You are on page 1of 272

Software livre, cultura hacker e o ecossistema da colaboração • 

 • Software livre, cultura hacker e o ecossistema da colaboração

Software livre, cultura


hacker e ecossistema
da colaboração

Anderson Fernandes de Alencar


Murilo Bansi Machado
Rafael Evangelista
Sergio Amadeu da Silveira
Vicente Macedo de Aguiar (Org)

Dados Internacionais de Catalogação na Publicação (CIP)


Biblioteca Prof. José Geraldo Vieira

S664

Software livre, cultura hacker e o ecossistema da colaboração /


organização Vicente Macedo de Aguiar ; ilustrações
Murilo Machado. -- São Paulo: Momento Editorial, 2009.

Vários autores.
ISBN 978-85-62080-03-6

1. Ciência da computação 2. Software livre 3. Cultura


hacker 4. Ecossistema da colaboração I. Aguiar, Vicente
Macedo de II. Machado, Murilo

CDD 005.1
Software livre, cultura hacker e o ecossistema da colaboração • 

Conteúdo licenciado pela Creative Atribuição-Compartilhamento pela Licença 2.5 Brasil Com-
mons. Essa licença permite copiar, distribuir, exibir e criar obras derivadas sobre esta obra.
As novas obras devem conter menção aos autores nos créditos, porém as obras derivadas
precisam ser licenciadas sob os mesmos termos dessa licença.

Software livre, cultura hacker e


ecossistema da colaboração

Revisão
Karina Bersan Rocha

Diagramação
Murilo Bansi Machado

Capa
Aurélio A. Heckert

Anderson Fernandes de Alencar


Murilo Bansi Machado
Rafael Evangelista
Sergio Amadeu da Silveira
Vicente Macedo de Aguiar (Org)

Momento Editorial
2009
 • Software livre, cultura hacker e o ecossistema da colaboração

“Se você tem uma maçã e eu tenho uma


maçã, e nós trocamos as maçãs, então
você e eu ainda teremos uma maçã. Mas
se você tem uma idéia e eu tenho uma
idéia, e nós trocamos essas idéias, então
cada um de nós terá duas idéias”

George Bernard Shaw


Software livre, cultura hacker e o ecossistema da colaboração • 

Sumário

7
Introdução
Vicente Macedo de Aguiar
$JrQHVHGRIHQ{PHQRGRVVRIWZDUHVOLYUHVƒ2VKDFNHUV

15
Distros e comunidades: a dinâmica interna de
Debian, Fedora, Slackware e Ubuntu
Murilo Bansi Machado
%UHYHKLVWyULFRHFDUDFWHUtVWLFDVJHUDLVGDVGLVWULEXLo}HVƒ'LQkPLFDLQWHUQD
GDVGLVWULEXLo}HVƒ%DUUHLUDGHHQWUDGDHSURFHVVRGHUHFUXWDPHQWRGHQRYRV
FRODERUDGRUHVƒ2SRUWDYR]GDVFRPXQLGDGHVƒ$FRPXQLFDomRLQWHUQDH
H[WHUQDƒ+LHUDUTXLDVHUHODo}HVGHSRGHUƒ2SHVRGRWUDEDOKREUDVLOHLURIUHQWH
jFRPXQLGDGHLQWHUQDFLRQDOƒ2WHPSRGHGLFDGRjFRODERUDomRƒ2FRQFHLWRGH
³OLEHUGDGH´VREDyWLFDGHDOJXPDVFRPXQLGDGHV

39
Software Livre e a Perspectiva da Dádiva: uma análise sobre a
produção colaborativa no projeto GNOME
Vicente Macedo de Aguiar
2VXUJLPHQWRGRSURMHWR*120(ƒ23URMHWR*120(HRPRGHORFRODERUDWLYRGH
SURGXomRHQWUHSDUHVƒ3ODQHMDQGRRHQUHGRGHXPDQRYDYHUVmRƒ3HUVSHFWLYDGD
'iGLYDHR3URMHWR*120(ƒ$GiGLYDFRPRIHQ{PHQRDQWURSROyJLFRƒ2*120(
HDGiGLYDPHGLDGDSRUFRPSXWDGRUƒ&RQVLGHUDo}HV¿QDLV
VREUHHVVD³FRPXQLGDGHDWXDO´

79
Política e Linguagem nos debates sobre software livre
Rafael Evangelista
$FRQWULEXLomRGDVFLrQFLDVGDOLQJXDJHPƒ6XMHLWRLGHRORJLDHVHQWLGRƒ'XDV
OLFHQoDVGLIHUHQWHVUHVWULo}HVƒ$UHOHYkQFLDGDVOLFHQoDVƒ1DVOLFHQoDVDV
GLIHUHQoDVƒ0DLVUHVWULo}HVƒ*18/LQX[RX/LQX["ƒ6RIWZDUHOLYUHRXFyGLJR
DEHUWR"ƒ'XDVFRUUHQWHV$PHVPDOXWD"ƒ6RIWZDUHOLYUHFHUYHMDJUiWLVH
OLEHUGDGHGHH[SUHVVmRƒ6RIWZDUHOLYUHQDSHULIHULDGRVLVWHPDƒ2SURMHWRGH
3LQKHLURHRVDSHQVDGRVƒ2SURMHWRGR3HUXƒ'RLVPRPHQWRVQR
%UDVLOƒ&RPSDUWLOKDQGRWH[WRV
 • Software livre, cultura hacker e o ecossistema da colaboração

151
A tecnologia na obra de Álvaro Vieira Pinto e Paulo Freire
Anderson Fernandes de Alencar
ÈOYDUR9LHLUD3LQWRXPROKDUUHÀH[LYRHULJRURVRƒ2FRQFHLWRGHWpFQLFDH
WHFQRORJLDƒ$VGLYHUVDVDWLWXGHVIUHQWHjWHFQRORJLDƒ$GHSHQGrQFLDDXWRQRPLD
WHFQROyJLFDHDWHFQRORJLDFRPRSDWULP{QLRGDKXPDQLGDGHƒ3DXOR)UHLUHXP
ROKDURWLPLVWDFXULRVRHFUtWLFRƒ3RUXPDSUi[LVWHFQROyJLFDƒ$WHFQRORJLDD
VHUYLoRGHTXHLQWHUHVVHV"ƒ(PGHIHVDGHXPDFRQFHSomRGHLQIRLQFOXVmRƒ
&RQVLGHUDo}HV¿QDLV3DXOR)UHLUHHR
movimento do software livre

189
Mobilização colaborativa, cultura hacker e a
teoria da propriedade imaterial
Sergio Amadeu da Silveira
8PDEUHYHLQWURGXomRjTXHVWmRGDSURSULHGDGHHGDOLEHUGDGHƒ2PRGHORGH
SURSULHGDGHGHEHQVWDQJtYHLVHRPRQRSyOLRGRVRIWZDUHƒ&HQiULRVGRFRQIURQWR
HQWUHIRUoDVGRFRPSDUWLOKDPHQWRHGREORTXHLRGRFRQKHFLPHQWRWHFQROyJLFRƒ
(OHPHQWRVSDUDXPDWHRULDGDSURSULHGDGHGHEHQVQmRHVFDVVRVƒ&RPXQLGDGHV
WHFQROyJLFDVPRYLPHQWRVVyFLRWpFQLFRVHHVIHUDS~EOLFDƒ
3ROtWLFDSyVFDSLWDOLVWDGRVEHQVDQWLULYDLV"

271
Debates e discussões interativas
Software livre, cultura hacker e o ecossistema da colaboração • 

Introdução

A civilização do século XXI está cada vez mais conectada. As tecnologias


da informação, a exemplo da Internet, estão se tornando uma espécie de “tecido
digital” do cotidiano da vida humana. Assim, cada vez mais a rede mundial
GH FRPSXWDGRUHV VH D¿UPD FRPR D EDVH WHFQROyJLFD SDUD D FRQVWLWXLomR GH
DJUXSDPHQWRV H RUJDQL]Do}HV VRFLDLV TXH DFDEDP SRU LPSDFWDU GLUHWDPHQWH D
dinâmica econômica, política e cultural do mundo moderno. Esse contexto atual de
UHODo}HV HQWUH WHFQRORJLD H SURGXomR VRFLDO DFDED HQWmR VH WRUQDQGR XP FDPSR
IpUWLOSDUDHVWXGRVHSHVTXLVDVFLHQWt¿FDV0XLWRVVmRRVWUDEDOKRVDFDGrPLFRVTXH
VH GHEUXoDP VREUH R WHPD SDUD WHQWDU FRPSUHHQGHU HVVD UHDOLGDGH GH LQWHQVDV
transformações que anunciam até mesmo a superação da era industrial por uma
³LQIRUPDFLRQDO´HPTXHLPSHUDDHFRQRPLDGRVEHQVGLJLWDOL]DGRV
 1R HQWDQWR GR SRQWR GH YLVWD GDV FLrQFLDV KXPDQDV SRXFRV DLQGD VmR
os estudos que procuram analisar a singularidade de um fenômeno que está
diretamente ligado a esse contexto de conectividade e que, ao mesmo tempo,
SRGHVHUFRQVLGHUDGRFRPRXPGRVFDWDOL]DGRUHVGHERDSDUWHGRVSURFHVVRVGH
mudanças ligados ao mundo digital: os denominados softwares livres. Em outras
SDODYUDV SRGHVH GL]HU TXH WRGR R HFRVVLVWHPD FRODERUDWLYR UHODFLRQDGR jV
comunidades e aos projetos que estão voltados para o uso, o desenvolvimento e a
GLVWULEXLomRGHVRIWZDUHVFODVVL¿FDGRVFRPR³OLYUHV´HQFRQWUDPVHIRUDGDSDXWDGH
GLVFXVV}HVHSHVTXLVDVDFDGrPLFDV3RUHVVDUD]mRSRXFRDLQGDVHVDEHVREUHD
UHDOLGDGHGDVFRPXQLGDGHVGHVRIWZDUHOLYUHVLWXDGDVQRFLEHUHVSDoRTXHPXLWDV
YH]HV VmR UHVSRQViYHLV SRU GH¿QLU RV UXPRV H SDGU}HV WHFQROyJLFRV GD SUySULD
VRFLHGDGHHPUHGH$OpPGLVVRDpWLFDRWUDEDOKRDFXOWXUDDLGHRORJLDHDOyJLFD
HFRQ{PLFDGRVVXMHLWRVTXHLQWHUDJHPQHVVHDPELHQWHGLJLWDODFDEDPGDPHVPD
forma, sendo marginalizados e pouco compreendidos.
 • Software livre, cultura hacker e o ecossistema da colaboração

Assim, em vez de fechar os olhos para essa realidade (social) singular que
VHDSUHVHQWDSURS}HVH³TXHWHQWHPRVHQWHQGrODSRLVDYHUGDGHLUDTXHVWmRQmR
é ser contra ou a favor, mas sim reconhecer as mudanças qualitativas na ecologia
GRV VLJQRV QR DPELHQWH LQpGLWR TXH UHVXOWD GD H[WHQVmR GDV QRYDV UHGHV GH
FRPXQLFDomR SDUD D YLGD VRFLDO H FXOWXUDO´ ± FRPR WmR EHP RULHQWD 3LHUUH /pY\
 3DUWLQGRGHVVDSHUVSHFWLYDHVWHOLYURYLVDRIHUHFHUXPDSHTXHQDSDUFHOD
GHFRQWULEXLomRQRHQWHQGLPHQWRVREUHRIHQ{PHQRVRFLDOHDVPXGDQoDVSROtWLFDV
UHODFLRQDGRVDRVRIWZDUHOLYUH3DUDWDQWRHOHpFRPSRVWRSRUXPDFROHWkQHDGH
DUWLJRVHODERUDGRVDSDUWLUGHHVWXGRVDFDGrPLFRVGHGLYHUVDViUHDVGDVFLrQFLDV
humanas, que foram desenvolvidos em diferentes universidades e centros de
SHVTXLVDGR%UDVLOPDVTXHWrPHPFRPXPRPHVPRREMHWRGHDQiOLVHDWHPiWLFD
do Software livre, Cultura hacker e o ecossistema da colaboração.
 3DUWLQGR GH WDO FRQFHSomR QD SULPHLUD VHomR GHVWH OLYUR 0XULOR %DQVL
0DFKDGR DSUHVHQWD XP DUWLJR TXH IRL UHVXOWDGR GH XPD SHVTXLVD GH LQLFLDomR
FLHQWt¿FDUHDOL]DGDQRDQRGHMXQWRDR&HQWUR,QWHUGLVFLSOLQDUGH3HVTXLVDGD
)DFXOGDGH&iVSHU/tEHURTXHDERUGDDTXHVWmRGDGLQkPLFDGDVFRPXQLGDGHVGH
VRIWZDUHOLYUHTXHGmRYLGDDGLIHUHQWHVSURMHWRVGHGLVWULEXLo}HVGRVLVWHPDRSH
UDFLRQDO *18/LQX[ &RP R WtWXOR Distros e comunidades: a dinâmica interna de
Debian, Fedora, Slackware e Ubuntu, é apresentada pelo autor uma análise com­
parativa entre tais comunidades on-line, em que são explorados elementos con­
siderados fundamentais para compreender a dinâmica interna de cada uma delas
como, por exemplo, as formas de comunicação, as relações de poder, o período de
FRODERUDomRGRVPHPEURVFRPRVSURMHWRVHQWUHRXWUDVTXHVW}HV
 1D VHomR VXEVHTXHQWH 9LFHQWH 0DFrGR GH $JXLDU Gi FRQWLQXLGDGH DR
HQWHQGLPHQWR VREUH D UHDOLGDGH GDV FRPXQLGDGHV GH VRIWZDUH OLYUH WUD]HQGR RV
UHVXOWDGRV GH XPD SHVTXLVD QHWQRJUi¿FD UHDOL]DGD QR SHUtRGR GH GH]HPEUR GH
DIHYHUHLURGHSHORDXWRUQR1~FOHRGH3yV*UDGXDomRHP$GPLQLVWUDomR
GD (VFROD GH$GPLQLVWUDomR 13*$  GD 8QLYHUVLGDGH )HGHUDO GD %DKLD 8)%$ 
(VVD SHVTXLVD EXVFRX DQDOLVDU DV HVSHFL¿FLGDGHV GD GLQkPLFD GH WUDEDOKR GRV
KDFNHUVQRSURFHVVRGHSURGXomRFRODERUDWLYRHQmRFRQWUDWXDOSUHVHQWHQDFRPX
nidade on-line OLJDGD DR 3URMHWR *120( 3DUD WDQWR R DUWLJR Software Livre e a
Perspectiva da Dádiva: uma análise sobre o trabalho e a produção colaborativa no
Projeto GNOMEDQDOLVDFRPRVHPDQLIHVWDDRUJDQL]DomRHDGLQkPLFDGRWUDEDOKR
TXH LPSXOVLRQD R SURFHVVR GH GHVHQYROYLPHQWR GH VRIWZDUH QHVVH SURMHWR FRPR
WDPEpPpH[DPLQDGDDQDWXUH]DGHVVHWUDEDOKRFRODERUDWLYRDGRWDGRSHORVKDFNHUV
nessa comunidade.
$SyV HVVD DQiOLVH PDLV HPStULFD GDV FRPXQLGDGHV GH VRIWZDUH OLYUH
Rafael Evangelista apresenta um artigo intitulado Política e Linguagem nos debates
Software livre, cultura hacker e o ecossistema da colaboração • 

sobre o software livre)UXWRGHXPDGLVVHUWDomRGH0HVWUDGRHP/LQJXtVWLFDTXH


IRLGHIHQGLGDHPQD8QLYHUVLGDGH(VWDGXDOGH&DPSLQDV 81,&$03 HVVH
DUWLJRSURFXUDUHÀHWLUGLVFXUVLYDPHQWHVREUHRVGHEDWHVTXHWUDWDPGDVYDQWDJHQV
e desvantagens da adoção de sistemas livres em computadores. A partir de uma
concepção que considera que o acontecimento de linguagem é um acontecimento
SROtWLFRSURFXUDVHHQWHQGHUFRPRHRQGHRSROtWLFRVHLQVFUHYHQHVVHGHEDWH3RU
LVVRRDXWRUHVWDEHOHFHXPDUHÀH[mRVREUHRXVRGHFHUWRVWHUPRVHQRPHV ³*18
/LQX[´ ³VRIWZDUH OLYUH´  H QmR RXWURV ³/LQX[´ ³FyGLJR DEHUWR´  QD UHIHUrQFLD DRV
REMHWRVGRGHEDWHLQYHVWLJDQGRDKLVWyULDGRVVHQWLGRVDHOHVDWULEXtGRV
Na quarta seção deste livro, Anderson Fernandes de Alencar traz, dentro
GHXPGHEDWHPDLVFRQFHLWXDOXPDUHÀH[mRVREUHA Tecnologia na obra de Álvaro
Vieira Pinto e Paulo Freire, como resultado de uma dissertação de mestrado, defen­
GLGD HP  QD )DFXOGDGH GH (GXFDomR GD 8QLYHUVLGDGH GH 6mR 3DXOR 863 
&RPHVVHDUWLJRRDXWRUEXVFDUHÀHWLUDFHUFDGHXPDPHWRGRORJLDGHPLJUDomRGR
VRIWZDUHSURSULHWiULRSDUDRVRIWZDUHOLYUHTXHFRQWHPSOHHOHPHQWRVGRSHQVDPHQWR
GR¿OyVRIRÈOYDUR9LHLUD3LQWRHGRHGXFDGRU3DXOR)UHLUHEXVFDQGRDLQGDDSUHVHQWDU
HOHPHQWRV WHyULFRSUiWLFRV UHOHYDQWHV SDUD D FRQVWLWXLomR GH XPD ³3HGDJRJLD GD
0LJUDomR´
 7HQGRFRPRREMHWRGHDQiOLVHRPRYLPHQWRGHGHVHQYROYLPHQWRHXVRGR
VRIWZDUHOLYUHMXQWDPHQWHFRPDGLVSXWDSROtWLFDHHFRQ{PLFDFRPRVEHQH¿FLiULRV
GR PRGHOR KHJHP{QLFR GH SURSULHGDGH GH VRIWZDUH 6pUJLR $PDGHX GD 6LOYHLUD
apresenta um artigo intitulado Mobilização Colaborativa, Cultura Hacker e a Teoria
da Propriedade Imaterial(VVHDUWLJRWUD]RVUHVXOWDGRVGRHVWXGRDFDGrPLFRTXH
IXQGDPHQWRXVXDWHVHGH'RXWRUDGRHP&LrQFLD3ROtWLFDGHIHQGLGDQD8QLYHUVLGDGH
GH6mR3DXOR 863 HP(OHYLVDWUD]HURVSULQFLSDLVSRQWRVDERUGDGRVVREUH
RSUREOHPDGDIRUPXODomRGHXPDWHRULDSROtWLFDGDSURSULHGDGHGHEHQVLPDWHULDLV
no contexto de uma sociedade informacional e em rede.
 1R~OWLPRFDStWXORGHVWHOLYURROHLWRUpFRQYLGDGRDFRODERUDUQDFRQWLQXDomR
GHVVDVSHVTXLVDVSRUPHLRGHXPDPELHQWHLQWHUDWLYRQD,QWHUQHWRQGHHOHSRGHUi
DFUHVFHQWDUQRYDVLQIRUPDo}HVHFRQWULEXLo}HVVREUHRVWHPDVDERUGDGRVFRPR
WDPEpP SDUWLFLSDU GH GHEDWHV DVVtQFURQRV  FRP RV DXWRUHV VREUH R FRQWH~GR
apresentado ao longo de todos os artigos.

A gênese do fenômeno dos softwares livres

3DUD PHOKRU FRPSUHHQGHU DV WHPiWLFDV DERUGDGDV QRV GLIHUHQWHV DUWLJRV


apresentados, este livro parte do pressuposto de que se faz necessário para o
10 • Software livre, cultura hacker e o ecossistema da colaboração

OHLWRUFRQKHFHUSDUWHGDJrQHVHGRPRYLPHQWRSHORVRIWZDUHOLYUHTXHVXUJHDSDUWLU
GDGpFDGDGH3DUDRVRFLyORJR0DQXHO&DVWHOOV  DWpHVVDpSRFDDV
DVSLUDo}HVGHJUDQGHSDUWHGRVWHFQyORJRVFRPSXWDFLRQDLVVHGLUHFLRQDYDPSDUDD
H[SDQVmRGDIURQWHLUDGR³PXQGRGRVELWV´SRUPHLRGRGHVHQYROYLPHQWRFRODERUDWLYR
de um sistema operacional capaz de rodar em todos os tipos de computadores
H DR PHVPR WHPSR FRQHFWDU RV VHUYLGRUHV j ,QWHUQHW 2 VLVWHPD RSHUDFLRQDO
81,;SURSRUFLRQDYDHVVDVFRQGLo}HVGHQWURGHXPDPELHQWHGHDOWDFRODERUDomR
WHFQROyJLFD(ODERUDGRSRU.HQ7KRPSVRQGR/DERUDWyULR%HOOVHPR81,;
WHYHVHXFyGLJRIRQWHGLVSRQLELOL]DGRQRVHXSURFHVVRGHGHVHQYROYLPHQWRLQLFLDO
 (VVD FRQGLomR GH DEHUWXUD SRVVLELOLWRX TXH RXWURV FHQWURV GH SHVTXLVDV
como, por exemplo, o Computer System Research Group, da Universidade Ber­
NHOH\ QD &DOLIyUQLD DSHUIHLoRDVVHP HVVH VLVWHPD$VVLP QR ¿QDO GD GpFDGD GH
DOpPGHH[SDQGLUD,QWHUQHWSRUPHLRGRSURMHWRGHVXSRUWH81,;SDUDRVSUR
WRFRORVGD$USDQHWHGD8VHQHWDRPHVPRWHPSRHVWXGDQWHVGH%HUNHOH\FULDUDP
o que foi considerado o mais avançado sistema operacional da época: o Berkeley
Software Distribution (BSD). ³281,;WRUQRXVHXPDPELHQWHGHVRIWZDUHSDUDWRGR
WLSR GH VLVWHPD OLEHUWDQGR DVVLP RV SURJUDPDGRUHV GD QHFHVVLGDGH GH LQYHQWDU
OLQJXDJHQV HVSHFt¿FDV SDUD FDGD PiTXLQD R VRIWZDUH WRUQRXVH SRUWiWLO R TXH
permitiu a comunicação entre computadores e programação de computador cumu­
ODWLYD´ &DVWHOOV 
 'HQWURGHVVHFRQWH[WRGHFRODERUDomRWHFQROyJLFD³DDomRSUHSRQGHUDQWH
GRVKDFNHUV WHFQyORJRV  GHV RUJDQL]DGDHPWRUQRGD,QWHUQHWHDWpHVVHPRPHQWR
DPSODPHQWHLGHQWL¿FDGDFRPDFXOWXUDWpFQLFDGR81,;QmRVHSUHRFXSDYDFRP
VHUYLoRV FRPHUFLDLV (OHV TXHULDP PHOKRUHV IHUUDPHQWDV H PDLV ,QWHUQHW H 3&V
EDUDWRV GH  ELWV SURPHWHQGR S{U XPD FRLVD H RXWUD DR DOFDQFH GH WRGRV´
5D\PRQGapud&DVWHOOV $VVLPRPRYLPHQWRGRVRIWZDUHOLYUHFRPRXP
PRYLPHQWRSROtWLFRGHEDVHWHFQROyJLFDHPHUJHHPTXDQGRXPSURJUDPDGRU
GR/DERUDWyULRGH,QWHOLJrQFLD$UWL¿FLDOGR0,7QRV(8$R5LFKDUG6WDOOPDQUHD
JH j GHFLVmR FRPHUFLDO GD $7 7 GH UHLYLQGLFDU GLUHLWRV GH SURSULHGDGH1 VREUH R
VLVWHPDRSHUDFLRQDO81,;IHFKDQGRHQWmRRVHXFyGLJRIRQWH6WDOOPDQMXQWRFRP
um grupo de programadores, lançou­se nesse momento no árduo processo de
GHVHQYROYLPHQWRGHRXWURVLVWHPDRSHUDFLRQDOLQVSLUDGRQR81,;TXHIRLEDWL]DGR
com a sigla GNU (um acrônimo recursivo para “GNU is Not Unix”).
 &RQFRPLWDQWHPHQWH DR GHVHQYROYLPHQWR GHVVH VLVWHPD 6WDOOPDQ FULRX D
5HLYLQGLFDUGLUHLWRVGHSURSULHGDGHVREUHXPVRIWZDUHVLJQL¿FDWUDQVIRUPiORHPXPDPHUFDGRULD1HVVHSURFHVVR
XPXVXiULRDRSDJDUSDUDDGTXLULURGLUHLWRGHXVRGHXPGHWHUPLQDGRVRIWZDUHDFDEDQmRWHQGRDFHVVRDRFyGLJR
IRQWHGHVVHVLVWHPD¿FDQGRDVVLPLPSRVVLELOLWDGRGHPRGL¿FiORHFRPSDUWLOKiORSRVWHULRUPHQWH$VVLPDSHVDUGHVVD
DWLWXGHPHUFDGROyJLFDGD$77GHIHFKDURFyGLJRGR81,;WHUVLGRXPPDUFRQDFRPXQLGDGHKDFNHUQRDQRGH
HOHQmRIRLXPFDVRLVRODGR2DYDQoRGHVVDOyJLFDGHPHUFDGRQRVHWRUGHGHVHQYROYLPHQWRGHVRIWZDUHVVHGHX
SULQFLSDOPHQWHFRPDFULDomRGD0LFUR6RIW IXWXUDMicrosoft Corporation SRU%LOO*DWHVH3DXO$OOHQHPFRPR
REMHWLYRGHGHVHQYROYHUHFRPHUFLDOL]DULQWHUSUHWDGRUHVGDOLQJXDJHPGHSURJUDPDomR%$6,&
Software livre, cultura hacker e o ecossistema da colaboração • 11

Free Software Fundation (FSF) HIRLRSURWDJRQLVWDGDHODERUDomRGHXPDUFDERXoR


MXUtGLFRTXHJDUDQWLXDOpPGDDEHUWXUDGRFyGLJRIRQWHDSOHQDOLEHUGDGHGHXVR
DSHUIHLoRDPHQWRHGLVWULEXLomRGHVVDWHFQRORJLD±SURSRQGRDVVLPDVXEVWLWXLomR
GD OyJLFD GR copyright pelo “copyleft”. 2 VLVWHPD RSHUDFLRQDO *18 IRL HQWmR
GLVSRQLELOL]DGRQD5HGHVHJXQGRRVWHUPRVGD*3/ General Public License), tendo
RDSRLRGD)6)SDUDGDUVXVWHQWDELOLGDGHDHVVHSURMHWR
 1RHQWDQWRDSHVDUGHWHUFULDGRDVFRQGLo}HVSROtWLFDVIDYRUiYHLVjPDQX
WHQomRHDRGHVHQYROYLPHQWRGHVRIWZDUHVOLYUHVXPGRVVLVWHPDVFHQWUDLVGR3URMHWR
*18R.HUQHO HURDQmRIXQFLRQRXHIHWLYDPHQWHDWpRDQRGH6HJXQGR
&DVWHOOV   LVVR QmR RFRUUHX SRU LQFDSDFLGDGH WpFQLFD GH SURJUDPDomR ± Mi
TXH6WDOOPDQSRUH[HPSORpUHFRQKHFLGRFRPRXPGRVPDLRUHVSURJUDPDGRUHV
TXH SDVVDUDP SHOR 0,7 (VVD GHPRUD HP GHVHQYROYHU XP SURMHWR GH WDPDQKD
FRPSOH[LGDGHDFRQWHFHXHPGHFRUUrQFLDGRVKDFNHUVGRSURMHWR*18QmRWHUHP
SHUFHELGRDLQGDRSRGHUGHFRODERUDomRGD,QWHUQHW

³6y XPD UHGH GH FHQWHQDV GH PLOKDUHV GH FpUHEURV WUDEDOKDQGR
FRRSHUDWLYDPHQWHFRPGLYLVmRGRWUDEDOKRHVSRQWkQHDHFRRUGHQDomR
PDOHiYHOPDVH¿FLHQWHSRGHULDOHYDUDFDERDWDUHIDH[WUDRUGLQiULDGH
criar um sistema operacional capaz de lidar com a complexidade de
computadores cada vez mais potentes interagindo por meio da Internet”
&DVWHOOVS 

(QTXDQWR LVVR QD PHVPD GpFDGD GH  D PXOWLQDFLRQDO Microsoft co­
PHUFLDOL]RXHGLIXQGLXFRPDIRUoDGHXPPHUFDGRVHPFRQFRUUrQFLDXPVLVWHPD
RSHUDFLRQDO SURSULHWiULR LVWR p FRP R FyGLJRIRQWH IHFKDGR  PHVPR VHQGR
considerado tecnologicamente inferior. No entanto, pelo fato de ter uma interface
DSDUrQFLD DPLJiYHOHGHIiFLOPDQXVHLRSDUDXVXiULRV¿QDLVRVLVWHPDIHFKDGRGD
0LFURVRIWDWHQGHXDXPDGHPDQGDFDGDYH]PDLVFUHVFHQWHGHXVXiULRVFRPXQVGH
FRPSXWDGRUHV&RPRDOWHUQDWLYDDHVVHFRQWH[WRVXUJHHQWmRRVLVWHPDRSHUDFLRQDO
*18/LQX[TXHVHGHVHQYROYHDSDUWLUGRWUDEDOKRGH5LFKDUG6WDOOPDQ  PDV
FRPXPPpWRGRGHGHVHQYROYLPHQWRPDLVVXEYHUVLYRTXHRSUySULR3URMHWR*18
GHVFREHUWRPHLRTXHSRUDFDVRSHORHQWmRHVWXGDQWHGD8QLYHUVLGDGGHGH+HOVLQNL
GD)LQOkQGLD/LQXV7RUYDOGV
Copyleft pXPDFDUDFWHUtVWLFDDWULEXtGDDGHWHUPLQDGDVREUDVSXEOLFDGDVVREOLFHQoDVOLYUHVFRPRD*3/ *HQHUDO
3XEOLF /LFHQVH  RX DOJXPDV OLFHQoDV GD &UHDWLYH &RPPRQV ± TXH REULJDP TXH RXWURV GLVWULEXDP REUDV GHULYDGDV
VRPHQWHVREXPDOLFHQoD OLYUH LGrQWLFDDTXHUHJHDREUDRULJLQiULD1DSUiWLFDLVVRVLJQL¿FDTXHFDVRXPDHPSUHVD
GHVHQYROYDXPVRIWZDUHXVDQGRSHGDoRVGHFyGLJRVGHXPRXWURVLVWHPDOLYUHTXHDGRWDD*3/HVVHVRIWZDUHGHULYDGR
REUDGHULYDGD REULJDWRULDPHQWHWHPTXHXVDUWDPEpPD*3/FRPROLFHQoD
 6H XP VLVWHPD RSHUDFLRQDO p GHVFULWR FRPR XP FRQMXQWR GH SURJUDPDV H ³SDFRWHV´ TXH ID]HP XP FRPSXWDGRU
funcionar, o kernel é o mais importante “pacote” desse sistema. Isto porque o kernel realiza todas as operações mais
EiVLFDV SHUPLWLQGR TXH XP XVXiULR GH FRPSXWDGRU H[HFXWH RXWURV SURJUDPDV (OH p PXLWDV YH]HV GHVFULWR FRPR R
“sistema nervoso” de um sistema operacional para computadores, dada a sua complexidade e funcionalidade.
12 • Software livre, cultura hacker e o ecossistema da colaboração

 (PRHQWmRXQLYHUVLWiULR/LQXV7RUYDOGVTXHKDYLDDGTXLULGRRVHX
SULPHLURFRPSXWDGRUSHVVRDO XP3&GD,QWHO TXLVXWLOL]iORFRPXPVLVWHPD
RSHUDFLRQDO81,;1RHQWDQWRFRPRQmRWLQKDUHFXUVRV¿QDQFHLURVSDUDWHUDFHVVR
DHVVDWHFQRORJLDGHGLFRXVHXWUDEDOKRGHFRQFOXVmRGHFXUVRFRPRHVWXGDQWHGH
FLrQFLDGDFRPSXWDomRSDUDGHVHQYROYHUVHXSUySULR.HUQHO3DUDHPSUHHQGHUWDO
IDoDQKDHOHWRPRXFRPRUHIHUrQFLDRSUySULR.HUQHOGR81,;SDUDPiTXLQDV
HXWLOL]RXRFRPSLODGRU*&&SDUDOLQJXDJHPC. Ao terminar sua primeira versão, ele
DGHQRPLQRXGH³)UHL[´±PDVVHJXQGR&DVWHOOVRDGPLQLVWUDGRUGRVHUYLGRUTXH
HOHXWLOL]DYDHPKRPHQDJHPDRSUySULRFULDGRUGHQRPLQRXRGH/LQX['HYLGRjV
GL¿FXOGDGHHQFRQWUDGDVDRORQJRGRVHX³SURMHWR¿QDOGHFXUVR´/LQXVGLYXOJRXR
FyGLJRIRQWHGR.HUQHOQXPNewsgroup4 na Internet, em agosto de 1991, pedindo
então ajuda e cooperação de outros programadores no desenvolvimento desse
VRIWZDUHOLYUH
 &RPRUHVXOWDGRGHVVDLQLFLDWLYD/LQXVDFDERXREWHQGRXPDH[WUDRUGLQiULD
FRODERUDomR YLQGD GH WRGRV RV FDQWRV GR SODQHWD TXH GH DOJXPD IRUPD WLQKDP
DFHVVRjUHGH6HJXQGR5D\PRQG  QRLQtFLRGRSURMHWR/LQX[SRUYROWDGH
QmRHUDHVWUDQKRXPDQRYDYHUVmRGR.HUQHOVHUODQoDGDPDLVGHXPDYH]SRU
GLD$VVLP³GLYXOJDo}HVUiSLGDVDPSODFRRSHUDomRHWRWDODEHUWXUDGDLQIRUPDomR
SHUPLWLUDP D WHVWDJHP H[WHQVLYD H D GHSXUDomR GR FyGLJR GH WDO IRUPD TXH HP
 R *18/LQX[ HUD XP VLVWHPD RSHUDFLRQDO PHOKRU TXH RV VLVWHPDV 81,;
SDWHQWHDGRV´ &DVWHOOV (PDOpPGRVVLVWHPDV81,;FRPHUFLDLV
SDVVDUHPDDGRWDUR.HUQHO/LQX[VHJXQGR&DVWHOOV  MiKDYLDSHORPHQRV
PLOK}HVGHXVXiULRVGR*18/LQX[HPWRGRRPXQGR

2Newsgroup é uma ferramenta de discussões na Internet, onde usuários postam mensagens de texto (denominadas
GH³DUWLJRV´ HPIyUXQVTXHVmRDJUXSDGRVSRUDVVXQWR$RFRQWUiULRGDVPHQVDJHQVGHFRUUHLRHOHWU{QLFR e-mail), que
são transmitidas quase que diretamente do remetente para o destinatário, os artigos postados nos newsgroups são
retransmitidos através de uma extensa rede de servidores conectados entre si.
Software livre, cultura hacker e o ecossistema da colaboração • 13

7DEHOD±/LQKDGRWHPSRGRVRIWZDUHOLYUH
ANO EVENTO
1950s &yGLJRVIRQWHVVmRGLVWULEXtGRVVHPUHVWULomRHQWUHHPSUHVDV FRPR,%0 FHQWUR
e GHSHVTXLVDV FRPRRVODERUDWyULRV%HOOVH0,7 HXQLYHUVLGDGHV
1960s
1969 .HQ 7KRPSVRQ GHVHQYROYH D SULPHLUD YHUVmR GR 81,; 2 FyGLJRIRQWH GHVVH
VLVWHPDpGLVWULEXtGROLYUHPHQWH
1978 'RQDOG.QXWK 6WDQGIRUG SXEOLFRXR7(;FRPRVRIWZDUHOLYUH
1979 $SyVD$7 7
VDQXQFLDUDFRPHUFLDOL]DomRGR81,;D8QLYHUVLGDGHGH%HUNHOH\
Gi LQtFLR DR GHVHQYROYLPHQWR GD VXD SUySULD YHUVmR GR 81,; R %6' Berkeley
Software Distribution).
(ULF$OOPDQQXPHVWXGDQWHGDPHVPD8QLYHUVLGDGHGH%HUNHOH\GHVHQYROYHXXP
SURJUDPDTXHWUDQVIHUHPHQVDJHQVHQWUHFRPSXWDGRUHVSRUPHLRGD$53$1(7
que posteriormente evolui para o Sendmail.
1983 5LFKDUG6WDOOPDQSXEOLFDR0DQLIHVWR*18EXVFDQGRDGLIXVmRGRVRIWZDUHOLYUHH
cria a Free Software Foundation.
1987 2GHVHQYROYHGRU$QGUHZ7DQHQEDXPODQoDR0LQL[DYHUVmRGR81,;SDUD3&V
0DF$PLJDH$WDUDL67GLVSRQLELOL]DQGRFRPSOHWDPHQWHRFyGLJRIRQWH
1991 /LQXV7RUYDOGV SXEOLFD D YHUVmR  GH XPD YDULDomR GR NHUQHO GR 0LQL[ SDUD R
SURMHWR*18TXHHOHFKDPRXGH³/LQX[´
1993 eODQoDGRR)UHH%6'EDVHDGRQR%6'8QL[
,DQ0XUGRFNFULDXPDQRYDGLVWULEXLomRGR*18/LQX[FKDPDGDGH³'HELDQ´
1994 0DUF(ZLQJIRUPDDHPSUHVDRed Hat/LQX[HFULDXPDGLVWULEXLomRSUySULDSDUD
SUHVWDUVHUYLoRVFRPHVWHVRIWZDUHOLYUH
1995 2*UXSRGHKDFNHUVGHQRPLQDGRGH³$SDFKH´FRQVWUyLXPQRYRVRIWZDUH OLYUH 
SDUDVHUYLGRUHV:HETXHDWXDOPHQWHpRPDLVXVDGRHPWRGRRPXQGR
1996 2desktop.'(pODQoDGRSDUDXVXiULRVGR*18/LQX[SRU0DWWKLDV(WWULFKSRUpP
com alguns aplicativos proprietários.
1997 23URMHWR*120(pLQLFLDGRSRU)HGHULFR0HQDH0LJXHOGH,FD]DFRPRdesktop
OLYUHR¿FLDOGR3URMHWR*18
1999 2Q~PHURGHXVXiULRV*18/LQX[pHVWLPDGRHPPLOK}HVGHXVXiULRV
2000 Novas empresas multinacionais de TI (como a Novel e Real) lançam versões de
VHXVSURGXWRVTXHURGDPQR*18/LQX[
2001 2Q~PHURGHXVXiULRV*18/LQX[pHVWLPDGRHPSHORPHQRVPLOK}HVHPWRGR
o mundo.
2007 0DLVGHSURMHWRVGHVRIWZDUHVOLYUHVHVWmRUHJLVWUDGRVHPapenas um dos
PDLRUHVUHSRVLWyULRVGHFyGLJRDEHUWRGRPXQGRRVLWHSourceForge.net.
5HIHUrQFLDOpen Source TimelineLQ+$56H2X 
14 • Software livre, cultura hacker e o ecossistema da colaboração

Os hackers

3RU¿PpQHFHVViULRUHDOL]DUQHVWDLQWURGXomRXPSHTXHQRHVFODUHFLPHQWR
VREUH D DPELJXLGDGH H R PDO HQWHQGLPHQWR TXH VH ID] VREUH R WHUPR H D SUi[LV
VRFLDOGHWHFQyORJRVTXHVHD¿UPDPFRPR³KDFNHUV´,VWRSRUTXHDRORQJRGHWRGDV
as pesquisas que compõem este livro, o termo hacker não está associado a in­
divíduos irresponsáveis que visam penetrar em sistemas computacionais de forma
ilícita – como é normalmente propagado pela mídia de massa tradicional. Esse tipo
GHLQGLYtGXRVTXHYLRODPVLVWHPDVGHVHJXUDQoDHTXHEUDPFyGLJRVFRPSXWDFLRQDLV
VmRHVSHFL¿FDPHQWHGHQRPLQDGRVGHcrackers e, em geral, são repudiados pelos
PHPEURVGDVFRPXQLGDGHVLQWHUQDFLRQDLVGHVRIWZDUHOLYUH
 'HIRUPDFRQWUiULDDHVVDYLVmRSUpFRQFHELGDRVHVWXGRVTXHFRPS}HP
este livro consideram que a práxis dos hackers fundamenta uma cultura que diz
respeito ao conjunto de valores e crenças que emergiu das redes de programadores
de computador que interagiam on-lineHPWRUQRGHSURMHWRVWpFQLFRVHFRODERUDWLYRV
que visavam resultados inovadores. Assim, essa cultura desempenha um papel
FHQWUDODRORQJRGDKLVWyULDGHGHVHQYROYLPHQWRGRVSULQFLSDLVVtPERORVWHFQROyJLFRV
GDDWXDOVRFLHGDGHHPUHGH FRPRR3&Personal ComputerD,QWHUQHWHVRIWZDUHV
FRPRRVLVWHPDRSHUDFLRQDO*18/LQX[ DWpRVGLDVDWXDLV$¿QDO¿FDFODURGHSRLV
de uma análise mais aprofundada, que é essa cultura hacker que dá sustentação
DRDPELHQWHIRPHQWDGRUGHLQRYDo}HVWHFQROyJLFDVVLJQL¿FDWLYDVPHGLDQWHDFROD
ERUDomRHFRPXQLFDomROLYUHVFRPRWDPEpPpHODTXHDFDEDSHUPLWLQGRDFRQH[mR
HQWUHRFRQKHFLPHQWRRULJLQDGRHPXQLYHUVLGDGHVHFHQWURVGHSHVTXLVDVHRVVXE
produtos empresariais que difundem as tecnologias da informação no “mundo dos
átomos” ­ isto é, na materialidade da sociedade capitalista.

