Subject: Re: Ransom (long) (was: Mandatory donations...)
From: Adam Theo <>
Date: Mon, 15 Oct 2001 08:25:44 -0400

Karsten M. Self wrote:

> In general, the application area has been driver development.  A
> developer uses some device, writes (or improves) a driver for it.  This
> was communicated to the manufacturer.
> Given that the GPL is an affirmative license (the GPL does not coopt
> your copyright, it terminates if you don't grant it), the code could be
> demonstrated to the manufacturer without a grant of copyright.  If the
> quality, functionality, and other parameters were met, there isn't an
> appropriation risk (at least not a legally executed one).
> This was a few years back, before the world changed, and all that.
> Companies might have been mor ewilling to pay for freelance development
> than today.  Too, the folks I knew who were doing this have good and
> established creds.

Hmm... Interesting. I'll put this on my list of things to research for 
Ransom... history of device driver creation.

> This isn't a get-rich quick scheme.  It is a way for a good developer to
> pick up a spare contract.  I also see it as more a protocol than a
> license.

Yes, agreed. I see Ransom as a model (or protocol as you put it), and we 
can develop a small handful (2-4) of licenses, tools, and other 
resources that can be used to facilitate Ransom. Norbert's Copyleft 
Ransomware is an excellent start, and the first one that should be 
worked on and promoted. If it really succeeds to all expectations, we 
may not even need to make other Ransom licenses  :-)

    /\    -- Adam Theo, Age 22, Tallahassee FL USA --
   //\\   Theoretic Solutions (
  /____\    "Software, Internet Services and Advocacy"
/--||--\ Personal Website (
    ||    Jabber Open IM (
    ||    Email & Jabber:
    ||    AIM: AdamTheo2000   ICQ: 3617306   Y!: AdamTheo2
  "A free-market socialist computer geek patriotic American buddhist."