Won't work. MS would immediately report the true amount of new code in the
protected stuff includes 90% of the code in the old stuff, and therefore still
protected. The 10% of unprotected stuff would be the interfaceing code already
released (system calls, include files, library calls ...) plus a few drivers
for hardware no longer available. And removed comments...
> The advantages to Microsoft are that this approach leaves them as the
> pilot of thier own compromised ship, the sole architects of all thier own
> products, the sole judge of what should be in a Microsoft OS and what
> shouldn't, and otherwise spares them from government micromanagement.
> Government involvement would be very limited, stating what is and is not
> bundled. For example, MSN-related client software is bundled and
> compromisable, the MSN network itself isn't. Et cetera. This leaves them
> free to be thier rusticly charming proprietary selves vis-a-vis the
> products they have not yet bundled into Windows, such as (last I heard,)
> Office, which reflects the idea that the operating system has
> public-interest aspects that ancillary products may not. Thus Internet
> Explorer and so on would be subject to compromise in due time.
-------------------------------------------------------------------------
Jesse I Pollard, II
Email: pollard@navo.hpc.mil
Any opinions expressed are solely my own.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/