This 2010 essay argues that running a nonfree program on your server, even for personal use, compromises your freedom and contributes to a broader system of user subjugation. While seemingly a private act, hosting proprietary software empowers the software's developer to control your computing, potentially through surveillance, restrictions on usage, or even remote bricking. This reinforces the developer's power over all users, making it harder for free software alternatives to gain traction. By choosing free software, you reclaim control over your server and contribute to a freer digital world for everyone.
The blog post "Right to root access" argues that users should have complete control over the devices they own, including root access. It contends that manufacturers artificially restrict user access for anti-competitive reasons, forcing users into walled gardens and limiting their ability to repair, modify, and truly own their devices. This restriction extends beyond just software to encompass firmware and hardware, hindering innovation and consumer freedom. The author believes this control should be a fundamental digital right, akin to property rights in the physical world, empowering users to fully utilize and customize their technology.
HN users largely agree with the premise that users should have root access to devices they own. Several express frustration with "walled gardens" and the increasing trend of manufacturers restricting user control. Some highlight the security and repairability benefits of root access, citing examples like jailbreaking iPhones to enable security features unavailable in the official iOS. A few more skeptical comments raise concerns about users bricking their devices and the potential for increased malware susceptibility if users lack technical expertise. Others note the conflict between right-to-repair legislation and software licensing agreements. A recurring theme is the desire for modular devices that allow component replacement and OS customization without voiding warranties.
Summary of Comments ( 17 )
https://news.ycombinator.com/item?id=42964883
HN users largely agree with the article's premise that "personal" devices like "smart" TVs, phones, and even "networked" appliances primarily serve their manufacturers, not the user. Commenters point out the data collection practices of these devices, noting how they send usage data, location information, and even recordings back to corporations. Some users discuss the difficulty of mitigating this data leakage, mentioning custom firmware, self-hosting, and network segregation. Others lament the lack of consumer awareness and the acceptance of these practices as the norm. A few comments highlight the irony of "smart" devices often being less functional and convenient due to their dependence on external servers and frequent updates. The idea of truly owning one's devices versus merely licensing them is also debated. Overall, the thread reflects a shared concern about the erosion of privacy and user control in the age of connected devices.
The Hacker News post titled "Who Does That Server Serve? (2010)" has a moderate number of comments discussing the linked GNU article about the ethical implications of running your own server. Several commenters engage with the core ideas presented by the article.
A recurring theme is the practicality and feasibility of self-hosting in the modern internet landscape. Some users acknowledge the idealistic appeal of controlling one's own data and digital presence but point out the increased complexity and maintenance burden involved. They highlight the advantages of established service providers in terms of reliability, security, and accessibility. One commenter specifically mentions the difficulties in achieving robust spam filtering and DDoS protection on a personal server. The trade-off between convenience and control is a central point of discussion.
Several comments explore the nuanced meaning of "serving" in the context of the article. Some argue that even a self-hosted server implicitly "serves" the interests of hardware manufacturers, internet service providers, and software developers, thus never truly achieving complete autonomy. This leads to a discussion about the interconnected nature of the internet and the inherent dependencies involved.
The legal and ethical responsibilities of running a server are also addressed. Commenters mention the potential liability for hosting illegal content, even unintentionally, and the need to comply with various regulations. This raises questions about the realistic expectations of individual users to manage these complex issues.
Some commenters offer practical advice and resources for those interested in exploring self-hosting. They mention specific software packages, hardware configurations, and community forums dedicated to supporting self-hosting enthusiasts.
While several commenters express agreement with the article's premise about the importance of digital autonomy, there's a noticeable thread of pragmatism throughout the discussion. The challenges and complexities of self-hosting are acknowledged, and the conversation evolves into a more balanced consideration of the pros and cons involved. The comments don't necessarily refute the article's central argument but rather provide a realistic context for evaluating the feasibility and implications of self-hosting in the present day.