Skip to main content

Week 6: Copyleft


Continuing on the topic of copyright issues, this week's post will be about Copyleft and what impact it has on choosing a software license for one's project. 

So first of all, what even is Copyleft? Some of you might have heard of this term before in association with open-source software. Well, it's a license for free content/software that determines whether or not the derived works are influenced by the license or not. In contrast to copyright, copyleft ensures that the code/content is freely available for use and modification, whereas copyright more restricts uses. 

There are three different grades of copyleft:

Strong copyleft - one of the most famous examples is definitely GNU GPL, which was also the first copyleft license. This basically means that the license applies to all derived works and you are obligated to publish the source code if you distribute code that was derived from theirs.

Weak copyleft - an example of this would be GNU Lesser General Public License. This license isn't as strongly restricted but it still leaves some rights to the developers of the main source code. With these licenses, the license doesn't apply to all derived work. Weak copyleft licenses are usually used for software libraries. Mozilla for example is a user of weak copyleft.

Non-copyleft - examples of this would be Apache, MIT, and the BSD licenses. These are pretty simple and also give developers the most freedom. This usually doesn't require you to distribute source code as the author doesn't want ownership over the work.

So when choosing a software license before starting your project, you should really think through what you want the future conditions for the project to be. Whether you want others to be able to contribute to it and help develop it further under the condition that they refer to your source code, or you don't care who does what with your code, I think copyleft gives developers a lot of good options.


Sources:

https://opensource.com/resources/what-is-copyleft

https://choosealicense.com/licenses/

https://e7.pngegg.com/pngimages/871/683/png-clipart-copyleft-free-art-license-copyright-on-off-words-phrases-copyright.png

Comments

Popular posts from this blog

Week 9: Examples of bad and good HCI

With technology developing rapidly, we find all sorts of new ways to improve our lives and how we interact with technology. With technological innovation, we might witness the creation of something life-changing and spectacular or something that just no one even asked for. I'll try to bring examples of both worlds. Firstly I'd like to bring a good example of HCI - eye-tracking. I recently watched either a video on YouTube or a documentary on Netflix (can't really member which) that showed how eye-tracking technologies have changed the lives of people suffering from illnesses like locked-in syndrome. Locked-in syndrome is a condition where people have full cognitive ability but they are unable to move or speak due to paralysis of voluntary muscles. So usually they can only move their eyes, and that's about it, although some can't even do that. They are literally locked in their bodies unable to move and communicate with others. But thanks to eye-tracking, people that...

Week 15: IT and Ethics

In my last blog post, I will be touching upon an ethical theory and how I see it implemented in IT. For the theory, I chose Social Contract Theory that was first formulated by the English philosopher Thomas Hobbes. According to the theory, society should strive to develop a set of rules that make sense to everyone (making people follow them voluntarily). For instance, driving on the right (or in some places, left) could be a common example - drivers keep to the right not for fearing the police but to avoid confusion and possible crashes. I think this pretty much describes how online communication and hacking work. Although there aren't really any rules strictly in place other than netiquette rules on how you should behave online or how, who, and if to hack someone, most people obey a set of rules that just make sense to everyone without really having them written down. Even though there are some netiquette rules, it's merely a recommendation, not a requirement. So everyone can ...

Week 11: Privacy and censorship

This week's topic was censorship, privacy and the Internet and I'd like to talk about examples of both censorship and privacy. The first thing that pops into my head regarding censorship is the famous Chinese app TikTok. Amongst TikTok already having tons of privacy issues and security risks, TikTok has also been caught censoring its content that would be okay in the Western world and Europe but wouldn't be in China. As TikTok is owned by the Chinese company ByteDance, it cooperates with the Chinese government and they have said this openly before, although they don't really specify exactly how. But TikTok users have noticed how some content that is being posted is heavily censored. Examples of this are the BLM and ACAB movements and Hongkong protests. The app has only one main feed that you can't filter yourself, it just feeds you content based on your watch time, likes, and personal data. So when these movements were at their peak people started noticing how all o...