Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
The Courts Government News

Abusing the GPL? 771

Anonymous with good reason, a reader would like to bring this important question to your collective attention: "Our (technically savvy) lawyer has advised my company that 'incidental resources' do not a work derive. For example: If I have a student's version of a development environment whose license does not allow me to distribute code compiled with it for commercial use, I am legally allowed to use the environment to create my ANSI C++ code, which, when I compile it with GCC, I am free to use to whatever commercial end I like. This seems fairly intuitive. (After all, you could have written the same thing in a text editor, and the debugging, etc, that you need the IDE for doesn't actually 'show up' in the final code). Here's the kicker: My company wants to translate this to an abuse of the GPL and has been advised 'full speed ahead!'"

"How, you may ask?

Integrate the highly useful GPL code we're eyeing into our only slightly more complex (but much more lucrative) project, thereby saving us at least 30% of the coding involved. The company then go all the way to production with it, but instead of finally compiling the actual project for distribution, they instead compile a bunch of incomprehensible gobbledygook that just happens to compile to the same bytecode. You know the game: globally replace every function name, variable name, and so on from our code with nonsensical names (or random characters), remove all of the comments, and any other form of obfuscation they can introduce. They will then GPL the obfuscated gobbledygook, which isn't much more useful to anyone than reverse-engineered bytecode would be (it is a complex project). 'Voila!' All the benefits of a huge GPL project and countless thousands of volunteer hours and unreadable, incomprehensible source tree.

For the record: I
do not think this is right yet, I have not been able to find any precedent for why the GPL should protect against this kind of abuse.

I'm not trying to snitch on my company -- or lose my job, which is why I am posting anonymously -- but hopefully some lawyers out there could point out some iron-clad
legal reason preventing this sort of thing. I've read the GPL through at least a dozen times since yesterday, and so far it looks like our lawyer is right. I have not found any relevant linkage either, as I have mentioned. Links to extended legal analyses of the GPL from a technical standpoint (if any exist) would be the most helpful. All help is appreciated."

This discussion has been archived. No new comments can be posted.

Abusing the GPL?

Comments Filter:
  • by horse ( 70241 ) on Wednesday March 06, 2002 @09:34AM (#3117731)
    Speaking only for myself, here. I would resign immediately, and report the abuse to the FSF.

    Life is too short to work for lowlife scum.
  • by phr2 ( 545169 ) on Wednesday March 06, 2002 @09:35AM (#3117740)
    The GPL explicitly defines source code as the preferred form of a program for modifying it.

    To find out whether the gobbletygook you distribute is source code or not is simple: if you normally add features to the program by editing the gobbletygook, it's source. If you instead edit the stuff that you compiled to gobbletygook and then recompile it, then the stuff you distributed isn't source and it's a clear-cut GPL violation.

  • Preferred form (Score:4, Informative)

    by Anonymous Coward on Wednesday March 06, 2002 @09:36AM (#3117745)
    Gnu GPL clause 3: "The source code for a work means the preferred form of the work for making modifications to it."

    Deliberately obfuscated high-level language code (which is no longer preferred, or even useful, for modifications) does not appear to meet this requirement.
  • Can't do it. (Score:1, Informative)

    by Anonymous Coward on Wednesday March 06, 2002 @09:36AM (#3117748)
    Read the GPL. Source code must be provided in a form normally used by programmers.
    Obfuscated code violates this license clause. End of story.
  • by fizbin ( 2046 ) <martin@NOspaM.snowplow.org> on Wednesday March 06, 2002 @09:47AM (#3117826) Homepage

    Why did it take so many posts for someone to point this out? Do people not read the GPL?



    What a day to be without moderator points...



    For those too lazy to read the whole thing, read section three, point #3 [gnu.org] very carefully. Just because something compiles does NOT mean that it is source according to the GPL. That you would not do development on the obfuscated gobbledegook clearly shows that the obfuscated version is NOT the preferred form for modification. I would be highly suspicious that your lawyer is insufficiently anal when reading contracts if they missed this.



    As for precedent, can anyone find a discussion of GPL'ed yacc/bison grammars? This would fit exactly the case above - the original source that must be distributed is the .y file, not the result of compiling the .y to a .c file. Unfortunately, I don't think that anyone has ever been tempted to rip off a GPL'ed grammar.