Referências

&$67(//60DQXHO$*DOi[LDGD,QWHUQHWUHÀH[}HVVREUHD,QWHUQHWRVQHJyFLRVHDVRFLHGDGH.
5LR'H-DQHLUR-RUJH=DKDU(GLWRU

+$56$OH[DQGHU286KDRVRQJ:RUNLQJIRUIUHH"0RWLYDWLRQVIRUSDUWLFLSDWLQJLQRSHQVRXUFHSURMHFWV
International Journal of Electronic Commerce  YRO  Q S ± 'LVSRQtYHO HP KWWS
FVGOFRPSXWHURUJSHUVDJHQ'/$EV7RFMVS"UHVRXUFH3DWK GOSURFHHGLQJV WRF FRPSSURFHHGLQJV
KLFVVWRF[PO '2, +,&66!$FHVVRHPMXQ

/e9<3LHUUH&LEHUFXOWXUD6mR3DXOR(G

67$//0$15LFKDUG0)UHH6RIWZDUH)UHH6RFLHW\6HOHFWHG(VVD\VRI5LFKDUG06WDOOPDQ%RVWRQ
-RVKXD*D\
Software livre, cultura hacker e o ecossistema da colaboração • 15

Distros e comunidades
a dinâmica interna de Debian, Fedora,
Slackware e Ubuntu

Murilo Bansi Machado

Ao contrário do que alguns apregoam, o universo open source está longe


de ser homogêneo. Em torno de um objeto em comum – o software livre –, acham-
VH GLYHUVRV FRODERUDGRUHV TXH FRQVLGHUDQGR JUDXV GH D¿QLGDGH RX GHWHUPLQDGR
LGHiULRGLVS}HPVHHPFRPXQLGDGHVHVSHFt¿FDV7DLVFRPXQLGDGHVSRUVXDYH]
embora convirjam em inúmeros pontos, detêm vários atributos que a elas são muito
SUySULRVFRQ¿JXUDQGRVHDVVLPXPFHQiULRSOXUDOGHPRFUiWLFRHSRUFHUWROLYUH
Entre os aspectos em comum, pode-se citar o fato de todas se valerem de
XPPRGHORDEHUWRHFRODERUDWLYRGLQkPLFRHÀH[tYHOFDOFDGRQDHVSRQWDQHLGDGH
H QD YROXQWDULHGDGH 1HVVH PHLR ID]HPVH SUHVHQWHV D FXOWXUD PHULWRFUiWLFD H D
produção entre pares, elementos-chave da cultura hacker. Os muitos voluntários,
motivados por uma busca pelo conhecimento, pela possibilidade de se relacionar
HSHODYRQWDGHGHVHUHPUHFRQKHFLGRVHPIXQomRGHVHXVIHLWRVH[SUHVVDPVHXV
desejos à comunidade e se empenham em tarefas nas quais sejam mais hábeis
H TXH PDLV OKHV GHHP SUD]HU (VVH PRGHOR GH WUDEDOKR YDOH GL]HU GHVD¿D GH
forma consistente as limitações do paradigma neoliberal dominante porque seus
trabalhadores não têm perspectiva de um retorno que possa ser lucrativo e suas
ações não são respaldadas por leis ou contratos, prevalecendo, portanto, um
ambiente de troca, e as comunidades de software livre só se tornam projetos
possíveis em função disso.
Nesse sentido, também não são poucos os pontos em que as comunidades
se distanciam. Observaram-se, de um lado, modos de trabalho um tanto rígidos e
¿pLVDXPWLSRGHKLHUDUTXLDHGHRXWURVLVWHPDVXPSRXFRPDLVGHVFHQWUDOL]DGRV
)D]HPVHQRWDUDLQGDGLIHUHQWHVHVWUXWXUDVGHRUJDQL]DomRRUDFRP&RQVHOKRV
RUD FRP /tGHUHV H &RQVWLWXLo}HV H RUD FRP XP ³GLWDGRU EHQHYROHQWH YLWDOtFLR´
(QTXDQWRSDUDXQVDLGpLDGH³OLEHUGDGH´HVWiDVVRFLDGDDRDSULPRUDPHQWRGDV
LQWHUIDFHVJUi¿FDVD¿PGHWRUQDURVLVWHPDPDLVuser-friendly possível e, assim,
16 • Software livre, cultura hacker e o ecossistema da colaboração

XQLYHUVDOL]DU R DFHVVR SDUD RXWURV VHU ³OLYUH´ GHSHQGH GH TXDO SRGHU R XVXiULR
WHP VREUH R FyGLJRIRQWH H SRU LVVR FRQYpP WUDEDOKDU SDUD VXD H[FHOrQFLD$V
diversidades são, pois, patentes aos olhos.
Para fundamentar toda esta nossa discussão, foram analisadas quatro
distribuições de software livre durante o ano de 2008. São elas: Debian, Fedora,
Slackware e Ubuntu. Para tal, acompanhamos fóruns, listas de discussões, comuni-
GDGHV HP UHGHV VRFLDLV FDQDLV QR ,5& HWF EHP FRPR HQWUHYLVWDPRV GLYHUVRV
XVXiULRVHFRODERUDGRUHV-iVREUHRVFULWpULRVXWLOL]DGRVSDUDHVFROKHUHVVDVTXDWUR
distribuições em meio a uma vastidão delas,1 FRQYpP GL]HU HP SULPHLUR OXJDU
buscou-se trabalhar com comunidades cuja representatividade no Brasil fosse alta
– não apenas em termos de números, mas em participação e envolvimento. Outra
SUHRFXSDomR FRQVLVWLX QD HVFROKD GH FRPXQLGDGHV GH GLIHUHQWHV QDWXUH]DV DOJR
que remete à estrutura de sua fundação, consolidação e funcionamento. Dessa
IRUPDDRSDVVRTXH8EXQWXH)HGRUDID]HPVHGLVWULEXLo}HVFRPHUFLDLV±LVWRp
são mantidas por grandes empresas que dão apoio aos trabalhos prestados pelos
colaboradores das respectivas comunidades –, Slackware e Debian são os maiores
H[HPSORV GH GLVWULEXLo}HV QmRFRPHUFLDLV QDV TXDLV SHVDP DSHQDV D IRUoD GDV
intensas atividades de seus voluntários.
 1HVWH DUWLJR IH]VH HP XP SULPHLUR PRPHQWR XP EUHYH KLVWyULFR GRV
grupos, dos projetos e das distribuições, apontando brevemente algumas de
VXDVFDUDFWHUtVWLFDVPDLVHYLGHQWHV3RU¿PHP³1RUPDVSURFHVVRVGLQkPLFDV´
OHYDQWDUDPVHDOJXQVWySLFRVSDUDXPDDQiOLVHFRPSDUDWLYDHPTXHVmRH[SORUDGRV
elementos considerados chave para compreender a dinâmica interna de cada
FRPXQLGDGH ± PHVPR VRE RV LQHTXtYRFRV ULVFRV GH LQFRUUHU QD VXSHU¿FLDOLGDGH
inócua ou no reducionismo caricatural.

Breve Histórico e características gerais das distribuições

Slackware Linux

³6y 6ODFNZDUH p /LQX[ H 3DWULFN 9RONHUGLQJ R VHX SURIHWD´ $ IUDVH


encontrada em muitos fóruns, listas de discussão, comunidades do Orkut etc.,
descreve o espírito que está solenemente incutido na mente de grande parte dos
colaboradores dessa distribuição.
Slackware pDPDLVDQWLJDGLVWULEXLomR/LQX[PDQWLGDSRUXPDFRPXQLGDGH
1 Segundo o site Distro Watch KWWSZZZGLVWURZDWFKFRP HPFRQVXOWDUHDOL]DGDHPDJRVWRGHH[LVWHPPDLV
de 1000 distribuições em atividade em todo o mundo
Software livre, cultura hacker e o ecossistema da colaboração • 17

e uma das primeiras a serem lançadas, sendo que sua criação data de 16 de Julho
GHTXDQGRRHVWDGXQLGHQVH3DWULFN9RONHUGLQJJUDGXRXVHHP&LrQFLDVGD
&RPSXWDomR SHOD 8QLYHUVLGDGH (VWDGXDO GH 0LQQHVRWD H ODQoRX D YHUVmR 
9RONHUGLQJpXPPLWRSDUDXVXiULRVHGHVHQYROYHGRUHVGDGLVWULEXLomR slackers),
TXHVHUHIHUHPDHOHFRPR³RKRPHP´ the man) e BDFL (Benevolent Dictator For
LifeRX'LWDGRU9LWDOtFLR%HQHYROHQWH 7DLVDOFXQKDVDVVLPFRPRDIUDVHWHPDTXH
LQLFLDHVWHWySLFRVLQWHWL]DPWRGRRUHVSHLWRHDGPLUDomRTXH9RONHUGLQGLQVSLUD
 1DV SULPHLUDV YHUV}HV GD GLVWULEXLomR 9RONHUGLQJ WUDEDOKRX VR]LQKR QR
projeto, e apenas em um segundo momento aceitou a ajuda de outros desenvol-
vedores, que ainda hoje são poucos. Já o nome que escolheu é originário do próprio
WHUPR ³VNDFN´ TXH HPERUD VHMD XPD GHVLJQDomR HP LQJOrV SDUD ³SUHJXLoRVR´ RX
³IROJDGR´ GHULYD GH XP FRQFHLWR FXQKDGR SHOD Igreja do Sub-gênio2 comumente
WUDGX]LGR SRU ³VHQVR GH OLEHUGDGH LQGHSHQGrQFLD H RULJLQDOLGDGH SDUD DOFDQoDU
VXDVPHWDVSHVVRDLV´
 0RYLGRVSHORSULQFtSLR.,66 DFU{QLPRSDUD³Keep it simple, stupid´LVWRp
³PDQWHQKDRVLPSOHVHVW~SLGR´ RVslackers se habituaram a manter um sistema
FRP LQWHUIDFHV JUi¿FDV SDUD SRXFDV IXQo}HV DOJR TXH SRGH VH DVVHPHOKDU DR
81,; RULJLQDO ± ³VLPSOLFLGDGH´ QHVVH FDVR QmR GL] UHVSHLWR j IDFLOLGDGH GH XVR
PDV DR GHVLJQ ,VVR DOpP GH FRQIHULU UDSLGH] H OHYH]D VLJQL¿FD TXH R XVXiULR
não conta com a ajuda de barras, menus e ícones intuitivos para trabalhar com
JUDQGHSDUWHGRVFRPDQGRVTXHVmRUHDOL]DGRVHPVXDPDLRULDSRUPHLRGHOLQKDV
GHFyGLJRSRLVRVPHPEURVGDFRPXQLGDGHDFUHGLWDPTXHRVJUi¿FRVRFXOWDPR
³YHUGDGHLUR´VLVWHPD3RULVVRGL]VHTXH³Vy6ODFNZDUHp/LQX[´H[SUHVVmRTXH
UHPHWH D XPD GLVWULEXLomR ³SXUD´ ³RULJLQDO´ QHOD HVVH ³YHUGDGHLUR VLVWHPD´ HVWi
plenamente à disposição de quem opera a máquina, alguém que tem o poder de
garantir a segurança e o bom andamento de quaisquer aplicações.
Hoje, nem mesmo o próprio processo de instalação do Slackware é total-
PHQWHJUi¿FRRTXHGL¿FXOWDDUHDOL]DomRGHWDOIHLWRSRUXPLQLFLDQWH0XLWRVFUrHP
TXHDGLVWULEXLomRH[LJHPXLWRWHPSRGRVXVXiULRVQHVVDGL¿FXOGDGHGHDSUHQGL]DGR
imediato. Os slackers, no entanto, acreditam que o sistema é simples à medida que
pFRPSUHHQGLGRHTXHVHXXVRpVLQJXODUPHQWHYDQWDMRVRHPIXQomRGDH[SHULrQFLD
angariada durante o processo de pesquisa a que o iniciante se submete nos
primeiros momentos.
Além de simples e, portanto, leve, o Slackware tem por característica
SUHSRQGHUDQWHDHVWDELOLGDGHUD]mRSHODTXDOpDPSODPHQWHXVDGRHPPiTXLQDV
que cumprem o papel de servidores de sistema e devidamente aproveitado por
2 Igreja do Sub-gênio &KXUFKRIWKH6XE*HQLXV pXPDUHOLJLmR¿FWtFLDGDTXDO3DWULFN9RONHUGLQJp³PHPEUR´7UDWDVH
GHXPJUXSRSVHXGRUHOLJLRVRTXHVDWLUL]DDOpPGDVUHOLJL}HVDWHRULDGDFRQVSLUDomRRVH[WUDWHUUHVWUHVHDVSHFWRV
da cultura popular.
18 • Software livre, cultura hacker e o ecossistema da colaboração

PDLVGHRXWUDVGLVWULEXLo}HVTXHGHOHVHID]HPGHULYDGDV
No Brasil, a comunidade Slackware PDLV H[SUHVVLYD HVWi HP yUELWD
GR *XVEU R *UXSR GH 8VXiULRV 6ODFNZDUH %UDVLO 2 *XVEU VXUJLX QR GLD  GH
GH]HPEURGHFRPRIUXWRGDYRQWDGHGHXPJUXSRGHDPLJRVFXMRREMHWLYRHUD
promover a troca de informações sobre a distribuição e ser uma referência diante
GDVFRPXQLGDGHVQDFLRQDLVHLQWHUQDFLRQDLV3RGHVHGL]HUTXHDWpFHUWRSRQWRR
projeto de seus fundadores3 tem sido bem-sucedido.
 4XDQGRVDLUiDSUy[LPD RXDVSUy[LPDV YHUVmR }HV GRSlackware? Patrick
9RONHUGLQJUHVSRQGH³RQRYR6ODFNZDUHYDLVHUODQoDGRTXDQGRHVWLYHUSURQWR´4

Ubuntu Linux

Se, nos dias atuais, a imagem que se consolidou quanto ao fato de os


VLVWHPDVGHQ~FOHR*18/LQX[VHUHPPDQLSXODGRVHFRPSUHHQGLGRVDSHQDVSRU
hackers ou grandes peritos em informática está em grande parte superada, isso
PXLWRVHGHYHDRVXUJLPHQWRSULPHLUDPHQWHGHLQWHUIDFHVJUi¿FDVOLYUHVDPLJiYHLV
±VHQGRRVJUDQGHVH[SRHQWHVR.'(HPHR*120(HP±HHP
VHJXQGR OXJDU DR DSDUHFLPHQWR GR 8EXQWX /LQX[ FXMD SULPHLUD YHUVmR   IRL
ODQoDGDDRVGHRXWXEURGHVRERFRGLQRPH³ZDUW\´5
%DVHDGDQDGLVWULEXLomR'HELDQR8EXQWXpPDQWLGRSHODHPSUHVD&DQRQLFDO
/WG IXQGDGD SHOR VXODIULFDQR 0DUN 5LFKDUG 6KXWWOHZRUWK FRP VHGH QD ,OKD GH
0DQHYROWDGDSDUDDSURPRomRGHVRIWZDUHVOLYUHV3URJUDPDGRUEHPVXFHGLGR
6KXWWOHZRUWKIH]VHPLOLRQiULRDRSDVVDUVXDHPSUHVDGH³VHJXUDQoDQDLQWHUQHW´
D7KDZWHDRVFXLGDGRVGDWDPEpPHPSUHVDGHVHJXUDQoD9HUL6LJQGRV(VWDGRV
8QLGRV&RPRGLQKHLURGDYHQGDHOHYLDMRXQRPXQGRGDOXD±OLWHUDOPHQWH3RU
20 milhões de dólares, tornou-se o segundo turista espacial do mundo a bordo da
QDYHUXVVD6R\X]70HP'HYROWDDRSODQRWHUUHQRFULRXD&DQRQLFDO/WG
TXH VXVWHQWD R 8EXQWX DVVLP FRPR DV GHULYDo}HV .XEXQWX ;XEXQWX (GXEXQWX
H *REXQWX6  GH GLYHUVDV IRUPDV ± GHVGH R ¿QDQFLDPHQWR GH GHVHQYROYHGRUHV H
(QWUHRVIXQGDGRUHVHVWmR$OHVVDQGUR0DUWLQV$QWRQLR0DUFHOR%UXQR+HQULTXH-DUEDV&HODQWH-RmR$OH[DQGUH
0DUFHOR6DPVRQLXN0DUFRV7DGHX5LFDUGR&DUUDQRH5RGULJR*UDHII
4 O que não ocorre em algumas distribuições, nas quais são estabelecidas certas periodicidades para o lançamento
GDSUy[LPDYHUVmRVHQGRPDLVFRPXPDGHVHLVPHVHV1HVVDFRUULGDFRQWUDRWHPSRDOJXPDVFRLVDVSRGHP¿FDU
SRUID]HU1R6ODFNZDUHFRQWXGRDQRomRGHWHPSRpUHOHJDGDDVHJXQGRSODQRHPEHQHItFLRGDEXVFDSRUDTXLORTXH
julgam ser um sistema perfeito. Por isso, a periodicidade pode variar: no ano de 1993, foram lançadas 5 versões. Em
TXDWURYHUV}HV1RVDQRVGHHWUrVQRYDVYHUV}HVIRUDPODQoDGDV(PHGXDV
YHUV}HV(PHDSHQDVXPDYHUVmR
$HVFROKDGRQ~PHUR³´QmRIRLDRDFDVR$UHJUDFRQVLVWHHPGHGLFDURQ~PHURGDHVTXHUGDDRDQRGHODQoDPHQWR
e o da direita, ao mês. Quanto aos codinomes, trata-se de uma prática muito comum associar um apelido a cada versão
lançada.
7UDWDVHFRPRGLWRGHGHULYDo}HVGRPHVPRVLVWHPD³.XEXQWX´QDGDPDLVpGRTXHR8EXQWXVREDLQWHUIDFHJUi¿FD
.'( SRUSDGUmRR8EXQWXYHPFRP*120( ³;XEXQWX´WUD]DLQWHUIDFH;IFHDRSDVVRTXH³(GXEXQWX´WUD]RQ~FOHR
GR8EXQWXDSULPRUDGRHVSHFL¿FDPHQWHSDUDDPELHQWHVHGXFDFLRQDLVHR³*REXQWX´pXPDYDULDQWHPDLVOHYHHFRP
menos recursos, contendo apenas por software livre em todas as aplicações.
Software livre, cultura hacker e o ecossistema da colaboração • 19

mantenedores do sistema em diversos cantos do mundo até o envio gratuito de


PtGLDV &'V FRQWHQGRRVLVWHPDRSHUDFLRQDOSDUDTXDOTXHUSDUWHGRSODQHWD
 1mRpjWRDTXHRVORJDQGR8EXQWXp³/LQX[IRUKXPDQEHLQJV´RXVHMD
³/LQX[SDUDVHUHVKXPDQRV´2VLVWHPDFXMRQRPHpXPFRQFHLWRVXODIULFDQRTXH
SRGHUVHUWUDGX]LGRFRPR³KXPDQLGDGHSDUDFRPRVRXWURV´pSURMHWDGRSDUDTXH
TXDOTXHUSHVVRDVHMDFDSD]GHXViORLQGHSHQGHQWHPHQWHGRQtYHOGHFRQKHFLPHQWR
HPLQIRUPiWLFDRXGDQDFLRQDOLGDGH(VVHHVStULWRGHWHQWDWLYDGHXQLYHUVDOL]DomR
IH] GR 8EXQWX XP VLVWHPD GHYHUDV LQWXLWLYR GHVGH R SURFHVVR GH LQVWDODomR
DWp D XWLOL]DomR GDV PDLV YDULDGDV IXQo}HV FRQWDQGR LQFOXVLYH FRP YDVWtVVLPD
GRFXPHQWDomR R¿FLDO H H[WUDR¿FLDO FDSD] GH VDWLVID]HU WDQWR DV G~YLGDV GH XP
LQLFLDQWHTXDQWRDVGHXPLQLFLDGR7UDWDVHSRUVLQDOGHXPDOLWHUDWXUDFRPSOHWDp
PXLWRFRPXPDREDL[DURVPDQXDLVPDLVXVDGRVHQFRQWUDUFDStWXORVLQWURGXWyULRV
DOXVLYRVjKLVWyULDGRVRIWZDUHOLYUHHjV¿ORVR¿DVHPMRJRVHPSUHHPOLQJXDJHP
acessível e com analogias fáceis de serem compreendidas. A nacionalidade do
usuário, como dito, também não costuma ser uma barreira, já que o sistema é
WUDGX]LGR SDUD PXLWRV LGLRPDV DWUDYpV GRV HVIRUoRV GH LQ~PHURV FRODERUDGRUHV
TXHWDPEpPWUDGX]HPHHODERUDPQRYDVGRFXPHQWDo}HV&RPXPDQRYDYHUVmR
a cada seis meses, o Ubuntu é geralmente lançado após decorrido, em média, um
PrVGRODQoDPHQWRGRQRYR*120(VXDLQWHUIDFHJUi¿FDSDGUmR
 1R %UDVLO D FRPXQLGDGH 8EXQWX VHJXH j ULVFD D ¿ORVR¿D FRP D TXDO R
VLVWHPDIRLHODERUDGRHQDTXDOVXVWHQWDWRGDDVXDEDVH'D(TXLSH2¿FLDOEURWDP
vários subtimes que trabalham para aprimorar a distribuição. Entre eles estão:
&RQVHOKR%UDVLO yUJmRPi[LPRTXHUHSUHVHQWDR¿FLDOPHQWHDFRPXQLGDGHEUDVLOHLUD
DWXDOPHQWHFRPWUrVPHPEURV 'RFXPHQWDomR7UDGXomR3ODQHWD IHUUDPHQWDTXH
agrega as informações postadas em blogs de membros da comunidade), Segurança,
8EXQWX*DPHV)yUXQV'LVWURV SDUDFXLGDUGDVTXHVW}HVDOXVLYDVjVGLVWULEXLo}HV
GHULYDGDV.XEXQWXH;XEXQWX HRV*UXSRV5HJLRQDLVTXHVmRDVUHSUHVHQWDo}HV
nos estados.1DPDLRUSDUWHGDVYH]HVRVVXEWLPHVGHVHPSHQKDPVHXVWUDEDOKRV
por meio do Launchpad8 – um conjunto de aplicações na plataforma web usado no
desenvolvimento de programas de código aberto, controlando tarefas e facilitando
todo o processo de colaboração. Para que um indivíduo comece a participar da
comunidade ajudando ativamente, criar uma conta no Launchpad é um ótimo
começo.

$WpHQWmRH[LVWHPJUXSRVUHJLRQDLVQRVHVWDGRVGH$ODJRDV%DKLD&HDUi0DWR*URVVR0DUDQKmR0LQDV*HUDLV
3DUDtED 3DUDQi 3DUi 3HUQDPEXFR 5LR *UDQGH GR 6XO 5LR GH -DQHLUR 6DQWD &DWDULQD 6mR 3DXOR 6HUJLSH H QR
Distrito Federal. Nada impede, entretanto, que algum usuário reúna um grupo de pessoas e crie um novo grupo regional
onde não houver nenhum.
2/DXQFKSDGDVVLPFRPRR8EXQWXIRLGHVHQYROYLGRHpPDQWLGRSHOD&DQRQLFDO/WG
20 • Software livre, cultura hacker e o ecossistema da colaboração

Debian GNU/Linux

 &RQWDQGR DWXDOPHQWH FRP PDLV GH PLO GHVHQYROYHGRUHV HVSDOKDGRV SRU


todo o mundo, a comunidade Debian se destaca por ter um grande número de
SHVVRDV WUDEDOKDQGR DWLYDPHQWH QR VRIWZDUH $OpP GLVVR ID]VH QRWiYHO VXD
RUJDQL]DomREHPGH¿QLGDGRWDGDGHQRUPDVPXLWRFODUDVHSUHFLVDV
 (VVDGLVWULEXLomRGHQ~FOHR*18/LQX[pRFDUURFKHIHGR3URMHWR'HELDQ
R¿FLDOPHQWHIXQGDGRHPGHDJRVWRGHSHORHVWDGXQLGHQVH,DQ0XUGRFN
que juntou as três letras iniciais do nome de sua mulher, Debra, com seu primeiro
QRPHD¿PGHIRUPDURWtWXORGDGLVWULEXLomR,QLFLDOPHQWHFRPDSRLRGRSURMHWR*18
e da Free Software Foundation (entre 1994 e 1995), a distribuição começou com um
SHTXHQRJUXSRGHKDFNHUVFXMRLGHDOHUDEHPVHPHOKDQWHDRGRSUySULR/LQX[QR
TXHGL]UHVSHLWRDPDQWHUXPGHVHQYROYLPHQWRDEHUWRDEUDQJHQWHHFROHWLYR
Para disciplinar todas essas pessoas na elaboração de um sistema de alto
SDGUmRR3URMHWR'HELDQWHP±DOpPGHGRFXPHQWRVFRPSROtWLFDVGHRUJDQL]DomR
comunicação, conduta etc., bastante comum às outras comunidades – uma
³&RQVWLWXLomR´ LQWHUQD H XP ³&RQWUDWR 6RFLDO´ (QTXDQWR HVWH LPSHOH R PHPEUR
a assumir um compromisso com a comunidade declarando, entre outras coisas,
TXH³R'HELDQSHUPDQHFHUiOLYUH´³LUHPRVUHWULEXLUjFRPXQLGDGHVRIWZDUH
OLYUH´³QmRHVFRQGHUHPRVSUREOHPDV´H³QRVVDSULRULGDGHVmRQRVVRVXVXiULRVHR
VRIWZDUHOLYUH´DTXHODWUDWDGDHVWUXWXUDRUJDQL]DFLRQDOSDUDDWRPDGDGHGHFLV}HV
na comunidade, dividindo-a em grupos cuja composição e poderes são claramente
SRVWXODGRV 9DOH UHVVDOWDU LQFOXVLYH TXH D &RQVWLWXLomR QmR H[HUFH UHJXODo}HV
sobre os trabalhos individuais. Pelo contrário, ela assegura sua independência.
 7DLV DJUXSDPHQWRV GL]HP PXLWR VREUH D FRPXQLGDGH $ HVWUXWXUD JHUDO
consiste em 2¿FLDLV9 (incluindo líder, comitê técnico e secretário), trabalhadores
ligados à Distribuição UHODFLRQDGRV D SDFRWHV LQGLYLGXDLV UHSRVLWyULRV )73
gerência de lançamento, documentação etc.), à Publicidade (imprensa, eventos,
parceria, marketing) e à Infra-estrutura (suporte a idiomas, acompanhamento
dos bugs, mantenedores de chaveiros, equipe de segurança, site na web etc.) e
Distribuição Personalizada ('HELDQ-USDUDFULDQoDV'HELDQ0HGSDUDSHVTXLVD
PpGLFD'HELDQ(GXSDUDHGXFDomR'HELDQ/H[SDUDHVFULWyULRVOHJDLV'HQLDQ
13SDUDRUJDQL]Do}HVVHP¿QVOXFUDWLYRVH'HELDQ$FHVVLELOLW\SDUDSHVVRDVFRP
GH¿FLrQFLD 
 4XDQWR DR H[HUFtFLR GR SRGHU QD FRPXQLGDGH p HVWDEHOHFLGD D VHJXLQWH

&DEHDROtGHUGR3URMHWR'HELDQHQWUHRXWUDVFRLVDVWRPDUGHFLV}HVXUJHQWHVHFRPDQGDUGLVFXVV}HV(OHpHOHLWR
SHORVGHVHQYROYHGRUHVHPXPSURFHVVRFRPSOH[RTXHOHYDHPFRQWDWDQWRRJUDXGHDFHLWDomRTXDQGRGHUHMHLomR
GRFDQGLGDWR-iR&RPLWr7pFQLFRpR~QLFRyUJmRTXHWHPSRGHUVREUHDVGHFLV}HVLQGLYLGXDLVGRVGHVHQYROYHGRUHV
sendo que a comunidade prefere usá-lo apenas como última alternativa.
Software livre, cultura hacker e o ecossistema da colaboração • 21

hierarquia: 1. Os desenvolvedores,10 por via de resolução geral ou de uma eleição;


2. O líder do Projeto; 3. O comitê técnico e/ou seu presidente; 4. O desenvolvedor
individual trabalhando em uma tarefa particular; 5. Delegados apontados pelo líder
SDUD WDUHIDV HVSHFt¿FDV  2 VHFUHWiULR ± UHVSRQViYHO HQWUH RXWUDV FRLVDV SRU
recolher os votos entre os desenvolvedores, determinar seu número e identidade
H UHVROYHU GLVSXWDV FRP UHODomR j LQWHUSUHWDomR GD &RQVWLWXLomR 'HVVD IRUPD
evidencia-se uma estrutura fundamentada, mais do que na meritocracia, na
³SLVWLFUDFLD´ 5XRVR LVWRpQDUHODomRGHFRQ¿DQoDHQWUHRVSDUHV
Além disso, um usuário deve ter grande envolvimento nos trabalhos para
FRQVHJXLU GHWHUPLQDGRV SRVWRV ± R TXH GLJDVH DFDED SRU YDORUL]iORV 4XDQGR
perguntado, no FISL 2008, sobre os requisitos para se tornar um desenvolvedor, um
DVSLUDQWHDWDOSRVWRGLVVH³ePXLWRPHOKRUDVVLPHVVHpRHVStULWRGDFRPXQLGDGH
e XP WHVWH SDUD YHU VH R FDUD TXHU UHDOPHQWH VHJXLU FRODERUDQGR GLIHUHQWH GH
RXWUDVGLVWURVDSHVVRDID]SRXFRMiUHFHEHXPHPDLOFRPRQRPHGRSURMHWRH
VH DFRPRGD´ $OpP GHVVDV HVWUXWXUDV LQVWLWXFLRQDLV TXH VH YHUL¿FDP HP JHUDO
um pouco mais rígidas do que nas demais comunidades (mas que, de fato, não
H[HUFHPJUDQGHSUHVVmRVREUHVHXVFRODERUDGRUHV HVWiDEXVFDREVHVVLYDSHOD
estabilidade dos pacotes por parte dos mantenedores.11 No Debian, nada do que
QmR HVWHMD FRPSOHWDPHQWH ¿QDOL]DGR HVWiYHO H IXQFLRQDQGR SHUIHLWDPHQWH EHP
SRGH HQWUDU QR VLVWHPD ¿QDO GLVSRQLELOL]DGR DRV XVXiULRV ± H LVVR PXLWDV YH]HV
implica abrir mão de uma versão mais atual para dar lugar a algo mais antigo, porém
HVWiYHO ,VVR WXGR GLJDVH QmR VH WUDGX] HP XP SUREOHPD D FRPXQLGDGH JRVWD
GHUHVVDOWDUTXH³R'HELDQYDLODQoDUTXDQGRHVWLYHUSURQWR´LVWRpQmRKiGDWDV
previamente marcadas para isso acontecer.
 1R%UDVLODFRPXQLGDGH'HELDQVHID]UHSUHVHQWDWLYDQmRWDQWRSHORQ~PHUR
de desenvolvedores ou de pessoas que trabalham mais ativamente no software
¿QDO ± WDO Q~PHUR DOLiV p FRQVLGHUDGR EDL[R TXDQGR FRPSDUDGR j TXDQWLGDGH
de desenvolvedores europeus e norte-americanos. No entanto, o número de
HQWXVLDVWDV HYDQJHOL]DGRUHV H RXWURV YiULRV FRODERUDGRUHV HOHYD D FRPXQLGDGH
'HELDQEUDVLOHLUDDXPSRVWRPXLWRVLJQL¿FDWLYRQRPXQGRGRVRIWZDUHOLYUH

2VGHVHQYROYHGRUHVVmRRVPHPEURV³R¿FLDLV´GDFRPXQLGDGH3DUDDOFDQoDUWDOSRVWRHOHVGHYHPWHUXPDFKDYH
*3* HVSpFLH GH DVVLQDWXUD GLJLWDO  DVVLQDGD SRU DOJXpP TXH Mi p GHVHQYROYHGRU FKDPDGR GH ³SDGULQKR´  SDVVDU
por provas de habilidade técnica e compreensão ética e moral com relação ao software livre e à comunidade Debian.
$R¿QDOJDQKDPXPHPDLOFRPRGRPtQLR³GHELDQRUJ´XPDSiJLQDQD,QWHUQHWHRDFHVVRDRUHSRVLWyULRFHQWUDOGD
distribuição.
 0DQWHQHGRUHV VmR UHVSRQViYHLV SRU SDFRWHV HVSHFt¿FRV DVVHJXUDQGR D HVWDELOLGDGH GRV VRIWZDUHV 3DUD LVVR
QmRSUHFLVDPVHUGHVHQYROYHGRUHVPDVIUHTHQWHPHQWHVHFDQGLGDWDPDRSRVWReFRPRVHIRVVHXPSURFHVVRGH
DSUHQGL]DGRRGHVHQYROYHGRUGHYHVHUYLUFRPRPDQWHQHGRUSRUXPWHPSRDWpSURYDUVXDFDSDFLGDGH
22 • Software livre, cultura hacker e o ecossistema da colaboração

Fedora

O Projeto Fedora teve início em 2002, quando a empresa Red Hat, criada
HPHHVSHFLDOL]DGDHPVHUYLoRVUHODFLRQDGRVDVRIWZDUHOLYUHHGLVWULEXLo}HV
/LQX[GHFLGLXYROWDUVHXVHVIRUoRVSDUDRPHUFDGRFRUSRUDWLYRRIHUHFHQGRVROXo}HV
open source. Dessa forma, dividiu sua distribuição em duas: Red Hat Enterprise
/LQX[H)HGRUD&RUHFULDQGRDVVLPR3URMHWR)HGRUDTXHSDVVRXDVHUFRQGX]LGR
em boa parte pela comunidade.
Sustentado pela Red Hat, o Projeto teve investimento inicial em pessoas,
divulgação e eventos e é considerado um laboratório de inovação, pesquisa e
GHVHQYROYLPHQWRVHJXQGR0D[6SHYDFN±VHXOtGHUDWpIHYHUHLURGH(QFDUDGR
como uma parceria entre comunidade e empresa, o Projeto, que lança uma nova
YHUVmRGDGLVWULEXLomRDFDGDVHLVPHVHVWHPFRPRXPDGDV¿QDOLGDGHVWHVWDUH
DSHUIHLoRDU DSOLFDo}HV TXH VHUmR LPSOHPHQWDGDV QR VRIWZDUH R¿FLDO GD 5HG +DW
ODQoDGRDFDGDGH]RLWRPHVHV$VVLPR)HGRUDJHUDOPHQWHWUD]RTXHKiGHPDLV
recente e corre o risco, em nome da inovação, de portar uma aplicação passível
de bugs$FRPXQLGDGHSRUFHUWRVHUHVSRQVDELOL]DSURQWDPHQWHSRUHOHV1mRp
UDURSRUH[HPSORHQFRQWUDUXPDJUDQGHTXDQWLGDGHGHDWXDOL]Do}HVSRXFRWHPSR
depois da data de lançamento.
 2 3URMHWR p JHULGR SHOR )DP6&R Fedora Ambassadors Steering
Committee  XP FRPLWr GH  HPEDL[DGRUHV12 eleito a cada seis meses por
HPEDL[DGRUHVHVSDOKDGRVSHORPXQGR2FRPLWrpUHVSRQViYHOSHODVHVWUDWpJLDV
GHPDUNHWLQJGDGLVWULEXLomRHSHODRUJDQL]DomRGDFRPXQLGDGHPXQGLDORULHQWDQGR
D DWXDomR GRV GHPDLV HPEDL[DGRUHV H IRUQHFHQGR RV UHFXUVRV QHFHVViULRV SDUD
as comunidades locais. Atualmente, o brasileiro Rodrigo Padula de Oliveira é um
de seus membros. Nas eleições de Janeiro de 2008, recebeu o maior número de
votos (41 do total de 69), o que corroborou a credibilidade e a representatividade
da comunidade brasileira diante do Projeto. Além disso, Padula também assumiu o
cargo de Community Manager GR)HGRUDQD$PpULFD/DWLQD )HGRUD/$7$0 yUJmR
TXH SUHWHQGH UHDOL]DU QD UHJLmR DWLYLGDGHV VHPHOKDQWHV jV GHVHPSHQKDGDV SHOR
)DP6&R
 $FLPD GR )DP6&2 H[LVWH XP yUJmR Pi[LPR GH GHFLV}HV WUDWDVH GR
)HGRUD%RDUGFRQVLGHUDGRXPWLPHH[HFXWLYRFRQVWLWXtGR±DWpPHDGRVGH
– por 5 membros indicados pela Red Hat e 4 membros eleitos pela comunidade.
7RGDYLDDSyVRODQoDPHQWRGR)HGRUDGHFRGLQRPH³6XOSKXU´HPGHPDLR
de 2008, a força da comunidade aumentou substancialmente e o quadro foi revertido:
&DEHDRVHPEDL[DGRUHVUHSUHVHQWDUR)HGRUDSHUDQWHRS~EOLFRDMXGDUDGLVVHPLQDUDGLVWULEXLomRHRVRIWZDUHOLYUH
em geral, ser um intermediário na comunicação entre membros da comunidade e ajudar a recrutar novos membros. Ser
HPEDL[DGRUH[LJHSRUWDQWRJUDQGHFRPSURPHWLPHQWRFRPD¿ORVR¿DGDFRPXQLGDGH+iHPEDL[DGRUHVEUDVLOHLURVQRV
HVWDGRVGH$0%$&(070*3%355-6&6372HQR'LVWULWR)HGHUDO
Software livre, cultura hacker e o ecossistema da colaboração • 23

PHPEURVSDVVDUDPDVHUHOHLWRVHRVRXWURVLQGLFDGRVSHODHPSUHVD$EDL[R
GR)DP6&2HVWmRRVHPEDL[DGRUHVFRPXQVHRVOtGHUHVGHFDGDVXESURMHWRTXH
VmR 'RFXPHQWDomR 7UDGXomR 0DUNHWLQJ (PEDL[DGRUHV $UWH ,QIUDHVWUXWXUD
,QWHUQDFLRQDOL]DomR:HEVLWHV1RWtFLDV'LVWULEXLomRH6,*V±6SHFLDO*URXS,QWHUHVWV
RX*UXSRGHLQWHUHVVHV(VSHFLDLV JUXSRVTXHGHVHQYROYHPHDSULPRUDPVRIWZDUHV
YROWDGRVSRUH[HPSORSDUDTXHPVHLQWHUHVVDSRUUiGLRDPDGRURXDVWURQRPLD 
2XWURV SURMHWRV VmR *UXSRV 5HJLRQDLV 7UDGXomR 'RFXPHQWDomR 0DUNHWLQJ
0tGLD*UiWLV GLVWULEXLomRJUDWXLWDGR'9'GHLQVWDODomR (GXFDomR YROWDGDDRXVR
DFDGrPLFRHFLHQWt¿FR (PSDFRWDPHQWRH2/3& OLJDGRDRSURJUDPDOne Laptop
Per Child).
Uma das grandes bandeiras do Fedora é a facilidade de uso. Para isso, o
'9'GHLQVWDODomRYHPFRPYiULDVLQWHUIDFHVJUi¿FDVFRPR*120(.'(;)&(
:LQGRZ0DNHUHWFFDEHQGRDRXVXiULRHVFROKHUHQWUHXPDRXPDLVGHODV

Dinâmica interna das distribuições

Barreira de entrada e processo de recrutamento de novos


colaboradores

0XLWRV XVXiULRV LQLFLDQWHV QR PXQGR GR VRIWZDUH livre costumeiramente


creem que, para ajudar determinada distribuição ou comunidade, é necessário
ID]HUSDUWHDWLYDPHQWHGRVSURMHWRVHVWDUHPFRQVWDQWHFRQWDWRFRPVHXVOtGHUHV
DQJDULDU YiULDV UHVSRQVDELOLGDGHV H UHDOL]DU WUDEDOKRV UHJXODUPHQWH 3RU FHUWR
LVVRWXGRVHID]GHJUDQGHUHOHYkQFLDPDVDVFRPXQLGDGHVGHL[DPFODURTXHXPD
DWLWXGH FRODERUDWLYD H[LJH PXLWR PHQRV$ SULQFtSLR D PHOKRU IRUPD GH DMXGDU p
usando a distribuição e testando o sistema, o que é amplamente salientado nos
sites de vários projetos:

Debian³<RXFDQVLPSO\WHVWWKHRSHUDWLQJV\VWHPDQGWKHSURJUDPVSURYLGHG
LQLWDQGUHSRUWDQ\QRW\HWNQRZQHUUDWDRUEXJV\RX¿QGXVLQJWKH%XJ7UDFNLQJ
6\VWHP´13

Fedora³8WLOL]DUR)HGRUDpDPDQHLUDPDLVVLPSOHVGHSDUWLFLSDU>@0DLV
usuários -> mais bugs resolvidos -> sistema operacional de melhor qualidade ->
PDLRUQ~PHURGHXVXiULRV´14

13 Disponível em: http://www.debian.org/intro/help$FHVVRHPMXOKR7UDGXomRYRFrSRGHVLPSOHVPHQWHWHVWDUR


sistema operacional e os programas nele disponíveis e reportar quaisquer erros ou bugs ainda não conhecidos usando
R³%XJ7ULDJH6\VWHP´
14 Disponível em: http://www.projetofedora.org/portal/participe. Acesso em julho/2008.
24 • Software livre, cultura hacker e o ecossistema da colaboração

Slackware³7KHPRVWREYLRXVZD\\RXFDQKHOSZLWK6ODFNZDUHLVWRXVHLW7KH
PRUHSHRSOHWKDWXVHLWWKHPRUHSHRSOHWKDWFDQ¿QGDQGUHSRUWEXJV7KLVZLOO
PDNH6ODFNZDUHHYHQPRUHVWDEOHWKDQLWLVQRZ´15

(PERUD D LGpLD GH ³UHFUXWDPHQWR´ VHMD YiOLGD H DGRWDGD SHORV FKDPDGRV


³HYDQJHOL]DGRUHV´ ± RX VHMD DTXHOHV TXH WrP SRU LGHDO SURPRYHU R XVR H D
disseminação do software livre em todas as esferas da sociedade, não medindo
esforços para tal –, há muitos membros nas comunidades estudadas que pensam
GH RXWUD IRUPD ,JRU 3LUHV 6RDUHV FKHIH GH WUDGXomR H HPEDL[DGRU GR )HGRUD
SUHIHUHGHL[DUTXHDLQLFLDWLYDGHTXHUHUSDUWLFLSDUYHQKDGRXVXiULRHDSyVVDEHU
do interesse do indivíduo, fornece todo o apoio necessário para tirar suas dúvidas
e direcioná-lo à área de seu interesse. Já um dos líderes do Ubuntu-SP, Paulo
) &KULVWLDQR SUHIHUH TXH DV SHVVRDV HP SULPHLUR OXJDU ³VH HQFDQWHP´ SHOD
distribuição. Segundo ele, isso fará com que esses usuários busquem por respostas
H VH HPSHQKHP (P XP PRPHQWR SRVWHULRU &KULVWLDQR WDPEpP IRUQHFH WRGD D
ajuda necessária, empenhando-se na inserção dos novatos. Além disso, nos fóruns
e listas de discussão de todas as distribuições, há tópicos destinados a usuários
LQLFLDQWHVHFRPSRXFDH[SHULrQFLD5HFUXWDUFRODERUDGRUHVQmRpSRUWDQWRUHJUD
geral.
Quando à barreira de entrada nas comunidades, há um choque maior das
¿ORVR¿DV GDV GLVWULEXLo}HV *URVVR PRGR RV slackers aparentam (o que, como
veremos, não corresponde à realidade) usar de uma postura arrogante quando se
deparam com usuários principiantes.16 De fato, não é raro observar nos fóruns da
FRPXQLGDGH D EUHYH UHVSRVWD ³57)0´ SDUD GHWHUPLQDGDV SHUJXQWDV7UDWDVH GH
XP DFU{QLPR SDUD ³Read the fucking manual´ LVWR p ³OHLD D SRUFDULD GR PDQXDO´
HPXPDWUDGXomREHPSROLGDGLJDVH 2XWUDUHVSRVWDPXLWRFRPXPp³SURFXUDQR
JRRJOH´

 .OHE&KDRVRQGHFRQVLJRPDQXDOGRVFRPDQGRVGRVODFNZDUH"
 DWKD.OHE&KDRVQRJRRJOH
 3OHEHRVDLXGDVDOD TXLW³%LWFK;DQHZIUDJUDQFHIRUPHQE\&DOYLQ
.OHLQ´ 
 .OHE&KDRVDWKDEO]D

2IUDJPHQWRDFLPDH[WUDtGRGRFDQDOVODFNZDUHEUGDUHGHFreenode no
,5&QRGLDGHVHWHPEURGHSRGHLJXDOPHQWHWUD]HUDLGpLDGHTXHRVslackers
15 Disponível em: http://www.slackware.com/faq/do_faq.php?faq=general$FHVVRHPMXOKR7UDGXomRDPDQHLUD
PDLVyEYLDGHYRFrDMXGDUR6ODFNZDUHpXVDQGRR4XDQWRPDLVSHVVRDVXVDUHPPDLVSHVVRDVSRGHUmRHQFRQWUDUH
reportar bugs. Isso tornará o Slackware ainda mais estável do que é agora.
'XUDQWHR),6/ )yUXP,QWHUQDFLRQDO6RIWZDUH/LYUHGH RVVODFNHUV¿FDUDPQDPDLRUSDUWHGRWHPSR
sentados ou deitados no chão do grande saguão no qual várias comunidades e empresas instalaram seus estandes. De
PRGRJHUDOHOHVVHGLYHUWLDPFRPMRJRVRXSURJUDPDYDPDOJXPVRIWZDUH7RGDYLDVHPSUHTXHVXUJLDDOJXPXVXiULR
FRPG~YLGDVRXGL¿FXOGDGHVRVVODFNHUVGHGLFDYDPVHXWHPSRHHVIRUoRSDUDWHQWDUUHVROYHUDVTXHVW}HV
Software livre, cultura hacker e o ecossistema da colaboração • 25

QmRVHGmRDRWUDEDOKRGHUHVSRQGHUDSHUJXQWDVHLJQRUDPRVQRYDWRV&RQWXGR
p SHUIHLWDPHQWH SRVVtYHO XP XVXiULR VHU PXLWR EHPYLQGR j FRPXQLGDGH7XGR R
TXH VH SHGH p TXH DQWHV GH ID]HU TXDOTXHU SHUJXQWD OHLDPVH WRGRV RV DUWLJRV
WXWRULDLVHGLFDVDUHVSHLWRGRDVVXQWRHVHUHDOL]HPWRGDVDVWHQWDWLYDVLPDJLQiYHLV
de respondê-la autonomamente. Depois disso, será respeitado por seus pares, que
seguramente o ajudarão a resolver os problemas.
Desfeito esse mito sobre o Slackware, passemos às outras distribuições,
nas quais as barreiras de entrada variam muito. Em linhas gerais, membros do
8EXQWXHGR)HGRUDWrPSRUSULQFtSLRIRUQHFHUTXDOTXHUWLSRGHDX[tOLRPHVPRTXH
DVG~YLGDVDSUHVHQWDGDVMiWHQKDPVLGRHVFODUHFLGDVRXDWpGRFXPHQWDGDV&RPR
essas distribuições declaradamente se preocupam com a facilidade de uso e com
o amplo apoio ao usuário leigo, alguns membros chegam a passar um bom tempo
respondendo dúvidas nos e-mails pessoais – o que é contra o consenso geral de
que as perguntas devem ser respondidas nos fóruns para que mais pessoas se
EHQH¿FLHP GDV UHVSRVWDV 1R HQWDQWR HVVHV PHPEURV DUJXPHQWDP TXH PXLWRV
usuários não frequentam fóruns, seja por falta de tempo ou de prática, e tudo o que
TXHUHPpXPDUHVSRVWDVLPSOHVHUiSLGD7XGRpIHLWRHPQRPHGDXQLYHUVDOL]DomR
do acesso.
 4XDQGR DRV PHPEURV GR 'HELDQ YHUL¿FRXVH XPD SRVWXUD LQWHUPHGLiULD
HQWUH DV GLVWULEXLo}HV FKDPDGDV FRPHUFLDLV H R 6ODFNZDUH &RPR Ki XPD YDVWD
e detalhada documentação em português abordando vários aspectos do sistema
operacional, além dos sites da distribuição e da comunidade, é difícil que alguém
se sinta perdido no Debian. Ademais, muitos de seus representantes brasileiros são
IDFLOPHQWHHQFRQWUDGRVQR,5&HIUHTXHQWHPHQWHVHGLVSRQLELOL]DPDFRQYHUVDUHD
ajudar os usuários.
Em suma, a resposta mais comum obtida quando se indagou algum membro
GDVFRPXQLGDGHVHVWXGDGDVVREUH³RTXHpSUHFLVRSDUDVHHQWUDUQDFRPXQLGDGH´
IRL VLPSOHVPHQWH ³ERD YRQWDGH´ 0DOJUDGR FDGD GLVWULEXLomR VLJD VXDV SUySULDV
¿ORVR¿DVHSUHFHLWRVDVVLQDODVHTXHRHVStULWRGHFRPXQLGDGHHVWiSUHVHQWHHP
todas elas.

