99 |
a practice known as “tivoization” or (through |
a practice known as “tivoization” or (through |
100 |
blacklisting) as “secure boot” — freedom 1 becomes a |
blacklisting) as “secure boot” — freedom 1 becomes a |
101 |
theoretical fiction rather than a practical freedom. This is not |
theoretical fiction rather than a practical freedom. This is not |
102 |
sufficient. |
sufficient. In other words, these binaries are not free software |
103 |
|
even if the source code they are compiled from is free. |
104 |
</p> |
</p> |
105 |
|
|
106 |
<p> |
<p> |