From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham autolearn_force=no version=3.4.4 X-Google-Thread: 103376,d0f6c37e3c1b712a X-Google-Attributes: gid103376,public X-Google-Language: ENGLISH,ASCII-7-bit Path: g2news2.google.com!news3.google.com!newsfeed2.dallas1.level3.net!news.level3.com!bloom-beacon.mit.edu!llslave.llan.ll.mit.edu!53ab2750!not-for-mail From: "Frank J. Lhota" User-Agent: Thunderbird 1.5.0.4 (Windows/20060516) MIME-Version: 1.0 Newsgroups: comp.lang.ada Subject: Re: Ada in Debian: most libraries will switch to the pure GPL in Etch References: <1151405920.523542.137920@p79g2000cwp.googlegroups.com> <1151436486.2179.48.camel@localhost> <1151438973.2179.67.camel@localhost> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Message-ID: Date: Wed, 28 Jun 2006 13:58:30 -0400 NNTP-Posting-Host: 155.34.132.133 X-Complaints-To: news@ll.mit.edu X-Trace: llslave.llan.ll.mit.edu 1151517587 155.34.132.133 (Wed, 28 Jun 2006 13:59:47 EDT) NNTP-Posting-Date: Wed, 28 Jun 2006 13:59:47 EDT Xref: g2news2.google.com comp.lang.ada:5224 Date: 2006-06-28T13:58:30-04:00 List-Id: Michael Bode wrote: > Georg Bauhaus writes: > >> I see the irony, but this is legal stuff. Consider a few sheets of >> paper landing on your desk saying, this is a part of the NT kernel. >> This part of the NT kernel source, as the header clearly indicates, >> is GPLed. Would you believe it? > > If I had downloaded it myself from > https://gnu.microsoft.com/free_software/windows_nt/src/ ? Folks, Georg was only kidding. We will have to wait a *long* time to see "gnu" and "Microsoft" in the same URL. AFAIK Microsoft has not officially released the source code for any OS except the DOS 1.x BIOS. Two years ago, there was a panic over the leaking of the source code for Windows NT / 2000; see http://www.neowin.net/index.php?act=view&id=17509 This immediately raised the concern that hackers could use this source code to pinpoint vulnerabilities. So much for the concept of security through obscurity!