Re: Metrics and your privacy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Bruno Wolff III wrote:

Hi Bruno -

However, when I do an install on a machine there isn't a good reason that
I should need to provide a public IP address for that machine in order to
do the install. I might for instance do downloads at one machine and then
use them on several machines in different physical locations.
Yes, this is a fair enough complaint, it would be wrong to link the 
install action with a *requirement* to touch anything external.  But it 
should be okay to propose to the user on firstboot to check for updates, 
which he probably wants to do anyway, is in his interests and he can 
deny it.
I consider any software that makes network connections back to the supplier
for reasons not part of the function the software is providing to me to
be spyware since it is supplying my IP address to the provider.
It's not a bad definition.  The yum traffic generated by a user is 
legitimate to use under that definition.
Just to be clear in general given some of the things said by others on 
this thread, if I was running a mirror so people could choose to connect 
to it and get the benefit of their free updates, for sure I will keep 
logs and process then how I like without asking anyone's permission, for 
abuse monitoring or anything else I felt like.  This is the implicit TOS 
of contacting ANY server on the Internet.  Anyone here running a public 
server NOT keeping logs, to be consistent with any deeply held feelings 
about privacy?
employees, I think it would be unlikely that a TLA could convince Red Hat to
secretly put back doors into their products. I don't believe that is true
of most software companies. While the odds of me being affected by this are very low, I want to support companies that I feel are supporting freedom.
(I'm probably more at risk of marketting getting my data and annoying me with
sales propositions.)
This is a different issue, but it wouldn't be RHAT but an upstream 
project that got perverted, like that attack on the kernel a while back 
where someone changed an if(uid==0) to an if(uid=0) to get root powers 
almost invisibly just by going down that code path.  Given the way the 
OS is composed assuming there are no backdoors already is a matter of 
faith (but I agree it is unlikely there are remote backdoors, or we 
might have seen the resulting traffic floating by).
-Andy

--
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux