Re: Metrics and your privacy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Bruno Wolff III wrote:

Hi Bruno -

However, when I do an install on a machine there isn't a good reason that
I should need to provide a public IP address for that machine in order to
do the install. I might for instance do downloads at one machine and then
use them on several machines in different physical locations.

Yes, this is a fair enough complaint, it would be wrong to link the install action with a *requirement* to touch anything external. But it should be okay to propose to the user on firstboot to check for updates, which he probably wants to do anyway, is in his interests and he can deny it.

I consider any software that makes network connections back to the supplier
for reasons not part of the function the software is providing to me to
be spyware since it is supplying my IP address to the provider.

It's not a bad definition. The yum traffic generated by a user is legitimate to use under that definition.

Just to be clear in general given some of the things said by others on this thread, if I was running a mirror so people could choose to connect to it and get the benefit of their free updates, for sure I will keep logs and process then how I like without asking anyone's permission, for abuse monitoring or anything else I felt like. This is the implicit TOS of contacting ANY server on the Internet. Anyone here running a public server NOT keeping logs, to be consistent with any deeply held feelings about privacy?

employees, I think it would be unlikely that a TLA could convince Red Hat to
secretly put back doors into their products. I don't believe that is true
of most software companies. While the odds of me being affected by this are very low, I want to support companies that I feel are supporting freedom.
(I'm probably more at risk of marketting getting my data and annoying me with
sales propositions.)

This is a different issue, but it wouldn't be RHAT but an upstream project that got perverted, like that attack on the kernel a while back where someone changed an if(uid==0) to an if(uid=0) to get root powers almost invisibly just by going down that code path. Given the way the OS is composed assuming there are no backdoors already is a matter of faith (but I agree it is unlikely there are remote backdoors, or we might have seen the resulting traffic floating by).

-Andy

--
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux