Path: utzoo!utgpu!news-server.csri.toronto.edu!cs.utexas.edu!uwm.edu!ux1.cso.uiuc.edu!uxa.cso.uiuc.edu!msp33327 From: msp33327@uxa.cso.uiuc.edu (Michael S. Pereckas) Newsgroups: comp.misc Subject: Re: rms says... Message-ID: <1991Feb1.232305.4895@ux1.cso.uiuc.edu> Date: 1 Feb 91 23:23:05 GMT References: <21327@yunexus.YorkU.CA> <4607@lib.tmc.edu> <1682@digi.lonestar.org> Sender: news@ux1.cso.uiuc.edu (News) Organization: University of Illinois at Urbana Lines: 23 In <1682@digi.lonestar.org> kgallagh@digi.lonestar.org (Kevin Gallagher) writes: >In article <4607@lib.tmc.edu> jmaynard@thesis1.hsch.utexas.edu (Jay Maynard) writes: >> >>[stuff deleted] >>This still means that I cannot afford to have any GPV-protected code on my >>computer, since I cannot risk having the source of some of my income tainted >>by association with GPV code; whether or not it's infected by the GPV, I >>can't afford the legal representation I'd need to defend my rights in my >>programming. This is a real shame, as there are good tools that are not Are you trying to say that if for some reason you were accused of illegally using FSF code and taken to court, your defense would be to state that you don't have any GNU stuff installed on your machine? I'd be convinced.... Even if you could prove that that was true, you could very easily have seen the source elsewhere. -- Michael Pereckas * InterNet: m-pereckas@uiuc.edu * just another student... (CI$: 72311,3246) Jargon Dept.: Decoupled Architecture---sounds like the aftermath of a tornado