DRM goes beyond protecting tracks from being traded online. It is used to lock consumers to proprietary technology. It is used to control supply and push higher prices. It is used to undermine practices we have long defined as fair use so they can be shifted to fee-based.
--
Source DRM is Like Paying for Ice - 6/25/2006Richard Menta
» Richard Menta - all quotes »
We wish to control big business so as to secure among other things good wages for the wage-workers and reasonable prices for the consumers. Wherever in any business the prosperity of the businessman is obtained by lowering the wages of his workmen and charging an excessive price to the consumers we wish to interfere and stop such practices. We will not submit to that kind of prosperity any more than we will submit to prosperity obtained by swindling investors or getting unfair advantages over business rivals.
Theodore Roosevelt
The relationship between information and the mechanisms for its control is fairly simple to describe: Technology increases the available supply of information. ...control mechanisms are strained... When additional control mechanisms are themselves technical, they in turn further increase the supply of information. When the supply of information is no longer controllable, a general breakdown in psychic tranquillity and social purpose occurs. Without defenses, people have no way of finding meaning in their experiences, lose their capacity to remember, and have difficulty imagining reasonable futures.
Neil Postman
And the true order of going, or being led by another, to the things of love, is to begin from the beauties of earth and mount upwards for the sake of that other beauty, using these steps only, and from one going on to two, and from two to all fair forms to fair practices, and from fair practices to fair notions, until from fair notions he arrives at the notion of absolute beauty, and at last knows what the essence of beauty is.
Plato
Why is it bad to use an unauthorized copy of a proprietary program? Because it’s proprietary! So an unauthorized copy is almost as nasty as an authorized copy of the same program. They are both nasty because they are proprietary. The users don’t have control over them. If they pay developer – that makes it worse, because they are rewarding this delinquency. That’s why the authorized copy is worse. But they are both bad because they are both proprietary software. If you want freedom, you have to get rid of them both, because they both control you.
Richard M. Stallman
While games are fun to play, children should grow up not just being the consumers of technology but also the creators of technology.
Newton Lee
Menta, Richard
Menuez, Doug
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z