 |
您可以使用來送出安全且祕密的電子郵件。 |
411 |
瀏覽一下 GPG 是如何與「背判了的計算」不同是有用處的, |
412 |
並且看看那些對於某人有幫助的事物〔為什麼〕對其他人是如此的危險。 |
413 |
|
414 |
<p> |
415 |
When someone uses GPG to send you an encrypted document, and you use |
416 |
GPG to decode it, the result is an unencrypted document that you can |
417 |
read, forward, copy, and even re-encrypt to send it securely to |
418 |
someone else. A treacherous computing application would let you read |
419 |
the words on the screen, but would not let you produce an unencrypted |
420 |
document that you could use in other ways. GPG, a free software |
421 |
package, makes security features available to the users; they use it. |
422 |
Treacherous computing is designed to impose restrictions on the users; |
423 |
it uses them. |
424 |
<p> |
425 |
<sup><b>19</b></sup> 當某人使用 GPG 送給您一份加密的文件, |
426 |
並且您使用了 GPG 來將它解碼, |
427 |
〔所得到的〕結果是一份您可以閱讀、〔進一步〕傳遞、 |
428 |
複製甚至再次加密並安全地送給某個其他人的解密文件。 |
429 |
一個「背判了的計算」應用程式將會讓您在螢幕上閱讀這些文字, |
430 |
但是不讓您〔能夠〕製作出一份可以讓您以其它方式使用的解密文件。 |
431 |
GPG 這個自由軟體套件, |
432 |
讓「安全的功能特色」可以為使用者所取得; |
433 |
他們使用它。 |
434 |
「背判了的計算」則是設計來將限制加諸到使用者身上; |
435 |
它利用了他們。 |
436 |
|
437 |
<p> |
438 |
<li>Microsoft presents palladium as a security measure, and claims that |
439 |
it will protect against viruses, but this claim is evidently false. A |
440 |
presentation by Microsoft Research in October 2002 stated that one of |
441 |
the specifications of palladium is that existing operating systems and |
442 |
applications will continue to run; therefore, viruses will continue to |
443 |
be able to do all the things that they can do today. |
444 |
<p> |
445 |
<sup><b>20</b></sup> Microsoft 簡報了 palladium 作為一種安全手段, |
446 |
並且宣稱它將會保護〔電腦〕免受病毒的侵襲, |
447 |
但是證據顯示這項宣稱完全是站不住腳。 |
448 |
由 Microsoft Research (研究部門)在二○○二年十月所作的一場簡報, |
449 |
說明了 palladium 的其中一項規格是: |
450 |
現存的作業系統以及應用程式將會繼續地採用; |
451 |
因此, |
452 |
病毒也將能夠繼續地做它們今天能做的所有事情。 |
453 |
|
454 |
<p> |
455 |
When Microsoft speaks of "security" in connection with palladium, they |
456 |
do not mean what we normally mean by that word: protecting your |
457 |
machine from things you do not want. They mean protecting your copies |
458 |
of data on your machine from access by you in ways others do not want. |
459 |
A slide in the presentation listed several types of secrets palladium |
460 |
could be used to keep, including "third party secrets" and "user |
461 |
secrets"--but it put "user secrets" in quotation marks, recognizing |
462 |
that this somewhat of an absurdity in the context of palladium. |
463 |
<p> |
464 |
<sup><b>21</b></sup> 當 Microsoft |
465 |
在談論到與 palladium 作連接的“安全”時, |
466 |
他們指的「並不是」我們通常用來表示那個字的意思: |
467 |
保護您的機器,使其免於受到您不想要〔的事物侵擾〕。 |
468 |
他們指的是保護在您的機器上的您的資料的拷貝, |
469 |
使其免於被您〔自己〕以其他人不希望的方式進行存取(access)。 |
470 |
簡報中的一個幻燈片列出了數個 palladium 可能用來維護的祕密類型, |
471 |
包括了“第三團體(third party)的祕密”以及“使用者的祕密” -- |
472 |
但是它將“使用者的祕密”放到引號中, |
473 |
「似乎」將它認知為: |
474 |
就 palladium 的〔開發〕脈絡而言, |
475 |
這實在有點荒謬。 |
476 |
|
477 |
<p> |
478 |
The presentation made frequent use of other terms that we frequently |
479 |
associate with the context of security, such as "attack", "malicious |
480 |
code", "spoofing", as well as "trusted". None of them means what it |
481 |
normally means. "Attack" doesn't mean someone trying to hurt you, it |
482 |
means you trying to copy music. "Malicious code" means code installed |
483 |
by you to do what someone else doesn't want your machine to do. |
484 |
"Spoofing" doesn't mean someone fooling you, it means you fooling |
485 |
palladium. And so on. |
486 |
<p> |
487 |
<sup><b>22</b></sup> 簡報中頻繁地使用當我們談到安全時, |
488 |
經常會使用到的其它字眼, |