O porta-voz das comunidades

Este tópico consiste na tentativa de buscar nas comunidades uma grande


YR] DWLYD ± DOJXpP TXH DR SDVVDU SHORV GHVD¿RV H SURYDV LQHUHQWHV j FXOWXUD
meritocrática e fundamentar suas atividades nas relações sociais em meio ao
JUXSRFRQVHJXLXDQJDULDUXPFDSLWDOVLPEyOLFRWmRVLJQL¿FDWLYRDSRQWRGHWHUDV
TXDOL¿FDo}HVQHFHVViULDVSDUDUHVSRQGHUSHODFRPXQLGDGH1mRVHHVWiIDODQGRDTXL
26 • Software livre, cultura hacker e o ecossistema da colaboração

SRUFHUWRDSHQDVGRGHVHQYROYHGRUPDLVDWLYRRXGRWUDGXWRUPDLVH¿FLHQWH7UDWD
VHGHHQFRQWUDUXPVtPERORXPD¿JXUDFXMDFRQGXWDVHLGHQWL¿TXHSRQWXDOPHQWH
FRPD¿ORVR¿DGDVGLVWULEXLo}HV DRLQFRUSRUDU VHXVWUDoRVHOHPHQWDUHVHVWDQGR
DVVLPDSWRDUHSUHVHQWDUVHXVPHPEURV(Q¿PXPSRUWDYR]
Observou-se que, na maioria dos casos, esses representantes não se valiam
GH DOJXP FDUJR R¿FLDO RX LQVWLWXFLRQDOL]DGR SDUD GHVHPSHQKDU VXDV DWLYLGDGHV
9DPRVDRVH[HPSORV2QRPHPDLVLQÀXHQWHGDFRPXQLGDGH6ODFNZDUHQR%UDVLO
pRGH³3LWHU381.´DOFXQKDGH5REHUWR)UHLUHV%DWLVWD(OHDOpPGHVHUR~QLFR
brasileiro que contribui ativamente no desenvolvimento do sistema operacional
e um dos mais antigos usuários da distribuição, é o responsável pela Slackware
Zine HVSpFLH GH UHYLVWD HOHWU{QLFD  H RUJDQL]D HYHQWRV H SDOHVWUDV UHODFLRQDGRV
ao Slackware – como o SlackShow, ocorrido em agosto de 2008. Apesar de tudo,
5REHUWRJDUDQWHTXHQmRIDODGH³IRUPDR¿FLDO´SHODGLVWULEXLomR
Quanto à comunidade Debian, a maior parte dos usuários da distribuição e
PHPEURVGDFRPXQLGDGHGHVLJQDPRSDUDQDHQVH)HOLSH$XJXVWRYDQGH:LHO RX
VLPSOHVPHQWH³IDZ´ FRPRVHXSRUWDYR]'HIDWR)HOLSHQmRpXPGRVPHPEURV
PDLV DQWLJRV WHYH VHX SULPHLUR FRQWDWR FRP VLVWHPDV GH Q~FOHR *18/LQX[ HP
1998 e com o Debian em 2002), mas seu envolvimento com a comunidade e sua
habilidade ao falar sobre ela em público facultaram a ele a possibilidade concreta de
UHSUHVHQWDURVDGHSWRVGDGLVWULEXLomR'XUDQWHR),6/SRUH[HPSOR)HOLSHIRL
responsável pelo estande do Debian e ministrou palestras sobre a distribuição. Ele
MiUHSUHVHQWRXDFRPXQLGDGHHPHYHQWRVFRPRR/DWLQRZDUH &RQIHUrQFLD/DWLQR
DPHULFDQD GH VRIWZDUH /LYUH  H QR &RQLVOL &RQJUHVVR ,QWHUQDFLRQDO GH VRIWZDUH
livre).
No Projeto Fedora, o nome em destaque é o de Rodrigo Padula. Um dos
SULPHLURVHPEDL[DGRUHVGDFRPXQLGDGHKRMHHOHpPHPEURGR)DP6&R )HGRUD
$PEDVVDGRUV6WHHULQJ&RPPLWWHH HH[HUFHDIXQomRGHCommunity Manager do
)HGRUD /$7$0 yUJmR GR )HGRUD QD $PpULFD /DWLQD  $OpP GLVVR IRUDP YiULRV
os casos em que Rodrigo ajudou pessoalmente na inserção de novos membros
RX QD SHUPDQrQFLD GRV DQWLJRV QHVVH SURMHWR -XQWDPHQWH FRP R HPEDL[DGRU
EDLDQR&ULVWLDQRDMXGRXQDR¿FLDOL]DomRGHXPJUXSRORFDOGR)HGRUDHP6HUJLSH
convidando o usuário Otávio para coordenar o projeto. Em outra oportunidade,
DRODGRGH'LHJR=DUFDUmRRXWURHPEDL[DGRU5RGULJRFXLGRXSDUDTXH,JRU3LUHV
Soares, hoje chefe da tradução, não saísse do Projeto Fedora.

&RPR DV FRLVDV DSHUWDUDP QD IDFXOGDGH WDOYH] HX WLYHVVH VDtGR GR
SURMHWRMiTXHRPHXWHPSROLYUHSUDWLFDPHQWHQmRH[LVWLDPDLVPDVIRL
aí que Rodrigo Padula e Diego Zacarão me convidaram para entrar no
Software livre, cultura hacker e o ecossistema da colaboração • 27

JUXSRGHHPEDL[DGRUHV'HSRLVGLVVRQmRWHYHFRPRVDLUPDLVSRLVHX
UHDOPHQWHTXHULDID]HUXPWUDEDOKRGHORQJRSUD]RHDVFRQGLo}HVGH
contribuição dentro do projeto eram totalmente favoráveis

&RP UHODomR DR 8EXQWX QmR IRL SRVVtYHO LGHQWL¿FDU XP ~QLFR SRUWDYR]
FDSD] GH IDODU DEHUWDPHQWH HP QRPH GD FRPXQLGDGH 2 TXH VH REVHUYDP QR
entanto, são fortes líderes locais, que ajudam a fomentar o uso e a disseminação
GD GLVWULEXLomR HP VXDV iUHDV GH LQÀXrQFLD 3RU H[HPSOR QD %DKLD H HP 0LQDV
*HUDLVHVWDGRVHPTXHDFRPXQLGDGH8EXQWXpPXLWRVLJQL¿FDWLYDRVQRPHVPDLV
LQÀXHQWHVVmRRVGH)iELR1RJXHLUDHGH/LFLR)RQVHFDUHVSHFWLYDPHQWH DPERV
VmRLQFOXVLYHPHPEURVGR&RQVHOKR8EXQWX%UDVLO 

A comunicação interna e externa

Evidentemente, o ciberespaço é o grande ponto de encontro das comunidades


GH VRIWZDUH OLYUH HVWXGDGDV 0XLWR HPERUD FDGD GLVWULEXLomR SURPRYD HQFRQWURV
presenciais por meio de eventos comemorativos ou fomente a participação de seus
membros em congressos, palestras, fóruns e conferências, a imensa maioria das
tarefas dos membros das comunidades se dá por meio de (não necessariamente na
ordem de relevância ou quantidade):

- Listas de discussão (mailing lists): trata-se de um mecanismo que roda na


SODWDIRUPDGHFRUUHLRHOHWU{QLFRFRPXP2VSDUWLFLSDQWHVHQYLDPPHQVDJHQVXQV
DRVRXWURVFRQWHQGRG~YLGDVRSLQL}HVHVFODUHFLPHQWRVeRPRGRPDLVVLPSOHVGH
FRPXQLFDomRHWDPEpPRPDLVXVDGRMiTXHH[LJHDSHQDVXPHQGHUHoRGHHPDLO
'HPRGRJHUDOH[LVWHPOLVWDVGHGLVFXVVmRSDUDFDGDVXESURMHWR GRFXPHQWDomR
WUDGXomR GHVHQYROYLPHQWR ]LQH HWF  DVVLP FRPR SDUD FDGD WLSR GH XVXiULR
LQLFLDQWHGHVHQYROYHGRUHWF 7DLVOLVWDVVmRQDPDLRUSDUWHGRVFDVRVDEHUWDVDR
S~EOLFR7RGDVDVFRPXQLGDGHVXWLOL]DPDVOLVWDVGHGLVFXVVmR

- Fóruns: Ambiente mais propício à solução de dúvidas e troca de informações.


Diferentemente das listas de discussão, as mensagens não circulam no ambiente
GH FRUUHLR HOHWU{QLFR PDV SRU PHLR GH SRVWDJHQV QRV VLWHV 5HFRPHQGDVH TXH
DQWHVGHODQoDUTXDOTXHUSHUJXQWDHPXPIyUXPRXVXiULRIDoDXPDEXVFDD¿P
GH YHUL¿FDU VH D TXHVWmR Mi IRL HVFODUHFLGD 1HQKXPD FRPXQLGDGH SUHVFLQGH GRV
fóruns;
- ,5&7UDWDVHGHXPSURWRFRORXVDGRSDUDSURJUDPDV scripts) de chat. Através do
,5&pSRVVtYHOID]HUDFRQH[mRFRPVHUYLGRUHVGHWRGRRPXQGR&DGDVHUYLGRU
'HSRLPHQWRFROKLGRHPHQWUHYLVWDFRP,JRU3LUHV6RDUHV
28 • Software livre, cultura hacker e o ecossistema da colaboração

possui canais, isto é, salas em que se pode conversar abertamente ou em particular.


As comunidades estudadas mantêm canais ativos na rede Freenode (irc.freenode.
QHW QRVTXDLVXVXiULRVWURFDPLQIRUPDo}HVGDGRVVROXFLRQDPG~YLGDVUHDOL]DP
reuniões ou simplesmente conversam sobre assuntos triviais. Durante a pesquisa,
IRL SRVVtYHO SDUWLFLSDU GH XPD UHXQLmR GD FRPXQLGDGH )HGRUD QR ,5& QD TXDO VH
SUHWHQGHX GLVFXWLU D GH¿QLomR H D FULDomR GRV *UXSRV 5HJLRQDLV GH 8VXiULRV 2
HQFRQWUR LGHDOL]DGR H FRQGX]LGR SRU 5RGULJR 3DGXOD GHXVH jV K KRUiULR GH
%UDVtOLD  GR GLD  GH MXQKR GH  H FRQWRX FRP D SUHVHQoD GH HPEDL[DGRUHV
XVXiULRVHFXULRVRVHPJHUDOFRPRVHREVHUYDQD¿JXUDDEDL[R

Canal #fedora-br da rede Freenode

- Blogs: Os usuários mais representativos comunicam seus feitos ou os rumos


tomados pela distribuição em seus blogs pessoais, que, em determinados casos,
são hospedados pelos servidores da própria distribuição;

- Planeta7DPEpPFKDPDGRGH³EORJGRVEORJV´7UDWDVHGHXPVLWHTXHDJUHJD
todos os blogs que têm alguma ligação com a distribuição, com o software livre ou
Software livre, cultura hacker e o ecossistema da colaboração • 29

com questões relacionadas à tecnologia de um modo geral. À medida que o usuário


HVFUHYH XP SRVW HP VHX EORJ D PHQVDJHP p GLUHFLRQDGD DR ³3ODQHWD´ HP TXH
estarão os posts de outros blogueiros. As comunidades Ubuntu e Debian têm seu
próprio Planeta Brasil, ao passo que a comunidade Fedora tem apenas o Planeta
do projeto internacional;

- E-mail: Em geral, não é recomendável que se tirem dúvidas ou se troquem


informações por meio dos e-mails pessoais. Parece ser um consenso entre os
PHPEURV GDV FRPXQLGDGHV TXH TXDQWR PDLV SHVVRDV VH EHQH¿FLDUHP GDV
UHVSRVWDVPHOKRUWHUiVLGRRWUDEDOKRUHDOL]DGRSHORVYROXQWiULRV&RQWXGRDOJXQV
poucos membros ainda se dispõem a responder dúvidas pelos e-mails, pois
DFUHGLWDPTXHDLQGDpXPDIRUPDYiOLGDGHDX[LOLDUDFRPXQLGDGH
- Zines6mRHVSpFLHVGHUHYLVWDVHOHWU{QLFDVGHGLFDGDVjFRPXQLGDGHGDGLVWULEXLomR
contendo, na maioria dos casos, artigos técnicos com resolução de problemas ou
GLFDVSDUDRWLPL]DUFHUWDVFDUDFWHUtVWLFDVGRVLVWHPD$VFRPXQLGDGHVEUDVLOHLUDV
6ODFNZDUH H 'HELDQ SRVVXHP VXD SUySULD ]LQH H D FRPXQLGDGH )HGRUD PDQWpP
XPDUHYLVWDHOHWU{QLFDFRPSOHWDFRQWDQGRFRPQRWtFLDVWXWRULDLVWH[WRVRSLQDWLYRV
referências à comunidade, informações sobre jogos, perguntas e respostas etc.

Esses mecanismos tratam mormente da comunicação interna, isto é,


UHDOL]DGD SHORV SUySULRV PHPEURV GD FRPXQLGDGH &RQWXGR QDGD LPSHGH TXH
alguém que não faça parte das atividades de sua distribuição participe ativa ou
SDVVLYDPHQWHXPDYH]TXHRVIyUXQVDVOLVWDVGHGLVFXVV}HVR,5&RVEORJVHDV
]LQHVHVWmRDEHUWRVjOHLWXUDGHTXDOTXHULQWHUQDXWD'HVVDPDQHLUDSRGHVHGL]HU
TXHHVVHVPHLRVWDPEpPVHFRQ¿JXUDPXPFDQDOGHFRPXQLFDomRH[WHUQD

Hierarquias e relações de poder

Os preceitos de liberdade apregoados pelos membros das mais variadas


FRPXQLGDGHV GH VRIWZDUH OLYUH QmR VH WUDGX]HP GH PDQHLUD DOJXPD HP XPD
IRUPDLUUHVWULWDPHQWHDQiUTXLFDGHRUJDQL]DomR'HPDQHLUDJHUDODVFRPXQLGDGHV
estão envolvidas em relações de poder fundamentadas na cultura meritocrática e
a liderança que nelas se estabelece está sujeita a avaliações pessoais por parte
GRV FRODERUDGRUHV ± D¿QDO HVWDPRV IDODQGR GH YROXQWiULRV &DVR XP OtGHU WRPH
uma atitude que não corresponda aos anseios e vontades da comunidade, os
colaboradores podem resolver contribuir com outro projeto ou não mais contribuir.
 *HQHULFDPHQWH DV KLHUDUTXLDV VH GmR HP QtYHO PDLV HOHYDGR QRV ³FRQ
VHOKRV´ GRV UHVSHFWLYRV SURMHWRV 1DV GLVWULEXLo}HV FRPHUFLDLV FRPR )HGRUD WDLV
30 • Software livre, cultura hacker e o ecossistema da colaboração

FRQVHOKRVVmRLQÀXHQFLDGRVGLUHWDPHQWHSHODVHPSUHVDVPDQWHQHGRUDV±QRFDVR
do Fedora Board, quatro dos nove membros pertencem à Red Hat. Já nas comu-
nidades das distribuições não-comerciais, os conselhos são compostos, eviden-
temente, apenas por colaboradores. No caso do Debian, conforme abordamos
GXUDQWHREUHYHKLVWyULFRGDVFRPXQLGDGHV H[LVWHXPDHVWUXWXUDGHRUJDQL]DomR
muito precisa. O projeto tem um líder, um comitê técnico (com seu respectivo presi-
GHQWH XPVHFUHWiULRHGHOHJDGRVPDVRJUDXPi[LPRGHSRGHUHVWiQDVPmRVGRV
GHVHQYROYHGRUHVTXHSRGHPH[HUFrORSRUPHLRGHXPD5HVROXomR*HUDORXSHODV
próprias eleições internas.
 (PQtYHOLQIHULRUDRGRVFRQVHOKRVH[LVWHPRVOtGHUHVHVSHFt¿FRVGHFDVD
VXESURMHWRTXHFRRUGHQDPDTXLORTXHVHSRGHULDFODVVL¿FDUFRPRFDGDFpOXODGDV
atividades básicas da tradução, documentação, grupos regionais, divulgação etc.
$ HVVHV OtGHUHV FDEH DOpP GH PDQWHU UHJXODUPHQWH D UHDOL]DomR GRV WUDEDOKRV
DVVHJXUDU D DWLYLGDGH GDV OLVWDV FXPSULU RV SUD]RV GHWHUPLQDGRV LVWR p TXDQGR
RSURMHWRVHFRPSURPHWHDHVWLSXODUGDWDVSDUDDGLVSRQLELOL]DUXPDQRYDYHUVmR
como é o caso de Fedora e Ubuntu) e incentivar novos colaboradores.
 1DPDLRULDGRVFDVRVHVVHVOtGHUHVVHMDPRVTXHHVWmRHPQtYHOPi[LPR
ou os que têm atividades mais locais, chegaram a seus atuais postos em função das
SUySULDV FRPSHWrQFLDV 8P GRV FyGLJRV PRUDLV TXH DWXDP FRPR IRUoD PRWUL] GH
VXD¿ORVR¿DUHFRPHQGDYHHPHQWHPHQWHTXHVHGHWHUPLQDGROtGHUQmRFRQVHJXLU
desempenhar suas funções da melhor maneira possível (seja por falta de tempo, por
H[FHVVRGHWUDEDOKRRXSRUSHUGDGHLGHQWL¿FDomRFRPRWUDEDOKR HVVHLQGLYtGXR
GHYHSDVVDUVHXFDUJRDRVFXLGDGRVGHTXHPHIHWLYDPHQWHSRVVDID]rOR$VVLP
XPERPOtGHUQmRGHYHGHL[DUGHRVHUDWpPHVPRTXDQGRGHFLGLUTXHGHL[DUiVHX
projeto.
No que se refere às relações líderes-liderados, também foi possível obser-
YDU FHUWDV GLYHUJrQFLDV HQWUH DV FRPXQLGDGHV (QTXDQWR QR 8EXQWX VH YHUL¿FRX
maior independência dos colaboradores – que podem desenvolver livremente seus
SURMHWRV ORFDLV RX SHVVRDLV VHP D QHFHVVLGDGH GH UHSRUWDU R TXH HVWmR ID]HQGR
–, no Projeto Fedora, há um acompanhamento um pouco maior por parte dos
HPEDL[DGRUHVFRPUHODomRjVDWLYLGDGHVJHUDLVHPTXHRVPHPEURVGDFRPXQLGDGH
se envolvem. Já no Debian, a questão central não está tão ligada à relação entre
líderes e colaboradores quanto ao maior vínculo que estes têm com a distribuição.
(P JHUDO R ³PRGR 'HELDQ GH RUJDQL]DomR´ VHJXQGR DTXL GHVFULWR H[LJH PDLRU
comprometimento dos voluntários.
Quanto ao Slackware, vê-se que a distribuição foge um pouco às regras
JHUDLV$SULQFtSLRDJDUDQWLDGHH[FHOrQFLDGRVLVWHPDHVWiDFUHGLWDPRVslackers,
no desenvolvimento de certo modo fechado. Além de poucas pessoas contribuírem
DWLYDPHQWH SDUD D GLVWULEXLomR DR WRGR VmR PHQRV GH TXLQ]H GHVHQYROYHGRUHV
Software livre, cultura hacker e o ecossistema da colaboração • 31

VHJXQGR 3LWHU 381. R ~QLFR EUDVLOHLUR GHVVH WLPH  QDGD p LPSOHPHQWDGR QR
VLVWHPD VHP D DTXLHVFrQFLD GH VHX IXQGDGRU H JUDQGH ³GLWDGRU EHQHYROHQWH
YLWDOtFLR´3DWULFN9RONHUGLQJ$GHPDLVQmRKiPXLWRHVSDoRSDUDTXHVWLRQDPHQWRV
FRQVLGHUDGRVWRORVLVWRpGHTXHPQmRVHSUHSDURXRVX¿FLHQWHSDUDID]rORV$TXL
H[LVWHPSRUWDQWRKLHUDUTXLDVHUHODo}HVGHSRGHUYLVLYHOPHQWHGH¿QLGDV

O peso do trabalho brasileiro frente à comunidade internacional

'LDQWH GR TXH VH H[SORURX DWp HQWmR HVWi PDLV GR TXH FODUR TXH DV
TXDWUR FRPXQLGDGHV HVWXGDGDV ± 8EXQWX )HGRUD 6ODFNZDUH H 'HELDQ ± ID]HP
VHPXLWRH[SUHVVLYDVVREGLYHUVRVDVSHFWRVQRPXQGRGRVRIWZDUHOLYUH$OpPGH
contarem com uma vasta gama de colaboradores espalhados por todo o mundo,
DV GLVWULEXLo}HV SURGX]LGDV SHODV FRPXQLGDGHV UHYHODPVH D FDGD QRYD YHUVmR
WUDEDOKRVGHH[FHOrQFLDWpFQLFDIDWRTXHpFRPSURYDGRSRUVXDDPSODDFHLWDomR
HPLQVWLWXLo}HVHGXFDFLRQDLVRUJDQL]Do}HVJRYHUQDPHQWDLVHQmRJRYHUQDPHQWDLV
e no próprio mercado (através de empresas que, em muitos casos, dedicam-se
apenas aos trabalhos open source) – isso sem mencionar a grande quantidade de
VHUYLGRUHVQRVTXDLVVHXVDPHVVDVGLVWULEXLo}HVGHQ~FOHR*18/LQX[
E, malgrado a presença de sistemas operacionais livres não seja tão
pronunciada (quando comparada à dos softwares proprietários) entre os assim
FKDPDGRV³XVXiULRVGRPpVWLFRV´DVGLVWULEXLo}HVTXHQRVVHUYLUDPGHUHIHUrQFLD
têm grande participação também nesse meio. Diante disso, deve-se enaltecer,
enérgica e justamente, a atuação de seus protagonistas que, por meio de constantes
HVIRUoRVFROHWLYRVWRUQDPSRVVtYHODUHDOL]DomRGRVWUDEDOKRVPHQFLRQDGRV1HVWH
WySLFR GLVFXWLUHPRV TXmR H[SUHVVLYRV VH PRVWUDP RV DWRUHV EUDVLOHLURV TXH VH
lançam à colaboração no Slackware e no Fedora.
 eGLJQRGHQRWDTXHDDWLYLGDGHGHPHGLUDUHOHYkQFLDGHXPDFRPXQLGDGHID]
se de alto risco. Não convém, evidentemente, tratar apenas do número de membros
HDSDUWLUGDtTXDOL¿FDURVSHVRVFRPEDVHHPVLPSOHVDQiOLVHVFRPSDUDWLYDV18
&RQIRUPHREVHUYDPRVSRUH[HPSORRIDWRU³Q~PHUR´QmRpPXLWROHYDGRHPFRQWD
SHODFRPXQLGDGH6ODFNZDUH±DRPHQRVQRTXHGL]UHVSHLWRDRVGHVHQYROYHGRUHV
GLUHWRVGRVLVWHPD6HpSRVVtYHOD¿UPDUTXHRVslackers acreditam que o número
UHGX]LGR GH GHVHQYROYHGRUHV FRQIHUH PDLRU H[FHOrQFLD DR SURFHVVR WDPEpP VH
SRGH GL]HU TXH VXD FRPXQLGDGH p PXLWR YDVWD H H[SUHVVLYD QR %UDVLO 'RLV IDWRV
eSRVVtYHOQRWDUTXHDWpHQWmRQmRVHIDORXHPQ~PHURGHPHPEURVGDVFRPXQLGDGHVRXQ~PHURGHXVXiULRVGDV
GLVWULEXLo}HV&RPRD¿UPDPRVQDLQWURGXomRGHVGHPyGXORpPXLWRGLItFLOPHQVXUiORV3ULPHLURSRUTXHQmRKiFRPR
SRVWXODUH[DWDPHQWHTXDLVRVUHTXLVLWRVQHFHVViULRVHVX¿FLHQWHVSDUDTXHDOJXpPVHWRUQHXPPHPEURGHTXDOTXHU
GDVFRPXQLGDGHV8PVLPSOHVVLPSDWL]DQWHTXHSURPRYDDOJXPDGDV¿ORVR¿DVHPMRJRPHVPRTXHGHIRUPDEHP
modesta, pode ser considerado um membro, a depender das concepções que disso se faça. Quanto aos usuários, a
situação é semelhante. Não é necessário pagar nem tampouco se cadastrar para pode usufruir de qualquer uma das
distribuições.
32 • Software livre, cultura hacker e o ecossistema da colaboração

SHUPLWHPLQIHULORRSULPHLURGHOHVMiFLWDGRGL]UHVSHLWRDRIDWRGHTXHH[LVWHXP
brasileiro nesse seleto grupo de desenvolvedores Slackware. O segundo, que está
relacionado ao primeiro, deu-se nos anos de 2004 e 2005, quando o grande ditador
EHQHYROHQWHHYLWDOtFLR3DWULFN9RONHUGLQJSDVVRXSRUJUDYHVSUREOHPDVGHVD~GH
HQmRS{GHGHGLFDUVHXVHVIRUoRVjPDQXWHQomRGDGLVWULEXLomR1DTXHODpSRFD
PXLWRVHHVSHFXORXVREUHR¿PGR6ODFNZDUHGDGDDLPSRUWkQFLDGDDWXDomRGH
9RONHUGLQJ5DSLGDPHQWHDFRPXQLGDGHVHPRELOL]RX3LWHU381.HQYLRXDVHJXLQWH
mensagem à lista de usuários da distribuição:

³3RYR

'HVVDYH]RHPDLOQmRpSDUDSDVVDUXPDPHQVDJHPGLYHUWLGD
Acho que todo mundo sabe; mas, para quem não sabe, Patrick
9RONHUGLQJpRFULDGRUHPDQWHQHGRUGRVODFNZDUH(HOHHVWi
doente. Ele escreveu uma longa carta com a descrição da
doença:
IWSIWSVODFNZDUHFRPSXEVODFNZDUHVODFNZDUHFXUUHQW3 $7
1(('6<285+(/3W[t
Quem tiver contato com centros de pesquisa ou médicos na
área de patologia, poderia passar essa mensagem para eles.
Sei que tem vários assinantes da lista que trabalham em
XQLYHUVLGDGHVjVYH]HVXPSXOLQKRQDIDFXOGDGHGHPHGLFLQDH
conversar com algum amigo possa quebrar um galhão e ajudar
R3DWULFNDPHOKRUDU3DUDHOHFRORFDULVVRQR&KDQJH/RJGR
FXUUHQWFRPFHUWH]DQmRHVWiEHP
Falous,
3LWHU381.
PS/1> Quem não conhecer médicos, centros de pesquisa e
SDWRORJLDHWFFRPFHUWH]DSRGHDMXGDUFRPDWRUFLGDHRUDo}HV
pela melhora do patrick
36! 6H YF QmR JRVWD GD SDODYUD ³RUDo}HV´ VXEVWLWXD SRU
UH]DVRXSHQVDPHQWRSRVLWLYRRTXH¿FDUPHOKRUSDUDDVVXDV
FUHQoDV´19

No entanto, a grande prova da relevância da comunidade brasileira está


QR IDWR GH TXH 9RONHUGLQJ GHVLJQRX R *86%5 *UXSR GH 8VXiULRV 6ODFNZDUH
Brasil) para dar continuidade aos seus trabalhos enquanto se recuperava. Segue a
notícia do (PSL-BR) Projeto Software Livre Brasil de 24.11.2004:20

Comunidade GUS-BR passa a auxiliar o Slackware.com


2¿FLDOPHQWH

19 Disponível em: KWWSRVGLUFRPPOXVHUJURXSVOLQX[EUD]LOVODFNZDUHPVJKWPl. Acesso em:


julho/2008.
20 Disponível em: http://www.softwarelivre.org/news/3353. Acesso em: julho/2008.
Software livre, cultura hacker e o ecossistema da colaboração • 33

3RUDOJXPWHPSR3DWULFN9RONHUGLQJHVWDUiFXLGDQGRPDLVGD
VXDVD~GHHSDUDQmRGHL[DURVImVSUHRFXSDGRVLQFXELXDR
*86%5GHYHUL¿FDUHYDOLGDUVHFXULW\¿[HVH%XJ)L[HVQR
6ODFNZDUH&XUUHQWDOpPGR6ODFNZDUH

7RGDDLQIRUPDomRSRGHVHUREWLGDQRVLWHZZZVODFNZDUHRUJ
EU H WRGRV RV XVXiULRV GR *86%5SRGHPDX[LOLDU LQIRUPDQGR
problemas e remendos diretamente na lista slack-users.

 2XWUD FRPXQLGDGH EUDVLOHLUD PXLWR H[SUHVVLYD TXDQGR OHYDGD DR FHQiULR


LQWHUQDFLRQDOUH~QHVHHPWRUQRGR3URMHWR)HGRUD$VVLPFRPR3LWHU381.OLGHUDRV
WUDEDOKRVQR6ODFNZDUH5RGULJR3DGXODGH2OLYHLUDWUDGX]VHQRJUDQGHH[SRHQWH
do Fedora, sendo que seus esforços para com a comunidade estabelecem uma
relação de troca mútua e salutar. À medida que desenvolve seus trabalhos, Rodrigo
WUD]PDLRUQRWRULHGDGHSDUDDFRPXQLGDGHGR3URMHWR)HGRUD%UDVLOTXHSRUVXD
YH]OKHGiWRGRRDSRLRHLQFHQWLYRSDUDUHSUHVHQWiOR±RTXHGLJDVHPHUHFHR
reconhecimento da comunidade mundial.
 &RQIRUPH DSRQWDPRV R QRPH GH 5RGULJR IRL R PDLV PHQFLRQDGR QDV
HOHLo}HVGHMDQHLURGHSDUDR)DP6&2FRPTXDVHGRWRWDOGHYRWRV
7DPEpPDVVXPLXHPDEULOGRPHVPRDQRDOLGHUDQoDGR&RPPXQLW\0DQDJHUGR
)HGRUDQD$PpULFD/DWLQD )HGRUD/$7$0 TXHGDUiDSRLRjVFRPXQLGDGHVUHJLRQDLV
latinas. Há, é claro, outros brasileiros muito ativos, tais como Diego Zarcarão e David
%DU]LOD\ TXHWDPEpPpIXQFLRQiULRGD5HG+DW PDVHVVDQRWRULHGDGHGH5RGULJR
em especial, é uma forma de a nação Fedora, cujos membros estão espalhados por
WRGRRPXQGRUHFRQKHFHUDH[SUHVVmRGDFRPXQLGDGHQR%UDVLO(PHQWUHYLVWDj
edição do 1º ano da Fedora Zine, em março de 2008, Rodrigo assinalou:

$ PLQKD UHHOHLomR SDUD R &RPLWr 'LUHWLYR GH (PEDL[DGRUHV )HGRUD


demonstrou não somente a credibilidade do Projeto Fedora Brasil
GHYLGRDVXDRUJDQL]DomRSDUWLFLSDomRHUHVXOWDGRVPDVDXQLmRHP
TXH RV HPEDL[DGRUHV EUDVLOHLURV H ODWLQRV HP JHUDO VH HQFRQWUDP
&RPDFULDomRGRKWWSSUR\HFWRIHRGRUDRUJTXHDJUHJDYiULRVSDtVHV
GD $PpULFD /DWLQD FRPR 3DUDJXDL %UDVLO $UJHQWLQD &KLOH 0p[LFR
3HUX 9HQH]XHOD H 8UXJXDL KRXYH XPD LQWHJUDomR PXLWR IRUWH HQWUH
esses países, que em grande parte me apoiaram na reeleição... Além,
claro, de outros países que acreditam no meu trabalho e em tudo que
HVWDPRVGHVHQYROYHQGRDTXL9HMRQmRVRPHQWHFRPRPpULWRSHVVRDO
mas como mérito de toda a equipe do Projeto Fedora Brasil >@ O Brasil
VHUYHFRPRXPPRGHOR&RPRVRPRVDPDLRUFRPXQLGDGHGD$PpULFD
Latina e um pouco mais madura devido ao tempo de participação,
SDVVDPRV PXLWDV H[SHULrQFLDV SDUD HOHV H FRQVWDQWHPHQWH WURFDPRV
LQIRUPDo}HVDWUDYpVGDOLVWDGHHPEDL[DGRUHVODWLQRVHGHHYHQWRVFRPR
D,&RQIHUHQFLD/DWLQR$PHULFDQDGH(PEDL[DGRUHVH8VXiULRV)HGRUD
34 • Software livre, cultura hacker e o ecossistema da colaboração

UHDOL]DGDQRLatinoware HPFRPDSDUWLFLSDomRGR3DUDJXDLGR
%UDVLOGD$UJHQWLQDHGD9HQH]XHOD

Outro fator merecedor de destaque: além de ser numerosa – a maior da


$PpULFD /DWLQD FRQWDQGR FRP HPEDL[DGRUHV HP YiULRV HVWDGRV EUDVLOHLURV $0
%$&(070*3%355-6&6372HQR'LVWULWR)HGHUDO ±DFRPXQLGDGH
EUDVLOHLUDpPXLWRDWLYD1mRVmRUDUDVDVYH]HVSRUH[HPSORHPTXHDVWUDGXo}HV
SDUD R LGLRPD ³SRUWXJXrV GR %UDVLO´ VmR XPD GDV SULPHLUDV D VHUHP FRQFOXtGDV
quando não as primeiras.

O tempo dedicado à colaboração

Pensou-se em chegar a algumas posições sobre o tempo que os membros


das quatro comunidades dedicam à colaboração, especialmente pelo fato de que
RSURFHVVRGHSURGXomRGRVRIWZDUHOLYUHQHVVDVFLUFXQVWkQFLDVYHUL¿FDVHXPD
atividade fundamentada basicamente no voluntariado. Os resultados obtidos, em-
ERUD PXLWR JHQpULFRV H VXSHU¿FLDLV PDQWLYHUDP FHUWD UHODomR FRP DV LQ~PHUDV
ELEOLRJUD¿DVTXHWUDWDPGDTXHVWmRGDFXOWXUDKDFNHU
3RGHVHGL]HUHPSULPHLUROXJDUTXHDPDLRULDGRVFRODERUDGRUHVGHVHP
penha suas funções durante seu tempo considerado livre, apesar de muitos admi-
WLUHP TXH WDPEpP R ID]HP GXUDQWH DOJXQV PRPHQWRV HP TXH GHYHULDP HVWDU
ocupados com outros compromissos – como trabalho ou estudo. Em qualquer um
dos dois casos, a opção por colaborar, evidentemente, implica relegar a segundo
plano qualquer outra atividade, seja ela uma obrigação iminente ou um tempo de
SXUROD]HU
Quando se tentou chegar a uma conclusão sobre a quantidade de tempo
GHVSHGLGRFRPRVPDLVYDULDGRVWLSRVGHWUDEDOKRYHUL¿FRXVHSRUYiULRVPRWLYRV
que se tratava de uma tarefa quase impossível. Um desses motivos está no fato de
que muitos dos colaboradores estão envolvidos com o mundo do software livre em
WHPSRLQWHJUDO'LYLGHPVHDTXLPDLVXPDYH]GXDVHVIHUDVGHWUDEDOKRVTXHSRGHP
estar voltados a uma determinada distribuição: primeiro, aquelas atividades que
estão ligadas diretamente ao software, tais como desenvolvimento, programação,
tradução, documentação etc.; segundo, todo e qualquer trabalho indireto que faça
alusão à distribuição, sendo os mais comuns a divulgação, o incentivo ao uso, a
promoção de eventos, palestras e seminários ou a postagem de conteúdos em
fóruns e listas de discussões, tirando dúvidas, trocando informações, direcionando
os principiantes.
Software livre, cultura hacker e o ecossistema da colaboração • 35

 $VVLPHPIXQomRGDH[LVWrQFLDGRTXHVHFKDPRXGHVHJXQGDHVIHUDGH
trabalhos, muitos colaboradores estão envolvidos praticamente durante todo o
tempo com suas distribuições. E, de um modo geral, observa-se que a quantidade
de tempo despendida é muito variável entre os membros, e isso se dá, entre outras
UD]}HVSHODVGLIHUHQWHVSRVWXUDVTXHVHDVVXPHPRXVHMDSHORVGLIHUHQWHVQtYHLV
de comprometimento – e, nesse aspecto, também se notaram muitas diferenças:
GHVGHXVXiULRVTXHQmR¿]HUDPTXHVWmRGHUHSDVVDUDVUHVSRVWDVTXHREWLYHUDP
em fóruns até militantes que passaram horas respondendo a e-mails pessoais com
dúvidas de usuários.
 3RU ¿P D GHVSHLWR GH WRGDV DV FRQVLGHUDo}HV VREUH WHPSR GHGLFDGR j
FRODERUDomR FDEH ID]HU XP SDUrQWHVH 'H IDWR RV HVIRUoRV SHVVRDLV VmR PXLWR
YDORUL]DGRV QRV PRGRV GD SURGXomR HQWUH SDUHV DVVLP FRPR R WHPSR TXH VH
despende para corroborar tais esforços. No entanto, inferiu-se que, em meio à
FXOWXUD PHULWRFUiWLFD PDLV LPSRUWDQWH GR TXH R WHPSR p D H¿FLrQFLD GR WUDEDOKR
¿QDO 'H QDGD DGLDQWD SRUWDQWR HPSHQKDUVH GXUDQWH KRUDV QD SURJUDPDomR GH
uma ferramenta que se apresenta com muitos erros.