  • by Jamie Lokier ( 104820 ) on Wednesday March 06, 2002 @09:53AM (#3117857) Homepage

    (BTW, I am not a legal advisor. This is my understanding of the GPL).

    If you are including other people's GPL'd source code in a program which you distribute, then you must abide by the terms of that license. Section 3 of the GPL is precise enough to disallow scrambling the source code:

    1. You must provide the source code of the whole GPL program to your customers, as defined in clauses 3a, 3b and 3c.
    2. The provided source must correspond exactly with the binary that you give your customers. So it must include your modifications, for exactly that version.
    3. The provided source must be in the "preferred form of the work for making modifications to it". That means the source code must be what you actually load into your editor to develop the software. In other words, you must distribute the useful source code.

    There is nothing to stop you changing all the variable names, or the style of someone else's code. However, if you distribute a GPL'd binary then the source you distribute with it must be the source that you prefer to use for modifying the program yourself. You may be called upon to prove this in a dispute.

    For reference, section 3:

    3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:

    a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

    b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

    c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)

    The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

    If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

  • And then what? (Score:3, Informative)

    by IPFreely ( 47576 ) <mark@mwiley.org> on Wednesday March 06, 2002 @09:55AM (#3117871) Homepage Journal
    So he reports it to FSF. Then what?

    The primary question of the article was "Is this legal or actionable with respect to the GPL?"
    Even if the FSF knew about it, what could they do? There has to be a clear violation of the wording of the GPL, not just some gut reaction.

    So the question stands: What can be done about this type of situation given what we know?

    If there is something that can be done, then talk about reporting them.

    FWIW: The BSD advertising clause would require at least one comment remain in the code, the original authors name. That would at least give someone a hint as to where the code came from when trying to interpret the "garbage" source.

  • by Bruce Perens ( 3872 ) <bruce@perens.com> on Wednesday March 06, 2002 @09:55AM (#3117879) Homepage Journal
    Obligatory disclaimer: This is not legal advice, get another lawyer than the one you've already heard from to give you that.

    The GPL states:

    The source code of a work means the preferred form of the work for making modifications to it.
    That term was written to prevent exactly the sort of obfuscation the attorney is proposing. Obfuscated code is demonstrably not the preferred version for creating modifications. So, what is being proposed is a GPL violation, and your company's attorney missed that part of the license. The talk about incidental resources isn't germane, it actually seems to be intended to confuse, because what is being proposed clearly is a derivative work, and the company attorney is acknowledging that when he suggests that the obfuscated code be GPL-ed.

    But there are simpler remedies than legal ones. If the free software developer community hears about a product using obfuscated code to circumvent the GPL, they will retaliate by creating a non-obfuscated version and using it to compete with your company's product. They are experienced at reverse-engineering, they have excellent tools for code reformatting and analysis, and there are a many programmers who will be angry enough to work on this.

    If your employer wants to unashamedly take advantage, they are simply buying a lawsuit. The free software community does have the resources to bring one - it would probably be brought by law professor Eben Moglen of Columbia University. He wants more legal tests of the GPL, and would love to make an example of your employer. Don't go there.

    Bruce

  • Selling GPL Software (Score:1, Informative)

    by Anonymous Coward on Wednesday March 06, 2002 @10:04AM (#3117936)
    Lets just look at the resulting software and ignore the mentioned source code issues.

    The end software product binary is GPL licensed.
    This means 1 person can buy it, and give it away to everyone else, as he is entitled to under the GPL.

    Since you are giving away no cost software, what do you expect to gain from hiding the source.
  • by cduffy ( 652 ) <charles+slashdot@dyfis.net> on Wednesday March 06, 2002 @10:12AM (#3117972)
    Until they actually release this code, there's nothing the FSF (or anyone else) can do. Talking about copyright violations isn't a crime, and there's a good chance management will come to their senses. As long as these people don't do anything immoral, I don't see anything wrong with working for them.

    Threatening mass resignations from engineering, btw, is one tactic I'm currently seeing used to prevent a GPL violation at another company. Buyer's market though engineering talent may be right now, I expect it'll be effective -- turnover is just too expensive. Quitting right away (as soon as idea is raised) -- simply put, why?
  • Section 3 also mentions: The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. [Emphasis mine.]

