Feeds

Stallman: open-source .NET 'danger' for Debian

Microsoft patent warning

Remote control for virtualized desktops

Richard Stallman, founder of the GNU project and a General Public License author, has slammed plans to include Mono in Debian's default install as a "dangerous" risk for the open-source community.

In a statement published on the Free Software Foundation site, Stallman says the move is being taken "for the sake of Tomboy which is an application written in C#."

"The danger is that Microsoft is probably planning to force all free C# implementations underground some day using software patents," Stallman said. "This is a serious danger, and only fools would ignore it until the day it actually happens. We need to take precautions now to protect ourselves from future danger."

The Debian GNU/Linux project has plans to include Tomboy, a note-taking application in its next release. This would include implementing Mono, the open-source implementation of Microsoft's .NET backed by Novell.

"The problem is not in the C# implementations, but rather in Tomboy and other applications written in C#," he continued. "If we lose the use of C#, we will lose them too. That doesn't make them unethical, but it means that writing them and using them is taking a gratuitous risk."

Stallman warned that a Microsoft threat should steer the open-source community to discourage people from writing programs in C# and depend on the free C# implementations as little as possible.

Although Stallman frequently speaks about the dangers of software patents on open-source, trust for Microsoft has run particularly thin recently because of the company's legal attack on TomTom over a FAT patent dispute.

Stallman urged the community to instead distribute and recommend non-C# applications whenever possible to avoid Redmond lawyers from being able to disable major OS functions on a whim. ®

Beginner's guide to SSL certificates

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.