Language Selection

English French German Italian Portuguese Spanish

Are App Stores Liable for Open Source Software Compliance?

Filed under
OSS

The use of open source software enables application developers to build better applications more efficiently and cost effectively. Yet, open source license compliance in the app store setting can be a bit puzzling.

About a year and a half ago, there was a stir when GNU Go was removed by Apple from its App Store. The game, licensed under the GNU General Public License version 2 (GPL v2), was available for download on the App Store. The Free Software Foundation (FSF) contacted Apple and the developer who submitted the game to the App Store regarding non-compliance with the GPL v2, noting that the developer failed to provide the source code and Apple was in violation of the license as well. The FSF also provided a public explanation of its stance on its blog. Apple unceremoniously pulled the game from the App Store, thus eliminating the question of non-compliance. The focus of the discussion centered around restrictive terms in the App Store terms of service that conflicted with the GPL v2, section 6 which prohibits any further restrictions on the rights granted by the GPL v2 to recipient of the software.

What fascinated me about this controversy was the lack of focus on the other key requirements of the license.

Rest here




More in Tux Machines

Interview with FreeDOS Founder and Lead Dev Jim Hall

It’s been 23 years to the FreeDOS project. FreeDOS founder Jim Hall shares some interesting insight into this veteran open source project. Read more

Programming and howtos: Python, Swift and Recipes

Security: Updates, Intel, Torvalds

  • Security updates for Tuesday
  • Intel: We've found severe bugs in secretive Management Engine, affecting millions
    Thanks to an investigation by third-party researchers into Intel's hidden firmware in certain chips, Intel decided to audit its firmware and on Monday confirmed it had found 11 severe bugs that affect millions of computers and servers. The flaws affect Management Engine (ME), Trusted Execution Engine (TXE), and Server Platform Services (SPS).
  • Open Source Security Podcast: Episode 71 - GitHub's Security Scanner
    Josh and Kurt talk about GitHub's security scanner and Linus' security email. We clarify the esoteric difference between security bugs and non security bugs.
  • Linus Torvalds 'sorry' for swearing, blames popularity of Linux itself
    Linux overlord Linus Torvalds has apologised – a bit – for calling some security-centric kernel contributors “f*cking morons”. Torvalds unleashed a profanity-laden rant at Google developer Kees Cook, over the latter's proposal to harden the kernel. Another Google security chap, Matthew Garret, asked Torvalds “ Can you clarify a little with regard to how you'd have liked this patchset to look?” To which Torvalds responded that “I think the actual status of the patches is fairly good with the default warning.”

Benchmarks: Linux Power Use, Sabrent EC-SS31, Phoronix Test Suite 7.6 M3