    So, not only do that have to release the unobfuscated code, but they have to release the scripts that obfuscated it. What fun! :)
  • by yerricde ( 125198 ) on Wednesday March 06, 2002 @10:34AM (#3118135) Homepage Journal

    It would be hard to write an anti-obsucation clause I imagine

    Not that hard; in fact, it's already been done. The GNU GPL [gnu.org], section 3, states: "The source code for a work means the preferred form of the work for making modifications to it." I don't think any reasonable U.S. district court judge would consider robo-obfuscated C to count as the "preferred form" for that purpose. See #3117740 [slashdot.org] for another explanation.

  • by Anonymous Coward on Wednesday March 06, 2002 @10:34AM (#3118136)
    maybe you want to take over the xfree 3.3.6 nvidia opengl driver. that is.. the preprocessor output that nvidia released. and no, it isnt in a working state since 2 years or so.
  • by 87C751 ( 205250 ) <[moc.lartnec-tnar] [ta] [tods]> on Wednesday March 06, 2002 @10:35AM (#3118142) Homepage
    ALSO - he's not talking about removing comments variablenames & whitespace in the gpl'd source, but his company's.
    Error 666: FTRTFA

    What the author said was:

    Integrate the highly useful GPL code we're eyeing into our only slightly more complex (but much more lucrative) project, thereby saving us at least 30% of the coding involved. The company then go all the way to production with it, but instead of finally compiling the actual project for distribution, they instead compile a bunch of incomprehensible gobbledygook that just happens to compile to the same bytecode. You know the game: globally replace every function name, variable name, and so on from our code with nonsensical names (or random characters), remove all of the comments, and any other form of obfuscation they can introduce.
    So, yes, they are intending to munge the GPL source they've incorporated, along with their own source, into a final, monolithically obfuscated product.
  • A two part problem (Score:5, Informative)

    by Christian Hicks ( 564547 ) on Wednesday March 06, 2002 @10:38AM (#3118172)
    This sort of issue breaks down into two sub-problems:

    1. Is it in violation of the GPL? This question is not a simple one, but such actions may very well be violation of the GPL. If this matter reached court, the question would center on whether the process applied to the GPL'd code constituted part of the process to create the derivative work, as derivitive work is defined in the GPL. For example, an expert might argue that code obfuscation can be part of the compilation process. It is oversimplified to say that laws are reinterpreted on the fly to capture the intent of the law. What is true is that these sorts of questions - for example, what constitutes compilation - are likely to be viewed in a manner which assists the obvious intent of the applicable contract/law.

    2. If it is a violation, can it be proved? Probably. Our company works for lawyers on code plagiarism cases all the time. There are many algorithms you can apply to show statistically significant relationships between a body of code and its obfuscated counterpart. The same should be possible with bytecode. Once a reasonable basis for suspicion is established, plaintiffs could get discovery of the company's code repositories and depose employees under oath.

    Christian Hicks
    Elysium Digital, L.L.C.
    http://www.elys.com [elys.com]

  • by Anonymous Coward on Wednesday March 06, 2002 @10:45AM (#3118237)
    There have been cases before of obfuscated GPL code (Some video drivers in the Linux Kernel I believe) but those were original source from the manufacturer.

    I think you are thinking about the nvidia drivers [www.nvidia], developers of Beos drivers [nanorevolution.com] were always complaining they could make no to little sense of the released source. Not a violation in my opinion, everyone could see what de drivers where doing, it was just to complex to learn from looking at the code anyway (instead of real documentation). I still think someone should licence the geforce line of chips, build boards based on the reference design like all other vendors but release real open drivers based on the documentation they got along with the chip licence. These may not have the speed of oficial nvidia detonator drivers but with an opensource developers community they could a least be tweaked for the os(and subsequently be ported to other operating systems, and maybe even architectures(quake 3 on alpha anyone ;-))

    To bad nvidia will never let this heapen, they should really be more forthcoming with help if they want to get more succesfull in the chipset arena.(nForce)
  • by KGIS ( 307368 ) on Wednesday March 06, 2002 @10:46AM (#3118246)
    But who gets to decide what the preferred form is? Wouldn't that be open to some interpretation? It is obviously the form that the company in question would prefer you to have.
    I know that this is not the same but if I want to edit your GPL program in APL (my preferred form) but it is only available in C does that mean that you are violating the GPL? Does the original author always get to decide what the preferred form for all future uses of the code is? In some ways that doesn't seem very open to me.
  • if you (re)distribute changes, you must at least distribute those changes as source code.