489 |
像是“攻擊”(attack)、 |
490 |
“惡意的代碼”(malicious code)、 |
491 |
“欺騙”(spoofing)以及“可信賴的”(trusted)。 |
492 |
〔但是〕它們之中沒有一個指的是我們通常用來表示的意思。 |
493 |
“攻擊”並不是指某人試圖要傷害您, |
494 |
它是指您試圖要複製音樂; |
495 |
“惡意的代碼”指的是由您〔自己〕所安裝的代碼, |
496 |
而這代碼可能做得出某個「其他人」不希望您的機器去做的某些事; |
497 |
“欺騙”並不是指某人欺騙了您, |
498 |
它指的是您玩弄了 palladium 。 |
499 |
諸如此類……。 |
500 |
|
501 |
<p> |
502 |
<li>A previous statement by the palladium developers stated the basic |
503 |
premise that whoever developed or collected information should have |
504 |
total control of how you use it. This would represent a revolutionary |
505 |
overturn of past ideas of ethics and of the legal system, and create |
506 |
an unprecedented system of control. The specific problems of these |
507 |
systems are no accident; they result from the basic goal. It is the |
508 |
goal we must reject. |
509 |
<p> |
510 |
<sup><b>23</b></sup> 由一個 palladium 開發者先前所作的聲明, |
511 |
說明了它的基本根據是: |
512 |
不論是誰開發或收集了資訊, |
513 |
應該都對「您如何使用它」具有完全的控制權。 |
514 |
這是對於過去「倫理」和「法律體系」的觀念的一種革命性的推翻, |
515 |
並且創造了一種前所未見的控制體系。 |
516 |
〔關於〕這些系統的特定問題並不是出於偶然; |
517 |
它們是來自於〔有意識的〕基本目標。 |
518 |
而這目標正是我們必須拒絕的。 |
519 |
|
520 |
</ol> |
521 |
<p> |
522 |
Copyright © 2002 Richard Stallman. |
523 |
<p> |
524 |
Verbatim copying and distribution of this entire article is permitted |
525 |
without royalty in any medium provided this notice is preserved. |
526 |
<BR> |
527 |
【本文允許在無須支付版稅, |
528 |
且不變更文件內容的前提下刊登在任何形式的媒體中, |
529 |
但需保留此聲明。】 |
530 |
<P> |
531 |
|
532 |
<HR> |
533 |
|
534 |
<H4>本文被出版 |
535 |
於 <a href="http://shop.fsf.org/product/free-software-free-society/"><i> |
536 |
《自由軟體,自由社會:理查•馬修•史托曼的選文》</i></a> |
537 |
|
538 |
<p> |
539 |
|
540 |
<A HREF="/philosophy/philosophy.html">閱讀其它文章</A></H4> |
541 |
|
542 |
<HR> |
543 |
[ |
544 |
<!-- Please keep this list alphabetical --> |
545 |
<!-- PLEASE UPDATE THE LIST AT THE BOTTOM (OR TOP) OF THE PAGE TOO! --> |
546 |
<A HREF="/philosophy/can-you-trust.zh-cn.html">簡體中文</A> |
547 |
| <A HREF="/philosophy/can-you-trust.zh-tw.html">繁體中文</A> |
548 |
| <A HREF="/philosophy/can-you-trust.en.html">英文</A> |
549 |
| <A HREF="/philosophy/can-you-trust.de.html">德文</A> |
550 |
| <A HREF="/philosophy/can-you-trust.es.html">西班牙文</A> |
551 |
<!-- Please keep this list alphabetical --> |
552 |
<!-- PLEASE UPDATE THE LIST AT THE BOTTOM (OR TOP) OF THE PAGE TOO! --> |
553 |
] |
554 |
|
555 |
<P> |
556 |
返回 <A HREF="/home.zh-tw.html">GNU 首頁</A>。 |
557 |
|
558 |
<P> |
559 |
請將有關 自由軟體基金會 與 GNU 的 查詢 與 問題 送到 |
560 |
<A HREF="mailto:gnu@gnu.org"><EM>gnu@gnu.org</EM></A>。 |
561 |
你也可以使用 <A HREF="/home.html#ContactInfo">其他方法聯繫</A> |
562 |
自由軟體基金會。 |
563 |
|
564 |
<P> |
565 |
請將有關網頁的意見送到 |
566 |
<A HREF="mailto:webmasters@gnu.org"><EM>webmasters@gnu.org</EM></A>, |
567 |
其他問題則送到 |
568 |
<A HREF="mailto:gnu@gnu.org"><EM>gnu@gnu.org</EM></A>。 |
569 |
|
570 |
<P> |
571 |
請將有關中文網頁的意見送到 |
572 |
<A HREF="mailto:chinese-coordinators@gnu.org"><EM>chinese-coordinators@gnu.org</EM></A>, |
573 |
其他問題則送到 |
574 |
<A HREF="mailto:chliu@gnu.org"><EM>chliu@gnu.org</EM></A>。 |
575 |
|
576 |
<P> |
577 |
Free Software Foundation, Inc., |
578 |
51 Franklin St, Fifth Floor, Boston, MA 02110, USA |
579 |
|
580 |
<P> |
581 |
翻譯:劉 昭宏。 |
582 |
<BR> |
583 |
驗證:馬 雪萍。 |
584 |
<BR> |
585 |
請將有關翻譯的問題送到 |
586 |
<A HREF="http://savannah.gnu.org/projects/chinese/">GNU/CTT</A> 的 |
587 |
<A HREF="mailto:chinese-translators@gnu.org">翻譯人員</A>。 |
588 |
|
589 |
<P> |
590 |
Updated: |
591 |
<!-- timestamp start --> |
592 |
$Date: 2011/12/30 05:18:24 $ $Author: ineiev $ |
593 |
<!-- timestamp end --> |
594 |
<HR> |
595 |
</BODY> |
596 |
</HTML> |
597 |
|