O conceito de “liberdade” sob a ótica de algumas comunidades

Há vários motivos pelos quais alguém opta por usar um software livre em
detrimento de um software proprietário, mas três deles merecem certo destaque – os
PRWLYRVWpFQLFRVRVVRFLDLVHRV¿QDQFHLURV(VWHV~OWLPRVVmREHPFRPSUHHQVtYHLV
algumas pessoas não querem ou não podem pagar pelo alto preço das licenças e,
por isso, passam a usar softwares livres, que estão gratuitamente disponíveis na
rede.
 1RVFDVRVPDLVHOHPHQWDUHVGHXVXiULRV¿QDLVHPHPEURVGDVFRPXQLGDGHV
de software livre, os dois primeiros discursos (a saber, os aspectos técnicos e os
VRFLDLV FRVWXPDPSUHYDOHFHU±RUDVHFRPSOHPHQWDPRUDVmRDQWDJ{QLFRV'HVVD
PDQHLUDSHUPHLDRV³DVSHFWRVWpFQLFRV´XPDYLVmRTXHVHEDVHLDXQLFDPHQWHQD
H[FHOrQFLD WpFQLFD GR VRIWZDUH VHQGR TXH DTXHOHV TXH D GHIHQGHP DSUHJRDP
que se deve usar software livre simplesmente porque ele é melhor. Para esses
LQGLYtGXRVRFRQFHLWRGH³OLEHUGDGH´HVWiHPSRGHUDFHVVDUHDOWHUDURFyGLJRIRQWH
GRVSURJUDPDV1RHQWDQWRVHJXQGRHOHVQmRH[LVWHRPHQRUSUREOHPDHPVHXVDU
software proprietário nos casos em que ele funcione melhor ou garanta a facilidade
de uso.
Por outro lado, há aqueles que consideram que a liberdade que move aque-
OHV TXH HVWmR IRFDGRV DSHQDV QRV DVSHFWRV WpFQLFRV p LQH[LVWHQWH ± RX TXDQGR
muito, incompleta. Esses usuários estão mais preocupados com as questões
36 • Software livre, cultura hacker e o ecossistema da colaboração

sociais implícitas no ato de usar um software livre – ato que, por essência, denotaria
independência (seja das licenças proprietárias cobradas pelas grandes corporações,
VHMDGDVDWXDOL]Do}HVUHPXQHUDGDVTXHVmRH[LJLGDVRXGRFyGLJRIRQWHIHFKDGR 
H DOWLYH] (OHV HVWmR HP JUDQGH SDUWH GRV FDVRV HQYROYLGRV HP YiULRV SURMHWRV
de inclusão digital em comunidades desfavorecidas e acreditam que a inclusão
social está diretamente relacionada à própria inclusão digital – e esta, diga-se,
QmR SRGHULD VH UHDOL]DU FRP VRIWZDUHV SURSULHWiULRV TXH GHYHULDP VHU DEROLGRV
SRUFRPSOHWR$VVLPD³YHUGDGHLUD´OLEHUGDGHYDLPXLWRDOpPGDVUD]}HVWpFQLFDV
VHQGRRVRIWZDUHOLYUHGHQWUHPXLWRVRXWURVXPLQVWUXPHQWRFDSD]GHSRUWDUXPD
LGHRORJLDTXHPRELOL]HSHVVRDVHFRPXQLGDGHV(VVHVGRLVGLVFXUVRVMiUHFHEHUDP
YiULDVDOFXQKDV7DOYH]DVPDLVFRQKHFLGDVWUDWHPRSULPHLURFRPR³26,´21RX³open
source´HDVHJXQGDFRPR³)UHH6RIWZDUH´RX³[LLWD´
Além dessas divergências, há pequenos embates de ordem técnica que,
SRU¿PWDPEpPDFDEDPVHWRUQDQGRTXHVW}HVGHOLEHUGDGH(PSULQFtSLRFRQWXGR
GL]HP UHVSHLWR D FHUWDV SHFXOLDULGDGHV WpFQLFDV GH FDGD GLVWULEXLomR ,VVR SRGH
ser facilmente ilustrado pelos sistemas Debian e Slackware: no primeiro, quando
XP XVXiULR GHFLGH EDL[DU GHWHUPLQDGR SURJUDPD SRU PHLR GR PRGR WH[WR LVWR p
XVDQGROLQKDVGHFRPDQGREDVWDUHFRUUHUDR$37 $GYDQFHG3DFNDJLQJ7RRO XP
JHUHQFLDGRU GH SDFRWHV TXH ID] R GRZQORDG QmR DSHQDV GR DSOLFDWLYR VROLFLWDGR
mas de todas as suas dependências, facilitando o trabalho do usuário. No caso do
Slackware, o aplicativo correspondente é o Slackpkg, que busca apenas o arquivo
solicitado, sem suas dependências.220XLWRVXVXiULRVGDVGLVWULEXLo}HVGHULYDGDVGR
'HELDQ RXPHVPRGDTXHODVGHULYDGDVGR)HGRUDHPTXHRJHUHQFLDGRUpR<XP
FRPIXQomRVHPHOKDQWHjGR$37QRTXHGL]UHVSHLWRjEXVFDSRUGHSHQGrQFLDV 
defendem o uso de seu gerenciador pelo fato de ele proporcionar facilidade de uso.
Já grande parte dos slackers, em contrapartida, acreditam que isso fere a liberdade
GRXVXiULRXPDYH]TXHHOHQmRWHPSOHQRFRQWUROHVREUHRVLVWHPD2GHSRLPHQWR
GHXPXVXiULRGR6ODFNZDUHGXUDQWHXPDFRQYHUVDQRFDQDOVODFNZDUHEUGDUHGH
)UHHQRGHQHWQR,5&pPXLWRHVFODUHFHGRU

³$ GLIHUHQoD p TXH QRV 'HELDQV GD YLGD RX QRV 5HGKDW GD YLGD
SURJUDPDV GHVVH WLSR ID]HP FKHFDJHP GH GHSHQGrQFLDV &RPR R
6ODFNZDUHSRUQDWXUH]DQmRWHPHVVDSROtWLFDRVODFNSNJWDPEpPQmR
RID]4XHUEDL[DURDSDFKH">'LJLWH@³VODFNSNJLQVWDOODSDFKH´HSURQWR
(OHQmRYDLEDL[DUQDGDDOpPGRTXHYFRUGHQDU8P³DSWJHW´MiFKHFD

(PDOXVmRjOLFHQoD2SHQ6RXUFH,QLDWLYH 26, TXHQmRREULJDDSXEOLFDomRGHDOWHUDo}HVUHDOL]DGDVQRFyGLJR


IRQWHGHDOJXPVRIWZDUHSRVVLELOLWDQGRDH[LVWrQFLDGHSURMHWRVLQWHJUDGRVSRUVRIWZDUHVOLYUHVHVRIWZDUHVSURSULHWiULRV
eFRPRVHHPDQDORJLDEHPUXGLPHQWDUXPLQGLYtGXRSUHFLVDVVHFR]LQKDUDUUR]4XDQGRXVDUR$37RJHUHQFLDGRU
do Debian, não precisará se preocupar com qualquer ingrediente: o gerenciador buscará pelos grãos, pela água e pelos
WHPSHURVFRPELQDQGRWXGRRTXHIRUQHFHVViULRSDUDTXHRDOLPHQWR¿TXHSURQWR4XDQGRXVDUR6ODFNSNJRXVXiULR
terá em suas mãos apenas os grãos, devendo, portanto, buscar todo o resto por conta própria.
Software livre, cultura hacker e o ecossistema da colaboração • 37

VHRDSDFKHGHSHQGHGHDOJXPDRXWUDFRLVDHYDLTXHUHUEDL[DUHVVD
outra coisa tb. Os usuários dessas distros vêem isso como facilidade.
1yV XVXDOPHQWH YHPRV LVVR FRPR ³SHUGD GH FRQWUROH´ SRU SDUWH GR
XVXiULRSTVHSRUH[HPSORYFPDQGDUHPRYHURSRVW¿[QXPGHELDQ
redhat, ele vai querer remover outras coisas junto, mas não foi isso que
YFPDQGRXFHUWR"´

&RQVLGHUDo}HV¿QDLV

Por meio dos breves resultados aqui apresentados, acredita-se, foi possível
compreender ao menos uma parte daquilo que se constitui como a dinâmica e o
funcionamento de uma comunidade de software livre. Os vários relatos, depoimentos,
SDVVDJHQVHQ¿PWRGRRPDWHULDOFROKLGRQRVSHUPLWHFRQVWDWDUFRPRVHHVWDEHOHFH
HRTXHVLJQL¿FDDSOXUDOLGDGHGHDo}HVLGpLDVHSRVWXUDVSUHVHQWHVHPPHLRDR
universo open source.
3RU¿PGHYHVHDSRQWDUTXHRVH[HPSORVGDVFRPXQLGDGHVGHVRIWZDUH
OLYUH FRQ¿JXUDPVH FRPR XPD SHTXHQD SDUWH GH DOJR PXLWR PDLRU YLJHQWH QD
sociedade em rede pós-industrial. O novo modo de produção, de avaliação e de
GLVWULEXLomR GH LQIRUPDo}HV ± GR TXDO ID]HP SDUWH DOpP GR VRIWZDUH OLYUH YiULRV
SURMHWRVFRQVROLGDGRVDSDUWLUGDUHGHWDLVFRPRR<RX7XEHR6ODVKGRWR'LJJ
D :LNLSpGLD R 6HWL#+RPH D OLFHQoD &UHDWLYH &RPPRQV HWF ± SDUHFH HVWDU
LQÀXHQFLDQGRGLUHWDPHQWHRVYHOKRVSDUDGLJPDVGDVRFLHGDGHTXHSRUVXDYH]
SDVVDPSRUFRQVWDQWHVSURFHVVRVGHUHYLVmRHGHDGDSWDomR4XHD¿ORVR¿Dopen
source possa ajudá-los.
38 • Software livre, cultura hacker e o ecossistema da colaboração
Software livre, cultura hacker e o ecossistema da colaboração • 39

Software Livre e a
Perspectiva da Dádiva
uma análise sobre o trabalho e a produção
colaborativa no projeto GNOME

Vicente Macedo de Aguiar

Este capítulo se sedimenta sobre um estudo1 FLHQWt¿FR TXH EXVFRX


DQDOLVDUDVHVSHFL¿FLGDGHVGDGLQkPLFDGHWUDEDOKRGRVKDFNHUVQRSURFHVVRGH
SURGXomR FRODERUDWLYR H QmRFRQWUDWXDO SUHVHQWH QDV FRPXQLGDGHV YLUWXDLV2 de
GHVHQYROYLPHQWR GH VRIWZDUHV OLYUHV  HP SDUWLFXODU QD FRPXQLGDGH UHODWLYD DR
Projeto GNU Network Object Model Environment, PDLVFRQKHFLGRHGLIXQGLGRSHOD
sigla GNOME.
 (QYROYHQGRPDLVGHKDFNHUVGHWRGRVRVFLQFRFRQWLQHQWHVGRJORERR
3URMHWR*120(JLUDHPWRUQRGHGRLVREMHWLYRVFRPXQV'HXPODGRWHQGRFRPR
IRFRRFKDPDGR³XVXiULR¿QDO´RSURMHWRYLVDRGHVHQYROYLPHQWRGHXPDPELHQWH
de desktop3 FRP XPD LQWHUIDFH JUi¿FD Graphical User Interface – GUI) e um
FRQMXQWRGHDSOLFDWLYRV VRIWZDUHV TXHIDFLOLWHPDRPi[LPRDLQWHUDomRGRXVXiULR
FRPRFRPSXWDGRU KDUGZDUH $OpPGRdesktopRSURMHWRDFDEDWHQGRDLQGDFRPR

(VVHHVWXGRFLHQWt¿FRIRLUHDOL]DGRSRUPHLRGHXPDLPHUVmR³QHWQRJUi¿FD´ SHVTXLVDSDUWLFLSDQWH GHQWURGRDPELHQWH


FRPSXWDFLRQDOTXHFRPS}HDFRPXQLGDGHRQOLQHGR3URMHWR*120(QRSHUtRGRGHGH]HPEURGHDIHYHUHLURGH
$OpPGHVVDLPSRUWDQWHLPHUVmRIRUDPUHDOL]DGDVHQWUHYLVWDVVHPLHVWUXWXUDGDVFRPPHPEURVGHGLIHUHQWHV
SDtVHVTXHSDUWLFLSDPGHIRUPDDWXDQWHGHVVH3URMHWR,QWHUQDFLRQDO3DUDPDLVLQIRUPDo}HVVREUHHVVDSHVTXLVDYHU
DGLVVHUWDomRLQWLWXODGD³2V$UJRQDXWDVGD,QWHUQHWXPD$QiOLVHQHWQRJUi¿FDVREUHDFRPXQLGDGHRQOLQHGHVRIWZDUH
livre do projeto GNOME à luz da teoria da Dádiva” TXH VH HQFRQWUD GLVSRQtYHO QR OLQN KWWSZZZDGPXIEDEUSXE
SXEOLFDFDR0$$'LVVHUWDFDR*QRPH9HUVDR)LQDOSGf
1HVWHDUWLJRVmRFRQVLGHUDGRVFRPR³FRPXQLGDGHVYLUWXDLV´RX³FRPXQLGDGHVRQOLQH´RVDJUXSDPHQWRVVRFLDLVTXH
VHPDQLIHVWDPQD,QWHUQHWRQGHRSURFHVVRGHFRPXQLFDomRpHVVHQFLDOPHQWHPHGLDGRSRUFRPSXWDGRUHV6HJXQGR
.R]LQHWV   R XVR GR WHUPR ³FRPXQLGDGH´ SDUD FODVVL¿FDU WDLV DJUXSDPHQWRV GH SHVVRDV MXVWL¿FDVH SHOR IDWR
GHVVH WLSR GH RUJDQL]DomR VRFLDO WHU HP JHUDO XPD H[LVWrQFLD SHUHQH GHGLFDUVH GH IRUPD RUJDQL]DGD D REMHWLYRV
H Do}HV FRPXQV DOpP GH SRVVXLU XPD H[LVWrQFLD ³UHDO´ SDUD VHXV PHPEURV LQGHSHQGHQWHPHQWH GDV SUR[LPLGDGHV
JHRJUi¿FDV3RULVWRpVHPSUHLPSRUWDQWHUHVVDOWDUTXH³XPDFRPXQLGDGHYLUWXDOQmRpLUUHDOLPDJLQiULDRXLOXVyULD
WUDWDVHVLPSOHVPHQWHGHXPFROHWLYRPDLVRXPHQRVSHUPDQHQWHTXHVHRUJDQL]DSRUPHLRGRQRYRFRUUHLRHOHWU{QLFR
PXQGLDO´ /pY\S 
3 O desktoppXPVLVWHPDFRPSXWDFLRQDOFRPSRVWRSRUXPFRQMXQWRGHDSOLFDWLYRV VRIWZDUHV TXHVHJXHPHGH¿QHP
XPSDGUmRGHLQWHUIDFHJUi¿FD *UDSKLFDO8VHU,QWHUIDFH*8, HDRPHVPRWHPSRSHUPLWHPDLQWHUDomRGRXVXiULR
FRPXPFRPDVIXQFLRQDOLGDGHVGHXPGHWHUPLQDGRVLVWHPDRSHUDFLRQDO$VVLPSRGHVHGL]HUTXHWRGDDDUTXLWHWXUD
VLPEyOLFDHRSDGUmRJUi¿FR YLVXDO GHPHQXVtFRQHViUHDVGHWUDEDOKRH³MDQHODV´VmRGH¿QLGRVSHORVLVWHPDGH
desktop.
40 • Software livre, cultura hacker e o ecossistema da colaboração

segundo objetivo a estruturação de uma plataforma4GHGHVHQYROYLPHQWRFRQWHQGR


XPDFROHomRGH,QWHUIDFHVGH3URJUDPDomRGH$SOLFDWLYRV $3,V DOpPGHGLYHUVDV
IHUUDPHQWDVGHSURJUDPDomRTXHVmRXWLOL]DGDVSRUKDFNHUVWDQWRGRSURMHWRFRPR
WDPEpPGHRXWUDVFRPXQLGDGHVGHVRIWZDUHVOLYUHVHVSDOKDGDVSHORFLEHUHVSDoR
$VVLP FRPR SRQWR GH SDUWLGD HVWH DUWLJR DQDOLVD FRPR VH PDQLIHVWD D
RUJDQL]DomRHDGLQkPLFDGRWUDEDOKRTXHLPSXOVLRQDRSURFHVVRGHGHVHQYROYLPHQWR
GH WRGR R FRQMXQWR GH VLVWHPDV FRPSXWDFLRQDLV OLYUHV TXH FRPS}HP R 3URMHWR
*120(1XPPRPHQWRSRVWHULRUSDUWLQGRGHVVDPHVPDUHDOLGDGHEXVFDUHPRV
FRPSUHHQGHUWDPEpPDQDWXUH]DGRWUDEDOKRDGRWDGRSHORVKDFNHUVQRSURFHVVR
GHSURGXomRHQWUHSDUHVTXHDFDEDHQYROYHQGRXPDFRPXQLGDGHLQWHUQDFLRQDOGH
colaboradores.

O surgimento do projeto GNOME

(P  VHJXQGR R VRFLyORJR 0DQXHO &DVWHOOV   Mi KDYLD SHOR
PHQRVPLOK}HVGHXVXiULRVGR*18/LQX[HPWRGRRPXQGR&RQWXGRPHVPR
VHQGR GLIXQGLGR FRPR XP VRIWZDUH GH H[FHOHQWH TXDOLGDGH WHFQROyJLFD QR LQtFLR
GR VHX SURFHVVR GH GHVHQYROYLPHQWR R VLVWHPD RSHUDFLRQDO *18/LQX[ WDPEpP
HUD FRQVLGHUDGR XP VRIWZDUH TXH H[LJLD SRU SDUWH GRV XVXiULRV XP QtYHO GH
FRQKHFLPHQWRWpFQLFRPDLVHOHYDGRSDUDRVHXERPIXQFLRQDPHQWR,VVRSRUTXH
SRUWHUVLGRGHVHQYROYLGR³SRUWHFQROyJRV´H³SDUDWHFQROyJRV´R*18/LQX[XWLOL]DYD
XPSDGUmRGHLQWHUIDFHJUi¿FD tFRQHVMDQHODVERUGDVHWF PHQRVLQWXLWLYRHFRP
SDGU}HVVLPEyOLFRVPHQRVDFHVVtYHLVjVSHVVRDVFRPXQVDRFRQWUiULRGHDOJXPDV
YHUV}HV SURSULHWiULDV GH FyGLJR IHFKDGR  FRPR R VLVWHPD RSHUDFLRQDO Windows
e o Mac OS X, TXH HVWDYDP VHQGR GHVHQYROYLGRV SRU JUDQGHV FRUSRUDo}HV GH
7HFQRORJLDGD,QIRUPDomR 7, TXHSULRUL]DYDPPDLVHVVDVTXHVW}HVGHLQWHUIDFH
JUi¿FD$VVLP SDUD TXH R *18/LQX[ VH GLIXQGLVVH GH IRUPD PDLV DPSOD ID]LD
VHQHFHVViULRRGHVHQYROYLPHQWRGHXPDPELHQWHGHdesktopTXHSRVVLELOLWDVVHD
H[LVWrQFLDGHXPVLVWHPDGHLQWHUIDFHFRPtFRQHVHMDQHODVHQWUHRXWURVDSOLFDWLYRV
TXH VHJXLVVH RV SULQFtSLRV GH OLEHUGDGH WHFQROyJLFD H DR PHVPR WHPSR TXH
SHUPLWLVVH TXH XP XVXiULR FRPXP SXGHVVH IDFLOPHQWH LQWHUDJLU H DFHVVDU VXDV
funcionalidades.
 3RU YROWD GH  R SULPHLUR SURMHWR TXH VXUJH SDUD WHQWDU VXSULU HVVD
lacuna foi denominado de K – desktop Environment .'( 1RHQWDQWRRIXQGDGRU
$SODWDIRUPDpDLQIUDHVWUXWXUDWHFQROyJLFDTXHVHUYHGHEDVHSDUDRGHVHQYROYLPHQWRGDVDSOLFDo}HVGR*120(
7HFQLFDPHQWHHODpXPFRQMXQWR UHSRVLWyULR GHELEOLRWHFDVGHREMHWRVIXQo}HVHHVWUXWXUDVGHGDGRVTXHSRGHPVHU
UHXWLOL]DGDVQRGHVHQYROYLPHQWRGHQRYDVDSOLFDo}HVRXVHMDpXPDHVSpFLHGH³DUPD]pP´DEHUWRGHFDL[DDEHUWD
FKHLDGHFyGLJRVSUpGH¿QLGRVTXHVHUYHGHUHIHUrQFLDSDUDTXDOTXHUGHVHQYROYHGRULQWHUHVVDGRHPXWLOL]iOD
7RGDYLDDQWHVGHDGHQWUDUHVVHVSRQWRVID]VHQHFHVViULRFRPSUHHQGHUDDPELJXXLGDGHHRPDOHQWHQGLPHQWRTXH
VHID]VREUHRWHUPRHDSUi[LVVRFLDOGRVKDFNHUVDERUGDGDQRFDStWXORLQWURGXWyULRGHVWHOLYUR
Software livre, cultura hacker e o ecossistema da colaboração • 41

GHVVHSURMHWR0DWWKLDV(WWULFKRSWRXSRUXWLOL]DUXPDWHFQRORJLDDWpHQWmRGHFyGLJR
IHFKDGR  R VRIWZDUH Qt toolkit da empresa 7UROO7HFK  HP VHXV SDFRWHV R¿FLDLV
$VVLP PHVPR QmR VHQGR XP VRIWZDUH FRPHUFLDO R desktop KDE causou muitas
GLVFRUGkQFLDV QR LQWHULRU GR PRYLPHQWR SHOR 6RIWZDUH /LYUH GHYLGR DR IDWRGHVVH
VLVWHPDQmRVHJXLUQDVXDLQWHJUDOLGDGHRVSULQFtSLRVGHDEHUWXUDHOLEHUGDGHGD
¿ORVR¿D*18$SDUWLUGHVVHFRQWH[WRHPGRLVKDFNHUVPH[LFDQRV)HGHULFR
0HQDH0LJXHOGH,FD]DVHDUWLFXODUDPSDUDGHVHQYROYHUXPSURMHWRGHdesktop
TXHQmRDSHQDVIRUQHFHVVHXPVLVWHPDDEHUWRGHLQWHUIDFHJUi¿FDPDLVLQWHOLJtYHO
SDUDRXVRPDVTXHWDPEpPVHJXLVVHGHIRUPDLQWHJUDORVSULQFtSLRVGHOLEHUGDGH
WHFQROyJLFD H FRODERUDomR DVVRFLDGRV DR VLVWHPD RSHUDFLRQDO *18/LQX[. Esse
projeto foi denominado de *18  1HWZRUN 2EMHFW 0RGHO (QYLURQPHQW  mais
FRQKHFLGRHGLIXQGLGRSHODVLJOD*120(
 $OpPGHFRQWDUFRPRDSRLRHDFRODERUDomRFUHVFHQWHGHKDFNHUVGHYiULRV
SDtVHV QR DQR TXH VH VHJXLX DR ODQoDPHQWR GD VXD YHUVmR SULPHLUD YHUVmR R
SURMHWR *120( SDVVRX WDPEpP D WHU R DSRLR GH GHVHQYROYHGRUHV GH VRIWZDUHV
TXHHUDPSDJRVSRUHPSUHVDVGH7,DH[HPSORGDRed Hat e a Eazel.6HJXQGR
,FD]D   FRP R DSRLR GLUHWR H D SDUWLFLSDomR GH YiULRV KDFNHUV HVSDOKDGRV
SHOD 5HGH MXQWDPHQWH FRP HVVHV GHVHQYROYHGRUHV FRQWUDWDGRV HP  R
SURMHWR*120(ODQoDDVXDYHUVmR  3RVWHULRUPHQWHQRDQRGHMiFRP
intuito de fortalecer ainda mais a missão do projeto de desenvolver uma plataforma
FRPSXWDFLRQDO OLYUH p FULDGD D )XQGDomR *120(  (VVD )XQGDomR FRP VHGH
QD &DOLIyUQLD (8$ WRUQRXVH XPD HVSpFLH GH RUJDQL]DomR IRUPDO TXH Gi DSRLR
LQVWLWXFLRQDO j FRPXQLGDGH YLUWXDO e HOD TXH UHSUHVHQWD IRUPDOPHQWH R 3URMHWR
QR ³PXQGR GRV iWRPRV´ VHQGR JHULGD GH IRUPD YLUWXDO SRU XP &RQVHOKR 'LUHWRU
FRPSRVWR SRU VHWH SHVVRDV GH GLIHUHQWHV SDUWHV GR PXQGR TXH VmR HOHLWDV SHOD
comunidade.

O Projeto GNOME e o modelo colaborativo de produção entre


pares

 2 3URMHWR *120( TXH Gi R VHQWLQGR GH H[LVWrQFLD SDUD WRGD HVVD
FRPXQLGDGHYLUWXDOGHKDFNHUVJLUDHPWRUQRGHGXDVPHWDV'HXPODGRWHQGR
FRPR IRFR R FKDPDGR ³XVXiULR ¿QDO´ R SURMHWR YLVD DR GHVHQYROYLPHQWR GH XP
ambiente de desktopSDUDGLVWULEXLo}HVGR*18/LQX[FRPXPDLQWHUIDFHJUi¿FD
Graphical User Interface – *8,  H XP FRQMXQWR GH DSOLFDWLYRV VRIWZDUHV  TXH
IDFLOLWHPDRPi[LPRDLQWHUDomRGHVVHXVXiULRFRPRFRPSXWDGRU hardware). Por
LVVRGHIRUPDLPEULFDGDDRGHVHQYROYLPHQWRGHVVHDPELHQWHJUi¿FR*120(ID]
42 • Software livre, cultura hacker e o ecossistema da colaboração

VHSUHVHQWHWDPEpPRSURFHVVRGHWUDGXomRGRVVRIWZDUHVTXHFRPS}HPRGHVNWRS
SDUDPDLVGHLGLRPDVQRPXQGRDEUDQJHQGRDVVLPGHVGHLGLRPDVRFLGHQWDLV
FRPR(VSDQKRO)UDQFrVH3RUWXJXrV TXHXVDPRPHVPRDOIDEHWRDOtQJXDVH
GLDOHWRVTXHXVDPDOIDEHWRVFRPSOHWDPHQWHGLVWLQWRVFRPRSRUH[HPSOR&KLQrV
*UHJRÈUDEH+LQGLH+HEUDLFR3RURXWURODGRRSURMHWRDFDEDWHQGRWDPEpPFRPR
IRFRDHVWUXWXUDomRGHXPDSODWDIRUPDGHGHVHQYROYLPHQWRFRQWHQGRXPDFROHomR
GH,QWHUIDFHVGH3URJUDPDomRGH$SOLFDWLYRV $3,V DOpPGHGLYHUVDVIHUUDPHQWDV
GHSURJUDPDomRTXHVmRXWLOL]DGDVSRUKDFNHUVWDQWRGRSURMHWRFRPRWDPEpPGH
RXWUDVFRPXQLGDGHVGHVRIWZDUHVOLYUHVHVSDOKDGDVSHORFLEHUHVSDoR
 3DUWLQGRGHVVDUHDOLGDGHpLPSRUWDQWHIULVDUTXHRSURFHVVRGHGHVHQYRO
YLPHQWRGHVRIWZDUHVOLYUHVHPFRPXQLGDGHVGHVVDQDWXUH]DpVLQJXODUHPUHODomR
DXPDVSHFWRSUDJPiWLFRGRPRGRGHYLGDKDFNHU(QTXDQWR

³D~OWLPDUHYROXomRLQGXVWULDOPDUFRXDWUDQVLomRSDUDXPDVRFLHGDGH
TXH FRQWDYD FRP RV UHVXOWDGRV FLHQWt¿FRV RV KDFNHUV FKDPDP D
DWHQomR SDUD R IDWR GH TXH QD (UD GD ,QIRUPDomR PDLV LPSRUWDQWH
TXHRVUHVXOWDGRVFLHQWt¿FRVpRPRGHORGHSURGXomRHQWUHSDUHV1TXH
SHUPLWHREWHQomRGHVVHVUHVXOWDGRV´ +LPDQHP 

2XDLQGD³DHPHUJrQFLDGRVRIWZDUHOLYUHHRVXFHVVRIHQRPHQDOGRVVHXV
SLRQHLURV ± FRPR R VLVWHPD RSHUDFLRQDO *18/LQX[ R VHUYLGRU GH UHGH$SDFKH
3HUO%,1'±HPXLWRVRXWURVSURMHWRVWrPQRVIRUoDGRDUHDOL]DUXPDUHYLVmRQR
SDUDGLJPDGRPLQDQWHVREUHSURGXomR´ %HQNOHU >7UDGXomRQRVVD@
$VVLPDSHVDUGDJrQHVHGRGHVHQYROYLPHQWRGHWHFQRORJLDVFRPRDSUySULD,QWHUQHW
VHUXPERPH[HPSORGHLQRYDomROLEHUGDGHHDEHUWXUDRVSURMHWRVWHFQROyJLFRV
SURGX]LGRVGHIRUPDOLYUHHFRODERUDWLYDFRPRRLinux ou o GNOME, podem ser
FRQVLGHUDGRVXPDYDQoRDLQGDPDLRU,VVRSRUTXHGXUDQWHRSURFHVVR PHGLDGRSRU
FRPSXWDGRU GHGHVHQYROYLPHQWRGHVVHVVRIWZDUHVRVKDFNHUVYrPHODERUDQGRXP
PRGRVXEYHUVLYRGHDXWRRUJDQL]DomRSDUDDSURGXomRHGLVWULEXLomRGHVRIWZDUHV
livres na Internet.
 ³4XHPSHQVDULDPHVPRDFLQFRDQRVDWUiVTXHXPVLVWHPDRSHUDFLRQDOGH
FODVVHPXQGLDOSRGHULDVXUJLUFRPRTXHSRUPiJLFDSHORWHPSROLYUHGHPLOKDUHVGH
FRODERUDGRUHV HVSDOKDGRV SRU WRGR R SODQHWD FRQHFWDGRV VRPHQWH SHORV WrQXHV
FRUG}HV GD ,QWHUQHW"´ 5D\PRQG    6HJXQGR R KDFNHU (ULF 5D\PRQG
 HVVDHVSHFXODomRFHUWDPHQWHQmRSDUWLULDGHOHSRLVDVVLPFRPRTXDVH
DWRWDOLGDGHGRVSURJUDPDGRUHVGRLQtFLRGDGpFDGDGH±HOHGHIHQGLDDWHVH
GHTXHVRIWZDUHVGHDOWDFRPSOH[LGDGHFRPRXPNHUQHORXXPDPELHQWHdesktop,
QHFHVVLWDYDP VHU GHVHQYROYLGRV GHQWUR GH XP ³PRGHOR FDWHGUDO´ 'LWR GH RXWUD
Software livre, cultura hacker e o ecossistema da colaboração • 43

PDQHLUD HVVHV VLVWHPDV FRPSXWDFLRQDLV VHJXQGR R SDGUmR GH GHVHQYROYLPHQWR


DQWHULRU DR VXUJLPHQWR GR /LQX[ GHYHULDP VHU HODERUDGRV GH IRUPD FHQWUDOL]DGD
HLVRODGDSRUXPSHTXHQRJUXSRGHGHVHQYROYHGRUHVHVSHFLDOLVWDVTXHVyGLVSR
QLELOL]DULDP R UHVXOWDGR GH VHX WUDEDOKR TXDQGR SHUFHEHVVHP TXH XPD SULPHLUD
YHUVmRGHGHWHUPLQDGRVRIWZDUHHVWLYHVVHVLJQL¿FDWLYDPHQWHSURQWD±DVVLPFRPR
DFRQWHFHQDPDLRULDGDVHPSUHVDV ¿UPDV GHSURGXomRGHVRIWZDUHVTXHWrPR
FyGLJRIRQWHIHFKDGR(VVHPRGHOR5D\PRQG  GHQRPLQRXGHCatedral.
 'HQWUR GHVVH FRQWH[WR R OHPD ³OLEHUH FHGR XPD YHUVmR GR VRIWZDUH 
H IUHTXHQWHPHQWH GHOHJXH WXGR TXH YRFr SRVVD HVWHMD DEHUWR DR SRQWR GD
SURPLVFXLGDGH´FKHJRXFRPRXPJUDQGHFKRTXHSDUDRXQLYHUVRGDHQJHQKDULD
GHVRIWZDUHVFRPSOH[RV,VVRSRUTXHDPDLRULDGRVGHVHQYROYHGRUHVLQFOXLQGRR
SUySULR(ULF5D\PRQGDFUHGLWDYDTXHHVVDHUDXPDPiSROtWLFDSDUDSURMHWRVGHVVD
QDWXUH]D WHQGR HP YLVWD TXH RV SRVVtYHLV GHIHLWRV GHQRPLQDGR bugs) poderiam
VHUSDVVDGRVSDUDRVXVXiULRV
 3RURXWURODGRQRLQtFLRGRSURMHWR/LQX[SRUYROWDGHDUHODomRHQWUH
XVXiULRV H GHVHQYROYHGRUHV GH XP SURMHWR GH VRIWZDUH OLYUH IRL FRPSOHWDPHQWH
DOWHUDGDFRPDGLVSRQLELOL]DomRGRFyGLJRIRQWHPXLWRVXVXUiULRVSDVVDPDVHUFR
GHVHQYROYHGRUHVH¿FD]HV/LQXV7RUYDOGVSHUFHEHXTXHPXLWRVXVXiULRVVmRKDFNHUV
WDPEpPHSRUWDQWRHOHVSRGHPGLDJQRVWLFDUSUREOHPDVVXJHULUFRUUHo}HVHDMXGDU
DPHOKRUDURFyGLJRPXLWRPDLVUDSLGDPHQWHGRTXHXPSURJUDPDGRURXDWpPHVPR
XPDHTXLSHWpFQLFDGHIRUPDLVRODGDIHFKDGD(PRXWUDVSDODYUDV³GDGRVROKRV
VX¿FLHQWHVWRGRVRVHUURVVmRWULYLDLV´ 5D\PRQG $VVLPQHVVHPRGHOR
DEHUWRQmRHUDHVWUDQKRXPDQRYDYHUVmRGR.HUQHO/LQX[VHUODQoDGDPDLVGHXPD
YH] SRU GLD ± R TXH SDUD PXLWRV SURJUDPDGRUHV H HQJHQKHLURV FRPSXWDFLRQDLV
VHULDKXPDQDPHQWHLPSRVVtYHODSDUWLUGHXPPRGHORWUDGLFLRQDO

³1HQKXPDFDWHGUDOFDOPDHUHVSHLWRVDDTXLDRLQYpVDFRPXQLGDGH
/LQX[ SDUHFHX DVVHPHOKDUVH D XP JUDQGH H EDUXOKHQWR ED]DU GH
GLIHUHQWHVDJHQGDVHDSUR[LPDo}HV DGHTXDGDPHQWHVLPEROL]DGRSHORV
UHSRVLWyULRVGR/LQX[TXHDFHLWDULDVXEPLVV}HVde qualquer pessoa) de
RQGH XP VLVWHPD FRHUHQWH H HVWiYHO SRGHULD DSDUHQWHPHQWH HPHUJLU
VRPHQWHSRUXPDVXFHVVmRGHPLODJUHV´ 5D\PRQG 

 1RFDVRGR3URMHWR*120(HVVH³JUDQGHHEDUXOKHQWRED]DU´DFDEDHQYRO
YHQGRPDLVGHSHVVRDVHQWUHWUDGXWRUHVGHVHQYROYHGRUHVHFRODERUDGRUHVHP
JHUDOTXHMXQWRVID]HPSDUWHGHSDtVHVGRVFLQFRFRQWLQHQWHVGRSODQHWDFRPR
GHPRQVWUDD¿JXUD0DLVHVSHFL¿FDPHQWHSRUPHLRGDSHVTXLVDTXDQWLWDWLYDTXH
IXQGDPHQWRX HVWH WUDEDOKR S{GHVH REVHUYDU TXH GRV  +DFNHUV FDWDORJDGRV
44 • Software livre, cultura hacker e o ecossistema da colaboração

GHMDQHLURDMXOKRGH TXDVHDWRWDOLGDGHGRVPHPEURV  GDFRPXQLGDGH


VmRGRVH[RPDVFXOLQRHDPDLRULD  GHOHVVmRGHSDtVHVGD(XURSD2FLGHQWDO
FRPR)UDQoD,QJODWHUUD(VSDQKDH$OHPDQKD VHQGRRXWUDERDSDUWH  GRV
SDtVHV GD$PpULFD GR 1RUWH 0p[LFR &DQDGi H (8$ $$PpULFD GR 6XO &KLOH
%UDVLO H $UJHQWLQD  FKHJD D UHSUHVHQWDU  GRV PHPEURV 1R HQWDQWR H[LVWHP
WDPEpP SHVVRDV GH SDtVHV DIULFDQRV H DVLiWLFRV FRPR ËQGLD ,Um &KLQD 9LHWQm
7XQtVLD7RJR0DGDJDVFDUHÈIULFDGR6XODOpPGD2FHDQLDTXHVHID]SUHVHQWH
SRUPHLRGHSDtVHVFRPRSRUH[HPSOR$XVWUiOLDH1RYD=HOkQGLD

³3RQWRV´GDUHGHPXQGLDOGR3URMHWR*120(
)RQWHKWWSSODQHWJQRPHRUg

 (QWHQGHUSRUWDQWRDGLQkPLFDGHWUDEDOKRGRVKDFNHUVGR*120(pWHQ
WDU FRPSUHHQGHU R ³PLODJUH´ GR GHVHQYROYLPHQWR VHPHVWUDO GH XPD QRYD YHUVmR
GHVVHVLVWHPDFRPSXWDFLRQDOTXHXQHHPRELOL]DHVVDFRPXQLGDGHLQWHUQDFLRQDO
interligada apenas pelos liames digitais da rede mundial de computadores. Para
DOFDQoDURGHVD¿RDQDOtWLFRGHDGHQWUDUQRHQUHGRSURGXWLYRGHXPDQRYDYHUVmR
da Plataforma e do desktop*120(ID]VHDQWHVQHFHVViULDXPDDQiOLVHSUpYLDGD
HVWUXWXUDGHWLPHVHVHWRUHVTXHGHOLQHLDPDEDVHRUJDQL]DFLRQDOTXHPDQWpPYLYR
este processo não-contratual de produção em rede.
Software livre, cultura hacker e o ecossistema da colaboração • 45

GNOME: um “bazar” organizado?

 6HJXQGR*HUPDQ  DWXDOPHQWHR3URMHWR*120(HVWiDVVRFLDGRD


XP VLVWHPD FRPSXWDFLRQDO FRPSRVWR SRU PDLV GH  VRIWZDUHV HQWUH ELEOLRWHFDV
e aplicativos do desktopHGDSODWDIRUPD(PRXWUDVSDODYUDVLVVRFRUUHVSRQGHD
PDLVGHGRLVPLOK}HVGHOLQKDVGHFyGLJRTXHSRGHPVHDPSOLDUDLQGDPDLVDFDGD
nova versão.
O fato de o Projeto ser subdividido em diversos aplicativos e bibliotecas
estimula uma forma de divisão da produção em módulos2 de desenvolvimento -
GHIRUPDSURSRUFLRQDOHFRUUHVSRQGHQWHDRQ~PHURGHVRIWZDUHVTXHDWXDOPHQWH
JLUD HP WRUQR GH  (VVHV PyGXORV GH GHVHQYROYLPHQWR VmR DJUXSDGRV H VLVWH
PDWL]DGRVSHOR6LVWHPDGH&RQWUROHGH9HUV}HV Concurrent Versions System &96 
GR*120(HFRQWDPFRPDFRRUGHQDomRGHQRPtQLPRXPSURJUDPDGRUHIHWLYR
SDUD FDGD PyGXOR   TXH UHFHEH R QRPH GH mantenedor e HVVH PDQWHQHGRU R
KDFNHUUHVSRQViYHOSRUSODQHMDURVUXPRVGHXPGHWHUPLQDGRVRIWZDUHTXHFRPS}H
RVLVWHPDDOpPGHJHULURHQYLRGHGRDo}HVGHFyGLJRVGHSURJUDPDomRDSHOLGDGDV
de patchs.
 $VGRDo}HVSRGHPHVWDUUHODFLRQDGDVWDQWRjFRUUHomRGHXPHUUR bug) no
SURJUDPDTXDQWRDRHQYLRGHFyGLJRVFRPQRYDVIXQFLRQDOLGDGHVHHVSHFL¿FLGDGHV
TXHDOJXPXVXiULRTXHLUDDJUHJDUjTXHOHGHWHUPLQDGRVRIWZDUH(pQHVVHSRQWR
TXHUHVLGHVHJXQGR5D\PRQG  XPDGDVSULQFLSDLVYLUWXGHVGHVVHPRGHOR
DEHUWR GH SURGXomR FRODERUDWLYD HQWUH SDUHV  TXH HOH GHQRPLQRX GH ³ED]DU´
HQTXDQWRQRPRGHOR&DWHGUDOSUHVHQWHHPERDSDUWHGDVHPSUHVDVGHVRIWZDUH
QRPXQGRRVHUURVQRVSURJUDPDVVmRWUDWDGRVGHIRUPDIHFKDGDSRUPHLRGHXP
H[DPHPLQXFLRVRHGHPRUDGRIHLWRSRUXPQ~PHURSHTXHQRGHWpFQLFRV³QDYLVmR
ED]DUSRURXWURODGRYRFr PDQWHQHGRU DVVXPHTXHHUURVVmRJHUDOPHQWHWULYLDLV
PXLWRUDSLGDPHQWHTXDQGRH[SRVWRVSDUDFHQWHQDVGHiYLGRVFRGHVHQYROYHGRUHV
WULWXUDQGRFDGDQRYDOLEHUDomR´ 5D\PRQG 
 6HJXLQGR HVVD ¿ORVR¿D SRU H[HPSOR R PDQWHQHGRU GH TXDOTXHU PyGXOR
GR3URMHWR*120(GLVSRQLELOL]DGHIRUPDIUHTXHQWHQDZHEGDFRPXQLGDGHXPD
QRYD YHUVmR FRP R LQWXLWR GH WHU VHPSUH PDLV FRUUHo}HV GRDo}HV  GH TXDOTXHU
RXWUR KDFNHU DR UHGRU GR PXQGR TXH TXHLUD XVDU H FRQWULEXLU 'HVVD IRUPD R
PDQWHQHGRUGRSDFRWHFRQVHJXHUHGX]LURWUDEDOKRHRFXVWRTXHWHULDSDUDPDQWHU
DTXHOH GHWHUPLQDGR VRIWZDUH GH IRUPD LVRODGD$OpP GLVVR TXDQGR XP XVXiULR
GHVHQYROYHGRUSDVVDDID]HUGRDo}HVFRQVWDQWHVGHpatchs,HOHSDVVDWDPEpPD
WHUJUDQGHVSRVVLELOLGDGHVGHGLYLGLURSRVWRGHPDQWHQHGRURXDWpPHVPRDVVXPLU
H[FOXVLYDPHQWHWDOFDUJRFDVRRDWXDOPDQWHQHGRUFRQVLGHUHTXHQmRWHPPDLV
WHPSROLYUHHRLQGLTXHSDUDDVVXPLUWDOIXQomR
46 • Software livre, cultura hacker e o ecossistema da colaboração

 'HQWUR GR FRQWH[WR GD HVWUXWXUD RUJDQL]DFLRQDO GD FRPXQLGDGH WRGRV RV
PDQWHQHGRUHVHFRODERUDGRUHVGRVPyGXORVGHGHVHQYROYLPHQWRGHVRIWZDUHLUmR
FRPSRUDSHQDVXP QHVVHFDVRRGHHacking)GRVVXESURMHWRVRX³7LPHV´HP
TXHHVWiGLYLGLGRHDORFDGRRWUDEDOKRGDFRPXQLGDGHFRPRXPWRGR±FRPRVH
SRGHSHUFHEHUQRRUJDQRJUDPDGR3URMHWR*120(UHSUHVHQWDGRQD)LJXUD
 1RXQLYHUVRGHVVHVTXLQ]HVXESURMHWRV WLPHV WRGRVWrPDFRRUGHQDomRGH
SHORPHQRVXPOtGHURXPDQWHQHGRUTXHWUDEDOKDGHIRUPDPDLVHIHWLYDHSHULyGLFD
DOpPGDSDUWLFLSDomRGHRXWURVFRODERUDGRUHVPDLVHYHQWXDLV(QTXDQWRQDPDLRULD
GRVWLPHVpFRPXPDH[LVWrQFLDGHXPDGRLVFRRUGHQDGRUHVHPDOJXQVPyGXORV
GH GHVHQYROYLPHQWR p SRVVtYHO HQFRQWUDU DWp FLQFR PDQWHQHGRUHV GHSHQGR GD
FRPSOH[LGDGHGRVRIWZDUHHGRLQWHUHVVHGHVHPDQWHURVRIWZDUH3DUDIDFLOLWDUR
HQWHQGLPHQWR VREUH HVVD FRPSOH[D HVWUXWXUD RUJDQL]DFLRQDO HVVHV WLPHV SRGHP
VHUTXDOL¿FDGRVGHIRUPDJHUDOHQWUHDTXHOHVTXHHVWmRUHODFLRQDGRVjV³DWLYLGDGHV
¿P´LVWRpTXHHVWmRGLUHWDPHQWHOLJDGRVDRSURFHVVRGHGHVHQYROYLPHQWRGRV
VRIWZDUHV H DTXHOHV TXH VmR UHVSRQViYHLV SRU ³DWLYLGDGHV PHLR´ RX VHMD TXH
UHDOL]DPDWLYLGDGHVTXHRIHUHFHPXPDHVSpFLHGHVXSRUWHDRSURFHVVRHGHVHQ
YROYLPHQWRWDQWRGRGHVNWRSFRPRGDSODWDIRUPD

Organograma do Projeto GNOME


Software livre, cultura hacker e o ecossistema da colaboração • 47

$SDUWLUGHVVDFRPSOH[DHVWUXWXUDRUJDQL]DFLRQDOHDRPHVPRWHPSRWHQGR
FRPR EDVH HVVH VXEYHUVLYR PRGHOR FRODERUDWLYR GH SURGXomR WHFQROyJLFD HQWUH
SDUHVD*120(GHVGHFRPHoDDDGRWDUXPDSRVWXUDDWpHQWmRLQH[LVWHQWH
QRXQLYHUVRGRVSURMHWRVGHVRIWZDUHOLYUHODQoDUXPDQRYDYHUVmRGRVHX desktop
HGDVXDSODWDIRUPDOLYUHGHGHVHQYROYLPHQWRGHQWURGHXPSUD]RSUpHVWDEHOHFLGR
de seis meses.
$VVLP FDGD YHUVmR WRUQDVH IUXWR GH WRGR XP HQUHGR JHUDO GH GHVHQYRO
YLPHQWRWHFQROyJLFRHVSRQWDQHDPHQWHFRODERUDWLYRTXHDFDGDVHLVPHVHVWHUPLQD
HVHLQLFLDQRYDPHQWHFRPRODQoDPHQWRGHXPDYHUVmRPDLVPRGHUQDDQXQFLDGD
pelo Release Manager *HVWRU GH 9HUV}HV  QDV OLVWDV GH HPDLOV GD FRPXQLGDGH
1R HQWDQWR SDUD HIHLWR GD DQiOLVH DGRWDGD QHVWH WUDEDOKR DGRWDUVHi  XP FRUWH
WHPSRUDO QR SURFHVVR GH GHVHQYROYLPHQWR GR *120( &RPR SRQWR GH SDUWLGD
IRL HVFROKLGR R PrV GH VHWHPEUR GH  TXDQGR IRL ODQoDGD D YHUVmR 3 do
desktop SRU PHLR GR HPDLO ³Celebrating the release of GNOME 2.12!´ HQYLDGR
SRU(OLMDK1HZUHQDWXDORelease ManagerGD*120(SDUDDOLVWDGHDQ~QFLRVGD
comunidade.