    The GPL does address the issue of what constitutes "source code" at some length. From section 3:

    The source code for a work means the preferred form of the work for making modifications to it.

    I'd hardly think that obfuscated source would qualify as "the preferred form of the work for making modifications to it."

  • Not really... (Score:3, Informative)

    by eth1 ( 94901 ) on Wednesday March 06, 2002 @11:20AM (#3118483)
    What you describe would simply mean, since the 'source' according to the GPL is the preferred modifiable version, that they could be forced into releasing their non-obfuscated source, too.


    of course, IANAL

  • GPL Loophole (Score:0, Informative)

    by sales_worldwide ( 244279 ) on Wednesday March 06, 2002 @11:36AM (#3118573) Homepage


    This is the third time I have mailed you. You are taking a long time to wake up to this problem.

    I first mailed about a GPL violation with my company (under ND, so cannot discose - details follow). We then had hte PowerVR issue, where htey did not release source. And then we had hte FSFs comment on RTLinux (http://www.gnu.org/press/2001-09-14-RTLinux.html)

    So, there are three issues. RTLinux & patent, PowerVR not releasing source, and the linux binary driver GPL loophole described below. The primary copyright hoder, torvalds, is doing nothing about any of them. This is NOT what the linux community wants.

    Speaking of GPL violations, I found a pretty flagrant one at work a few weeks ago...
    Microtest (now XStore [xstoreonline.com]) put together a mess of GPL software - a modified Linux kernel 2.0.27, Samba 1.9.x, Apache, the MARS_NWE netware emulator, and GNU C libraries (libc5), among others, stuffed them on a flash chip in a drive-bay-size embedded 486-based computer, and sells it as their "DiscZerver [xstoreonline.com]" product line. Nothing wrong with the method, but there's plenty wrong in their implementation.

    Previous 'Ask Slashdot':

    We have some problems in the linux world. First, we jave the issues of RTLinux and their patent, wiht FSF commenting on it recently: http://www.gnu.org/press/2001-09-14-RTLinux.html)


    Then we have PowerVR where they are not releasing the source (also a recent slashdot post).


    And now, we have a loophole allowing these people to get away with it. There is a company already explooiting this loophole. Read on:



    I work in the embedded hardware field. Today we received some hardware from a manafacturer, who uses linux to run on their hardware.
    In the past I was given all source code to their product, as they are obliged to, given that their code is derived from the linux kernel itself.
    However, today I was told that they will no longer be distributing their source,
    since they have managed to incorporate all of them into a loadable kernel module (which they are referring
    to as a "binary only runtime loadable driver". Apparently linus torvalds has recently said that binary
    drivers can be
    distributed in binary only form. From my knowledge of the previous source this company released, they have gone to considerable effort to move all of
    their code into this "binary driver". It is not so much a binary driver, as a real time linux system hacked into a driver. I suspect they intercept certain system
    calls to achieve this - I am in the process of checking the binary to find out.


    I am under an NDA so cannot disclose more information, nor my name.


    But is this against the GPL? I think it is, and given that my name exists in the linux kernel too, I am upset and would like
    to do something about this - but apparently only Torvalds has the right to sue them - is that true?
    (But he won't, since he has said binary only drivers are OK).
    And where exactly do we draw the line between a derived linux kernel and the same thing implemented as a loadable
    module?

  • reverse the change (Score:1, Informative)

    by Anonymous Coward on Wednesday March 06, 2002 @11:37AM (#3118583)
    Though it would be nice to find a way to
    prevent the company from doing this, I wouldn't
    worry too much. The kind of obfuscations you
    mention can probably by reversed by some
    pattern matching code that "aligns" the original
    GPL'd and the obfuscated code, much the way
    current cheating-detection code can detect student
    software submissions that have carried out similar obfuscations. It would serve the
    company right to discover that their cleverly
    obfuscated code had been de-obfuscated and all
    their important changes revealed to the world.
  • by Chris Burke ( 6130 ) on Wednesday March 06, 2002 @12:33PM (#3118964) Homepage
    Obviously the clean source is preferred, but not required.

