Difference between revisions of "Talk:Copyright"

From CrossWire Bible Society
Jump to: navigation, search
m (Fair Use : Four prongs or five?: :Mended. ~~~~)
(128-bit encryption: new section)
Line 27: Line 27:
  
 
One of the paragraphs mentions a SWORD CD.  There is no description of the SWORD CD in the CrossWire wiki. [[User:David Haslam|David Haslam]] 19:59, 24 March 2009 (UTC)
 
One of the paragraphs mentions a SWORD CD.  There is no description of the SWORD CD in the CrossWire wiki. [[User:David Haslam|David Haslam]] 19:59, 24 March 2009 (UTC)
 +
 +
== 128-bit encryption ==
 +
 +
This is the only page in the wiki that mentions '''encryption'''. We could do with some more detailed description of how this works for protecting SWORD modules. Encryption is normally used to hide secrets, yet the text of any module is not intended to be secret but to be studied by everyone who purchases such a locked module! So what are we really trying to achieve by encryption here? Copy-protection is not the same as information security. And there is no such thing as security by obscurity.  [[User:David Haslam|David Haslam]] 16:52, 26 August 2009 (UTC)

Revision as of 16:52, 26 August 2009

Fair Use : Four prongs or five?

The section on Fair Use includes the phrase "four prong test", which is immediately followed by five bullet points! David Haslam 13:32, 7 December 2008 (UTC)

Mended. David Haslam 20:05, 24 March 2009 (UTC)

Form letters

I suggest that the form letters be moved to a separate new page, so the main article length is reduced. David Haslam 13:42, 7 December 2008 (UTC)

Done. David Haslam 19:54, 24 March 2009 (UTC)
If you use a tabbed browser, having each form letter open in a separate tab enables them to be compared very easily. This in itself may suggest further improvements to the wording. David Haslam 20:03, 24 March 2009 (UTC)

Avoiding duplication in copyright lobbying

We need some sort of notification system to tell others at CrossWire when someone has initiated lobbying for a particular text, merely to avoid the embarrassment of having other volunteers duplicate the approach to the same copyright owners. David Haslam 17:04, 8 December 2008 (UTC)

Form letter for Go Bible users

We need to draft a form letter template for Go Bible users. This will need to cover the subtle technical point that Go Bible is not a direct Frontend for the SWORD engine per se. The template should be worded in such a way that (if successfully lobbied) will result in obtaining permissions for distribution both as SWORD modules and as Go Bible applications for mobile phones. David Haslam 20:21, 19 February 2009 (UTC)

Why do we suggest offering to pay a small fee at this first approach?

The form letter templates all include the clause, "not only to pay a small fee to be able to use your work under .......". Why do we suggest offering to pay at this first approach? Wouldn't it be more sensible to leave this to subsequent correspondence? David Haslam 20:26, 19 February 2009 (UTC)

I have personally been involved in talking with two separate organisations, and I do not include that clause (to be more honest, I dislike form letters and change and tailor as much as I like to what I know of the organisation and what I am trying to achieve). My aim is to make the word of God freely available, and while I cannot do anything about what copyright holders choose to do with their copyright I am not going to suggest to them that they charge money because I am very sceptical of making money out of the word of God (you can justify it and I am not saying you can't, but I don't think most of the justification given is reasonable. This has been argued before and I hold a more extreme position than most people in the Crosswire community). -- Jmmorgan 12:57, 27 February 2009 (UTC)

SWORD CD ?

One of the paragraphs mentions a SWORD CD. There is no description of the SWORD CD in the CrossWire wiki. David Haslam 19:59, 24 March 2009 (UTC)

128-bit encryption

This is the only page in the wiki that mentions encryption. We could do with some more detailed description of how this works for protecting SWORD modules. Encryption is normally used to hide secrets, yet the text of any module is not intended to be secret but to be studied by everyone who purchases such a locked module! So what are we really trying to achieve by encryption here? Copy-protection is not the same as information security. And there is no such thing as security by obscurity. David Haslam 16:52, 26 August 2009 (UTC)