Planejando o enredo de uma nova versão

&RPRDLQRYDomRWHFQROyJLFDpRHVStULWREDOL]DGRUGHVVDRUJDQL]DomRDSyV
RODQoDPHQWRGHWRGDQRYDYHUVmRDFRPXQLGDGH*120(FRPHoDDVHSODQHMDU
para o lançamento de uma outra nova versão do seu desktop GHIRUPDVHPHOKDQWH
DR TXH DFRQWHFH QXPD FRPXQLGDGH GH HVFROD GH VDPED DSyV VHX GHV¿OH QD
0DUTXrVGH6DSXFDt TXHQHVVHFDVRHVWXGDGRpDeHQWmRTXHDHTXLSH
UHVSRQViYHOSHORODQoDPHQWRGHYHUV}HV±5HOHDVH7HDP- se reune no seu canal
,5& Internet Relay Chat SDUDHODERUDUXPDSURSRVWDGHFDOHQGiULR$VVLPORJR
DSyVDGH¿QLomRGHXPDSURSRVWDRRelease Manager lança um outro e-mail para
DOLVWDGHGLVFXVVmRGRVGHVHQYROYHGRUHVFRPXPDVXJHVWmRGHFDOHQGiULRSDUDR
desenvolvimento geral da futura versão. Essa proposta passa então a ser discutida
HQWUH WRGRV RV GHVHQYROYHGRUHV PDQWHQHGRUHV  H FRGHVHQYROYHGRUHV GH FDGD
VRIWZDUHSRUPHLRGDOLVWDGHHPDLOVHGR&DQDOEXVFDQGRVHDVVLPDFRQVWUXomR
GHXPFRQVHQVRTXHWHPFRPRPHGLDGRUR Release Manager.
 $ SDUWLU GH XP FDOHQGiULR GH GHVHQYROYLPHQWR GH VHLV PHVHV TXH ¿FD
GLVSRQtYHOQRVLWHGDFRPXQLGDGHWRGRVRVPDQWHQHGRUHVGHVRIWZDUHVFRPHoDP
DVHRUJDQL]DUSDUDGH¿QLUTXDLVDVIXWXUDVQRYLGDGHVHLQRYDo}HVTXHFDGDSDFRWH
WHUiQDSUy[LPDYHUVmR4XDQGRSURQWDWRGDVDVPHWDVGHLQRYDomRUHODWLYDVDRV
VRIWZDUHVGRVLVWHPDVmRSRVWDGDVQXPDSiJLQDZHEGHSODQHMDPHQWRGDVYHU
48 • Software livre, cultura hacker e o ecossistema da colaboração

V}HVGHQRPLQDGRGHRoadMap KWWSOLYHJQRPHRUJ5RDG0Dp).$OpPGLVVRDSyV
DGH¿QLomRGRSODQHMDPHQWRDEUHVHXPDQRYDHWDSDGHGLVFXVVmRVREUHDSRV
sibilidade de entrada de novos softwares para serem inseridos na plataforma ou no
desktop.
 1HVVHPRPHQWRTXDOTXHUKDFNHUSRGHSURSRUXPQRYRSDFRWHGHVROXomR
para ser agregado ao sistema GNOME. Da mesma forma como aconteceu na
DSURYDomRGRFDOHQGiULRHVVDSURSRVWDpGLVFXWLGDSHORVPHPEURVGHVHQYROYHGRUHV
GDFRPXQLGDGHQXPDOLVWDGHHPDLOHVSHFt¿FDWHQGRFRPRPHGLDGRUGDGLVFXVVmR
o UHOHDVHPDQDJHU$DSURYDomRRXQmRGDSURSRVWDVypGH¿QLGDPHVHVGHSRLV
TXDQGRRUHDOHDVHPDQDJHUID]XPOHYDQWDPHQWRGRUHVXOWDGRGDGLVFXVVmR

A colaboração dos usuários e a “temporada de caça aos bugs”!

 3DUDSRUHPSUiWLFDRSURFHVVRGHDEHUWXUDHOLEHUDomRLPHGLDWDGRFyGLJR
IRQWH SUHVHQWH QHVVH PRGHOR GH GHVHQYROYLPHQWR DEHUWR RV PDQWHQHGRUHV GRV
SDFRWHV GH VRIWZDUH GD *120( VHPSUH EXVFDP WUDWDU RV XVXiULRV GR desktop
FRPRFRGHVHQYROYHGRUHV±DVVLPFRPRDFRQWHFHGHIRUPDVHPHOKDQWHQRGHVHQ
YROYLPHQWR GR /LQX[ H GD GLVWULEXLomR 'HELDQ 'H IRUPD SDUDOHOD DR SURFHVVR GH
GHVHQYROYLPHQWR GD QRYD YHUVmR RV HUURV GH IXQFLRQDPHQWR bugs) da versão
DWXDOVmRUHSRUWDGRVSRUXVXiULRVGHWRGRVRVFRQWLQHQWHVGRJORERSDUDR Bugzilla
GD FRPXQLGDGH (VVHV HUURV VmR DYDOLDGRV SHOD HTXLSH GH WULDJHP GH bugs - a
%XJVTXDG  SDUD FHUWL¿FDUVH GH TXH RV SULQFLSDLV SUREOHPDV QmR SDVVDUmR GHV
percebidos pelos mantenedores dos pacotes.
 $VVLPGDGDDFRQWULEXLomRVLJQL¿FDWLYDGHXVXiULRVTXHVHFRPSRUWDPFRPR
EHWDWHVWHUVHFRGHVHQYROYHGRUHVSUDWLFDPHQWHWRGRRSUREOHPDUHODWLYRDDOJXP
aplicativo do desktop passa a ser detectado rapidamente e a sua respectiva solução
SRGH WDPEpP DFDEDU VH WRUQDQGR yEYLD SDUD DOJXQV TXH FRQWULEXHP DWp FRP
VXJHVW}HVGHQRYRVFyGLJRVSDUDDUHVROXomRGHDOJXQVbugs(VVDVFRQWULEXLo}HV
VHUYHPWDQWRSDUDDLPSOHPHQWDomRGHXPDYHUVmRHVWiYHOGRdesktopDWXDO LVWR
pXPDYHUVmRFRPRVbugs corrigidos) como para a correção de possíveis erros da
versão em desenvolvimento.
 1D YLVmR GH 5D\PRQG   VHULD H[DWDPHQWH QHVVH SRQWR TXH VH
FDUDFWHUL]DULDDGLIHUHQoDFHQWUDOHQWUHRVPRGHORVCatedral SURSULHWiULR HBazar
DFDGrPLFRDEHUWR .1RSULPHLURRVSUREOHPDVGHGHVHQYROYLPHQWROHYDPPHVHV
SHORIDWRGHSDVVDUSHODVPmRVGHSRXFDVSHVVRDVHVSHFLDOLVWDVQHFHVVLWDQGRGH
ORQJRVLQWHUYDORVSDUDRGHVHQYROYLPHQWRGHXPDQRYDYHUVmR±TXHWDPEpPQmR
VHUiSHUIHLWDHWUDUiQRYRVSUREOHPDV-iQRPRGHORED]DUSRURXWURODGRRVHUURV
VmRDVVXPLGRVFRPRIHQ{PHQRVPDLVWULYLDLVSHORIDWRGHVHUHPORJRH[SRVWRVSDUD
Software livre, cultura hacker e o ecossistema da colaboração • 49

FHQWHQDV GH iYLGRV FRGHVHQYROYHGRUHV GLVSRVWRV D HODERUDUHP H FRQWULEXtUHP


SDUDRDYDQoRWHFQROyJLFRGHXPDQRYDYHUVmR'HVVDIRUPDQXPDFRPXQLGDGH
GH GHVHQYROYLPHQWR WHFQROyJLFR FRPR D *120( XPD QRYD YHUVmR p OLEHUDGD D
FDGDVHLVPHVHVSDUDVHWHUPDLVFRUUHo}HVHFRPRXP³HIHLWRFRODWHUDO´SDVVDVH
DWHUDSRVVLELOLGDGHGHWHUWDPEpPPDLVFRQWULEXLo}HV

3HUtRGRVGHFRQJHODPHQWRHQWUDPHPFHQDRVPHPEURVQmR
programadores.

 1D PHGLGD HP TXH R SHUtRGR GH GHVHQYROYLPHQWR GR FDOHQGiULR GH
SODQHMDPHQWR DYDQoD FRPHoDP D DFRQWHFHU RV ³FRQJHODPHQWRV´ freezes)
DJHQGDGRV(VVHPpWRGRGH³SDUDGD´HPWHUPRVGHSURJUDPDomRGHFyGLJRVFULD
FRQGLo}HVSDUDTXHRXWUDVHTXLSHVGHFRODERUDomRWUDQVYHUVDOGDFRPXQLGDGHYLUWXDO
OLJDGDV D DWLYLGDGHV GH WUDGXomR GRFXPHQWDomR XVDELOLGDGH H DFHVVLELOLGDGH 
SRVVDP HQWUDU HP FHQD &RPR GHPRQVWUD R FDOHQGiULR GH SODQHMDPHQWR HVVHV
SHUtRGRV GH SDUDGD DFRQWHFHP DSyV R DQ~QFLR H D LPSOHPHQWDomR GH QRYDV
IXQFLRQDOLGDGHVQRVLVWHPDSRGHQGRVHUHVTXHPDWL]DGDVGDVHJXLQWHIRUPD

a) Congelamento de Funcionalidades±(VWHFRQJHODPHQWR HVWiUHODFLRQDGR DRV


VRIWZDUHV GD SODWDIRUPD API/ABI Freeze  FRPR WDPEpP DRV VRIWZDUHV GR
desktop Feature and Module Freeze). Essa parada acontece com o intuito de
SHUPLWLU  TXH D HTXLSH GR 3URMHWR GH 'RFXPHQWDomR GNOME Documentation
Project  FRPHFH D WUDEDOKDU QD HODERUDomR GH PDQXDLV GH XVR H GH¿QLomR GH
SDGU}HV WHFQROyJLFRVHGHHVFULWD SDUDHODERUDomRGRVPHVPRV. Na elaboração
GDYHUVmRHVVHVFRQJHODPHQWRVRFRUUHUDPHQWUHRVGLDVHGHMDQHLUR
GH.

b) Congelamento de Interface de UsuáriR±1HVWHSHUtRGRQHQKXPDGDVLQWHUIDFHV


JUi¿FDV tFRQHVERW}HVHMDQHODV GRVSURJUDPDVTXHFRPS}HPRdesktop pode
VHUDOWHUDGD$OpPGDHTXLSHGR3URMHWRGH'RFXPHQWDomRFRQWLQXDUDHODERUDU
RVPDQXDLVHDVGH¿QLo}HVGRVSDGU}HVHQWUDHPFHQDWDPEpPDHTXLSHGR
3URMHWRGH8VDELOLGDGH GNOME Usability Project (VVDHTXLSH¿FDUHVSRQViYHO
QHVVHPRPHQWRSRUUHYLVDUDVLQWHUIDFHVDSDUWLUGHHVSHFL¿FDo}HVHSDGU}HV
WpFQLFRVTXHVmRHVWDEHOHFLGRVSHORVHWRUGHHQJHQKDULDGHVRIWZDUHQRPXQGR
'HVVDIRUPDHOHVDX[LOLDPRVKDFNHUVGDFRPXQLGDGHQDFULDomRGHDSOLFDo}HV
LQWXLWLYDV DOpP GH RULHQWiORV SRU PHLR GD HODERUDomR GH SURMHWRV H GLUHWUL]HV
JUi¿FDVSDUDSUySULRdesktop GNOME.
50 • Software livre, cultura hacker e o ecossistema da colaboração

c) Congelamento das mensagens de comando dos softwares – Este período visa


LQLELUTXHTXDOTXHUPDQWHQHGRUGHDOJXPVRIWZDUHSRVVDDFUHVFHQWDUTXDOTXHU
PHQVDJHP ³H[WUD´ QDV EDUUDV GH PHQX GRV DSOLFDWLYRV FRPR ³6DOYDU´ RX
³,PSRUWDU$UTXLYR´SRUH[HPSOReDSDUWLUGHVVHFRQJHODPHQWRTXHDVYiULDV
HTXLSHV GR 3URMHWR GH 7UDGXomR GNOME Translation Project)4 começam a
WUDEDOKDUGHQWURGHXPDPELHQWHPDLVHVWiYHO,VVRSRUTXHFRPRHVVHSURMHWR
pFRPSRVWRSRUPDLVGHHTXLSHVYROXQWiULDVGHWUDGXomRHVSDOKDGDVSHOR
PXQGRDPRGL¿FDomRGHXPDPHQVDJHPDSyVHVVHFRQJHODPHQWRSRGHWUD]HU
XPLPSDFWREHPQHJDWLYRHPWHUPRVGHUHWUDEDOKR

d) Congelamento de Código±(VWH~OWLPRFRQJHODPHQWRpRPDLVUtJLGR$SDUWLU
GHVVHPRPHQWRTXDOTXHUPRGL¿FDomR¿FDLPSHGLGDGHVHULPSOHPHQWDGDVDOYR
DOJXPHUURGUiVWLFRTXH±SRUPRWLYRGHIRUoDPDLRUWHQKDVHTXHVHUPRGL¿FDGD
WHUiTXHWHURDYDOGRUHOHDVHWHDPDQWHV(QWUHHPFHQDGHVVDYH]DHTXLSH
GHPDUNHWLQJ GNOME Marketing Team)TXHLUiSUHSDUDUDVQRWDVTXHVHUmR
lançadas para imprensa e meios de comunicação em geral sobre a nova versão
do GNOME.

 $SyVDFRQFOXVmRGHVVHFLFORVHPHVWUDOGHSURGXomRHQWUHSDUHVRdesktop
SDVVDDVHUGLVSRQLELOL]DGRHSRVWHULRUPHQWHXWLOL]DGRSRUGLYHUVDVGLVWULEXLo}HVGR
VLVWHPDRSHUDFLRQDO*18/LQX[TXHVmRGHVHQYROYLGDVWDQWRSRUHPSUHVDVFRPR
SRURXWUDVFRPXQLGDGHVRQOLQHHVSDOKDVSHODUHGHPXQGLDOGHFRPSXWDGRUHV'H
DFRUGRFRPDVLQIRUPDo}HVTXHFRQVWDPQRVLWHGR3URMHWR*120(PDLVGH
GLVWULEXLo}HVGLIHUHQWHVGR*18/LQX[QRPXQGRDGRWDPHVVHdesktop livre.
 &RPR UHVXOWDGR GHVVH SURFHVVR PXQGLDO GH GLVWULEXLomR VHJXQGR )RVWHU
 VHPFRQWDUFRPDPDLRULDGRVXVXiULRVGRPpVWLFRVHPWRGRVRVSDtVHVTXH
QmRVmRFRQWDELOL]DGRVPDLVGHPLOSHVVRDVHP([WUHPDGXUDH$QGDOXL]DQD
(VSDQKDXPPLOKmRQD&KLQDHPLOSHVVRDVQRVWHOHFHQWURVGH6mR3DXORQR
%UDVLOXVDPR*120(FRPRRDPELHQWHGHdesktop dos seus computadores. Na
%DKLDGHDFRUGRFRP9D]  PDLVGHQRYHQWDPLOSHVVRDVHVWmRFDGDVWUDGDV
FRPRXVXiULRVQRV,QIRFHQWURVGR*RYHUQRGR(VWDGRTXHDGRWDPHVVHdesktop
OLYUHHPWRGDVDVHVWDo}HV$VVLPHPRXWUDVSDODYUDVSDUDDOpPGDFRPSOH[LGDGH
GRSURFHVVRGHSURGXomRRUHVXOWDGRGRWUDEDOKRFRODERUDWLYRGHVVHVKDFNHUVFRQ
segue ser distribuído livremente para os cinco continentes do planeta.
Software livre, cultura hacker e o ecossistema da colaboração • 51

Perspectiva da Dádiva e o Projeto GNOME

 6HJXQGR DV DQiOLVHV GH %HQNOHU   RV UHVXOWDGRV D H¿FLrQFLD H D


JUDQGHFDSDFLGDGHGHLQRYDomRLQFRUSRUDGRVDRSURFHVVRGHSURGXomRWHFQROyJLFD
SHOD H[SHULrQFLD RUJDQL]DFLRQDO GRV KDFNHUV FRORFD XP HQLJPD SDUD DV WHRULDV
FOiVVLFDVGD$GPLQLVWUDomR±DH[HPSORGD7HRULDGD)LUPDFRPRVHSRGHREVHUYDU
SHORH[HPSORGHSURGXomRFRODERUDWLYDHQmRFRQWUDWXDOGRSURMHWR*120(

³SURMHWRV GH VRIWZDUH OLYUH QmR GHSHQGHP GH PHUFDGRV QHP GH
JHVW}HVKLHUiUTXLFDVSDUDRUJDQL]DUVXDSURGXomR3URJUDPDGRUHVQmR
SDUWLFLSDPGHXPSURMHWRSRUTXHDOJXpPTXHpVHXFKHIHGLVVHTXHHUD
SDUDVHUIHLWR  $PDLRULDGRVSURFHVVRVGHSDUWLFLSDomRQRVSURMHWRV
QmRSRGHVHUHQWmRH[SOLFDGDSHODSUHVHQoDGLUHWDGHXPFRPDQGRGH
SUHoRRXGHTXDOTXHUUHWRUQRPRQHWiULR´ %HQNOHU 

 'HIRUPDFRQWUiULDDRTXHGHVFUHYHPDXWRUHVFRPR5RQDOG&RDVHHP$
1DWXUH]DGD)LUPDDRORQJRGHVVHSURFHVVRGHSURGXomRPHGLDGRSHORFRPSXWDGRU
HPHUJH XPD GLQkPLFD GH WUDEDOKR LQIRUPDO HQWUH SDUHV GH IRUPD HVSRQWkQHD H
³DXWRHYROXWLYD´ PDLV HODERUDGD H H¿FLHQWH TXH TXDOTXHU SODQHMDPHQWR FHQWUDO H
KLHUiUTXLFRSRGHULDDOFDQoDU$OpPGLVVR(ULF5D\PRQG  DLQGDD¿UPDTXHRV
KDFNHUVVmRHVWLPXODGRVSHORVLQWHUHVVHVGRSRGHUHGRUHFRQKHFLPHQWRLQGLYLGXDO
QXPDFRPXQLGDGHGHSDUHVRQGHVXDVSDL[}HVVmRVLPSOHVPHQWHFRPSDUWLOKDGDV
3DUWLQGRGHVVDSHUVSHFWLYDVXS}HVHTXH

³DµIXQomRHPSUHHQGHGRUD¶TXHRVKDFNHUVGR/LQX[ SRUH[HPSOR HVWmR


PD[LPL]DQGR QmR p HFRQRPLD FOiVVLFD PDV p D LQWDQJtYHO VDWLVIDomR
GR VHX SUySULR HJR H UHSXWDomR HQWUH RXWURV KDFNHUV $OJXpP SRGH
FKDPDU D VXD PRWLYDomR GH µDOWUXtVWD¶ PDV LVVR LJQRUD R IDWR TXH
DOWUXtVPR p HP VL PHVPR XPD IRUPD GH VDWLVIDomR GR HJR SDUD XP
DOWUXtVWD´ 5D\PRQG 

 (P RXWUDV SDODYUDV HVVD UHODomR SDUDGR[DO GH ³DOWUXtVPR´ H ³VDWLVIDomR


GR HJR´ FRPR XPD IRUPD GH UHWRUQR GR WUDEDOKR HPSUHHQGLGR QHVVHV SURMHWRV
FRPXQLWiULRVFRPRDGR.HUQHOGR/LQX[RXGRSURMHWR*120(QmRÀXLSRUWDQWR
VHJXQGRRVSDUkPHWURVHFRQ{PLFRVGRPHUFDGRRXGHTXDOTXHULQVWLWXLomRFRQWUDWXDO
3RU RXWUR ODGR %HQNOHU   +LDPHQP   &DVWHOOV   H 5D\PRQG
  DSRQWDP SDUD RXWUR WLSR GH HQWHQGLPHQWR ,VWR p HVVHV DXWRUHV UHODWDP
TXHDGLQkPLFDGHWUDEDOKRHPSUHHQGLGDSHORVKDFNHUVHVWDQGRGHVYLQFXODGDGH
LQVWLWXLo}HVFRPSHQVDWyULDVUHTXHURXWUDIRUPDGHYtQFXORVRFLDOHDGHVmRDXP
52 • Software livre, cultura hacker e o ecossistema da colaboração

RXWUR FRQMXQWR GH YDORUHV TXH DUWLFXODP DR PHVPR WHPSR D UHSXWDomR HQWUH RV
SDUHVFRPRSUD]HUHDDOHJULDGRDWRGHFULDU
 'HQWUHHVVHVYDORUHVVHJXQGR6WDOOPDQ  &DVWHOOV  H6LOYHLUD
 DOLEHUGDGH GHWHUDFHVVRGHXVDUGHFRQWULEXLUHUHGLVWULEXLUWRGRRFRQKH
FLPHQWR SRVVtYHO  p R YDORU VXSUHPR GRV KDFNHUV ± DSHVDU GH QmR VHU R ~QLFR
(VVDOLEHUGDGHSDUHFHWUDGX]LUVHHPXPMRJRGHUHSXWDo}HVHWURFDHQWUHSDUHV
TXDQGR D OyJLFD VRFLDO SDVVD D VHU GHWHUPLQDGD QmR SHOR UHWRUQR PRQHWiULR RX
SHODDFXPXODomRGHEHQVPDVVLPSHODLQIRUPDomRFRQKHFLPHQWRRXFyGLJR GH
SURJUDPDomR TXHp³GRDGR´(PRXWUDVSDODYUDVDGLQkPLFDHPSUHHQGLGDQRVHLR
GDFXOWXUDKDFNHUHVWDULDDVVLPDVVRFLDGDDXPD³UHJUDGHRXUR´IXQGDGDQDWULSOD
ação de dar, receber e retribuirTXH$SJDXD  &DVWHOOV  .ROORFN  
5D\PRQG  H%DUEURRN  GHQRPLQDUDPGHSUiWLFDGD³FXOWXUDGRGRP´
TXHLQGX]LULDDPDQLIHVWDomRGHXPDVXSRVWD³HFRQRPLDGDGiGLYD´ gift economy).
 7RGDYLDPHVPRVHQGRXWLOL]DGDSRUGLIHUHQWHVDXWRUHVYDOHUHVVDOWDUTXH
H[LVWHXPDGLIHUHQFLDomRFRQFHLWXDOHSUiWLFDHPWHUPRVGRHQWHQGLPHQWRGDGiGLYD
FRPRXPIHQ{PHQRVRFLDOHVXDUHODomRFRPRKDFNHULPRV1HVWHDUWLJRGHIRUPD
GLVWLQWD GD FRQFHSomR GH QDWXUH]D PDLV UHOLJLRVD RX GR VHQVR FRPXP D GiGLYD
QmRVHUiFRQVLGHUDGDFRPRXPDGRDomRDOWUXtVWLFDQRUPDOPHQWHFODVVL¿FDGDFRPR
PtVWLFD RX ³SXUD´ 'LIHUHQWHPHQWH GHVVH HQWHQGLPHQWR FRQVLGHUDUVHi D GiGLYD
FRPR XP FRQFHLWR DQWURSROyJLFR LQLFLDOPHQWH GHVHQYROYLGR SRU 0DUFHO 0DXVV QR
LQtFLR GR VpFXOR ;; VREUH XPD UHODomR VRFLDO GH P~OWLSODV GLPHQV}HV XP IDWR
VRFLDOIXQGDGRQDWULSODREULJDomRSDUDGR[DOGHdar, receber e retribuir.
 ,VVR VLJQL¿FD GL]HU TXH GH DFRUGR FRP WDO FRQFHSomR D GiGLYD QmR p
FRQVLGHUDGDFRPRXPREMHWRRXXPEHPGRDGRDGiGLYDpXPDUHODomRGHWURFDHP
TXHREHPFLUFXODHPQRPHRXDIDYRUGRYtQFXORHQWUHRVDWRUHVHQWUHXPFROHB
WLYR(VVHEHPTXHDFDEDVHUYLQGRGH³SRQWH´SDUDDUHODomRSRGHVHUWDQWRXP
REMHWR PDWHULDOWDQJtYHO FRPRWDPEpPXPDSDODYUDXPDLGHLDXPFRQKHFLPHQWR
RXXPFyGLJRIRQWH'HVVDIRUPDID]VHQHFHVViULR GHPRQVWUDUTXHHVVDQRomR
PDXVVLDQD GD GiGLYD DEUH D SRVVLELOLGDGH SDUD D FRPSUHHQVmR GR SURFHVVR GH
GHVHQYROYLPHQWR FRODERUDWLYR HQWUH RV KDFNHUV QmR FRPR XPD DomR SXUDPHQWH
DOWUXtVWLFDPDVFRPRXPDDomRKXPDQDSDUDGR[DODRPHVPRWHPSRLQWHUHVVDGD
HGHVLQWHUHVVDGDHVSRQWkQHDHREULJDGD

A dádiva como fenômeno antropológico

³)HOL]PHQWHQHPWXGRHVWiDLQGDFODVVL¿FDGRH[FOXVLYDPHQWHHPWHUPRV
$SHVDU GH VHU XVDGR SRU WRGRV HVVHV DXWRUHV FRPR XPD UHIHUrQFLD LQWHUSUHWDWLYD R WHUPR ³GRP´ p PXLWDV YH]HV
WUDGX]LGRSDUDDOtQJXDSRUWXJXHVDSRUPHLRGDSDODYUDGiGLYDRXDGHSHQGHUGDRWUDGXWRUDSRGHSHUPDQHFHUVHP
WUDGXomR3DUDDOtQJXDLQJOHVDDSDODYUD³GRP´pWUDGX]LGDSDUDgift.
Software livre, cultura hacker e o ecossistema da colaboração • 53

GH FRPSUD H YHQGD$V FRLVDV WrP DLQGD XP YDORU GH VHQWLPHQWR SDUD DOpP GR
PXQGR YHQDO´ 0DXVV   7UD]HQGR FRQVWDWDo}HV FRPR HVVD ODQoDGDV
DRXQLYHUVRGDVFLrQFLDVKXPDQDVQDVSULPHLUDVGpFDGDVGRVpFXOR;;SRUPHLR
da obra Ensaio sobre a Dádiva7 0DUFHO 0DXVV OHYDQWD R YpX GD LQFRPSUHHQVmR
VREUH DTXLOR TXH DOJXQV SHVTXLVDGRUHV FRQVLGHUDULDP  DQRV PDLV WDUGH  FRPR
XPGRVSLODUHVGHFRQVWLWXLomRGDVVRFLHGDGHVKXPDQDVDWULSODREULJDomRGHdar,
receber e retribuirRXVLPSOHVPHQWHDdádiva3RUPHLRGDDQiOLVHGHXPDVpULHGH
SHVTXLVDVHWQRJUi¿FDVDVVRFLDGDVDGLIHUHQWHVSRYRVGDVPDLVGLYHUVDVUHJL}HV
GR JORER FRPR 3ROLQpVLD 0HODQpVLD 1RURHVWH $PHULFDQR H $XVWUiOLD  0DUFHO
Mauss desenvolveu um estudo sobre a forma e o sentido da circulação e da troca
GHEHQVHPVRFLHGDGHVGLWDV³DUFDLFDV´RX³SULPLWLYDV´
 $VVLP 0DXVV S{GH FRQVWDWDU D SDUWLU GH DQiOLVHV HPStULFDV TXH QmR
H[LVWLDDVLPSOHVWURFDGHEHQVHQWUHLQGLYtGXRVSRLVWDLVUHODo}HVVHHVWDEHOHFLDP
HQWUHFROHWLYLGDGHV FOmVWULERVHIDPtOLDV TXHVHREULJDPPXWXDPHQWHHQmRHQWUH
LQGLYtGXRV (P VHJXQGR OXJDU RV EHQV WURFDGRV QmR HUDP DSHQDV REMHWRV ~WHLV
GRSRQWRGHYLVWDHFRQ{PLFRHVLPDQWHVGHWXGRUHSUHVHQWDYDPDPDELOLGDGHV
IHVWDVVHUYLoRVGRPpVWLFRVULWXDLVFRQKHFLPHQWRVHGDQoDVTXHWHFLDPYtQFXORV
VRFLDLV$VWURFDVFRPHUFLDLVRXPHUFDQWLVUHSUHVHQWDYDPDSHQDVXPGRVPRPHQWRV
GHVVDVUHODo}HVHDFLUFXODomRGHULTXH]DDSHQDVXPGRVWHUPRVGHXP³FRQWUDWR´
mais geral e permanente.
 0DUFHO0DXVVHQWmRUHMHLWRXDSRVVLELOLGDGHGHFRPSUHHQGHUHVVDVUHOD
o}HV GH WURFD VRE D yWLFD XWLOLWiULD GR PHUFDGR HP TXH LQGLYtGXRV HP FRQGLo}HV
GH HVFDVVH] WURFDULDP H[FOXVLYDPHQWH EHQV H VHUYLoRV SDUD VDWLVIDomR GH VXDV
QHFHVVLGDGHVHOHPHQWDUHVFRQVWLWXLQGRXPDHVSpFLHGH³HFRQRPLDQDWXUDO´RXXP
VLVWHPD GH HVFDPER ³e DLQGD XPD QRomR FRPSOH[D D TXH LQVSLUD WRGRV RV DWRV
HFRQ{PLFRVTXHGHVFUHYHPRVHHVVDQRomRQmRpQHPDGDSUHVWDomRSXUDPHQWH
OLYUHHJUDWXLWDQHPDGDSURGXomRHGDWURFDSXUDPHQWHLQWHUHVVDGDVGR~WLOe
XPDHVSpFLHGHKtEULGR  ´ 0DXVV 'HVVDIRUPDLQLFLDOPHQWH

³00DXVVQRVWLQKDSULQFLSDOPHQWHVHUYLGRSDUDVHGLPHQWDUDFUtWLFDGR
XWLOLWDULVPRHGRHFRQRPLFLVPRFRUURERUDQGRDLQWXLomRSRUVLPHVPD
HYLGHQWHTXHQDDomRVRFLDOFHUWDPHQWHHQWUDRFiOFXORHRLQWHUHVVH
$UHIHUrQFLDHPIUDQFrVGHVWDREUDpEssai sur le don, forme et raison de l’échange dans les sociétés archaïques,
in: Sociologie et Anthropologie, collection quadrige HG38) 3DULV  HPERUD HVWH WH[WR WHQKD VLGR LQLFLDOPHQWH
SXEOLFDGRQXPDRXWUDUHYLVWDIUDQFHVD O’Année Sociologique HPFRRUGHQDGDSHORWLRGH0DUFHO0DXVVR
VRFLyORJR('XUNKHLP
7RGDYLDYDOHVXEOLQKDUTXHDGLVWLQomRIHLWDLQLFLDOPHQWHSRU0DXVVHQWUHdar, receber e retribuirSDUDH[SUHVVDUD
WULSOD DomR GD GiGLYD p VLPSOHVPHQWH GH QDWXUH]D DQDOtWLFD SDUD H[SOLFDU HVVH PHVPR IHQ{PHQR 1XPD UHODomR GH
GiGLYDDSHVVRDTXHGRDDOJRSRGHHVWDUQDYHUGDGHUHWULEXLQGRSHORIDWRGHMiWHUUHFHELGRGHWHUFHLURV HPRXWUR
PRPHQWR RXGHTXHPHVWiVHQGREHQH¿FLDGRSRUHODQHVVHGHWHUPLQDGRLQVWDQWH
 0DUFHO 0DXVV QmR UHDOL]RX QHQKXPD SHVTXLVD HWQRJUi¿FD in loco (OH EDVHRX VXDV DQiOLVHV HP SHVTXLVDV
DQWURSROyJLFDVHPVRFLHGDGHV³DUFDLFDV´TXHIRUDPGHVHQYROYLGDVSRUJUDQGHVHWQyORJRVFRPR7KXUQZDOG0DOLQRZVNLF
%RDVHQWUHRXWURV
54 • Software livre, cultura hacker e o ecossistema da colaboração

PDWHULDO RX LPDWHULDO PDV QmR VRPHQWH LVVR HQFRQWUDVH WDPEpP


REULJDomR HVSRQWDQHLGDGH DPL]DGH H VROLGDULHGDGH HP VXPD D
GiGLYD´ &DLOOp 

A dádiva moderna

 7RGDYLDD GiGLYDFRPRXPIHQ{PHQRVRFLDOpDLQGDHVWXGDGDSRUDOJXQV
cientistas sociais10  TXH D FRQVLGHUDP FRPR ³R´ SULQFtSLR EDVLODU GH XP PRGHOR
VRFLROyJLFR H DWp PHVPR FRPR ³R´ SDUDGLJPD GDV FLrQFLDV VRFLDLV ³3DUD WHQWDU
DYDQoDUQDUHDOL]DomRGHWDOSURMHWRpSUHFLVRDQWHVGHPDLVQDGDYHQFHUDWLPLGH]
GH 0DUFHO 0DXVV H FRPR VXJHULPRV IRUPXODU D KLSyWHVH GH TXH D GiGLYD QmR
GL]UHVSHLWRVRPHQWHjVVRFLHGDGHVSULPLWLYDV´ *RGERXW (PRXWUDV
SDODYUDV HVVHV DFDGrPLFRV ± DSHOLGDGRV GH PDXVVLDQRV  YrP EXVFDQGR GH
PRQVWUDUTXHDGiGLYDQmRpXPIHQ{PHQRLUUHOHYDQWHDVVRFLDGRDSHQDVDVRFLH
GDGHV DQWLJDV RX WUDGLFLRQDLV 3DUD HOHV D GiGLYD p XP IHQ{PHQR VRFLDO TXH VH
PDQLIHVWD LQWHQVDPHQWH QD VRFLHGDGH FRQWHPSRUkQHD HPERUD GH XPD PDQHLUD
DOWHUDGDTXHVHID]LPSRUWDQWHFRPSUHHQGHU
 'H IRUPD VLPSOL¿FDGD SRGHVH GL]HU TXH QR PXQGR FRQWHPSRUkQHR
HVVHIHQ{PHQRSRGHHVWDUDVVRFLDGRDWXGRRTXHFLUFXODQDVRFLHGDGHTXHQmR
HVWiVLWXDGRQDHVIHUDGR(VWDGR UHGLVWULEXLomR QHPQDGRPHUFDGRHQHPQD
LOHJDOLGDGHGHFLUFXLWRVTXHHQYROYHPDYLROrQFLDItVLFD(GHPRGRSRVLWLYRDGiGLYD
HVWiOLJDGDDWXGRRTXHFLUFXODDIDYRURXHPQRPHGROLDPHVRFLDO3RULVVRREHP
TXHFLUFXODpDQWHVGHWXGRDHQFDUQDomRGR³HVStULWR´GRGRDGRUDUHSUHVHQWDomR
VLPEyOLFD GR GHVHMR GH HVWDEHOHFHU RX PDQWHU XPD UHODomR 3RU H[HPSOR ³EDVWD
SHQVDUQRTXHFLUFXODHQWUHDPLJRVHQWUHYL]LQKRVHQWUHSDUHQWHVVREDIRUPDGH
SUHVHQWHVGHKRVSLWDOLGDGHHGHVHUYLoRV1DVRFLHGDGHPRGHUQDDGiGLYDFLUFXOD
WDPEpPHQWUHGHVFRQKHFLGRVGRDo}HVGHVDQJXHGHyUJmRV¿ODQWURSLDGRDo}HV
KXPDQLWiULDV EHQHYROrQFLD´ *RGERXW    7XGR LVVR VHP PHQFLRQDU  R
FRQKHFLPHQWR D LQIRUPDomR H DV WHFQRORJLDV11 TXH VmR OLYUHPHQWH GLVWULEXtGRV H
FRPSDUWLOKDGRVHQWUHHVWUDQKRVQRFLEHUHVSDoR
 *RGERXW   DLQGD HYLGHQFLD TXH QXP VLVWHPD GH GiGLYDV RV DWRUHV
VRFLDLVWHQGHPDVHDIDVWDUGDHTXLYDOrQFLDSUySULDGDVWURFDVFRPHUFLDLV±RTXH

&RPRXPH[HPSORGHHVWXGLRVRVVREUHHVVHIHQ{PHQR*RGERXW  FLWDRV³PDXVVLDQRV´LVWRpXPJUXSRGH


FLHQWLVWDV VRFLDLV HP WRUQR GD Revue du MAUSS 0RXYHPHQW$QWL8WLOLWDULVWH GHV 6FLHQFHV 6RFLDOHV  GLULJLGD SHOR
VRFLyORJR$ODLQ&DLOOpTXHVHGHGLFDPDRHVWXGRGDGiGLYDFRPRXPIHQ{PHQRDQWURSROyJLFR
 9DOH UHVVDOWDU TXH D LQIRUPDomR R FRQKHFLPHQWR H D WHFQRORJLD FRPR SRU H[HPSOR RV VRIWZDUHV  VmR EHQV GH
WURFDFODVVL¿FDGRVSHORVHFRQRPLVWDVFRPR³QmRULYDLV´2XVHMDVmRXPWLSRGHEHPTXHSRGHVHUDSURSULDGRXVDGR
FRQVXPLGR WURFDGRHFRPSDUWLOKDGRSRUPXLWDVSHVVRDVGHIRUPDVLPXOWkQHDSHORIDWRGHVHULQWDQJtYHOHLPDWHULDO
6LOYHLUD   UHVVDOWD DLQGD TXH ³GLIHUHQWHPHQWH GH XPD FDGHLUD RX GH XP FDUUR XP EHP GH QDWXUH]D QmRULYDO
p LQFDSD]  GH VH WRUQDU HVFDVVR SRLV HOH QmR VH GHSUHFLD GHVJDVWD  XPD FySLD GR PHVPR H[HPSODU QmR SRVVXL
GLIHUHQoDDOJXPDGDRULJLQDOHRFRPSDUWLOKDPHQWRGHVWHWLSRGHEHPSHUPLWHTXHYiULDVSHVVRDVXWLOL]HPRPHVPR
H[HPSODUGHIRUPDVLPXOWkQHD´
Software livre, cultura hacker e o ecossistema da colaboração • 55

WDPEpP QmR VLJQL¿FD D H[LVWrQFLD GH DOJR XQLODWHUDO FRPR QR FDVR GD HVPROD12.
$RFRQWUiULR$SHVDUGHQmRVHUHPVLRREMHWLYRSRUWUiVGDWURFDDVUHWULEXLo}HV
H[LVWHPHPXLWDVYH]HVVmRPDLRUHVTXHDGiGLYDLQLFLDO³'iVHUHFHEHVHPXLWDV
YH]HV PDLV PDV D UHODomR HQWUH RV GRLV p PXLWR PDLV FRPSOH[D H GHVPRQWD R
PRGHOROLQHDUGDUDFLRQDOLGDGHLQVWUXPHQWDO´ *RGERXW ,VVRRFRUUHSRU
TXHHQTXDQWRRPHUFDGRVHEDVHLDQDOLTXLGDomRGDGtYLGDDGiGLYDVHEDVHLDHP
UHODo}HV GH HQGLYLGDPHQWR P~WXR 6y TXH QHVVH IHQ{PHQR QmR VH HVWi IDODQGR
QXPD³GtYLGD¿QDQFHLUD´
 1HVVHVLVWHPDGHGDUUHFHEHUHUHWULEXLUH[LVWHXPDDOWHUQkQFLDGDSRVLomR
QHJDWLYDHSRVLWLYDHPUHODomRDRVHQWLPHQWRGHGtYLGDLVWRpKiXPDDOWHUQkQFLD
GHTXHPVHFRQVLGHUDTXHHPWHUPRVJHUDLVUHFHEHXPDLVGRTXHGRRX3DUWLQGR
GHVVHSULQFtSLRGDPHVPDIRUPDTXHDVUHODo}HVGHPHUFDGRVHIXQGDPHQWDPQD
OLTXLGDomRGRYtQFXORHGDGtYLGDHQWUHRVDWRUHVDGiGLYDVHDOLPHQWDSRUDPERV
FRPRDOJRYROXQWDULDPHQWHPDQWLGRSRLV³RVREMHWRVGRDGRVDFHLWRVHUHWULEXtGRV
QmRVHµWURFDP¶QHPSRUTXHVmR~WHLVQHPHPUD]mRGDVXDHTXLYDOrQFLDPRQHWiULD
PDV SRUTXH VLJQL¿FDP VLPEROLFDPHQWH D YRQWDGH GH VH FRQVWLWXLU UHODomR faire
lien ´ )UDQoD)LOKR 3RULVVRRVHQWLPHQWRGHGtYLGDQmRpDSHQDVRHOH
PHQWRTXHGLVWLQJXHXPVLVWHPDGHGiGLYDGRPHUFDGRPDVRJUDQGHSLODUGHVVH
VLVWHPDGHHQGLYLGDPHQWRP~WXRTXHVHHVWDEHOHFHHPQRPHGRYtQFXORVRFLDOHGR
TXHHOHUHSUHVHQWDVLPEROLFDPHQWH

