TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Code of Practice for Software Vendors: call for views

6 点作者 azalemeth12 个月前

2 条评论

dave442012 个月前
Where is the “draft Code of Practice for Software Vendors” they want feedback on? I don’t see a link to it from that page.
评论 #40398234 未加载
RecycledEle12 个月前
I have a few suggestions, but I live in Texas so they probably do not want to hear from me.<p>Our society&#x27;s future will be determined by our software.<p>1. If software includes safety features that prevent a user from doing something, they must be transparent and easy to turn off. Otherwise the maker and resellers are liable for any damage they cause. For example, if my car insurance phone app goes into harassment mode because I am using my phone as I drive then you are liable for my not being able to use a mapping program to help me drive my wife to a hospital.<p>2. If your DRM or copy protection interferes with legitimate use of your software, you must provide 24&#x2F;7&#x2F;365 phone access to live humans who answer within 120 seconds and undo the damage immediately. I suggest you use video conferencing software on cell phones so you can talk to the user and see their computer screen. Or you could stop using DRM and copy protection.<p>3. It is fraud to claim a click-wrap license agreement is binding if it was not fully disclosed, letter-for-letter before the software was paid for or downloaded. It is also fraud to request any changes to the EULA or any other contract after payment or downloading or any other effort by the user.<p>4. EULAs must be understandable by an average 7th grader or they are fraud.<p>Given the high risks of cyber warfare:<p>5. Software must work without any online connection. That means it must be installable and fully usable. It must not stop working.<p>6. No software can have a remote kill switch or spying ability.<p>7. Makers and resellers have strict liability for any exploits found in their software.<p>8. Backdoors in software are illegal.<p>9. User data can never be shared with anyone the user does not want to share it with. No bribes or threats can be used to get permission.<p>10. It is illegal to access someone&#x27;s computer without their permission. That permission can not be purchased, induced, or gained by deception.<p>11. Any software with a global installed base where users of 100,000 copies are willing to pay 10 pounds per year for maintenance are entitled to have that software maintained. The copyright holder can maintain it, ir they can subcontract that maintenance to another party. 95% of the 1 million pounds per year will go to whoever is willing and able to maintain the software. The copyright holder may not refuse to low this maintenance and must provide all code and documentation to the maintainers. For example, Windows 95 would still be getting updates if this were the law.<p>12. All violations of these laws will be punished by a fine in the amount of the damages plus 1 day in jail for every 300 pounds (GBP) of damages. Let me repeat: The guilty parties will serve 24 hours in jail for every 300 pounds of damages they cause. There will be no exceptions.