logo

drewdevault.com

[mirror] blog and personal website of Drew DeVault git clone https://hacktivis.me/git/mirror/drewdevault.com.git

On-real-names.md (5742B)


  1. ---
  2. title: On "real name" policies
  3. date: 2023-10-31
  4. ---
  5. Some free software projects reject anonymous or pseudonymous contributions,
  6. requiring you to author patches using your "real name". Such projects have a
  7. so-called "real name" policy; Linux is one well-known example.[^1]
  8. [^1]: A [change to Linux policy][1] earlier this year refines their approach to
  9. alleviate the concerns raised in this article.
  10. [1]: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d4563201f33a022fc0353033d9dfeb1606a88330
  11. The root motivations behind such policies vary, but in my experience the most
  12. often cited rationale is that it's important to establish the provenance of the
  13. contribution for copyright reasons. In the case of Linux, contributors are asked
  14. to "sign-off" their commits to indicate their agreement to the terms of the
  15. Developer Certificate of Origin (DCO), which includes clauses like the
  16. following:
  17. > The contribution was created in whole or in part by me and I have the right to
  18. > submit it under the open source license indicated in the file.
  19. To some extent, the DCO serves as a legal assertion of copyright and an
  20. agreement to license a work under given copyright terms (GPLv2 in the case of
  21. Linux). This record also means that the author of the code is accountable in
  22. case the copyright is challenged; in the case of an anonymous or pseudonymous
  23. contributor you're shit out of luck. At that point, liability over the
  24. disagreement would likely fall into the hands of the maintainer that accepted
  25. the contribution. It is reasonable for a maintainer to ask a contributor to
  26. assert their copyright and accept liability over the provenance of their code in
  27. a legally meaningful and accountable form.
  28. The possibility that someone may have something useful to offer to a free
  29. software project, but is not comfortable disclosing their name for any number of
  30. reasons, is a reasonable supposition. A maintainer whose "real name" policy is
  31. challenged on this basis would also be reasonable in saying "I feel for you, but
  32. I cannot agree to accept legal liability over the provenance of this code,
  33. nor can I communicate that risk to end-users who acquire code under a license
  34. that may or may not be valid as such".
  35. "Real name" policies are controversial in the free software community. I open
  36. with this perspective in an attempt to cool down the room. Those who feel
  37. marginalized by "real name" policies often skew young, and many treat matters
  38. such as copyright and licensing with disdain. Moreover, the problem tends to
  39. inflame deeply hurtful sentiments and raise thorny matters of identity and
  40. discrimination, and it's easy to construe the intent of the policymakers as the
  41. intent to cause harm. The motivations behind these policies are reasonable.
  42. That said, intent or otherwise, these policies can cause harm. The profile of
  43. the contributor who is comfortable using their "real name" is likely to fall
  44. more narrowly into over-represented demographics in our community; enforcing a
  45. real-name policy will ostracize some people. Those with marginalized identities
  46. tend to be less comfortable with disclosing their "real name". Someone who has
  47. been subject to harassment may not be comfortable with this disclosure, since it
  48. offers more fuel to harassers keeping tabs on their activities. The use of a
  49. "real name" also confers a gender bias; avoiding a "real name" policy neatly
  50. eliminates discrimination on this basis. Of course, there are also many
  51. [falsehoods programmers believe about names][0] which can present in the
  52. implementation of such a policy.
  53. [0]: https://www.kalzumeus.com/2010/06/17/falsehoods-programmers-believe-about-names/
  54. There is also one particular problem which has been at the heart of conflict
  55. surrounding the use of "real-name" policies in free software: transgender
  56. identities. A transgender person is likely to change their name in the process
  57. of assuming their new identity. When this happens, their real name changes.
  58. However, it may or may not match their legal name -- some trans people opt to
  59. change it, others don't; if they do it is a process that takes time. Meanwhile,
  60. addressing a trans person by their old name, or "deadname", is highly
  61. uncomfortable. Doing so deliberately, as a matter of policy or otherwise, is a
  62. form of discrimination. Many trans people experience deliberate "deadnaming" as
  63. a form of harassment in their daily lives, and institutionalizing this behavior
  64. is cruel.
  65. The truth is, managing the names of participants is more challenging than anyone
  66. would like. On the one hand, names establish accountability and facilitate
  67. collaboration, and importantly, credit the authors of a work for services
  68. performed. On the other hand, names are highly personal and deeply affecting,
  69. and their usage and changes over time are the subject of important consideration
  70. at the discretion of their owner. A complicating factor is that handling names
  71. properly introduces technical problems which must be overcome.
  72. To embrace the advantages of "real name" policies -- establishing provenance,
  73. encouraging accountability, fostering a social environment -- without causing
  74. harm, the approach I have settled on for my projects is to use the DCO to
  75. establish provenance and encourage contributors to sign-off and participate
  76. under the identity they feel most comfortable with. I encourage people to
  77. utilize an identity they use beyond the project's walls, to foster a social
  78. environment and a connection to the broader community, to establish
  79. accountability, and to ensure that participants are reachable for further
  80. discussion on their work. If a contributor's identity changes, we make every
  81. effort to support this change in contemporary, future, and historical use.