A dádiva entre estranhos

6HJXQGR )UDQoD )LOKR H ']LPLUD   D SDUWLU GHVVD GXDOLGDGH SUiWLFD


H FRQFHLWXDO HQWUH D GiGLYD H DV WURFDV GH PHUFDGR p SRVVtYHO WDPEpP ID]HU D
GLVWLQomR HQWUH GRLV WLSRV GH VRFLDOLGDGH D primária13 e a secundária. Em outras
SDODYUDVLVVRVLJQL¿FDUHFRQKHFHUXPDFODUDGLVWLQomRHQWUHUHODo}HVVRFLDLVPDLV
tQWLPDV VRFLDOLGDGH SULPiULD  HP TXH D SHUVRQDOLGDGH GDV SHVVRDV H R YtQFXOR
HQWUH HODV p PDLV LPSRUWDQWH TXH D IXQomR TXH HODV GHVHPSHQKDP H DV RXWUDV
UHODo}HVVXEPHWLGDVj³OHLGDLPSHVVRDOLGDGH´ VRFLDOLGDGHVHFXQGiULD HPTXH±
GHIRUPDFRQWUiULDjSULPHLUDRTXHLPSHUDQmRpDSHVVRDHPVLPDVDIXQomR
RXFDUJRTXHHODRFXSD
$HVPRODpFODVVL¿FDGDSHODDQWURSRORJLDPDXVVLDQDFRPRXPFDVRVLQJXODUGHGiGLYDXQLODWHUDODXPGHVFRQKHFLGR
,VVRSRUTXHHODVHGH¿QHFRPRXPDGiGLYDTXHH[FOXLD¿UPDQGRXPDGRPLQDomRGHQWURGHXPDUHODomRFDUDFWHUL]DGD
SHODLPSRVVLELOLGDGHGRUHFHEHGRUGHUHWULEXLU$VVLP³GDHVPRODQDUXDjDMXGDDR7HUFHLUR0XQGRDVVLVWHVHjPHVPD
SHUYHUVmR GD GiGLYD VDOYR TXDQGR p WUDQVSRVWD SDUD XP VLVWHPD UHOLJLRVR YLVWR TXH VHUi µUHWULEXtGD DR FrQWXSOR¶
SRUQLQJXpPPHQRVTXHRSUySULR'HXV´  ³$GLPHQVmRHVSLULWXDOSRGHQHXWUDOL]DURVIHLWRVSHUYHUVRVGDGiGLYD
XQLODWHUDODXPGHVFRQKHFLGRLQFDSD]GHUHWULEXLU PDVLVVRQmRVHSURGX]QHFHVVDULDPHQWH ´ *RGERXW 
6HJXQGR&DLOOp³DGLPHQVmRGDVRFLDELOLGDGHSULPiULDpDTXHODRQGHVHGHVHQYROYHPDVUHODo}HVIDPLOLDUHVGH
YL]LQKDQoDDFDPDUDGDJHPRDPRUDDPL]DGHHQmRSRGHVHUHUUDGLFDGD0DVQDVRFLHGDGHVHJXQGDHPRXWUDV
SDODYUDV QD VRFLHGDGH PRGHUQD ± D VRFLHGDGH IRUPDOPHQWH UDFLRQDOL]DGD GLULD :HEHU ± DV GLPHQV}HV SHVVRDLV H
SULPiULDVVmRKLHUDUTXLFDPHQWHGRPLQDGDVSHORLPSHUDWLYRGDH¿FiFLDIXQFLRQDO´ &DLOOp 
56 • Software livre, cultura hacker e o ecossistema da colaboração

 3DUWLQGR GHVVD SHUVSHFWLYD SDUD DOpP GD HVIHUD GRPpVWLFD VRFLDOLGDGH


SULPiULD RH[HPSORGHGLYHUVDVRUJDQL]Do}HVHPWRGRPXQGRTXHVHHUJXHPD
SDUWLUGRWUDEDOKRYROXQWiULRGRVVHXVPHPEURVWRUQDPDLVLQWHOLJtYHODQRomRGHTXH
QHP WRGDV DV UHODo}HV HFRQ{PLFDV HQWUH HVWUDQKRV DVVXPHP D IRUPD GH WURFDV
FRPHUFLDLV RX HVWmR YLQFXODGDV jV Do}HV UHGLVWULEXWLYDV GR (VWDGR VRFLDOLGDGH
VHFXQGiULD $GRDomRGHVHUYLoRVHEHQV GHWRGDQDWXUH]D HQWUHGHVFRQKHFLGRV
 LVWR p QXPD UHODomR VHP YtQFXOR SULPiULR HQWUH R GRDGRU H R GRQDWiULR  YHP
VH PDQLIHVWDQGR FRPR DOJR FDGD YH] PDLV SUHVHQWH QR PXQGR FRQWHPSRUkQHR
3RGHVHSRUWDQWRSDUWLUGRSUHVVXSRVWRTXH³DPRGHUQLGDGHHVWiDVVLVWLQGRDRGH
VHQYROYLPHQWRGHXPDIRUPDLQpGLWDGHGiGLYDDGiGLYDHQWUHHVWUDQKRVQDTXDO
HODMiQmRVHUYHSDUDGDURULJHPRXSDUDFRQVROLGDUUHODo}HVVRFLDLVHVWiYHLVTXDVH
FRPXQLWiULDVPDVDOLPHQWDUHGHVDEHUWDVSRWHQFLDOPHQWHDRLQ¿QLWRPXLWRDOpPGR
LQWHUFRQKHFLPHQWRFRQFUHWR´ &DLOOp
 3DUWLQGRGHVVDSHUVSHFWLYDDXWRUHVFRPR*RXGERXW  UHVVDOWDPTXH
HVVDFLUFXODomRGHEHQVHVHUYLoRVGHEDVHYROXQWiULDORQJHGHVHUXPUHVtGXRGDV
VRFLHGDGHVWUDGLFLRQDLVpXPDFDUDFWHUtVWLFDGDVRFLHGDGHPRGHUQD1DVRFLHGDGH
FRQWHPSRUkQHD RX VRFLHGDGH HP UHGH  DVVLVWHVH D XP H[WHQVR OHTXH GH H[SH
ULrQFLDVOLJDGDVDWUDEDOKRVYROXQWiULRVHHQJDMDPHQWRVDVVRFLDWLYRVHPWRGRVRV
FRQWLQHQWHVGRSODQHWD6HMDQRPXQGRPDUFDGRSHODLQH¿FLrQFLDGRHVWDGRHGR
PHUFDGRQDSURPRomRGREHPHVWDUVRFLDOVHMDQXPRXWURPXQGRTXHWUD]jWRQD
SUREOHPiWLFDV UHODFLRQDGDV DR GHVHQYROYLPHQWR H[DFHUEDGR GHVVDV LQVWLWXLo}HV
RXWUDVIRUPDVGHVROLGDULHGDGHHFRODERUDomRP~WXDVHH[SULPHPSRUPHLRGHUHGHV
VRFLDLVFRPXQLGDGHVYLUWXDLVDVVRFLDo}HVHGLYHUVDVDWLYLGDGHVFROHWLYDVVHP¿QV
OXFUDWLYRV³(PWRGRVHVVHVH[HPSORVTXHUVHWUDWHGHXPWLSRWUDGLFLRQDOLVWDRX
PRGHUQRpFODURTXHRHQJDMDPHQWRDVVRFLDWLYRHYROXQWiULRLPSOLFDTXHDSHVVRD
Gr XPD SDUFHOD GH VHX WHPSR H VH HPSHQKH SHVVRDOPHQWH HP DOJXPD WDUHID´
&DLOOp 
 eHVVHFDUiWHUOLYUH LVWRpQmRFRQWUDWXDORXREULJDGR GRVVHUYLoRVSUHV
WDGRV SRU SHVVRDV QmR UHPXQHUDGDV SDUD ¿QV QmROXFUDWLYRV TXH DSUR[LPD HVVH
XQLYHUVRGHRUJDQL]Do}HVGR³HVStULWRGDGiGLYD´1RHQWDQWR*RGERXW  DOHU
WDTXHDSHQDVRFULWpULRGDQmRUHPXQHUDomRQmRpVX¿FLHQWHSDUDFDUDFWHUL]DUR
FDPSRWmRKHWHURJrQHRGHRUJDQL]Do}HVHH[SHULrQFLDVTXHIXQFLRQDPFRPEDVH
QXP VLVWHPD GH GiGLYDV 2XWUR IDWRU GH LJXDO LPSRUWkQFLD HVWi OLJDGR DR IDWR GH
HVVDV RUJDQL]Do}HV GHPRQVWUDUHP HP VHXV REMHWLYRV XPD DEHUWXUD SDUD RXWUDV
SHVVRDV TXH QmR VmR PHPEURV QHP ID]HP SDUWH GR Q~FOHR FHQWUDO (P RXWUDV
SDODYUDV HVVDV RUJDQL]Do}HV HVWmR VHPSUH ³DEHUWDV´ SDUD QRYDV SHVVRDV SDUD
novos vínculos.
 ¬OX]GHVVHHQWHQGLPHQWRGDGiGLYDPRGHUQDFRPRXPVLVWHPDGDDomR
Software livre, cultura hacker e o ecossistema da colaboração • 57

KXPDQD QR PXQGR FRQWHPSRUkQHR WRUQDPVH PDLV HYLGHQWHV FHUWDV FRQGLo}HV


SDUDVHFRPSUHHQGHUDQDWXUH]DGRWUDEDOKRYROXQWiULRHPRUJDQL]Do}HVVHP¿QV
OXFUDWLYRV H VXD VLQJXODULGDGH HP FRPSDUDomR FRP RXWUDV OyJLFDV GH WUDEDOKR ±
FRPREHPGHPRQVWURX&ODULVVD6DOD]DU  HPVXDSHVTXLVDHWQRJUi¿FDQXPD
JUDQGHDVVRFLDomREDLDQDTXHVHDSyLDWDQWRQRHQJDMDPHQWRYROXQWiULRGHVHXV
PHPEURVFRPRWDPEpPQDFRQWUDWDomRGHSUR¿VVLRQDLV(PRXWUDVSDODYUDVSRGH
VH SRUWDQWR SDUWLU GR SULQFtSLR TXH HVVD WLSRORJLD GD DomR KXPDQD SHUPLWH XP
DSURIXQGDPHQWRGRROKDUFLHQWt¿FRVREUHDLQWULJDQWHGLQkPLFDGHWUDEDOKRQmRFRQ
WUDWXDOHPSUHHQGLGDSHORVKDFNHUVQD,QWHUQHWFRPRXPIDWRVRFLDOPXLWRDOpPGD
GLQkPLFDOLJDGDjHVIHUDGRPHUFDGRRXGR(VWDGR

O GNOME e a dádiva mediada por computador

Para DSURIXQGDURHQWHQGLPHQWRVREUHDHVVrQFLDGRWUDEDOKRDGRWDGRSHORV
KDFNHUVQRSURFHVVRGHSURGXomRFRODERUDWLYRGR3URMHWR*120(DSHVTXLVD14TXH
IXQGDPHQWRXHVWHDUWLJROHYRXLQLFLDOPHQWHHPFRQVLGHUDomRTXHHVVDGLQkPLFDGH
WUDEDOKR HVWDULD GH IRUPD JHUDO IXQGDGD HP XPD HVSpFLH GH HQJDMDPHQWR HPL
QHQWHPHQWHYROXQWiULRHQmRFRQWUDWXDO(VVHWUDEDOKRYROXQWiULRVHJXQGRWDOSUHV
VXSRVWRQmRHVWDULDVHQGRHPSUHHQGLGRGHQWURGHSULQFtSLRVLQVWUXPHQWDLVHLQGL
YLGXDOLVWDVPDVVRESULQFtSLRVGHOLEHUGDGHHREULJDomRLQWLPDPHQWHLPEULFDGRVSRU
PHLRGRVTXDLVUHDOL]DVHXPREMHWLYRFRPXPRGHVHQYROYLPHQWRHDGLVWULEXLomR
GHXPVLVWHPDFRPSXWDFLRQDOOLYUH,VVRFRPRD¿UPD&DLOOp  ³WHQGRHPYLVWD
TXH RV LQWHUHVVHV GH JOyULD H SUHVWtJLR GH VHU GRPLQDP KLHUDUTXLFDPHQWH WDQWR
SRVLWLYDFRPRQRUPDWLYDPHQWHRVLQWHUHVVHVLQVWUXPHQWDLVGHSRVVHRVLQWHUHVVHV
GRWHU´ &DLOOp
 'LWR GH RXWUD PDQHLUD DR DQDOLVDU D GLQkPLFD GH WUDEDOKR GR SURMHWR
*120(SDUWLXVHGRSULQFtSLRTXHRWUDEDOKRKDFNHUQHVVDRUJDQL]DomRSRGHULD
VHUHQWHQGLGRSRUPHLRGHXPDWHRULDSOXULGLPHQVLRQDOHSDUDGR[DOGDDomRKXPDQD
±GHQRPLQDGDGHWHRULDDQWURSROyJLFDGD'iGLYD7DOWHRULDFRPRIRLDQWHULRUPHQWH
DSUHVHQWDGDOHYDHPFRQVLGHUDomRTXDWURGLPHQV}HVGDDomRKXPDQDLQWHUHVVHV
HGHVLQWHUHVVHREULJDomRHOLEHUGDGHLUUHGXWtYHLVXPDVjVRXWUDVQRFRQWH[WRGR
IDWRVRFLDODQDOLVDGR3DUWLQGRGHWDOSHUVSHFWLYDHVWDSHVTXLVDDGRWRXXPDJUDGH
DQDOtWLFD YLGH WDEHOD  GHVHQYROYLGD SDUD IDFLOLWDU R SURFHVVR GH HQWHQGLPHQWR GD
GLQkPLFDVRFLDOGRVKDFNHUVQR3URMHWR*120(jOX]GRFRQFHLWRDQWURSROyJLFRGD
'iGLYD

3DUDXPDPHOKRUFRPSUHHQVmRGDVHVSHFL¿FLGDGHVGRPpWRGRQHWQRJUi¿FRTXHQRUWHRXDUHDOL]DomRGHVWHHVWXGR
DFDGrPLFRYHUDGLVVHUWDomRLQWLWXODGD³2V$UJRQDXWDVGD,QWHUQHWXPD$QiOLVHQHWQRJUi¿FDVREUHDFRPXQLGDGHRQ
line de software livre do projeto GNOME à luz da teoria da Dádiva”TXHVHHQFRQWUDGLVSRQtYHOQROLQNKWWSZZZDGP
XIEDEUSXESXEOLFDFDR0$$'LVVHUWDFDR*QRPH9HUVDR)LQDOSGf
58 • Software livre, cultura hacker e o ecossistema da colaboração

Grade Analítica
Conceito Dimensões Indicadores
Reconhecimento
Diversão
Interesse Prazer/ Paixão
Poder (Meritocracia)
'HVD¿R$SUHQGL]DGR7pFQLFR

7UDEDOKDU-XQWR

9ROXQWiULR QmRUHPXQHUDGR
Dádiva
&RPSDUWLOKDPHQWR'RDomR
Desinteresse
*UDWXLGDGH
(VSRQWDQHLGDGH$o}HVQmR
FDOFXODGDV

&DXVD0LOLWkQFLD
5HODomRQmRFRQWUDWXDO
7UDEDOKRQR7HPSROLYUH
$XWRQRPLD3ROtWLFD 'HFLVmR
Liberdade
$EHUWXUDSDUDHQWUDUHVDLU

6HQWLPHQWRGHGtYLGD
/LYUH5HWULEXLomR
Obrigação &RPSURPLVVR
5HJUD,PSOtFLWD
Software livre, cultura hacker e o ecossistema da colaboração • 59

Interesse±SDUDRVPDXVVLDQRVGHPDQHLUDDOJXPDDGiGLYDFRPRXPDWLSRORJLD
GD DomR KXPDQD p GHVSURYLGD GH LQWHUHVVH 1R HQWDQWR VHJXQGR &DLOOp  
SDUD WUD]HU XP PtQLPR GH FODUH]D SDUD HVVD GLPHQVmR p QHFHVViULR GLVWLQJXLU R
LQWHUHVVH SRU WUiV GD DomR KXPDQD HP GXDV FDWHJRULDV GLIHUHQWHV R ³interesse
em” H R ³interesse por” 2 SULPHLUR WHP XPD QDWXUH]D LQVWUXPHQWDO TXDQGR XPD
GHWHUPLQDGD DomR p IHLWD QmR SRUTXH VH WHP SUD]HU HP UHDOL]iOD PDV SRUTXH
se tem interesse emID]rODSDUDDOFDQoDURXWURV¿QVGHQWURGHXPDSHUVSHFWLYD
XWLOLWiULD3RURXWURODGRTXDQGRVHVHQWHinteresse porDOJXpPRXSRUDOJRDDomRVH
HIHWXDSRUVLVySRUSDL[mRWRUQDQGRVHHODXP¿PHPVLPHVPD. Partindo dessa
GLVWLQomRSRGHVHGL]HUTXHDGiGLYDHVWiOLJDGDDXPDDomRTXHVHHIHWXDSRUVL
PDVTXHDRPHVPRWHPSRDFDEDJHUDQGRSUD]HUFULDWLYLGDGHUHFRQKHFLPHQWRH
SUHVWtJLR(VWHWLSRGHPRWLYDomRGHinteresse por, normalmente se manifesta em
GHWULPHQWR GRV LQWHUHVVHV LQVWUXPHQWDLV interesse em) TXH YLVDP SRU H[HPSOR
XPDYDQWDJHPXQLODWHUDOHPRSRVLomRjUHODomRTXHVHHVWDEHOHFH3DUWLQGRGHVVD
GLVWLQomR³DGiGLYDQmRGHYHVHUSHQVDGDVHPLQWHUHVVHRXIRUDGHOHPDVFRQWUDR
LQWHUHVVHLQVWUXPHQWDO LQWHUHVVHHP (ODpRPRYLPHQWRTXHSDUD¿QVGDDOLDQoDRX
H FULDomRVXERUGLQDRVLQWHUHVVHVLQVWUXPHQWDLVDRVLQWHUHVVHVQmRLQVWUXPHQWDLV
¬VSDL[}HV´ &DLOOp 

Desinteresse  VH QmR H[LVWH GiGLYD GHVLQWHUHVVDGD SRU RXWUR ODGR H[LVWH
GHVLQWHUHVVH QD GiGLYD$VVLP SRU PDLV TXH H[LVWD SRU H[HPSOR interesses por
XPGHWHUPLQDGRHQJDMDPHQWRYROXQWiULRQHVVHWLSRGHWUDEDOKRQmRH[LVWHQHQKXP
WLSRGHH[SHFWDWLYDGHUHPXQHUDomR UHWRUQR PRQHWiULRGLUHWR$OpPGLVWRHVVHWLSR
GH GLQkPLFD VRFLDO QmR DFRQWHFH SRU PHLR GH Do}HV FDOFXODGDV GHFLV}HV  HQWUH
³SUyV´ H ³FRQWUDV´ PDV SRU Do}HV HVSRQWkQHDV LPSXOVLRQDGDV PXLWDV YH]HV SRU
PRWLYDo}HVTXHQmRVmREHPFRPSUHHQGLGDVSRUTXHPDVH[HFXWD³1HVVHVHQWLGR
DGiGLYDVHRS}HUDGLFDOPHQWHDRFiOFXORDHVVDIRUPDSDUWLFXODUHQmRXQLYHUVDO
GHVHFRPSRUWDU$VVLPQmRKDYHULDVRPHQWHRFiOFXORGHXPODGRHUHÀH[RGR
WLSRDQLPDOGRRXWUR+iRJHVWRIHLWRQRHVStULWRGDGiGLYD´ *RGERXW

Liberdade±GLIHUHQWHPHQWHGDVUHODo}HVTXHSHUPHLDPDVHVIHUDVGR(VWDGRRX
GR PHUFDGR QXP FLUFXLWR GH GiGLYD QmR Ki QHQKXP WLSR GH DFRUGR H[SUHVVR RX
FRQWUDWRIRUPDOHQWUHLQGLYtGXRVPRWLYDGRVSRULQWHUHVVHVSDUWLFXODUHVTXHREULJXH
DOJXpPDGDUUHFHEHURXUHWULEXLUDOJXPDFRLVD$OpPGLVVR*RGERXW  DLQGD
UHVVDOWDTXHQDVRFLHGDGHPRGHUQDRJUDXVLJQL¿FDWLYRGHREULJDomRVRFLDOLVWR
pGHDOJRIHLWRIHLWRSRUREULJDomRWUDGLomRRXFRVWXPHSDUHFHVHUFDGDYH]PDLs
3DUDLOXVWUDUDLQGDPDLVHVVDTXHVWmR$ODLQ&DLOOpWUD]RH[HPSORGHXPDWOHWDHVSRUWLYRSRLVSDUDRDXWRU³DQWHV
GHID]HUGRHVSRUWHVHXJDQKDSmRRMRJDGRUSUR¿VVLRQDOVHODQoDQRMRJRSRUSDL[mRSRUinteresse poreGLItFLOFUHU
TXHHOHFRQWLQXHDVHUXPERPMRJDGRUVHYLYHDSHUGHUWRGRRSUD]HUQRMRJRPDVHOHVyVHUiXPERPSUR¿VVLRQDOVH
subordinar o interesse por ao interesse em´ &DLOOp
60 • Software livre, cultura hacker e o ecossistema da colaboração

UDUR2TXHSUHGRPLQDQXPDUHODomRVRFLDOGHGiGLYDpSRUWDQWRDOLYUHHQWUDGD
e saída.

 ³$VVLP FRQVWDWDPRV TXH RV DWRUHV GD GiGLYD LQWURGX]HP GH IRUPD
YROXQWiULD H SHUPDQHQWH XPD LQFHUWH]D XPD LQGHWHUPLQDomR   D
¿PGHVHDIDVWDUHPRPi[LPRSRVVtYHOGRFRQWUDWRGRFRPSURPLVVR
FRQWUDWXDO PHUFDQWLORXVRFLDO DVVLPFRPRGDUHJUDGRGHYHUGHIDWR
GHTXDOTXHUUHJUDGRWLSRXQLYHUVDO´ *REERXWS 

Obrigação – 3RU RXWUR ODGR FRPR Mi IRL UHVVDOWDGR QHVWH DUWLJR D OLEHUGDGH QXP
VLVWHPDGHGiGLYDQmRVHPDQLIHVWD±HPQHQKXPDKLSyWHVHSHODOLTXLGDomRGR
VHQWLPHQWRGHGtYLGD(VVDFRQGLomRWRUQDDVDtGD GHVFRPSURPLVVR GRDXWRUHP
DOJR QmR WmR VLPSOHV GH VHU FRQFUHWL]DGR DSHVDU GD VXD FRQGLomR GH OLEHUGDGH
3RU LVWR &DLOOp   H *REERXW   GHPRQVWUDP TXH VHMD HP VRFLHGDGHV
WUDGLFLRQDLVRXFRQWHPSRUkQHDVXPGRVHL[RVYLWDLVGHTXDOTXHUVLVWHPDGHGiGLYD
pDSUHVHQoDGRVHQWLPHQWRLQWUtQVHFRGHREULJDomRGHHQGLYLGDPHQWR3DUDFRP
SUHHQGrOR ID]VH QHFHVViULR LU DOpP GD QRomR GH obrigação FRPR DOJR H[WHUQR
HQULMHFLGRVREDIRUPDGHUHJUDVRFLDOSRVLWLYDGDOHJDOWUDGLFLRQDORXUDFLRQDOSRLV
HVVH VLVWHPD QmR LPS}H XPD REULJDomR FRQWUDWXDO VRE D IRUPD GH GtYLGD FRPR
SRGHULD VH ID]HU SUHVHQWH QD SHUVSHFWLYD GR PHUFDGR RX GR PRGHOR KROLVWD ³$
µYHUGDGHLUD¶GiGLYDpXPJHVWRVRFLDOPHQWHHVSRQWkQHRXPPRYLPHQWRLPSRVVtYHO
GHFDSWDUHPPRYLPHQWRXPDREULJDomRTXHRGRDGRUGiDVLPHVPRPDVXPD
REULJDomR LQWHUQD LPDQHQWH´ *RGERXW    3RU LVVR D GiGLYD p WDPEpP
considerada um jogo constante entre obrigação e liberdade.

Um trabalho a troco de nada?

1DHUDDWXDOGRLQIRUPDFLRQDOLVPRTXDQGRRQHROLEHUDOLVPR17 ainda se apre-


VHQWD FRPR SDUDGLJPD GRPLQDQWH QDV FLrQFLDV KXPDQDV XPD TXHVWmR VH WRUQD
PXLWRUHFRUUHQWHDRVHGHSDUDUFRPDLQWULJDQWHGLQkPLFDVRFLDOHPSUHHQGLGDSHORV
KDFNHUV³SRUTXHVHGDU"´2XDLQGDXWLOL]DQGRRTXHVWLRQDPHQWRHODERUDGRSRU%LOO
*DWHVQDVXDIDPRVDFDUWDLQWLWXODGDGHOpen letter to hobbyists³TXHPSRGHVH
SHUPLWLUID]HUXPWUDEDOKRSUR¿VVLRQDODWURFRGHQDGD"´&RQWXGRPDLVUHFRUUHQWH
2KROLVPR 'XPRQW HVWiDVVRFLDGRQXPVHQWLGRDPSORDWRGDVDVWHRULDVHQRUPDVTXHSULYLOHJLDPD
sociedade em detrimento do indivíduo.
6HJXQGR*RGERXW  QDVFLrQFLDVKXPDQDVR1HROLEHUDOLVPRpGHVLJQDGRHIXQGDPHQWDGRSRUYiULRVQRPHVH
WHRULDVFRPRSRUH[HPSORRLQGLYLGXDOLVPRPHWRGROyJLFRDWHRULDGDHVFROKDVUDFLRQDODWHRULDHFRQ{PLFDQHRFOiVVLFD
o utilitarismo e a teoria do homo oeconomicus.
(VWD³&DUWD$EHUWDDRV+REELVWDV´IRLHVFULWDSRU%LOO*DWWHVHP XPDQRGHSRLVGDIXQGDomRGD0LFUR6RIW 
HGLYXOJDGDQD,QWHUQHW1DpSRFD%LOO*DWHVKDYLDFULDGRRSURJUDPD$OWDLU%$6,&HQmRHVWDYDVDWLVIHLWRHPYHUR
SURGXWRGRVHXWUDEDOKRFRPSDUWLOKDGRGHIRUPD³JUDWXLWD´SRLVSDUDHOHRVVRIWZDUHVGHYHULDPVHUYHQGLGRVFRPR
TXDOTXHURXWUDPHUFDGRULD
Software livre, cultura hacker e o ecossistema da colaboração • 61

TXHHVVHWLSRGHSHUJXQWDpRWLSRGHUHVSRVWDFRPXP HDSUHVVDGD TXHVHRIHUHFH


SDUD R HQWHQGLPHQWR VREUH HVVH WLSR GH IHQ{PHQR (P RXWUDV SDODYUDV SRGHVH
GL]HU TXH QR kPELWR GR DWXDO SRVWXODGR GRPLQDQWH R HQJDMDPHQWR YROXQWiULR GH
SHVVRDVQXPSURFHVVRGHSURGXomRFRODERUDWLYD±DH[HPSORGRTXHpGHVHQYROYLGR
QRXQLYHUVRGDVFRPXQLGDGHVRQOLQHGHVRIWZDUHOLYUH±pQRUPDOPHQWHDVVRFLDGR
DGRLVWLSRVGHH[SOLFDomRRXHVVHV³KREELVWDV´ID]HPLVWRSRULQWHUHVVHYLVDQGR
UHFHEHUDOJXPDFRLVDHPDOJXPPRPHQWRGHVXDYLGDRXHOHVYLYHPHPFRQGLo}HV
VRFLDLVTXHRVLPSHOHP VHMDSHORFRVWXPHRXSRUXPFRQWUDWR DDJLUGHVVDIRUPD
 'H IDWR QmR VH SRGH MXOJDU D GL¿FXOGDGH GH HQWHQGLPHQWR SRU SDUWH GH
%LOO*DWHVRXGHTXDOTXHURXWURREVHUYDGRUGHVDWHQWRVREUHHVVDUHDOLGDGHVRFLDO
FRQVLGHUDGD ³H[WUDRUGLQiULD´ VHJXQGR VHX PRGR GH SHUFHEHU D UHDOLGDGH $¿QDO
FRPR GHPRQVWURX *RGERXW   QR VHX DUWLJR Homo donator versus Homo
oeconomicusWRUQDVHPXLWRGLItFLO para um indivíduo moderno conseguir pensar
QXPVLVWHPDGHSURGXomRHFLUFXODomRGHEHQVHVHUYLoRVVHPVHUHIHULUjVLQWHU
SUHWDo}HVHOLPLWDo}HVLQHUHQWHVDRSDUDGLJPDQHROLEHUDOGRPLQDQWH
&RQWXGRDRREVHUYDURFRWLGLDQRGHXPDFRPXQLGDGHRQOLQH de software
OLYUHFRPRDGR3URMHWR*120(RXWUDVUHVSRVWDVVXUJHPQRKRUL]RQWH%DVWDGH
LQtFLRXPDVLPSOHVREVHUYDomRQRSHU¿OGRVPHPEURVTXHHVWmRSUHVHQWHHPXPD
GDVLQ~PHUDVVDODVYLUWXDLVGH³EDWHSDSR´ chats GR3URMHWRHQRVEORJVTXHHVWmR
agrupados no Planet20 FHQWUDO GD FRPXQLGDGH TXH VH SHUFHEH DOJR GH LQXVLWDGR
HPFRPSDUDomRDTXDOTXHURUJDQL]DomRIRUPDOTXHSURGX]HGLVWULEXLVRIWZDUHV
ERDSDUWHGRVKDFNHUVYROXQWiULRVWUDEDOKDPIRUPDOPHQWHGXUDQWHDVHPDQDHP
JUDQGHVHPpGLDVHPSUHVDVGH7,HSRUWDQWRGHGLFDPVHDR3URMHWRQRSHUtRGR
TXH HOHV GH¿QHP FRPR ³WHPSR OLYUH´ 3RUpP R TXH VLJQL¿FD QD SUiWLFD  HVVH
³WHPSROLYUH´"6HJXQGRR-HII:DXJKXPGRVPHPEURVGR7LPHGH/DQoDPHQWRGH
9HUVmR 5HOHDVH7HDP LVVRVLJQL¿FD³RWHPSRTXHPHXHPSUHJRH3LD HVSRVD 
QmRGHPDQGDPGHPLPVHPSUHHPGHWULPHQWRGRPHXµSDGUmRGHVRQR21´>75$
'8d­21266$@
 $VVLP HVVH ³WHPSR OLYUH´ GHGLFDGR DR WUDEDOKR QR 3URMHWR WDPEpP SRGH
VLJQL¿FDUDLQGDH[WUDSRODUHPDOJXQVFDVRVFHUWRVOLPLWHVGHWHPSRGHWUDEDOKR
&RQIRUPH DV SDODYUDV GR KDFNHU *XLOKHUPH 3DVWRUH22 LVVR SRGH VLJQL¿FDU XPD
 8P H[HPSOR FODUR GHVVD GL¿FXOGDGH VREUH R HQWHQGLPHQWR GHVVH IHQ{PHQR GDGD D OLPLWDomR GR SDUDGLJDPD
QHROLEHUDORFRUUHXQXPDHQWUHYLVWDUHDOL]DGDSRUXPDSUHVHQWDGRUEUDVLOHLURSRSXODUPHQWHFRQKHFLGRFRPR-{6RDUHV
QXPSURJUDPDGHDXGLrQFLDQDFLRQDO$RVHULQIRUPDGRVREUHRHQJDMDPHQWRYROXQWiULRGRVKDFNHUVSRUPHLRGHGRLV
SURIHVVRUHVXQLYHUVLWiULRVTXHFRODERUDPFRPFRPXQLGDGHVGHVRIWZDUHOLYUHRDSUHVHQWDGRUORJRD¿UPRX³QmRDGLDQWD
YLUFRPHVVHSDSRTXHpµGHJUDoD¶SRUTXHKiXPDLQWHQomRDQWHULRUGHYHQGHULVVR´3DUDSRGHUDFHVVDUDHQWUHYLVWD
QDtQWHJUDKWWSZZZ\RXWXEHFRPZDWFK"Y D[L&K3+5FM
23ODQHWpXPVRIWZDUHOLYUHTXHSHUPLWHDLQWHUORFXomRHQWUHGLIHUHQWHVEORJVSHVVRDLVQXPDPHVPD:HE ³VLWH´ 
FRPRPRVWUDRH[HPSORGDFRPXQLGDGH*120(KWWSSODQHWJQRPHRUJ
'HSRLPHQWRGH-HII:DXJKFROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
*XLOKHUPH3DVWRUHPDLVFRQKHFLGRQDFRPXQLGDGH*120(SHORDSHOLGR³)DWDOHUURU´pGHVHQYROYHGRUGR3URMHWR
,QWHUQDFLRQDOHXPGRVOtGHUHVGR3URMHWR%UDVLOHLURGH7UDGXomR(OHQDVFHXQR%UDVLOHPSOHQDGpFDGDGHRTXH
VLJQL¿FDTXHHOHWLQKDDSHQDVDQRVQDpSRFDGDHQWUHYLVWD9DOHUHVVDOWDUDLQGDTXHDOpPGHSDUWLFLSDUGR3URMHWR
*120(*XLOKHUPHpRKDFNHUPDLVQRYRGRPXQGRDID]HUSDUWHGRWLPHGHGHVHQYROYHGRUHVGDFRPXQLGDGHGR
62 • Software livre, cultura hacker e o ecossistema da colaboração

GHGLFDomRGXUDQWHR³WHPSRTXHQmRGHYHULDVHUOLYUH´
1R HQWDQWR HVVD VLWXDomR GH VH GHGLFDU DOpP GR WHPSR OLYUH GLVSRQtYHO
QmR p DOJR TXH DFRQWHFH VRPHQWH QR SURMHWR *120( 'H DFRUGR FRP RV GDGRV
HQFRQWUDGRV QXPD SHVTXLVD DSOLFDGD SRU /DNKDQL H :ROI  23 D  KDFNHUV
GH  3URMHWRV GH VRIWZDUH OLYUH GLIHUHQWHV   GRV KDFNHUV WUDEDOKDYDP GH
IRUPDYROXQWiULD3RURXWURODGRGRVKDFNHUVGHVVHPHVPRWRWDOGLVVHUDPTXH
FRQWULEXHP GXUDQWH VHXKRUiULR GHWUDEDOKR 4XDQGR DSHVTXLVD TXHVWLRQRX VHR
VXSHUYLVRUGRVHWRURQGHRKDFNHUWUDEDOKDWLQKDFRQVFLrQFLDGHVWH³WUDEDOKRH[WUD´
 GLVVHUDP TXH QmR ± RX VHMD  GLVVHUDP TXH WUDEDOKDYDP GH IDWR QXP
WHPSR TXH WDPEpP QmR GHYHULD VHU OLYUH 3DUWLQGR GHVVD SHUVSHFWLYD D TXHVWmR
LQLFLDOSURSRVWDSRU*DWWHV,,,  VHDOWHUDXPSRXFR2TXHVHTXHUVDEHUp
QDYHUGDGHSRUTXHRVKDFNHUVTXHWUDEDOKDPGHIRUPDYROXQWiULD QmRFRQWUDWXDO 
QR*120(GHGLFDPVHXWHPSROLYUHHDLQGDSDUWHGR³WHPSRTXHQmRGHYHULDVHU
OLYUH´"

O Interesse por trabalhar junto

3DUWLQGR GRV UHVXOWDGRV HQFRQWUDGRV QD SHVTXLVD REMHWLYD UHDOL]DGD SRU


/DNKDQLH:ROI  SRGHVHGL]HUTXHDSULQFLSDOPRWLYDomRSRUWUiVGRWUDEDOKR
YROXQWiULR HPSUHHQGLGR SHORV KDFNHUV HP JHUDO HVWi UHODFLRQDGD DR IDWR GHVVD
DomR GH GHVHQYROYHU FyGLJRV VHU LQWHOHFWXDOPHQWH HVWLPXODQWH H SUD]HURVD SDUD
HOHV'HIDWRHVVHLQWHUHVVHSRUID]HUDOJRSHVVRDOPHQWHHVWLPXODQWHVHID]SUHVHQWH
WDPEpPQDFRPXQLGDGH*120(1RHQWDQWRDRUHSURGX]LUHVVDTXHVWmRGHIRUPD
DEHUWDGHQWURGHXPDHQWUHYLVWDVHPLHVWUXWXUDGDVHPTXHVW}HVREMHWLYDVVXUJH
RXWUDUHSRVWD DLQGDQmRSUHVHQWHHPRXWUDVSHVTXLVDVVREUHVRIWZDUHOLYUH FRPXP
DWRGDVDVUHVSRVWD³DVSHVVRDV´'HDFRUGRFRPDVSDODYUDVGRSUySULR*XLOKHUPH
3DVWRUHXPGRVKDFNHUVPDLVQRYRVGHVVDFRPXQLGDGHLVVRVLJQL¿FDGL]HUTXHHOH
GHGLFDVHXWHPSROLYUH HRTXHQmRGHYHULDVHUOLYUH

³SRUPHVHQWLUSDUWHGDFRPXQLGDGHSRUFDXVDGRVODoRVGHDPL]DGHGD
LGHQWL¿FDomRFRPRVLGHDLVGRSURMHWR,VWRID]YRFrJRVWDUGRSURMHWRGH
XPDIRUPDTXHYRFrTXHUGHGLFDU GRDU VHXWHPSRQDTXLOR$VSHVVRDV
QmROHYDPDVFRLVDVWmRDVpULR7UDEDOKDUQR*120(pGLYHUWLGRQmR
VySRUFDXVDGRFyGLJRTXHHXJRVWRGHID]HUQDWXUDOPHQWHPDVSRU
FDXVDGDVSHVVRDVHQYROYLGDVHSRUFDXVDGRWUDWDPHQWRTXHYRFrWHP
FRPHODV³24

sistema operacional Debian.


 2V UHVXOWDGRV GHVWD SHVTXLVD VmR VHPHOKDQWHV DRV UHVXOWDGRV HQFRQWUDGRV HP RXWUD SHVTXLVD UHDOL]DGD
DQWHULRUPHQWHSRU+DUVH2X  
'HSRLPHQWRGH*XLOKHUPH3DVWRUHFROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
Software livre, cultura hacker e o ecossistema da colaboração • 63

(VVHGHSRLPHQWRpEHPUHSUHVHQWDWLYRSDUDRVUHVXOWDGRVGHVVDSHVTXLVD
SRLV±VHPQHJDURLQWHUHVVHSRUWUDEDOKDUHPDOJRHVWLPXODQWHGLYHUWLGRHSUD]H
URVRHVVHJDURWRGHGH]HVVHLVDQRVGHPRQVWUDDLPSRUWkQFLDGRYtQFXORHVWDEH
OHFLGRFRPRVRXWURVPHPEURVGDFRPXQLGDGH$OpPGHOHHPWRGDVDVHQWUHYLVWDV
UHDOL]DGDV PHVPR TXH DOJXPDV UHVSRVWDV HP JHUDO DLQGD WUDJDP PRWLYDo}HV
GH RUGHP WpFQLFD D GLPHQVmR VRFLDO GRV YtQFXORV VHPSUH DSDUHFH QD YHUGDGH
FRPRXPDUD]mRIXQGDPHQWDO(PRXWUDVSDODYUDVLVVRVLJQL¿FDTXHRTXHOHYDRV
KDFNHUVGHVVHSURMHWRDVHHQJDMDUHPp³DLQFRPSDUiYHOFRPELQDomRHQWUHXPD¿
ORVR¿DPRUDOHXPD¿ORVR¿DWpFQLFDMXQWRpFODURFRPDFRPXQLGDGHHDVSHVVRDV
LQFUtYHLV GH Oi´ :DXJK    >75$'8d­2 1266$@  2X DLQGD VHJXQGR R
GHVHQYROYHGRU*O\Q)RVWHUSRGHVHGL]HUTXH

³RSURMHWRHVWiGLYLGLGRHPGXDVFRLVDVREYLDPHQWHpRdesktopOLYUHR
FyGLJRDEHUWRDEDVHGHWXGR'RRXWURODGRYRFrWHPSHVVRDVPXLWR
PXLWRLQWHUHVVDQWHVHLVVRpIDVFLQDQWHSRGHUHQFRQWUDUDPLJRVSRUOi
DLQGDPDLVVHYRFr¿]HUSURMHWRVSRUGLYHUVmR(XDFKRTXHpXPDGDV
PHOKRUHV FRLVDV D TXH HX UHDOPHQWH SRVVR GHGLFDU D PLQKD YLGD (X
DFUHGLWRTXHpXPDERDFDXVD(HXSHQVRTXHpPXLWROHJDOSDUDPLP
FRQKHFHUSHVVRDVGHYiULDVSDUWHVGRPXQGR³

3DUWLQGRGHVVDFRQVWDWDomRDRSURFXUDUFRPSUHHQGHUDOyJLFDGHWUDEDOKR
TXHGiYLGDDRSURMHWR*120(SHUFHEHVHFODUDPHQWHTXHRWUDEDOKRHPSUHHQGLGR
SHORV KDNHUV QmR p IHLWR D WURFR GH QDGD ([LVWH XP UHWRUQR 1R HQWDQWR ³VHP
FRQVLGHUDU RV PRWLYRV VRFLDLV p PXLWR GLItFLO FRPSUHHQGHU RV PRWLYRV TXH OHYDP
RVKDFNHUVDHPSUHJDUVHXWHPSROLYUHQRGHVHQYROYLPHQWRGHSURJUDPDVTXHVmR
GDGRV D WHUFHLURV SRVWHULRUPHQWH´ +LPDQHP    3DUD FRPSUHHQGHU HVVH
³WUDEDOKRDWURFRGHQDGD´pSUHFLVRHQWHQGHUSRUWDQWRTXHRIDWRURUJDQL]DFLRQDO
dessa comunidade RQOLQHGHVRIWZDUHOLYUHQmRHVWiDVVRFLDGRQHPDRGLQKHLUR
QHPjDFXPXODomRGHEHQVPDVjSDL[mRHDRSUD]HUGHFULDUMXQWRVDOJRTXHVHMD
UHFRQKHFLGDPHQWHYDOLRVRHQWUHVHXVSDUHVHPWHUPRVWHFQROyJLFRVHVRFLDLV
6HQGR XP SRXFR PDLV GLUHWR SRGHVH GL]HU TXH RV PHPEURV GR SURMHWR
*120(VHHQJDMDPQDFRPXQLGDGHSRUTXHWrPinteresse porGHVHQYROYHUFyGLJRV
SRU FRQWULEXLU FRP XP 3URMHWR GHVVD QDWXUH]D$OpP GLVVR R HQYROYLPHQWR VRFLDO
QHVVHWUDEDOKRFROHWLYR UHDOL]DGRMXQWRFRPRXWURVKDFNHUV DFDEDSURSRUFLRQDGR
UHFRQKHFLPHQWR SUHVWtJLR SUD]HU FULDWLYLGDGH H SRU FRQVHJXLQWH SRGHU PpULWR 
DWULEXtGR D FDGD LPSRUWDQWH FRQWULEXLomR WpFQLFD FRPSDUWLOKDGD $OpP GD SDL[mR
H GR SUD]HU SHOD DWLYLGDGH HP VL RXWURV ³UHWRUQRV´ VmR JHUDGRV SHOR IDWR GH VH
WUDEDOKDUMXQWRGHVHHVWDEHOHFHUYtQFXORVVRFLDLVQXPJUXSRSRUPHLRGRFyGLJR
'HSRLPHQWRGH*O\QQ)RVWHUFROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
64 • Software livre, cultura hacker e o ecossistema da colaboração

FRPSDUWLOKDGR$WpSRUTXHVHHVVDDomRGHGDUUHFHEHUHVHUUHWULEXtGRUHSUHVHQWD
XPDIRUPDRULJLQDOHGLVWLQWDGHFLUFXODomRHGLVWULEXLomRGHEHQVHODQmRVHPDQL
IHVWDQDDXVrQFLDGHXPUHWRUQR$RFRQWUiULR2UHWRUQRH[LVWHPHVPRDWpTXHQmR
VHWHQKDGHVHMDGR0DLVDLQGDSRGHVHGL]HUTXHD~QLFDFRLVDQmROLYUHQXPFLFOR
FRPRHVVH LVWRpQXPFLFORGHGiGLYD pRIDWRGHVHWHUTXHUHFHEHU6HHOHQmR
H[LVWLUVHUiXPDGiGLYDTXHQmRGHXFHUWRHTXHPGiVHQWHVH³WUDtGR´IUXVWUDGR
 3RUpP SDUD HQWHQGHU HVVDV GLPHQV}HV p IXQGDPHQWDO D DPSOLDomR GR
HQWHQGLPHQWRVREUHRTXHSRVVDVHUXP³UHWRUQR´LQGRPXLWRDOpPGDSHUVSHFWLYD
PHUFDGROyJLFD ¿QDQFHLUD (P RXWUDV SDODYUDV GHYHVH FRQVLGHUDU FRPR UHWRUQR
GHVGH D SUySULD VDWLVIDomR RX SUD]HU TXH HVVD GiGLYD PHGLDGD SRU FRPSXWDGRU
SRGHUHSUHVHQWDUDWpRUHFRQKHFLPHQWRHRSUHVWtJLROLJDGRVDHOD3RULVVRRWHUPR
³FRPXQLGDGHYROXQWiULDGHLQWHUHVVH´FXQKDGDSRUD(ULF5D\PRQG  pXPD
H[SUHVVmRSDUDGR[DOHDRPHVPRWHPSREHPSUHFLVDSDUDUHSUHVHQWDUDGLQkPLFD
VRFLDOHPSUHHQGLGDQHVVDRUJDQL]DomRSRUPHLRGDUHGHPXQGLDOGHFRPSXWDGRUHV