    But preferred is what the GPL requires.

    There can be some interpretation, but the clause states preferred form for modificaton, not compilation. Obfuscated source will still make the compiler happy, but not anyone who has to change the code. That the -company itself- would not make modifications to the code in obfuscated form would clearly indicate what the "preferred" form is.

  • Re:"viral license" (Score:2, Informative)

    by tramm ( 16077 ) <hudson@swcp.com> on Wednesday March 06, 2002 @01:52PM (#3119606) Homepage
    nanojath wrote:
    The GPL is absolutely nothing more than an agreed protocol for individuals to exercise their copyrights to works they created. The GPL says a simple thing: use the code, join the club. If you don't like the rules of the club, don't use the code:
    You're largely right, except that the GPL does not cover use or creation of derived works. It only deals with distribution of those derivatives. There are no restrictions on the use of GPLed code, as described in Section 0: "The act of running the Program is not restricted..."

  • by kavau ( 554682 ) on Wednesday March 06, 2002 @02:20PM (#3119782) Homepage
    earlytime wrote:

    from the GPL: "The source code for a work means the preferred form of the work for making modifications to it. (...)"

    IANAL, but I think this is the answer, although it has not been interpreted in the right way in the previous posts:

    If we interpret "the preferred form of the work for making modifications" as "the form the company uses for making modifications" then the company has only two choices after the first release of the software:

    1. They make modifications to the obfuscated form. Then they legally circumvented the GPL, but for a large project this is obviously not a feasible approach.
    2. They use the actual, unobfuscated source code to work on the second release. Then they have to declare it "the preferred form" and release the actual source code.

    I have a feeling it should be possible to get them with this...

  • by osu-neko ( 2604 ) on Wednesday March 06, 2002 @02:52PM (#3119987)
    IIRC it also requires you to clearly indicate where you have made changes, which this would not appear to do.

    You do not recall correctly, see the GPL [gnu.org].

    However, note this from the GPL: The source code for a work means the preferred form of the work for making modifications to it.

    If the company intends to keep a non-obfuscated version, this would be "the preferred form", and their lawyer is dead wrong...

  • by milo_Gwalthny ( 203233 ) on Wednesday March 06, 2002 @03:04PM (#3120094)
    Of course, as a lawyer, you should also realize it is ten times more expensive to defend than to sue. The costs of responding to discovery, alone, can easily hit six figures. And, (personal opinion) the obviousness of the obfuscation would probably be enough to prevent dismissal. So, the real question is not "could the Company in question win a suit," because we all know that in the lottery we call Trial by Jury anyone could win on any given day. The real question is "could the Company lose." A loss in court might result in the inability to sell their product for some period of time, or damages to the extent of their sales. If the company is small enough, this could mean the end of it. Is it worth the gamble?
  • by TheCarp ( 96830 ) <sjc AT carpanet DOT net> on Wednesday March 06, 2002 @03:26PM (#3120230) Homepage
    Because the GPL says you have to redistribute the source, modified or original, as source. You can do it as binary too, but you have to distribute the source to any person that you distribute a binary to that wants it. This obfustcated text is NOT source code... it is a preprocessed intermediate bytecode.

    Now, the fact that this intermediate bytecode is legal C or whatever other language the original was written in doesn't make it source. It just means that that is the internal syntax of this intermediate stage. This is because the defining characteristic of source code is that it is human readable. It is what the developer wrote and would use to modify it himself. WHen you preprocess this in such a way that it is no longer suitable for human reading and maintaining, it ceases to be source...and ceases to meet the GPL source requirement.

    I highly recomend that anyone who is going to talk about this actually READ the GPL [gnu.org]

    From the GPL:

    The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.


    -Steve
  • by SPYvSPY ( 166790 ) on Wednesday March 06, 2002 @03:41PM (#3120335) Homepage
    Yes, that would be one test for "preferred form", but there are others and the other side of any dispute will present them. The point is that the standard that you propose does not necessarily follow from the language of the GPL. In other words, your standard is more suitable than the GPL language. Of course, at trial, the credibility of your engineers and/or anyone testifying about their procedures will be at issue.
  • by LoseNotLooseGuy ( 554808 ) on Wednesday March 06, 2002 @06:01PM (#3121304) Homepage Journal

    Now 'shared source', and companies that provide Perl/PHP/JSP code with a commercial license *would* loose income!

