Google's 'clean' Linux headers: Are they really that dirty?

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
The trouble with open source is that most coders aren't lawyers and most lawyers aren't coders. And even if everyone did wear both hats, there would still be ample room for disagreement. The law, you must remember, is subjective.

Two intellectual-property lawyers have told the world that Android is at risk of legal attack because it uses Googly versions of the original Linux header files. But Linux daddy Linus Torvalds says this is "totally bogus". The truth lies somewhere in between. But good luck finding it.

Earlier this month, Edward Naughton, an intellectual-property attorney with the Boston-based firm Brown Rudnick, penned a piece for the Huffington Post in which he argued that Google's use of the original Linux "header files" in Android made the OS vulnerable under US copyright law. "Google's Android contains legal landmines for developers and device manufacturers," the headline read.

According to Naughton, when building Android's Bionic library – which provides application developers with access to Android's underlying Linux kernel – Google stretched the boundaries of copyright law by making use of the Linux header files open sourced under the GNU Public License (GPLv2), which has a strong copyleft provision. Google stripped programmer commentary and other information from the files, arguing that these "cleaned" files are no longer subject to copyright. Then, as part of Android, it open sourced the files under a license with no copyleft provision. But Naughton contends that the GPL may still apply .

More details - link
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top