Our Priorities
We judge the products and services we use, recommend, and disrecommend based on compliance with the following priorities.
Freely Shared and Freely Accessed
We prioritize supporting projects and products that are released openly and freely, or under licenses that encourage collaboration and access.
(F)OSS Software
Note: "FOSS" refers to Free as in Speech, not Beer and/or Open-Source software.
| Ideal | Software is distributed under an Open Source Initiative approved license. |
|---|---|
| Acceptable | Software is released as free binaries, or under a freeware license. Available under a license that allows you to view and/or use the source code, but not modify it. |
| Bad | Software is only available under restrictive licenses. Source code is not accessible. Most commercial software is not (F)OSS. Any software with DRM is not (F)OSS. |
Note: This site is not affiliated with or endorsed by the Open Source Initiative.
Public Domain or Creative Commons Data (Non-Software)
| Ideal | Data is in the public domain1 or distributed under a Creative Commons or equivalent license. |
|---|---|
| Acceptable | Data is available under freeware licenses or some non-restrictive paid licenses. |
| Bad | Data is distributed only under highly restrictive licenses. Access is limited via DRM. |
Open-Source Hardware
Note:"Hardware" refers to to physical items and other hardware products.
| Ideal | Hardware is not patented. Alternatively, hardware is licensed to be Free and/or Open Source, such as per the Open Source Hardware definition from the Open Source Hardware Association (OSHWA). Data necessary to recreate and use hardware is free, accessible, and available per the Free Data metrics and the Free Software metrics |
|---|---|
| Acceptable | Hardware is partially proprietary. It is possible to access information about its contents, manufacturing methods, maintenance processes, and the software needed for its use is available, either for free or for purchase at a reasonable price. |
| Bad | Hardware is proprietary. Patent holder may aggressively litigate its patent protections. Information about the hardware's contents, manufacturing methods, and maintenance processes are unavailable to users or available only at high cost or under highly restrictive licenses. The software needed to use the hardware is controlled via DRM, unavailable to users, or distributed under highly restrictive licenses. |
User Ownership and Control
We prioritize the user having ownership of the software and hardware that they use, and the ability to customize the settings and abilities of the products that they use. Additionally, we prioritize the user having control over the types and amount of data they share with service providers.
Digital Product Ownership
Note:"Digital Products" refers to to products that are data-based rather than hardware-based or service-based. These products may be provided to the user on a physical medium such as a flash drive or a disc, or via download.
Examples include an MP3 player with music, videos from YouTube, a video game from Steam or on a CD, computer apps that you downloaded from the Microsoft Store, photos on an SD drive or in the cloud, or text from an eBook or in PDF format.
The data is digital product, not the medium on which it is provided. The following metrics apply to digital products regardless of their transfer medium.
| Ideal | The user owns the digital product. They are able to freely give, loan, sell, trade, or modify their instance of the product at will. For example: buying a DVD, loaning it to your friend, and then selling it at a garage sale. You should be able to do the same with a product you download, just as easily. |
|---|---|
| Acceptable | The user has a perpetual license for software products. The user can transfer the data between their own devices (e.g. moving software or music from one computer to another) at will. The user can change the format of the data at will (e.g. ripping audio from a movie, printing out an ebook). Importantly, the user must be able to access or create a version of the product that the distributor does not have access to and cannot take away. |
| Bad | The user's access to the product is limited via DRM or other means. The distributor has the ability to remove the user's access to the product. Alternatively, the product is not a service, yet is only available via a subscription (i.e., the user's access to the product does not cause ongoing costs to the distributor that would justify charging a subscription, or the ongoing costs to the distributor are DRM-related or otherwise self-inflicted). |
Personal Data Control
| Ideal | No data exits the user's home network. Software that needs user data can be self-hosted. Companies providing services or software do not request or collect user data. |
|---|---|
| Acceptable | Minimal data leaves the user's home network and is sent to external service providers. Any data sent to external providers is anonymized to the greatest degree possible. Users have the ability to control what data is sent to external providers. |
| Bad | External providers require more data from the user than is necessary to provide the service. Data that is sent to external providers is not anonymized. Users do not have the ability to limit data sent to external providers. |
Hardware Ownership
| Ideal | Hardware is owned by the user. User can freely give, sell, loan, trade, repair, or modify the hardware (within the limits of local law) |
|---|---|
| Acceptable | Hardware is leased to the user or otherwise provided by subscription. The lease or subscription does not have limitations on the usage of the hardware, and is overall beneficial to the user, both financially and practically. The ongoing nature of the subscription is is well-justified by ongoing non-hardware services such as technical support, high-priority repair services, and/or free supplies. The total cost of the subscription over the lifetime of the hardware is less than the cost of the hardware (including supplies provided during the subscription). |
| Bad | Hardware is leased to the user or otherwise provided by subscription. There is little or no service provided to the user to justify the lease or subscription, or the ongoing cost is exploitative. Alternatively, the user technically owns the hardware, but the allowed use of the hardware is limited by distributor. The distributor may use DRM to lock the device to a specific user and prevent resale, or to lock a feature behind a subscription - both of these practices may mean the hardware is nonfunctional if it does not have internet access. In other cases, identical hardware may be sold as two different models, at two different prices, with locked-down software deactivating some features for the lower priced model. In rare cases, the limitation on the hardware usage may be contractual, rather than practical. |
Right To Repair
| Ideal | Hardware is designed to be repairable at low cost and skill. All parts and tools required to repair the hardware are readily available from multiple suppliers and are non-proprietary. Instructions for repairs are free and easily accessible. |
|---|---|
| Acceptable | Hardware is mostly repairable, but may require equipment, tools, or knowledge that laypeople do not usually have. Independent hardware repair does not void the manufacturer's warranty. The design may include some proprietary parts which are available at reasonable prices from the manufacturer, and which have alternatives available from vendors other than the manufacturer or distributor. Low-cost or expendable hardware might be unrepairable, but must be available at a low cost from multiple suppliers, or available for replacement for free or at-cost from the manufacturer or distributor. |
| Bad | Hardware is intentionally designed to not be repairable (e.g. parts are glued or welded), or is designed for repairs to require specialty tools and equipment (e.g., brand-specific security screws). Repairs may only be performed by authorized repair facilities (e.g. unauthorized repairs void the device warranty), using proprietary parts (e.g. unregistered serial numbers on replacement parts lead to arbitrary features of the device being disabled). The manufacturer or distributor actively fights customers' right to repair their hardware. |
-
Public Domain data may have become public domain by being categorically ineligible for copyright, by entering public domain due to age or lawsuit, or by being dedicated to the public domain by its creator(s). ↩