A gratuidade e a espontaneidade

3RURXWURODGRVHQmRH[LVWHDomRYROXQWiULDGHVLQWHUHVVDGDH[LVWHWDPEpP
GHVLQWHUHVVHQDVDo}HVHPSUHHQGLGDVSHORVPHPEURVGR3URMHWR*120($¿QDO
PHVPRTXHH[LVWDPinteresses porHVWHWLSRGHWUDEDOKRQHVVHWLSRGHHQJDMDPHQWR
HP JHUDO QmR H[LVWH XPD H[SHFWDWLYD FRQFUHWD GH UHPXQHUDomR ou algum tipo
GHFiOFXORVREUHDTXDQWLGDGHGHWUDEDOKRGHVSUHQGLGR6HPHVVHFiOFXORVREUHR
TXDQWR WHPSR VHWUDEDOKDSRUFRQVHJXLQWHQmRKiWDPEpPXPDFRQWDELOL]DomR
VREUHDOJXPWLSRGHUHWRUQR¿QDQFHLURGLUHWRLVWRpVREUHRTXDQWRVHGHYHUHFHEHU
HPWURFD4XDQGRTXHVWLRQDGRSRUH[HPSORVREUHTXDQGRHFRPRVHGHGLFDDR
SURMHWR 9LQFHQW 8QW] XP GRV PHPEURV YROXQWiULRV PDLV DWLYRV H UHVSHLWDGRV GR
3URMHWRUHVSRQGHXGDVHJXLQWHIRUPD³YRFrSHQVDTXHLVWRpIiFLOGHUHVSRQGHU"
4XDQGRH&RPR" ULVRV 1DPDLRULDGDYH]HVQRPHXWHPSROLYUH&RPR"eQR
PHXWHPSROLYUHHQWmRHXIDoRRTXHHXTXLVHU´27
 $OpPGHDJLUHPGHIRUPDDXW{QRPDHQmRFDOFXODGDDOJXQVKDFNHUVDLQ
GDUHVVDOWDPDLPSRUWkQFLDSDUDHOHVGHVHFRQWULEXLUFRP³DOJRPDLRU´FRPXPD
³FDXVD´ TXH EHQH¿FLH RXWUDV SHVVRDV 2X VHMD VHJXQGR DV SDODYUDV GH (OLMDK
1HZUHQDWXDOJHUHQWHGHODQoDPHQWRGHYHUV}HV Release Mananger) do Projeto
±RTXHRPDQWpPWUDEDOKDQGRYROXQWDULDPHQWHQRSURMHWRpSRUWDQWR³HVVDLQFUtYHO
FRPXQLGDGH FRP PXLWRV DPLJRV OHJDLV VDEHU TXH PLQKDV FRQWULEXLo}HV HVWmR
 9DOH IULVDU TXH DSHVDU GH QmR H[LVWLU XPD H[SHFWDWLYD GH UHPXQHUDomR LVVR QmR VLJQL¿FD GL]HU TXH FDVR HOD
DFRQWHoDQmRVHMDYLVWDFRPERQVROKRVSDUDTXDOTXHUPHPEURGDFRPXQLGDGH/RQJHGLVVR$SHVDUGHQmRH[LVWLUXPD
H[SHFWDWLYDGLUHWDGHUHPXQHUDomRVREUHRWUDEDOKRGRDGRSRGHVHGL]HUTXHRVRQKRGHPXLWRVKDFNHUVYROXQWiULRVGD
FRPXQLGDGHpSRGHUVHUUHPXQHUDGRHDVVLPGHGLFDUDPDLRUSDUWHSRVVtYHOGRVHXWHPSRDR3URMHWR
'HSRLPHQWRGH9LQFHQW8QW]FROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
Software livre, cultura hacker e o ecossistema da colaboração • 65

EHQH¿FLDQGRDYLGDFRWLGLDQDGHPXLWDVSHVVRDV´ 1HZUHQ >75$'8d­2


1266$@
 3DUWLQGRGHWDOFRQVWDWDomRHVWDDQiOLVHFRQVLGHUDTXHRFyGLJRRXWUDEDOKR
GDGRUHFHELGRHUHWULEXtGRpXPDDomRDRPHVPRWHPSRLQWHUHVVDGDHJUDWXLWD
2XDLQGDGHIRUPDPDLVVLPSOL¿FDGDpDOJRTXHHPDQDHPSULPHLUROXJDU

³SRU FDXVD GDV SHVVRDV (X WHQKR IHLWR DOJXQV DPLJRV YHUGDGHLURV
QD FRPXQLGDGH *120( (X WDPEpP JRVWR GR PRPHQWR TXDQGR XP
SURMHWRUHDOPHQWHFRPHoDDDQGDUXQLGR)LQDOPHQWHpOHJDOUHFHEHU
DJUDGHFLPHQWRVGRVXVXiULRVSHORWUDEDOKRTXHYRFrID]HVDEHUTXH
HVVDpXPDSHTXHQDPDQHLUDGHYRFrDMXGDUDWUDQVIRUPDURPXQGR
QXPOXJDUPHOKRU´

(P RXWUDV SDODYUDV SRGHVH GL]HU WDPEpP TXH WDO HQJDMDPHQWR p XPD
GRDomRQmRFDOFXODGDPDVVRFLDOPHQWHLQWHUHVVDGDeDOJRTXHDFDEDFLUFXODQGR
SRUWDQWRHPIXQomRGRODoRVRFLDOPHGLDGRSRUFRPSXWDGRUWDQWRSDUDURPSHUR
LVRODPHQWRFRPRSDUDGDUVHQWLGRHLGHQWLGDGHDXPD³FDXVD´XPWUDEDOKRQmR
FRQWUDWXDO H HVSRQWkQHR HPSUHHQGLGR SRU PHLR GRV OLDPHV GLJLWDLV GD ,QWHUQHW
$¿QDOPHVPRQXPDFRPXQLGDGHRQOLQHFRPRD*120(

³RVVHUHVKXPDQRVVmRHVHPSUHIRUDPVHUHVPRWLYDGRVGHGLYHUVDV
PDQHLUDV 1yV DJLPRV GH IRUPD LQVWUXPHQWDO PDV WDPEpP GH IRUPD
QmRLQVWUXPHQWDO 1yV DJLPRV SRU JDQKR PDWHULDO PDV WDPEpP SRU
EHPHVWDUSVLFROyJLFRHJUDWL¿FDomRHSRUXQLmRVRFLDO1mRKiQDGDGH
QRYRRXH[WUDRUGLQiULRQLVVRH[FHWRWDOYH]SDUDDOJXQVHFRQRPLVWDV´
%HQNOHU >75$'8d­21266$@

+DFNHUVYROXQWiULRVHSUR¿VVLRQDLVLQWHUHVVHYHUVXVJUDWXLGDGH"

$SHVDUGHRYROXQWDULDGRVHUXPDUHODomRGHWUDEDOKRSUHGRPLQDQWHGHQWUR
GRVSURMHWRVGHVRIWZDUHVOLYUHPXLWRVKDFNHUVVmRSDJRVGLUHWDPHQWH SRUHPSUHVDV
GH7,JRYHUQRVHIXQGDo}HVGHWRGRRPXQGR SDUDPDQWHUHPRGHVHQYROYLPHQWR
GH GHWHUPLQDGRV VLVWHPDV RX DSOLFDWLYRV WHFQROyJLFRV OLYUHV 6HJXQGR RV GDGRV
GDSHVTXLVDGH/DNKDQLH:ROI  QDDPRVWUDGHKDFNHUVTXHDWXDPHP
GLIHUHQWHVSURMHWRVHVVHQ~PHURGHSUR¿VVLRQDLVUHSUHVHQWDGRWRWDO$VVLP
como a maioria das comunidades RQOLQH GH VRIWZDUH OLYUH R SURMHWR *120( p
'HSRLPHQWRGH'DY\G0DGHOH\FROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
'HDFRUGRFRP/DNKDQLH:ROI  HVWHQ~PHURSRGHDXPHQWDU±FKHJDQGRDVHIRUHPFRQVLGHUDGRVDLQGD
RVKDFNHUVTXHWUDEDOKDPQRWHPSRTXH³QmRGHYHULDVHUOLYUH´LVWRpVHDSHVTXLVDOHYDUHPFRQVLGHUDomRRVKDFNHUV
TXHWUDEDOKDPFRPRYROXQWiULRGXUDQWHVHXH[SHGLHQWHGHWUDEDOKRUHPXQHUDGR
66 • Software livre, cultura hacker e o ecossistema da colaboração

WDPEpPFRPSRVWRWDQWRSRUPHPEURVYROXQWiULRVFRPRSRUWpFQLFRVTXHVmRSDJRV
SDUDWUDEDOKDUHPQRGHVHQYROYLPHQWRGHDOJXPDDSOLFDomRRXSDUWHHVSHFt¿FDGR
VLVWHPD'HDFRUGRFRPDDPRVWUDGHPHPEURVFDWDORJDGDSDUDHVWHWUDEDOKR
RSHUFHQWXDOGHSHVVRDVUHPXQHUDGDVFKHJDDGRVSHVTXLVDGRV
 3DUWLQGRGDSUHPLVVDTXHRVKDFNHUVYROXQWiULRVHVWDULDPPDLVSUHRFXSDGRV
FRP R FDORU GD UHODomR GHVLQWHUHVVH  H TXH DR PHVPR WHPSR RV SUR¿VVLRQDLV
WHULDP XP SDGUmR PDLV IXQFLRQDOLVWD LQVWUXPHQWDO  GH HQJDMDPHQWR VHULD OyJLFR
VXSRU GH IRUPD SUpFRQFHELGD  TXH D FRQYLYrQFLD HQWUH DPEDV DV IRUPDV GH
WUDEDOKRQXPPHVPRDPELHQWHGLJLWDOSRGHULDUHVXOWDUHPIRUWHVFRQÀLWRVQRLQWHULRU
GDFRPXQLGDGH$¿QDOQRPRPHQWRHPTXHDUHODomRGHWUDEDOKRpPHGLDGDSRU
XPFRQWUDWRIRUPDOGHHPSUHJRLVWRpTXDQGRXPGHWHUPLQDGRKDFNHUYHQGHDVXD
FDSDFLGDGH GH FULDomR HOH DFDED SRU FRQVHJXLQWH VXEPHWHQGRVH jV HVFROKDV
SUD]RVHPHWDVHVWDEHOHFLGDVSHODHPSUHVDFRQWUDWDQWHUHGX]LQGRDVVLPDVXD
OLEHUGDGH GH GHFLGLU MXQWR FRP D FRPXQLGDGH VREUH ³R TXH´ H ³TXDQGR´ WUDEDOKDU
dentro do projeto.
 (QWUHWDQWRSRUPDLVLQFUtYHOTXHSRVVDSDUHFHUHVVHWLSRGHFRQÀLWRDFDED
WHPPXLWDH[SUHVVmRQDGLQkPLFDGHWUDEDOKRGDFRPXQLGDGH*120((PSULPHLUR
OXJDUDRVHDGHQWUDUQRDPELHQWHGLJLWDOGDFRPXQLGDGH %ORJVOLVWDVGHHPDLOV
,5&V pPXLWRGLItFLOSHUFHEHUXPDGLIHUHQoDDSDUHQWHQRFRPSRUWDPHQWRHQWUHRV
PHPEURVYROXQWiULRVHRVUHPXQHUDGRV$SHQDVTXDQGRVHREVHUYDRVLVWHPDGH
FRQWUROHGHYHUVmR &96 RXRVLVWHPDGHFRQWUROHGHTXDOLGDGH %XJ]LOOD GRSURMHWR
pTXHVHSRGHSHUFHEHUXPDSULPHLUDGLIHUHQoDSRUWHUHPPDLVWHPSRGLVSRQtYHO
SDUD SURJUDPDU DV FRQWULEXLo}HV GH FyGLJR GRV GHVHQYROYHGRUHV UHPXQHUDGRV
QD PDLRULD GDV YH]HV VmR EDVWDQWH VLJQL¿FDWLYDV$OpP GLVVR p FRPXP KDFNHUV
UHPXQHUDGRVVHUHPPDQWHQHGRUHVGHPDLVGHXPPyGXORGR3URMHWR(PRXWUDV
SDODYUDV SRGHVH GL]HU TXH ³p PXLWR PDLV IiFLO SDUD RV GHVHQYROYHGRUHV SDJRV
¿FDUHP PDLV HQYROYLGRV QR SURMHWR H FRQVHJXLU UHDOPHQWH DFRPSDQKDU PDLV GH
SHUWR´30
 3RU RXWUR ODGR DR HVWDUHP VXEPHWLGRV WDPEpP j SUHVVmR GH QRUPDV
SUD]RV H UHVXOWDGRV LPSRVWRV SHODV HPSUHVDV FRQWUDWDQWHV DOJXQV KDFNHUV
UHPXQHUDGRVQmRFRPXQLFDPDRVGHPDLVPHPEURVGDFRPXQLGDGHRTXHHOHVHVWmR
SURGX]LQGRQDVVXDVUHVSHFWLYDVHPSUHVDVVHMDHPWHUPRVGHFRUUHomRGHHUURV
FRPRWDPEpPGHDFUpVFLPRVGHQRYDVIXQFLRQDOLGDGHVSDUDRVVRIWZDUHVFRQWLGRV
QR 3URMHWR &RP HVVD SRVWXUD PDLV ³IXQFLRQDO´ HOHV DSHQDV FRPSDUWLOKDP HVVDV
LQIRUPDo}HVTXDQGRDVROXomRMiHVWiDFDEDGD'HVVDIRUPDSRUPDLVTXHGHSRLV
WRGDDFRPXQLGDGHWHQKDDFHVVRWRWDODRVFyGLJRVSURGX]LGRVSHORSURJUDPDGRU
FRQWUDWDGR SHOD HPSUHVD HVVH WLSR GH GHVHQYROYLPHQWR HPSUHHQGLGR GH IRUPD
'HSRLPHQWRGH*O\QQ)RVWHUFROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
Software livre, cultura hacker e o ecossistema da colaboração • 67

³IHFKDGD´QmRpEHPYLVWRSRUDOJXQVPHPEURVYROXQWiULRVGDFRPXQLGDGH
 &RQWXGRPHVPRFRPHVVDVGLIHUHQoDVSRQWXDLVGHWHPSRHGHIRUPDGH
GHGLFDomRDRSURMHWRQR¿QDOQmRVHSHUFHEHQHQKXPWLSRGHFRQÀLWRRXGLYHUJrQFLD
PDLVVLJQL¿FDWLYDHQWUHPHPEURVUHPXQHUDGRVHYROXQWiULRV$RFRQWUiULR2TXHVH
SHUFHEH p XPD PXGDQoD GH UHODomR GH DOJXQV GHVHQYROYHGRUHV SDJRV D SDUWLU
GR PRPHQWR HP TXH HOHV SDVVDP D FRQWULEXLU FRP R SURMHWR H VH HQYROYHU PDLV
HIHWLYDPHQWH $VVLP FRPR IRL GHPRQVWUDGR DQWHULRUPHQWH QR OHYDQWDPHQWR GH
/DNKDQL H :ROI   HP RXWURV SURMHWRV GH VRIWZDUH OLYUH PXLWRV KDFNHUV TXH
WLYHUDPXPFRQWDWRLQLFLDOFRP*120(SRUPHLRGHXPDHPSUHVDGH7,DFDEDUDP
SRVWHULRUPHQWHVHHQYROYHQGRFRPRXWUDVDWLYLGDGHV H[WUDV QDFRPXQLGDGHSDUD
DOpPGDTXHODVDFRUGDGDVQRVHXFRQWUDWRGHWUDEDOKR
 5RPSHQGR FRP XPD SHUVSHFWLYD DEVROXWDPHQWH IXQFLRQDOLVWD ERD SDUWH
GRVKDFNHUVSDJRVSDVVDDWHUXPDUHODomRGHWUDEDOKR³KtEULGD´FRPDFRPXQLGDGH
,VVRGHPRQVWUDTXHVHPQHJDUDLPSRUWkQFLDGRVPRWLYRVXWLOLWiULRVGDVXDUHODomR
GH DVVDODULDGR HOHV WDPEpP WUDEDOKDP YROXQWDULDPHQWH HP RXWUDV DWLYLGDGHV
QmRFRQWUDWXDLV VHMD QR VHX WHPSR OLYUH IRUD GD HPSUHVD VHMD QR VHX ³WHPSR
TXHQmRGHYHULDVHUOLYUH´GHQWURGDHPSUHVD3RUH[HPSORFRPRH[SOLFDXPGRV
GHVHQYROYHGRUHVSDJRVGRSURMHWR

³jV YH]HV HX WURFR KRUDV GH WUDEDOKR IRUPDO TXH HVWRX ID]HQGR QR
*120(SRUKRUDVGHWUDEDOKROLYUHHPTXHWHQKRSUD]HU0DVDVYH]HV
pGLItFLOSDUDGHFLGLUDVFRLVDVTXHYRXID]HUQRPHXWHPSRGHWUDEDOKR
GDHPSUHVDHQRPHXWHPSROLYUH(DPLQKDQDPRUDGDHVWiVHPSUH
FKDWHDGDSRUTXHHXVHPSUHHVWRXFRPPHXFRPSXWDGRUGXUDQWHWRGD
DPLQKDVHPDQD  0DVjVYH]HVVmRFRLVDVTXHYRFrtemTXHID]HU
QRVHXWHPSROLYUH´31

 3DUWLQGRGHVVDGLQkPLFDSOXUDOGHWUDEDOKRGDPHVPDIRUPDTXHQmRVH
SRGHGHPDQHLUDVLPSOLVWDFRQVLGHUDUTXHXPGHVHQYROYHGRUQmRUHPXQHUDGRp
GHVSURYLGR GH TXDOTXHU LQWHUHVVH WDPEpP p HTXLYRFDGR SDUWLU GR HQWHQGLPHQWR
TXHXPKDFNHUUHPXQHUDGRGHQWURGR3URMHWR*120(pUHJLGRDSHQDVSRUPRWLYRV
XWLOLWiULRVHIXQFLRQDLV$QWHVGHWXGRSRUTXHPHVPRVHVXEPHWHQGRDXPFRQWUDWR
GH WUDEDOKR IRUPDO WRGR R FyGLJR FRPSDUWLOKDGR SRU HVVHV KDFNHUV QmR VmR GD
HPSUHVDFRQWUDWDQWH1DYLVmRGRVKDFNHUVTXHSDUWLFLSDPGR3URMHWRRPpULWRGD
FRQWULEXLomRGHVHQYROYLGDHGLVSRQLELOL]DGDQD,QWHUQHWHVWiDVVRFLDGDDRQRPHGR
KDFNHUTXHDLPSOHPHQWRXHVWDQGRHVVDFRQWULEXLomRUHJLVWUDGDQDOLFHQoDGHXVR
GRVRIWZDUHRXQmR'HVVDIRUPDRYtQFXORVHHVWDEHOHFHQmRHQWUHDHPSUHVDH
DFRPXQLGDGHHVLPHQWUHRKDFNHU³IXQFLRQiULR´HDFRPXQLGDGH&RPLVVRRQtYHO
'HSRLPHQWRGH7KRPDV6WLFKHOHFROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
68 • Software livre, cultura hacker e o ecossistema da colaboração

GHHQYROYLPHQWRHRYtQFXORTXHHVVHSUR¿VVLRQDOHVWDEHOHFHFRPDFRPXQLGDGH
WRUQDPVHDOJRPXLWRDOpPGHXPDPHUDSUHVWDomRGHVHUYLoR(PRXWUDVSDODYUDV
RKDFNHUHPSUHJDGRDFDEDDGRWDQGRXPSDGUmRGHHQJDMDPHQWRHUHODFLRQDPHQWR
PXLWR SUy[LPR RX SHUIHLWDPHQWH FRPSDWtYHO DR GRV PHPEURV YROXQWiULRV HP
UHODomRDRWUDEDOKRGHVHQYROYLGRQR3URMHWR
 'HQWURGHVVHHPDUDQKDPHQWRGHOyJLFDVHYtQFXORVDWHRULDSOXULGLPHQVLRQDO
HSDUDGR[DOGDGiGLYDSHUPLWHSRUWDQWRXPERPHQWHQGLPHQWRGHVVDLQWULJDQWH
GLQkPLFDVRFLDOHPSUHHQGLGDSHORVKDFNHUVYROXQWiULRVHSUR¿VVLRQDLVGHQWURGH
XPPHVPRDPELHQWHGHWUDEDOKRGLJLWDOLVWRpGHQWURGHXPDPHVPDRUJDQL]DomR
YLUWXDO GD SURGXomR $¿QDO ³HP VH FRQVLGHUDQGR RV YROXQWiULRV FRPR DSHQDV
SXUDPHQWH GHVLQWHUHVVDGRV H RV SUR¿VVLRQDLV DVVDODULDGRV FRPR VRPHQWH
SXUDPHQWHLQWHUHVVDGRVGL¿FLOPHQWHVHFRPSUHHQGHFRPRSRGHULDPFRDELWDUQXP
SHUtRGRGHGXUDomRFRQVLGHUiYHOQXPDUHODWLYDKDUPRQLD´ )UDQoD)LOKRH']LPLUD


$REULJDomRQmRFRQWUDWXDOGHFRQWULEXLU

'HQWUH HVVDV SHFXOLDULGDGHV GH FRPSRUWDPHQWR TXH RFRUUHP HQWUH RV


GHVHQYROYHGRUHV SDJRV TXH DWXDP QR 3URMHWR *120( H[LVWH HQWUHWDQWR FHUWR
WLSR GH VLWXDomR TXH FRQWUDULD DLQGD PDLV D SUySULD QRomR GH FRQWUDWR VRFLDO GH
WUDEDOKR  FRQFHELGD RULJLQDOPHQWH SRU ¿OyVRIRV LOXPLQLVWDV GR VpFXOR ;9,,,32.
$ SDUWLU GR PRPHQWR HP TXH SUR¿VVLRQDLV ³KtEULGRV´ GHL[DP GH VHU FRQWUDWDGRV
SHOD HPSUHVD H PHVPR DVVLP FRQWLQXDP WUDEDOKDQGR QR 3URMHWR GH IRUPD QmR
FRQWUDWXDOHYROXQWiULD PXLWDVYH]HVDWpQDPHVPDDWLYLGDGHTXHGHVHPSHQKDYDP
FRPR DVVDODULDGRV  HYLGHQFLDVH PDLV XPD LQWULJDQWH TXHVWmR SDUD DV FLrQFLDV
KXPDQDVQRVHLRGHVVDGLQkPLFDVRFLDOFRQWHPSRUkQHD
 8PGRVH[HPSORVGHVVDVLWXDomRSRGHVHUGHPRQVWUDGRTXDQGRQRDQR
GHRHQWmRJHVWRU UHPXQHUDGR GDVFRUUHo}HVGHHUURV ³bugs´ GHXPDGDV
ferramentas mais usadas no desktop do GNOME – o software Evolution33±SHU
PDQHFHXQRSURMHWRFRPRYROXQWiULRDSyVGHL[DUDHPSUHVDTXHRFRQWUDWRXSDUD
GHVHPSHQKDUHVVDIXQomR$SyVURPSHUFRPRFRQWUDWRGHWUDEDOKRDVVDODULDGRH
PHVPRFRQWLQXDQGRDWUDEDOKDUDSHQDVQRVHXWHPSROLYUHHVVHKDFNHU FRQKHFLGR
FRPR/XLV9LOOD SDVVRXDQmRPDLVFRQWULEXLUDSHQDVQDJHVWmRGHHUURVHIDOKDV
GR(YROXWLRQPDVVLPGR3URMHWR*120(FRPRXPWRGR'HYLGRDHVVHQtYHOGH
6HJXQGR)UDQoD)LOKRH']LPLUD  RV¿OyVRIRVLOXPLQLVWDV FRPR-RQK/RFN+REEHVH5RXVVHDX FRQFHEHUDP
R FRQWUDWR VRFLDO FRPR XPD HVSpFLH GH DFRUGR UHDOL]DGR HQWUH LQGLYtGXRV UDFLRQDLV PRWLYDGRV SRU LQWHUHVVHV
LQVWUXPHQWDLV H SDUWLFXODUHV  RX VHMD GHQWUR GH XPD OyJLFD SXUDPHQWH XWLOLWiULD$VVLP GH DFRUGR FRP HVVD YLVmR
LOXPLQLVWD³VHDRSRVLomRGRVLQWHUHVVHVSDUWLFXODUHVWRUQRXQHFHVViULRRHVWDEHOHFLPHQWRGDVVRFLHGDGHVpRDFRUGR
GHVVHVPHVPRVLQWHUHVVHVTXHDWRUQRXSRVVtYHO´ 5RXVVHDXapud )UDQoD)LOKRH']LPLUD 
2(YROXWLRQpXPDSOLFDWLYR VRIWZDUH OLYUHR¿FLDOGRSURMHWR*120(TXHFRPS}HRVLVWHPDGHdesktop,XWLOL]DGR
SDUDJHUHQFLDURFRUUHLRHOHWU{QLFR HPDLOV FDOHQGiULRHFDWiORJRGHHQGHUHoRVGRVXVXiULRV
Software livre, cultura hacker e o ecossistema da colaboração • 69

FRQWULEXLomRHHQJDMDPHQWRDLQGDGDGRSRUHOHSDUDDFRPXQLGDGHKRMHDOpPGH
VHUXPGRVKDFNHUVPDLVUHVSHLWDGRVQDFRPXQLGDGH/RXLV9LOODpFRQVLGHUDGRR
bugmaster HPpULWR do Projeto.
 3DUD HQWHQGHU R TXH OHYD VREUHWXGR XP H[WUDEDOKDGRU DVVDODULDGR D
FRQWLQXDU HQJDMDGR QXP PHVPR SURMHWR GLJLWDO FRPR YROXQWiULR GHVHPSHQKDQGR
PDLVWDUHIDVGRTXHDTXHODVLQLFLDOPHQWHSUHYLVWDVQRVHXFRQWUDWRGHWUDEDOKRRUL
JLQDO EDVWDHQWHQGHUTXHDVVLPFRPRIRLGHPRQVWUDGRQRGHSRLPHQWRGDPDLRULD
GRVKDFNHUVYROXQWiULRV>

³DPHOKRUSDUWH QR3URMHWR*120( pRVHQVRGHFDPDUDGDJHPQyV


HVWDPRV VHPSUH MXQWRV QLVWR H HOHV VmR XPD JDOHUD PXLWR OHJDO (X
QXQFD WUDEDOKHL QXP SURMHWR FRP XPD HTXLSH GH WUDEDOKR PHOKRU QR
VHQWLGRTXHWRGRVHVWmRLQGRMXQWRVDDOJXPOXJDUID]HQGRDOJXPDFRLVD
MXQWRV HVSHFLDOPHQWH HP WRUQR GR *120( ,VWR p GH ORQJH D IRUPD
GHWUDEDOKRPDLVHQFDQWDGRUDTXHDVSHVVRDVSRGHPWHU(HXQXQFD
HQFRQWUDULDXPDVLWXDomRFRPRHVWDDQmRVHUFRPPXLWDVRUWH´34

 7HQGRFRPREDVHHVVHWLSRGHVHQWLPHQWRHQWUHRVPHPEURVDFRPXQLGDGH
*120(UHSUHVHQWDXPDLQWHQVDUHGHVRFLDOPHGLDGDSRUFRPSXWDGRUHVFRQVWLWXtGD
GDVRPDGDVUHODo}HVVLQJXODUHVTXHFDGDPHPEURPDQWpPFRPRJUXSR3RULVVR
HVVH PHVPR DPELHQWH GLJLWDO GH LQWHUDomR VRFLDO DFDED WDPEpP LQGX]LQGR XPD
HVSpFLHGHHQYROYLPHQWRSDUDGR[DODRPHVPRWHPSRHPTXHVHHQJDMDPGHIRUPD
SUD]HURVDHHVSRQWkQHD QmRFRQWUDWXDO DVSHVVRDVTXHWUDEDOKDPQHVVHJUXSRVH
HQYROYHPGHWDOIRUPDTXHVHVHQWHPVRFLDOPHQWHUHVSRQViYHLVRXFRPSURPHWLGDV
FRPDFRPXQLGDGH0XLWRDOpPGHXPPHURFRPSURPLVVRFRQWUDWXDO IRUPDO HVVH
VHQWLPHQWRGH³HQGLYLGDPHQWR´FRPRJUXSRHFRPR3URMHWRpDOJRTXHRKDFNHU
SDUHFHGDUOLYUHPHQWHDVLPHVPR$¿QDOQmRSRUDFDVRFRQWULEXLUYROXQWDULDPHQWH
FRPR*120(VLJQL¿FDWDPEpPDOJRTXHSURSRUFLRQDDIHOL]VHQVDomR³GHGHYROYHU
SDUDDFRPXQLGDGHRTXHHODWHGHXWRGDOLEHUGDGHTXHHODWHGHXHRFyGLJRTXH
HODWHGHXSDUDYRFrXVDU´
 3RUpP PDLV GR TXH XPD VLPSOHV VHQVDomR GH REULJDomR SHVVRDO HVVH
VHQWLPHQWRLPSOtFLWRGHHQGLYLGDPHQWRVXJHUHDVVLPXPDUHVSRVWDSDUDRXWUDLP
SRUWDQWH TXHVWmR FRPR HVVDV SHVVRDV FRQVHJXHP PDQWHU VHP QHQKXP WLSR GH
FRQWUDWRIRUPDOYtQFXORVPHGLDGRVDSHQDVSRUFRPSXWDGRUHVHDRPHVPRWHPSR
JDUDQWLUDVLQHUJLDGHXPSURFHVVRGHSURGXomRWHFQROyJLFRDOWDPHQWHFRPSOH[R
QXP kPELWR PXOWLQDFLRQDO" 0HVPR WHQGR D )XQGDomR *120( FRPR XP SURMHWR
IRUPDOGHDSRLRWRGRRSURFHVVRGHGHVHQYROYLPHQWRGDSODWDIRUPDHGRdesktopp

'HSRLPHQWRGH/XLV9LOODFROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
'HSRLPHQWRGH*XLOKHUPH3DVWRUHFROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
70 • Software livre, cultura hacker e o ecossistema da colaboração

FRPSOHWDPHQWHLQIRUPDOLVWRpQmRFRQWUDWXDO'RSRQWRGHYLVWDLQVWLWXFLRQDOLVVR
TXHUGL]HUTXHWRGRVRVSDUWLFLSDQWHV FRPH[FHomRGDGLUHWRULDGD)XQGDomR QmR
WrPQHQKXPWLSRGH³GHYHU´OHJDOSDUDFRPDVDWLYLGDGHVGR3URMHWR
 3DUWLQGRGHVVDFRQVWDWDomRGHPRQVWUDVHTXHDGLQkPLFDVRFLDOGHWUDEDOKR
GDFRPXQLGDGH*120(SRVVXLGHIRUPDSHUHQHHLPSOtFLWDDOJXPDVQRUPDVSUy
SULDV FRQWXGR LUUHGXWtYHLV jV GLPHQV}HV FRQWUDWXDLV GR HVWDGR RX GR PHUFDGR
0DLVSUHFLVDPHQWHSDUDDOpPGDUHVSRQVDELOLGDGHIRUPDOGH¿QLGDFRQWUDWXDOPHQWH
QHVVDRUJDQL]DomRVHVREUHS}HXPDUHVSRQVDELOLGDGHQmRFRQWUDWXDOGRVYtQFXORV
'DPHVPDIRUPDTXHRVYtQFXORVHVWDEHOHFLGRVHQWUHRVPHPEURVGRJUXSRVmRD
UD]mRGHPXLWRVKDFNHUVYROXQWiULRVGHGLFDUHPDRSURMHWRVHXWHPSROLYUH HQmR
OLYUH  HVVHV PHVPRV YtQFXORV SRGHP GH WDO IRUPD HQYROYrORV TXH HP PXLWRV
FDVRVRVSUySULRVPHPEURVVH³REULJDP´OLYUHPHQWHHQWUHVL$OpPGLVVRFRPRXP
WLSRGHHIHLWRQRFLYRGHVVDSDUDGR[DOFRQGLomRSRGHVHGL]HUDLQGDTXH

³RODGRQHJDWLYR GR3URMHWR*120( pTXHpPXLWRIiFLOVHUWRPDGR


SHORJUXSR3RUH[HPSORQRV~OWLPRVGRLVDQRVHXQmR¿]QDGDDQmR
VHU FRPHU GRUPLU H WUDEDOKDU FRP HVWH JUXSR 2 JUXSR IRL XPD GDV
GXDVPHOKRUHVFRLVDV QHVWHSHUtRGR 'HPDQHLUDJHUDORIDWRpTXH
QyVHVWDPRVWmRHVWUHLWDPHQWHOLJDGRVTXHSHVVRDVGHIRUDGL¿FLOPHQWH
HQWHQGHPFRPRQyVSHQVDPRVH DVVLP QyVFRPHoDPRVDLQWHUDJLU
PDLVIULDPHQWHFRPHVVDVSHVVRDVGHIRUD outsiders (XDFKRTXHD
JHQWHUHDOPHQWHGHYHULDHYLWDUHVWHSUREOHPD´

'HIRUPDPXLWRPDLVLQWHQVDHYHODGDHVVHIHQ{PHQRGHWRUQDUXPGHWHU
PLQDGRKDFNHUXPLQGLYtGXR³WRPDGR´SHORJUXSRDFDEDSRU¿PVLPEROL]DQGRXPD
REULJDomR jV YH]HV DWp QRFLYD SRUpP OLYUHPHQWH FRQWUDtGD D SDUWLU GR PRPHQWR
HPTXHHOHVHHQJDMDHLQWHUDJHFRPHVVH3URMHWR'LWRGHRXWUDPDQHLUDHVVDUHV
SRQVDELOLGDGHHVSRQWDQHDPHQWHFRQWUDtGDVLJQL¿FDSDUDRKDFNHUXPDHVSpFLHGH
QmR FRQWUDWROLYUHPHQWHDGTXLULGRSRUpPVLPEROLFDPHQWHPDLV³REULJDQWH´TXHXP
FRQWUDWRGHWUDEDOKRIRUPDO8PDLQWHQVDUHODomRVRFLDOTXDVHTXHH[FOXVLYDPHQWH
PHGLDGD SRU FRPSXWDGRU TXH FRQYLGD SRUWDQWR D FRPSUHHQGHU R HQJDMDPHQWR
YROXQWiULRGRVKDFNHUVQmRFRPRXPDDomRSXUDPHQWHGHVLQWHUHVVDGDHHVSRQWkQHD
OLYUH PDVFRPRXPDDomRDRPHVPRWHPSRLQWHUHVVDGDHGHVLQWHUHVVDGDOLYUH
HREULJDGD±RXPDLVHVSHFL¿FDPHQWHFRPRXPVLVWHPDGHGiGLYDVPHGLDGDVSRU
computador.
 'HVVDIRUPDDDXWHQWLFLGDGHGHVVDGiGLYDPHGLDGDSRUFRPSXWDGRUVHH[
SUHVVDFRPRXPJHVWRVRFLDOPHQWHOLYUHHSDUDGR[DOXPDREULJDomRTXHRKDFNHU
Gi D VL PHVPR GH IRUPD SHVVRDO H SHUHQH37 3DUD RV PDXVVLDQRV p Dt QHVVH
'HSRLPHQWRGH/XLV9LOODFROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
1RHQWDQWRDVVLPFRPRDOHUWD*RGERXW  DOJXPDVPHWDPRUIRVHVQDHVVrQFLDGHVVHPRYLPHQWRSRGHPDOWHUDU
Software livre, cultura hacker e o ecossistema da colaboração • 71

SRQWR LPHUVD QHVVD WHQVmR QHVVH MRJR VXEMHWLYR HQWUH HVSRQWDQHLGDGH H GHYHU
JUDWXLGDGHHLQWHUHVVHTXHVHVLWXDDGiGLYD3RUFDXVDGHVVDFRQGLomRSDUWLFXODU
SRGHVH D¿UPDU TXH PHVPR QXP DPELHQWH GLJLWDO HP TXH DV UHODo}HV KXPDQDV
VmRPHGLDGDVSRUFRPSXWDGRU

³D GiGLYD VHULD XPD H[SHULrQFLD HP TXH D GLVWkQFLD HQWUH ¿QV H
PHLRV p DEROLGD HP TXH QmR Ki PDLV ¿QV H PHLRV PDV XP DWR TXH
SUHHQFKHRHVSDoRGHVLJQL¿FDomRGRVXMHLWRHID]FRPTXHVHMDPRV
XOWUDSDVVDGRV SHOR TXH SDVVD SRU QyV H SHOR TXH VH SDVVD HP QyV
$ GiGLYD VHULD XPD H[SHULrQFLD GH DEDQGRQR j LQFRQGLFLRQDOLGDGH
H[SHULrQFLD GH SHUWHQFHU D XPD FRPXQLGDGH TXH ORQJH GH OLPLWDU D
SHUVRQDOLGDGH GH FDGD XP DR FRQWUiULR D H[SDQGH &RQWUDULDPHQWH
DXPDYLVmRLQGLYLGXDOLVWDDH[SHULrQFLDGDVROLGDULHGDGHFRPXQLWiULD
QmRFRQWUDGL]QHFHVVDULDPHQWHDD¿UPDomRGDLGHQWLGDGHHSRGHDR
FRQWUiULR GHVHQYROYrOD 'RQDWL   $ GiGLYD VHULD DVVLP XPD
H[SHULrQFLD VRFLDO IXQGDPHQWDO QR VHQWLGR OLWHUDO GH H[SHULrQFLD GRV
IXQGDPHQWRVGDVRFLHGDGHGDTXLORTXHQRVOLJDDHODSDUDDOpPGDV
UHJUDV FULVWDOL]DGDV H LQVWLWXFLRQDOL]DGDV FRPR QRUPDV GD MXVWLoD´
*RGERXW

&RQVLGHUDo}HV¿QDLVVREUHHVVD³FRPXQLGDGHDWXDO´

2 FRQMXQWR GDV UHODo}HV KXPDQDV PHGLDGDV SRU FRPSXWDGRUHV PDLV GR


TXHUHSUHVHQWDUR³WHFLGRGLJLWDO´TXHFRPS}HDVRFLHGDGHFRQWHPSRUkQHDSDUHFH
GHVD¿DUERDSDUWHGRVFRQFHLWRVHSUiWLFDVTXHKDYLDPVLGRGLWDGRVSHODVFLrQFLDV
KXPDQDVHPSDUWLFXODUSHODFLrQFLDGDDGPLQLVWUDomR³+RMHXPERPQ~PHURGH
UHVWULo}HV GHVDSDUHFHX GHYLGR j GLVSRQLELOLGDGH GH QRYDV IHUUDPHQWDV GH FRPX
QLFDomRHGHFRRUGHQDomRHSRGHPRVSHQVDUPRGRVGHRUJDQL]DomRGRVJUXSRV
KXPDQRVHVWLORVGHUHODo}HVHQWUHRVLQGLYtGXRVHRVFROHWLYRVUDGLFDOPHQWHQRYRV
VHPPRGHORVQDKLVWyULDHQDVVRFLHGDGHVDQLPDLV´ /pY\ 
 'HQWUR GHVVH FRQWH[WR FRPR XP IHQ{PHQR RUJDQL]DFLRQDO GD DWXDO HUD
GR LQIRUPDFLRQDOLVPR DV FRPXQLGDGHV GH SURGXomR H GLVWULEXLomR GH VRIWZDUHV
OLYUHV SDUHFHP VHU PHOKRU FRPSUHHQGLGDV VRE D H[SUHVVmR ³FRPXQLGDGH DWXDO´
± FLWDGD LQLFLDOPHQWH SRU /pY\    GR TXH RV WHUPRV ³FRPXQLGDGHV RQOLQH´
RX ³FRPXQLGDGH YLUWXDO´ FRPXPHQWH XWLOL]DGRV$¿QDO GH DFRUGR FRP RV GDGRV
GH DSHQDV  XP GRV PDLRUHV UHSRVLWyULRV GH FyGLJR DEHUWR GR PXQGR ± R VLWH

VHXVHQWLGR,VWRpHVVHPRYLPHQWRLQWUtQVHFRSRGHVHWRUQDUSUHVRHHQULMHFLGRQXPGHYHUSRGHVHWUDQVIRUPDUPXLWDV
YH]HVHPREULJDomRH[WHUQDTXDQGRRSUySULRGRDGRUDVVLPRID]1HPWRGRVDTXHOHVTXHVHHQJDMDPHPSURMHWRV
FRPRHVVHVmRVX¿FLHQWHPHQWH¿pLVDRVSUySULRVVHQWLPHQWRVSDUDREHGHFHUDHVVHPRYLPHQWRVHPWUDQVIRUPiORGH
DOJXPPRGRHPUHJUDHPREULJDomRH[WHUQDRXDWpPHVPRHPXPFRQWUDWRIRUPDO
3DUDXPDPHOKRUFRPSUHHQVmRVREUHHVVHGHEDWHHQWUHDVQRo}HVGHFRPXQLGDGHQD6RFLHGDGHHP5HGHOHLDR
FDStWXOR&RPPXQLW\DQG&\EHUFXOWXUHdo livro An introduction to Cyberculture GH'DYLG%HOO  
72 • Software livre, cultura hacker e o ecossistema da colaboração

6RXUFH)RUJHQHWpSRVVtYHOHQFRQWUDUSRUOiPDLVGHSURMHWRV de software
OLYUHUHJLVWUDGRV(VVHVSURMHWRVVmRGHVHQYROYLGRVSRUGLYHUVDVFRPXQLGDGHVTXH
VRPDPMXQWDVPDLVGHPLOKmRHPLOKDFNHUVGHWRGRVRVFRQWLQHQWHVGRSOD
QHWDTXHLQWHUDJHPSRUPHLRGHXPSURFHVVRHFRQ{PLFRFRPXPSURGX]LUHFRP
SDUWLOKDUFyGLJRVGHIRUPDDEHUWDFRODERUDWLYDHQmRFRQWUDWXDO40.
 1RXQLYHUVRGHVVDV³FRPXQLGDGHVDWXDLV´GHVRIWZDUHOLYUHH[LVWHPWDQWR
DTXHODVPHQRVH[SUHVVLYDVGRSRQWRYLVWDTXDQWLWDWLYR±IRUPDGDVDSHQDVSRUGRLV
RXWUrVKDFNHUV±FRPRJUDQGHVJUXSRVIRUPDGRVSRUPDLVGHKDFNHUVFRPR
SRUH[HPSORpRFDVRGR3URMHWR*120(&RPXPSURFHVVRGHRUJDQL]DomRDEHUWR
HTXDVHTXHHVSRQWkQHR LVWRpVHPQHQKXPSODQHMDPHQWRHVWUDWpJLFRHVWUXWXUDO 
D FRPXQLGDGH GH KDFNHUV TXH FRPS}HP HVVH SURMHWR FRQVHJXH VH DXWRJHULU
para o desenvolvimento e a distribuição semestral de um ambiente de desktop e
XPD SODWDIRUPD GH GHVHQYROYLPHQWR FRPSRVWRV SRU PDLV GH  VRIWZDUHV HQWUH
DSOLFDWLYRV H IHUUDPHQWDV GH WRGRV RV QtYHLV WpFQLFRV 3DUD WDQWR D FRPXQLGDGH
*120(GLYLGHVHGHIRUPDHVSRQWkQHDHPTXLQ]HVXESURMHWRVRX7LPHVHP¿FD
DORFDGRWRGRRWUDEDOKRGDFRPXQLGDGHGHVGHDo}HVGLUHWDPHQWHOLJDGDVDRSUR
FHVVR GH GHVHQYROYLPHQWR DWp DTXHODV DWLYLGDGHV TXH GmR VXSRUWH SDUD HVVD ¿
nalidade principal.