    There are very few companies that would voluntarily let loose or release income. Of course, it is possible that they could fail to retain income due to piracy. The word you were looking for is lose.

    Congratulations! You have been participant #46 in my campaign to rid Slashdot of this error.

  • Obfuscating C Code (Score:3, Informative)

    by ninewands ( 105734 ) on Wednesday March 06, 2002 @06:48PM (#3121639)
    Personally, I think this would be a rather easy case to prove if anyone chose to pursue it.

    A context diff of the "obfuscated" code against the code it's derived from would rather quickly show that the only changes from one to the other was symbols and the lack of comments. Unless, that is, they resorted to some rather serious Obfuscation like operator and function overloading, or trick use of preprocessor errors, in which case, a diff of the preprocessor output from the two code trees would also damn the offender pretty quickly.

    I AM a (recovering) Lawyer (I am non-practicing) and I would advise your company that they are playing with fire by trying this. You didn't reveal which GPL Code your company finds so useful, but there are MUCH smarter ways to play this game, especially if the authors of the code you like so much HAVE assigned their copyright to the FSF. (See, FSF v. NeXT Computer, (over gcc) for instance).

    I question the degree of "tech-savvy"-ness of your company's counsel if he's advising them to go "full speed ahead" on such a transparent, bad faith abuse of the GPL (can't call it a violation ... technically, at least).

  • Re:No it isn't. (Score:2, Informative)

    by qjkx ( 556069 ) on Wednesday March 06, 2002 @08:36PM (#3122220)
    IANAL, but I think that you are introducing an assumption that makes "preferred" seem poorly defined when it really isn't. Here's what I'd agrue:

    The subject of the verb "prefer", that is, the entity or entities doing the preferring, is not specified. Therefore we have to infer it.

    I would say you have shown that when "people in general" or "people in the industry" are the preferrers, the word has no objective meaning. I agree, and note that any definition we give here could cause the unmodified distribution to be in a non-preferred form, and thus not source.

    However, there is another reasonable grammatical possibility for who the preferrer is, namely the person(s) modifying the code.

    Now, if the modifier is the preferrer, preference is easily determined by his/her/their past actions. We can ask what form they used to modify the code (i.e. put them on the stand, and if they lie and say they modified the obfuscated code, ask them to explain what various sections of the obfuscated code do). In this case at least there is exactly one set of documents which fit the criteria.

    So we have two interpretations, one of which leads to a meaningless statement, and one of which leads to a meaningful one. This is a common situation in English, and the general convention among English (or other language) speakers is to go with the interpretation which makes sense. Under this ubiquitous convention, I would agrue that the "preferred" form for modifications can only be that which the modifier him/her/thierself has used.

    I've copped out a bit and omitted the possibility that it is the original author who is the preferrer (what happens if a word is ambiguous, but every possible interpretation leads to the same conclusion?), but if that could be set aside, would a judge be likely to buy this sort of argument?

  • Re:OT: Modern Judges (Score:3, Informative)

    by TekPolitik ( 147802 ) on Wednesday March 06, 2002 @09:28PM (#3122403) Journal
    But you're the only one I've seen on Slashdot, or talked to in person, who seems to think that "preferred form" isn't fairly obvious.

    It's not so much that "preferred form" is obvious, it's that "the preferred form" is obvious. Note, not "a preferred form". The common meaning of "the preferred form" allows for exactly one form to fit this description. In other words, out of all of the available forms, the one that is the best possible form for modification is the one that has to be distributed. Quite clearly, if the company is continuing to modify the program in form X, then form X is, prima facie, the only possible form that fits the phrase "the preferred form".

    The only way this could be negatived (yes, that is a verb in lawyerspeak) is by demonstrating that the form used for development is a form not convenient to others, and the translated form is actually preferable for those others.

    IANALY, but I did top the year last year, and this is a simple question of interpretation that a first year law student could deal with.

Credit ... is the only enduring testimonial to man's confidence in man. -- James Blish

Working...