Organização social do Trabalho e relações de poder

$SHVDUGHWRGDHVVDRUJDQL]DomRVRFLDOGRWUDEDOKRHPPyGXORVH7LPHV
GHGHVHQYROYLPHQWRQmRpSRVVtYHOSHUFHEHUXPDGLYLVmRUtJLGDHQWUHDVIXQo}HV
GHFDGDPHPEURQR*120(±FRPRSRUH[HPSORXPDGLYLVmRHQWUHDTXHOHVTXH
VmRPDQWHQHGRUHVGHSDFRWHVGHVHQYROYHGRUHVHVSRUiGLFRVHXVXiULRV$RFRQ
WUiULR 2 SURMHWR *120( p FRPSOHWDPHQWH GLQkPLFR H ÀH[tYHO 4XDOTXHU XVXiULR
TXHVHEHQH¿FLDGHVVHVLVWHPDWHPFRQGLo}HVWDQWRSDUDFRQWULEXLUHID]HUSDUWHGH
IRUPDPDLVHIHWLYDFRPRWDPEpPSDUDVDLUDTXDOTXHUPRPHQWRGDRUJDQL]DomRRX
OLPLWDUVHDID]HUDOJXPDVFRQWULEXLo}HVHVSRUiGLFDV
 7RGDYLD HVVD VLQHUJLD QD GLYLVmR GRV SDSpLV VRFLDLV QR LQWHULRU GR JUXSR
HVWiVXERUGLQDGDDRQtYHOGHFRQWULEXLomRTXHFDGDXPFRPSDUWLOKDHGRYtQFXOR
TXHVHHVWDEHOHFHFRPDFRPXQLGDGH4XDQGRXPGHWHUPLQDGRXVXiULRSDVVDD
ID]HU FRQWULEXLo}HV VLJQL¿FDWLYDV TXH VmR DFHLWDV SHULRGLFDPHQWH SHORV PHPEURV
GDFRPXQLGDGHSRUPpULWRGHVVDVGRDo}HVHVVHXVXiULRSRGHDWpUHFHEHURUHV
SHLWDGRFDUJRGH³PDQWHQHGRU´GRPyGXORTXHHOHHVWiDMXGDQGRDGHVHQYROYHU3RU
FDXVDGHVVDFRQGLomRGHÀH[LELOLGDGHHDEHUWXUDRVSUySULRVPHPEURVGDFRPX
3DUDREWHUXPDHVWDWtVWLFDDLQGDPDLVDWXDOL]DGDGHVVHXQLYHUVRDFHVVHRVLWHKWWSVRXUFHIRUJHQHW
0HVPRTXHVHHQFRQWUHPQHVVHPHVPRDPELHQWHFRPXQLWiULRPXLWRVKDFNHUVHSURMHWRVSDJRVSRUHPSUHVDVQmR
H[LVWHQDGDTXHUHJXOHLQVWLWXFLRQDOPHQWHHVVHSURFHVVRHFRQ{PLFRPXQGLDOGHSURGXomRHGLVWULEXLomRWHFQROyJLFD
FRPRXPWRGRLVWRpFRPRXPVHWRULQVWLWXFLRQDOGDHFRQRPLDGDLQIRUPDomR
Software livre, cultura hacker e o ecossistema da colaboração • 73

QLGDGHSRGHPD¿UPDUGHIRUPDVLQFHUDHQmRXWLOLWiULDTXHPHVPRWHQGRDOJXPDV
FDUDFWHUtVWLFDVGLIHUHQFLDGDVHQWUHVL³RVXVXiULRVVmRDEDVHGHWRGDDFRPXQLGDGH
VRPHQWHSRUXPDVLPSOHVUD]mRWRGRVRVFRQWULEXLGRUHVHUDPXVXiULRVDQWHVGH
FRPHoDUHPDFRQWULEXLU´ 817= >75$'8d­21266$@
 &RPDIXQomRGHPDQWHQHGRUGHDOJXPPyGXORGR*120(RYtQFXORGHVVH
FRODERUDGRUHPUHODomRjFRPXQLGDGHVHDPSOLDDSRQWRGHWRUQDUPDLVGLItFLOXP
SRVVtYHOGHVOLJDPHQWRHPUHODomRDR3URMHWR±PHVPRTXHQmRH[LVWDQHQKXPWLSR
GHFRQWUDWRDOpPGDREULJDomRTXHHOHGiOLYUHPHQWHDVLPHVPR3RURXWURODGR
FRPR PDQWHQHGRU GH DOJXP SDFRWH R QtYHO GH UHVSHLWR H UHFRQKHFLPHQWR HQWUH
VHXVSDUHVVHDPSOLDGHIRUPDPDLVVLJQL¿FDWLYD4XDOTXHUKDFNHUTXHDVVXPDHVVD
IXQomRSHORPpULWRGHVXDVFRQWULEXLo}HVDGTXLUHPDLVSRGHUGHGHFLVmRVREUHDV
TXHVW}HVTXHHQYROYHPRSURMHWR³1R¿QDOGDVFRQWDVDGLUHomRGRSURMHWRpGDGD
SRUTXDOTXHUXPTXHHVFUHYDFyGLJRV  (QWmRVHYRFrGHVHQYROYHFyGLJRRXVH
YRFrWHPLQÀXrQFLDGLUHWDVREUHSHVVRDVTXHGHVHQYROYHPFyGLJRVQR¿QDOHVWHp
RSURFHVVRGHWRPDGDGHGHFLVmR´41(PRXWUDVSDODYUDVLVVRVLJQL¿FDGL]HUTXHD
GLQkPLFDGHSRGHUQDRUJDQL]DomRVRFLDOGRWUDEDOKRQHVVH3URMHWR,QWHUQDFLRQDOLUi
GHSHQGHUGRPpULWRDVVRFLDGRjVUHODo}HVGHWURFDVHFRPSDUWLOKDPHQWRGHFyGLJRV
TXHVmRHPSUHHQGLGDVQRLQWHULRUGRJUXSR
 3DUWLQGRGHWRGDVHVVDVFRQVWDWDo}HVDUHDOLGDGHGHVVHIHQ{PHQRRUJD
QL]DFLRQDO HPSUHHQGLGR QRV OLDPHV GLJLWDLV GD ,QWHUQHW QmR GHL[D G~YLGDV D VHX
UHVSHLWR H[LVWH XP HQJDMDPHQWR QmRFRQWUDWXDO DVVRFLDGR D XPD IRUPD GH FLU
FXODomRGHEHQVTXHGLIHUHFRPSOHWDPHQWHGHRXWUDVRUJDQL]Do}HVOLJDGDVjHVIH
UD GR PHUFDGR RX GR (VWDGR ,VVR VLJQL¿FD GL]HU TXH DOpP GH QmR WHU QHQKXPD
SHUVSHFWLYDGHUHWRUQROXFUDWLYRQHVVDRUJDQL]DomRDVDo}HVQmRVmRLPSRVWDVSRU
OHLRXFRQWUDWR(ODVVHLQVHUHPQXPVLVWHPDGHWURFDHFRPSDUWLOKDPHQWRWHFQR
OyJLFRHPTXHRVDJHQWHVEXVFDPDIDVWDUVHYROXQWDULDPHQWHGDHTXLYDOrQFLDHP
TXHDUHWULEXLomRQmRpXPD¿QDOLGDGH±SRUPDLVTXHHODH[LVWD2FyGLJRHRWHPSR
GHWUDEDOKRVmRGRDGRVQmRSDUDVHUHFHEHUDOJRHPWURFDPDVSDUDTXHRXWURV
FRPSDUWLOKHPHFRQWLQXHPGRDQGRWDPEpP(VVDpD³UHJUDGHRXUR´UHODWDGDGRU
5LFKDUG6WDOOPDQ  QRLQtFLRGR3URMHWR*18'HVVDIRUPDDVUHODo}HVGHQWUR
GHVVDRUJDQL]DomRVmRUHJLGDVSRUDOJRTXHSRGHVHUGH¿QLGRFRPRXPSURFHVVR
QmRFRQWUDWXDO GH GtYLGD P~WXD H SRVLWLYD HQWUH PHPEURV 'H IRUPD DLQGD GLUHWD
WUDWDVHGHXPDQRYDH[SUHVVmRGDGiGLYDPRGHUQDXPVLVWHPDGHGiGLYDPHGLDGD
SRUFRPSXWDGRUWDQWRQDQDWXUH]DFRPRQRPRGRGHIXQFLRQDPHQWRHRUJDQL]DomR
GRWUDEDOKR
 'HQWURGHVVHVLVWHPDSRGHVHREVHUYDUTXHSUHGRPLQDPDVUHODo}HVGH
WUDEDOKRTXHQmRVHHQTXDGUDPRXTXHVHVREUHS}HPjUXSWXUDDOLHQDQWHLPSRVWD
SHOD UHODomR VDODULDO LVWR p ³HODV UHODo}HV GH WUDEDOKR  HVWmR VHPSUH SHUWR GR
'HSRLPHQWRGH/XLV9LOODFROKLGRHPHQWUHYLVWDUHDOL]DGDQRGLD
74 • Software livre, cultura hacker e o ecossistema da colaboração

YtQFXORVRFLDOVmRLPDQHQWHVDRYtQFXORHSRUWDQWRHVWmRIRUD GDGLQkPLFD GD


UHODomRVDODULDO´ *RGERXW $VVLPDSHVDUGHYLVDUHPDXPD¿QDOLGDGH
WpFQLFDGHDOWDFRPSOH[LGDGHpPHGLDQWHHVVHVYtQFXORVWHFLGRVSRUPHLRGRHQ
JDMDPHQWRQmRFRQWUDWXDOGRVKDFNHUVTXHDFRPXQLGDGH*120(JDUDQWHDVXD
YLDEOLGDGHVRFLDOSROtWLFDHRUJDQL]DFLRQDO3RULVVRHVVHVLVWHPDGHGiGLYDPHGLDGD
SRUFRPSXWDGRUDSDUHFHSRUWDQWRFRPRXP³IDWRVRFLDOWRWDO´GLULD0DUFHO0DXVV
FRPRXPSULQFtSLRFRQVXEVWDQFLDOjYLGDTXHVHPDQLIHVWDQRDPELHQWHGLJLWDO42TXH
FRPS}HHVVD³FRPXQLGDGHDWXDO´GHVRIWZDUHOLYUH

Novos horizontes para a Sociedade em Rede?

 7RGDYLDQDYLVmRGHDXWRUHVFRPR.ROORFN  %HQNOHU  H6LOYHLUD


  DV FRPXQLGDGHV GH VRIWZDUH OLYUH VmR DSHQDV XP H[HPSOR SURHPLQHQWH
GHXPIHQ{PHQRPXLWRPDLVDPSORQD6RFLHGDGHHP5HGH3DUDDOpPGRGHVHQ
YROYLPHQWRGHFyGLJRVDEHUWRVDpWLFDGHWUDEDOKRTXHVHPDQLIHVWDQDFXOWXUDGH
FRPSDUWLOKDPHQWRGRVKDFNHUVLQÀXHQFLDHSDUHFHUHFRQ¿JXUDUDIRUPDGHSURGXomR
HGLVWULEXLomRGDLQIRUPDomRQDHFRQRPLDFRQWHPSRUkQHD$VVLPDTXHVWmRTXH
PRELOL]RXHVWHSUHVHQWHHVWXGRLQWULJDQGRTXDOTXHUSRVWXODGRQHROLEHUDOSRGHVHU
UHIRUPXODGDHQRYDPHQWHDSUHVHQWDGDGDVHJXLQWHIRUPD

³3RUTXHFLQTXHQWDPLOYROXQWiULRVSRGHPFRPVXFHVVRVHUFRDXWR
UHV GD :LNLSHGLD D PDLV VpULD DOWHUQDWLYD RQOLQH GD (QFLFORSpGLD
%ULWkQLFDHGHSRLVHQWUHJDUDREUDGHJUDoD"3RUTXHPLOK}HVGH
YROXQWiULRVFRQWULEXHPFRPRTXHVREUDGRFLFORFRPSXWDFLRQDOGHVHXV
FRPSXWDGRUHVSDUDFULDURPDLVSRGHURVRFRPSXWDGRUGD7HUUD6(7,#
+RPe"´ %HQNOHU >75$'8d­21266$@

 eFODURTXHDLQGDQmRVHSRGHUHVSRQGHUHVVDVTXHVW}HVFRPDSUHFLVmR
DFDGrPLFD QHFHVViULD &RQWXGR OHYDQGR HP FRQVLGHUDomR R IHQ{PHQR RUJDQL
]DFLRQDO GDV FRPXQLGDGHV GH VRIWZDUH OLYUH MXQWR FRP R UHVJDWH GD FRQFHSomR
maussina do homo donatorHLVTXHVXUJHXPDOX]SDUDRLQGLYtGXRPRGHUQRQD
HVFXULGmRGHVXDSHUVSHFWLYDXWLOLWiULD/X]HVVDTXHWDQWRSRGHSURYRFDUYHUWLJHQV
FRPRWDPEpPDPSOLDUVXDFRPSUHHQVmRVREUHDQDWXUH]DGDDomRKXPDQDDSDUWLU
GDVXDPDQLIHVWDomRQR³PXQGRGRVbits´

&RPRXPDH[SHULrQFLDTXHWHFHIRUWHVYtQFXORVKXPDQRVPHVPRQXPDPELHQWHGLJLWDOFDEHVXEOLQKDUTXHDGiGLYD
WDPEpPGHVPLVWL¿FDDOJXQVSRVWXODGRVTXHDVVRFLDPD,QWHUQHWFRPRXPPHLRTXHHVWLPXODSUiWLFDVDQWLVRFLDLV(VVH
IHQ{PHQRWRUQDDLQGDPDLVFODURTXH³DLPDJHPGRLQGLYtGXRµLVRODGRHPIUHQWHjVXDWHOD¶pPXLWRPDLVSUy[LPDGR
IDQWDVPDGRTXHGDSHVTXLVDVRFLROyJLFD´ /pY\ 
Software livre, cultura hacker e o ecossistema da colaboração • 75

Referências

$*8,$59LFHQWH0GH2V$UJRQDXWDVGD,QWHUQHWXPD$QiOLVHQHWQRJUi¿FDVREUHDFRPXQLGDGH
on-line de software livre do projeto GNOME à luz da teoria da dádiva. 2007. 110 f. Dissertação
0HVWUDGR &XUVRGH$GPLQLVWUDomR(VFRODGH$GPLQLVWUDomRGD8)%$6DOYDGRU'LVSRQtYHOB
HP  KWWSZZZDGPXIEDEUSXESXEOLFDFDR0$$'LVVHUWDFDR*QRPH9HUVDR)LQDOSGf>.
$FHVVRHPVHW

$3*$8$5HQDWD2/LQX[HDSHUVSHFWLYDGDGiGLYDHorizontes Antropológicos3RUWR$OHJUHY
Q

%(//'DYLGAn Introduction to Cybercultures/RQGRQ5RXWOHGJH

%(1./(5<RFKDL&RDVH¶V3HQJXLQRU/LQX[DQG7KH1DWXUHRIWKH)LUPThe Yale Law Journal. Nova


<RUNSGH]

BBBBBBBBBBBBBBBBB The Wealth of Networks +RZ 6RFLDO 3URGXFWLRQ 7UDQVIRUPV 0DUNHWV DQG
)UHHGRP1HZ+DYHQ$QG/RQGRQ<DOH8QLYHUVLW\3UHVV'LVSRQtYHOHPKWWSKDELWDWLJFRUJ
ZHDOWKRIQHWZRUNVFK!$FHVVRHPDJR

&$,//e$ODLQA antropologia do Dom:RWHUFHLURSDUDGLJPD3HWUySROLV9R]HV

BBBBBBBBBBBBBBB$VRFLHGDGHPXQGLDOQRKRUL]RQWH,Q0$57,163DXOR+HQULTXH181(6%UDVLOPDU
)HUUHLUD A nova ordem social: SHUVSHFWLYDV GD VROLGDULHGDGH FRQWHPSRUkQHD %UDVtOLD 3DUDOHOR 
2004. p. 17-41.

BBBBBBBBBBBBBBB 2 'RP HQWUH ,QWHUHVVH H ³'HVLQWHUHVVDPHQWR´ ,Q 0$57,16 3DXOR +HQULTXH


&$03265REHUWD%LYDU&Polifonia do Dom5HFLIH(G8QLYHUVLWiULDGD8)3(S

&$67(//60DQXHOA Galáxia da InternetUHÀH[}HVVREUHD,QWHUQHWRVQHJyFLRVHDVRFLHGDGH5LR


'H-DQHLUR-RUJH=DKDU(GLWRU

BBBBBBBBBBBBBBA sociedade em rede.HG6mR3DXOR3D](7HUUD $HUDGD,QIRUPDomR


HFRQRPLDVRFLHGDGHHFXOWXUDYROXPH, 

BBBBBBBBBBBBBB 2 ,QIRUPDFLRQDOLVPR H D 6RFLHGDGH HP 5HGH ,Q +,0$1(0 3HNND A ética dos
hackers e o espírito da era da informaçãoDLPSRUWkQFLDGRVH[SORUDGRUHVGDHUDGLJLWDOHG5LR'H
-DQHLUR&RQWH[WRS

'80217/RXLVEnsaios sobre o IndividualismoXPD3HUVSHFWLYD$QWURSROyJLFDVREUHD,GHRORJLD


0RGHUQD/LVERD'RP4XL[RWH

)267(5*O\QQ101 Things to Know about GNOME'LVSRQtYHOHPKWWSZZZJQRPHRUJaJPDQ


EORJ!$FHVVRHPGH]

)5$1d$),/+2*HQDXWR&GH$IRUoDFUtWLFDGHXPDFRQFHSomR0DXVVLDQDGDGiGLYD,Q
(1&21752$18$/'$$132&6&D[DPEXO paradigma da dádiva e as ciências socias
no Brasil.6DOYDGRU$QSRFVS

)5$1d$ ),/+2 *HQXDWR & GH '=,0,5$ 6\OYDLQ (FRQRPLD 6ROLGiULD H 'iGLYD Organizações &
Sociedade6DOYDGRUYQSDEU7ULPHVWUDO

)5$1d$),/+2*HQDXWR&6$/$=$5&ODULVVD5*HVWmRGR9ROXQWDULDGRH'iGLYD5HÀH[}HVj/X]
GR&DVR2EUDV6RFLDLV,UPm'XOFH±26,' ,Q(1&217521$&,21$/'$$662&,$d­21$&,21$/
'26 352*5$0$6 '( 3Ï6*5$'8$d­2 (0 $'0,1,675$d­2  D  GH 6HWHPEUR GH 
%UDVtOLDAnais%UDVtOLD

*$7(6 ,,, :LOOLDP +HQU\ Open letter to hobbyists 'LVSRQtYHO HP KWWSZZZEOLQNHQOLJKWVFRP
FODVVLFFPSJDWHVZKLQHKWPO!$FHVVRHPGH]

*(50$1'DQLHO0The GNOME projectDFDVHVWXG\RIRSHQVRXUFHJOREDOVRIWZDUHGHYHORSPHQW


6RIWZDUH3URFHVV,PSURYHPHQWDQG3UDFWLFH9LFWRULDSVHW'LVSRQtYHOHPKWWS
76 • Software livre, cultura hacker e o ecossistema da colaboração

ZZZLQWHUVFLHQFHZLOH\FRPFJLELQDEVWUDFW$%675$&7!$FHVVRHPPDU

BBBBBBBBBBBBBBBBBB 6RIWZDUH (QJLQHHULQJ 3UDFWLFHV LQ WKH *120( 3URMHWF ,Q )(//(5 -RVHSK
),7=*(5$/'%ULDQ+,66$06FRWW$/$.+$1,.DULP5Perspectives on Free and Open Source
Software.&DPEULGJH7KH0,73UHVVS

*2'%287 -7 ,QWURGXomR j GiGLYD. Revista Brasileira Ciências Sociais 2XW  YRO
QRS'LVSRQtYHO HP       KWWSZZZVFLHOREUVFLHORSKS"VFULSW VFLBDUWWH[W SLG 6
 OQJ HQ QUP LVR!$FHVVRHP0D\

BBBBBBBBBBBBBBBO Espírito da Dádiva5LR'H-DQHLUR)XQGDomR*HW~OLR9DUJDV

BBBBBBBBBBBBBBBB+RPRGRQDWRUYHUVXV+RPRRHFRQRPLFXV,Q0$57,163DXOR+HQULTXHA Dádiva
entre os Modernos3HWUySROLV9R]HVS

+$56$OH[DQGHU286KDRVRQJ:RUNLQJIRUIUHH"0RWLYDWLRQVIRUSDUWLFLSDWLQJLQRSHQVRXUFHSURMHFWV
International Journal of Electronic Commerce  YRO  Q S ± 'LVSRQtYHO HP KWWS
FVGOFRPSXWHURUJSHUVDJHQ'/$EV7RFMVS"UHVRXUFH3DWK GOSURFHHGLQJV WRF FRPSSURFHHGLQJV
KLFVVWRF[PO '2, +,&66!$FHVVRHPMXQ

+,0$1(0 3HNND A ética dos hackers e o espírito da era da informação D LPSRUWkQFLD GRV
H[SORUDGRUHVGDHUDGLJLWDO5LR'H-DQHLUR&DPSXV

,&$=$ 0LJXHO GH The Story of the GNOME project 'LVSRQtYHO HP KWWSSULPDWHV[LPLDQ
FRPaPLJXHOJQRPHKLVWRU\KWPO!$FHVVRHPVHW

/$.+$1,.DULP5:2/)5REHUW*:K\+DFNHUV'R:KDW7KH\'R8QGHUVWDQGLQJ0RWLYDWLRQDQG
(IIRUWLQ)UHH2SHQ6RXUFH6RIWZDUH3URMHFWV,Q)(//(5-RVHSK),7=*(5$/'%ULDQ+,66$06FRWW
$/$.+$1,.DULP5Perspectives on Free and Open Source Software.&DPEULGJH7KH0,73UHVV
S

/(026$QGUpCiber-Socialidade7HFQRORJLDH9LGD6RFLDOQD&XOWXUD&RQWHPSRUkQHD'LVSRQtYHOHP
KWWSZZZIDFRPXIEDEUFLEHUSHVTXLVD!$FHVVRHPGH]

/e9<3LHUUHCibercultura6mR3DXOR(G

.2=,1(76 5REHUW 9 2Q 1HWQRJUDSK\ ,QLWLDO 5HÀHFWLRQV RQ &RQVXPHU 5HVHDUFK ,QYHVWLJDWLRQV RI
&\EHUFXOWXUH,QAdvances in Consumer Research

BBBBBBBBBBBBBBBBBBBB7KH¿HOGEHKLQGWKHVFUHHQXVLQJQHWQRJUDSK\IRUPDUNHWLQJUHVHDUFKLQRQ
OLQHFRPPXQLWLHV,QJornal of Marketing Research. YS)HE

.2//2&. 3HWHU The Economies of Online Cooperation *LIWV DQG 3XEOLF *RRGV LQ &\EHUVSDFH
'LVSRQtYHOHPKWWSZZZVVFQHWXFODHGXVRFIDFXOW\NROORFNSDSHUVHFRQRPLHVKWP!$FHVVR
HPDJR

0$57,163DXOR+HQULTXH&$03265REHUWD%LYDU&Polifonia do Dom5HFLIH(G8QLYHUVLWiULDGD
8)3(

0$8660DUFHOEnsaio sobre a dádiva/LVERD(GLo}HV

1(:5(1(%HKLQGWKH6FHQHV(OLMDK1HZUHQGNOME Journal2QOLQHDEU'LVSRQtYHOHP
KWWSJQRPHMRXUQDORUJDUWLFOHEHKLQGWKHVFHQHVHOLMDKQHZUHQ!$FHVVRHPDEU

5$<021'(ULF6WHYHQA Catedral e o Bazar'LVSRQtYHOHPKWWSZZZJHRFLWLHVFRP&ROOHJH3DUN


8QLRQSWFDWKHGUDOED]DDUKWPO!$FHVVRHPGH]

BBBBBBBBBBBBBBBComo se Tornar um Hacker.'LVSRQtYHOHPKWWSZZZOLQX[LPHXVSEUaUFDHWDQR


GRFVKDFNHUKRZWRSWKWPO!$FHVVRHPVHW

BBBBBBBBBBBBBBBHomesteading the Noosphere'LVSRQtYHOHPKWWSZZZ¿UVWPRQGD\RUJLVVXHV


LVVXHBUD\PRQGLQGH[KWPO!$FHVVRHPGH]
Software livre, cultura hacker e o ecossistema da colaboração • 77

6$/$=$5 &ODULVVD 5RFKD GD 6LOYD *HVWmR GR 9ROXQWDULDGR H 'iGLYD 5HÀH[}HV j /X] GR &DVR
Obras Sociais Irmã Dulce  26,'   I 'LVVHUWDomR 0HVWUDGR   &XUVR GH $GPLQLVWUDomR
(VFROD GH $GPLQLVWUDomR GD 8IED 6DOYDGRU  'LVSRQtYHO HP KWWSZZZDGPXIEDEUGLVVHUWD
PHVWDFDGFODULVVDBURFKDBGDBVLOYDKWP!$FHVVRHPDEU

6,/9(,5$6pUJLR$PDGHXA mobilizição colaborativa e a teoria da propriedade do bem intangível.


I7HVH 'RXWRUDGR &LrQFLD3ROtWLFD'HSDUWDPHQWRGH'HSDUWDPHQWRGH&LrQFLD3ROtWLFD
863 6mR 3DXOR  'LVSRQtYHO HP KWWSWZLNLVRIWZDUHOLYUHRUJELQYLHZ7HVH6$:HE+RPH!
$FHVVRHPMDQ

67$//0$15LFKDUG0Free Software, Free Society6HOHFWHG(VVD\VRI5LFKDUG06WDOOPDQ%RVWRQ


-RVKXD*D\

7259$/'6/LQXV2TXHID]RFRUDomRGHXPKDFNHUEDWHUPDLVUiSLGRWDPEpPFRQKHFLGRFRPRD/HL
GH/LQXV,Q+,0$1(03HNNDA ética dos hackers e o espírito da era da informaçãoDLPSRUWkQFLD
GRVH[SORUDGRUHVGDHUDGLJLWDOHG5LR'H-DQHLUR&DPSXVS

BBBBBBBBBBBBBBBBBB Só por prazer: Linux, os bastidores da criação 5LR GH -DQHLUR &DPSXV
2001.

817= 9LQFHQW The GNOME Community HQG XVHUV 'LVSRQtYHO HP KWWSZZZ
JQRPHMRXUQDORUJDUWLFOHWKHJQRPHFRPPXQLW\HQGXVHUV! $FHVVR HP  MXQ 

9$=7LDJR%RUWROHWWRBerimbau LivreFRQVWUXomRGHXPDVROXomROLYUHSDUDSURMHWRVGHLQIRFHQWURV
FRPXQLWiULRV   I 0RQRJUD¿D %DFKDUHODGR   'HSDUWDPHQWR GH &LrQFLD GD &RPSXWDomR
8QLYHUVLGDGH)HGHUDOGD%DKLD6DOYDGRU

:$8*+-HII%HKLQGWKH6FHQHV-HII:DXJKGNOME Journal2QOLQHIHY'LVSRQtYHOHP
KWWSJQRPHMRXUQDORUJDUWLFOHEHKLQGWKHVFHQHVMHIIZDXJK!$FHVVRHPIHY
78 • Software livre, cultura hacker e o ecossistema da colaboração
Software livre, cultura hacker e o ecossistema da colaboração • 79

Política e Linguagem
nos debates sobre
software livre
Rafael Evangelista

Introdução

'HVGHR¿PGDGpFDGDGHGRVpFXORSDVVDGRpFUHVFHQWHRGHEDWH
QR%UDVLOHPWRUQRGDVYDQWDJHQVHGHVYDQWDJHQVGDDGRomRGHVRIWZDUHVOLYUHV
WDQWRSHODHVIHUDS~EOLFDTXDQWRSHODLQLFLDWLYDSULYDGD(PHVSHFLDODGLVFXVVmR
LQWHQVL¿FDVH D SDUWLU GH  TXDQGR JUXSRV GH XVXiULRV H GHVHQYROYHGRUHV
GHVRIWZDUHOLYUHFRPDSRLRGDDGPLQLVWUDomRGRPXQLFtSLRGH3RUWR$OHJUHHGR
JRYHUQR GR HVWDGR GR 5LR *UDQGH GR 6XO SURPRYHP R , )yUXP ,QWHUQDFLRQDO GH
6RIWZDUH/LYUHQDFDSLWDOJD~FKD$OJXQVGHVVHVXVXiULRVVmRSDUWHLQWHJUDQWHGR
JRYHUQR PXQLFLSDO GH 3RUWR$OHJUH H GR JRYHUQR GR 5LR *UDQGH GR 6XO DPERV
FRQWURODGRVSHOR3DUWLGRGRV7UDEDOKDGRUHV 37 
'HVGHHVVHSHUtRGRpUHIHULGDDSUHVHQoDGH³SROtWLFRV´HQWUHRVJUXSRVGH
XVXiULRVHGHIHQVRUHVGRVRIWZDUHOLYUHDOJRTXHLQTXLHWDHJHUDUHFODPDo}HVSRU
SDUWHGRJUXSRGHSHVVRDVTXHFKDPDDVLPHVPRGH³DFRPXQLGDGHVRIWZDUHOLYUH´
(VVD FRPXQLGDGH IRUPDGD HVVHQFLDOPHQWH SRU LQGLYtGXRV FRP H[SHULrQFLD HP
WUDEDOKRVGHVFULWRVFRPR³WpFQLFRV´LQFRPRGDVHFRPDSUHVHQoDGRV³SROtWLFRV´H
LQLFLDXPGHEDWHTXHGXUDDWpKRMHGLVFXWLQGRDWpTXHSRQWRpLQWHUHVVDQWHSDUDRV
REMHWLYRVJHUDLVGRPRYLPHQWRRHQYROYLPHQWRFRPDSROtWLFD$SDODYUD³SROtWLFD´p
XVDGDQDPDLRUSDUWHGDVYH]HVSDUDID]HUUHIHUrQFLDDRHQYROYLPHQWRGHSDUWLGRV
SROtWLFRVQRPRYLPHQWR
 1RVDQRVVHJXLQWHVDUHIHUrQFLDj³SROtWLFD´FRPRDOJRH[WHUQRDRPRYL
PHQWR H FDSD] GH DWUDSDOKiOR RX DMXGiOR WHP VH UHSHWLGR FRP IUHTXrQFLD H p
OHPEUDGDWDQWRSHORVHWRUTXHGHIHQGHRXVRGRVVRIWZDUHVOLYUHVFRPRSHORVHWRU
80 • Software livre, cultura hacker e o ecossistema da colaboração

FUtWLFR j VXD DGRomR 0DLV UHFHQWHPHQWH D SDUWLU GH   D HVFROKD SRU SDUWH
GR JRYHUQR IHGHUDO EUDVLOHLUR GR VRIWZDUH OLYUH FRPR D SODWDIRUPD SUHIHUHQFLDO
SDUD R XVR SHOD DGPLQLVWUDomR S~EOLFD H HP SURMHWRV GH LQFOXVmR GLJLWDO IH] FRP
TXHRGHEDWHFDPLQKDVVHDLQGDPDLVQDGLUHomRGRTXHVWLRQDPHQWRGR³SROtWLFR´
QRVRIWZDUHOLYUH8PDGDVPDUFDVIXQGDPHQWDLVGRGHEDWHHPWRUQRGRVRIWZDUH
OLYUHVHUiHQWmRDGLVFXVVmRHQWUHRTXHpUHFRQKHFLGRFRPR³WpFQLFR´HRTXHp
UHFRQKHFLGRFRPR³SROtWLFR´
 (VVDTXHVWmRQmRVHUHVWULQJHjFRPXQLGDGHVRIWZDUHOLYUHEUDVLOHLUD$RULJHP
GRPRYLPHQWRVRIWZDUHOLYUHpDWULEXtGDDRV(8$FXMRUHSUHVHQWDQWHLQVWLWXFLRQDO
GHPDLRUSHVRpD)UHH6RIWZDUH)RXQGDWLRQ )6) SUHVLGLGDSRU5LFKDUG6WDOOPDQ
SURJUDPDGRU TXH VLQWHWL]RX RV SULQFtSLRV IXQGDPHQWDLV GR PRYLPHQWR 7DPEpP
QRV(8$RGHEDWHpPDUFDGRSHODVFDWHJRULDVWpFQLFD[SROtWLFDHRXWUDVGLYLV}HV
HPFDWHJRULDVTXHGHVWDVmRGHULYDGDVFRPRH¿FLrQFLD[LGHDLVUD]}HVSUiWLFDV
[UD]}HVLGHROyJLFDVQmRSROLWL]DomR[SROLWL]DomRHQWUHRXWUDV5LFKDUG6WDOOPDQ
PXLWDVYH]HVpFKDPDGRGH³FRPXQLVWD´HDTXDOL¿FDomRWHPVLGRWmRIUHTXHQWH
TXH Mi VH UHSHWH DWp PHVPR HP WRP GH SLDGD HP ZHEVLWHV GHGLFDGRV D QRWtFLDV
GR VHWRU GH 7HFQRORJLD GD ,QIRUPDomR 3URGX]VH SRU FRQVHTXrQFLD XP HIHLWR
GHXPDUHMHLomRj)6)SRLVQRFRQWH[WRGHVVHGHEDWH WHFQRORJLDGDLQIRUPiWLFD
PHUFDGR HVREUHWXGRQRV(8$RWHUPR³FRPXQLVWD´FDUUHJDXPVHQWLGRQHJDWLYR
SHMRUDWLYR$TXLVHHVWDEHOHFHXPDUHODomRHPTXHXPDSRVLomRUHFRQKHFLGDFRPR
³GH HVTXHUGD´ ± FRPXQLVWD VRFLDOLVWD RX SURJUHVVLVWD ± VLJQL¿FD ³HVWDU OLJDGR j
SROtWLFD´HQTXDQWRDDVVRFLDomRFRPROLYUHPHUFDGRRXDQmRUHMHLomRDRVLVWHPD
HFRQ{PLFRFDSLWDOLVWDVLJQL¿FDULDSRURSRVLomRXPDLPDJLQDGDQHXWUDOLGDGH

A contribuição das ciências da linguagem

1HVVHGHEDWHD/LQJXtVWLFDHPHVSHFLDOD$QiOLVHGR'LVFXUVRHRVHVWX
GRVGDHQXQFLDomRSRGHRIHUHFHUXPDFRQWULEXLomREDVWDQWHLQWHUHVVDQWH1mRVH
WUDWDGHFRQ¿UPDURXUHIXWDUDLGHLDGHTXH³KiPXLWRVSROtWLFRVQRPRYLPHQWR´QHP
PHVPRGLVFXWLUVHHVWHGLDORJDPDLVIRUWHPHQWHFRPRFDPSRGDHVTXHUGD5HV

(PžGHDEULOGHRVLWH1HZV)RUJHXPGRVPDLVSRSXODUHVHQWUHDFRPXQLGDGHVRIWZDUHOLYUHSXEOLFRXXPD
QRWtFLDWURWHHPTXHD¿UPDYDTXHR*18(PDFVVRIWZDUHFULDGRSRU6WDOOPDQH[LELDPHQVDJHQVVXEOLPLQDUHVFRPR
³R &ULVWLDQLVPR p HVWXSLGH]´ RX ³R &RPXQLVPR p ERP´ ³6HFUHW PHVVDJHV IRXQG LQ *18 (PDFV´ HP 1HZV )RUJH
SXEOLFDGRHYLVXDOL]DGRHP
0DLVUHFHQWHPHQWHHPRSUHVLGHQWHGD0LFURVRIW%LOO*DWHVFRPSDURXWRGRVDTXHOHVTXHEXVFDPXPD
ÀH[LELOL]DomRGRVLVWHPDDWXDOGHSURSULHGDGHLQWHOHFWXDOFRPFRPXQLVWDVGDQGRDVHJXLQWHGHFODUDomR ³*DWHVWDNLQJ
DVHDWLQ\RXUGHQ´HPNews.com, KWWSQHZVFRPFRP*DWHVWDNLQJDVHDWLQ\RXUGHQBKW
PO"SDUW UVV WDJ  VXEM QHZV
³1R,¶GVD\WKDWRIWKHZRUOG¶VHFRQRPLHVWKHUH¶VPRUHWKDWEHOLHYHLQLQWHOOHFWXDOSURSHUW\WRGD\WKDQHYHU7KHUHDUH
IHZHUFRPPXQLVWVLQWKHZRUOGWRGD\WKDQWKHUHZHUH7KHUHDUHVRPHQHZPRGHUQGD\VRUWRIFRPPXQLVWVZKRZDQWWR
JHWULGRIWKHLQFHQWLYHIRUPXVLFLDQVDQGPRYLHPDNHUVDQGVRIWZDUHPDNHUVXQGHUYDULRXVJXLVHV7KH\GRQ¶WWKLQNWKDW
WKRVHLQFHQWLYHVVKRXOGH[LVW´
Software livre, cultura hacker e o ecossistema da colaboração • 81

SRQGHUDWDLVSHUJXQWDVpPDQWHUDRSRVLomRHQWUHWpFQLFDHSROtWLFD1RSUHVHQWH
WUDEDOKR GDGD D VXD LQVFULomR WHyULFRPHWRGROyJLFD FRQVLGHUDVH TXH D SROtWLFD
p LQHUHQWH j SURGXomR GR VRFLDO DWUDYHVVDQGR WRGR H TXDOTXHU GHEDWH 7HQGR
HP YLVWD D 6HPkQWLFD +LVWyULFD GD (QXQFLDomR FRQIRUPH (GXDUGR *XLPDUmHV
R ³DFRQWHFLPHQWR GH OLQJXDJHP SRU VH GDU QRV HVSDoRV GH HQXQFLDomR p XP
DFRQWHFLPHQWRSROtWLFR´
 2VRIWZDUHOLYUHHPERUDVHMDXVXDOPHQWHOLJDGRDXPDFHUWDDUTXLWHWXUDGH
FRQVWUXomRGHXPVLVWHPDRSHUDFLRQDOQmRSRGHVHUFODVVL¿FDGRHPVLFRPRXP
REMHWRWpFQLFR2TXHGH¿QHXPVRIWZDUHFRPROLYUHRXSURSULHWiULRQmRHVWiGDGR
HPVXDDUTXLWHWXUDPDVHPVXDIRUPDGHOLFHQFLDPHQWRLVWRpQRPRGRFRPRp
UHJXODPHQWDGRMXULGLFDPHQWHUHJXODPHQWDomRTXHFRQ¿JXUDDXWRUL]DGHWHUPLQDGDV
UHODo}HV QD VRFLHGDGH H QmR RXWUDV 8P VRIWZDUH VHUi OLYUH VH IRU HQXQFLDGR
TXH VHX XVXiULR WHUi TXDWUR OLEHUGDGHV IXQGDPHQWDLV FySLD XVR PRGL¿FDomR H
GLVWULEXLomR(PJHUDODLGHLDGHVRIWZDUHOLYUHHVWiOLJDGDDXPVLVWHPDRSHUDFLRQDO
HPHVSHFLDOR*18/LQX[PDVVRIWZDUHVOLYUHVSURGX]LGRVSDUDIXQFLRQDUHPHP
VLVWHPDVSURSULHWiULRVFRPRR:LQGRZVWDPEpPH[LVWHPHPJUDQGHQ~PHUR8P
VRIWZDUHVHUiHQWmROLYUHVHDVVLPIRUHQXQFLDGR
 2 GHEDWH TXH VH HVWDEHOHFH HQWUH VRIWZDUH OLYUH H VRIWZDUH SURSULHWiULR
VHUi PDUFDGR SHOD FRQWUDGLomR HQWUH GXDV RUGHQV$V OLFHQoDV OLYUHV RX VHMD DV
³OLEHUGDGHV´ TXH RV VRIWZDUHV UHJXODGRV SRU HODV RIHUHFHP VHUmR REMHWR GH XPD
WHQWDWLYD GH VLOHQFLDPHQWR$V OLFHQoDV OLYUHV FRPR YHUHPRV VHUmR FODVVL¿FDGDV
FRPR ³LPSUySULDV´ FRPSDUDGDV D SDWRORJLDV YLUDLV TXH DIHWDP D VD~GH GR FRUSR
VRFLDOSHORVGHIHQVRUHVGROLFHQFLDPHQWRSURSULHWiULR1RFHQWURGHVVHGHEDWHHVWi
DFRQWUDGLomRHQWUHXPDQRUPDTXHHVWDEHOHFHXPDFHUWDGLYLVmRGRUHDO DOLFHQoD
SURSULHWiULD HRXWUDTXHTXHVWLRQDHVVDGLYLVmRD¿UPDQGRDGHVLJXDOHD¿UPDQGR
XPDQRYDRUGHP*XLPDUmHVGiDRSROtWLFRRVHQWLGRGHXPD³FRQWUDGLomRHQWUHXPD
QRUPDWLYLGDGHTXHHVWDEHOHFH GHVLJXDOPHQWH XPDGLYLVmRGRUHDOHDD¿UPDomR
GRSHUWHQFLPHQWRGRVTXHQmRHVWmRLQFOXtGRV´9HUHPRVTXHDVOLFHQoDVVmRRV
GRFXPHQWRVGHUHIHUrQFLDHTXHDGHIHVDSHODVSDUWHVGHXPDRXGHRXWUDIRUPD
GHOLFHQFLDPHQWRRXWHFQRORJLD *18/LQX[RX:LQGRZVRVVLVWHPDVRSHUDFLRQDLV
TXHVmRWRPDGRVFRPRRVPDLRUHVH[HPSORVGHVLVWHPDVOLYUHVRXSURSULHWiULRV 
VHUiDGHIHVDGHXPDFHUWDGLYLVmRGRUHDOHVWDEHOHFLGDSRUHVVHVGRFXPHQWRV

*XLPDUmHV
,GHPS
82 • Software livre, cultura hacker e o ecossistema da colaboração

Sujeito, ideologia e sentido

7DPEpPLPSRUWDQWHQDSUHVHQWHDQiOLVHpRFRQFHLWRGHLQWHUGLVFXUVRHXPD
UHÀH[mRVREUHDPHPyULDGRGL]HU3URFXUDUHLDTXLHVWDEHOHFHUXPDFRPSDQKDPHQWR
GDKLVWyULDGHFHUWRVVHQWLGRVSRVWRVHPMRJRQRGHEDWHVREUHRVRIWZDUHOLYUH(VVH
DFRPSDQKDPHQWRGHYHVHUGHVFULWRQmRFRPRXPDFURQRORJLDGHIDWRVPDVFRPR
RHVWDEHOHFLPHQWRGHUHODo}HVGHVHQWLGRTXHVHGmRQDKLVWyULDHTXHVySRGHP
VH HVWDEHOHFHU WHQGR FRPR UHIHUrQFLD R MiGLWR R TXH HVWi QD PHPyULD H R TXH
VHUiSRVVtYHOGL]HUDSDUWLUGRPRPHQWRHPTXHQRYDVFRLVDVVmRGLWDVRXPHOKRU
VmRUHVVLJQL¿FDGDV'HDFRUGRFRP2UODQGL³RVVHQWLGRVQmRHVWmRQDVSDODYUDV
HODVPHVPDV(VWmRDTXpPHDOpPGHODV´(DLQGD³&RQVHTXHQWHPHQWHSRGHPRV
GL]HU TXH R VHQWLGR QmR H[LVWH HP VL PHVPR PDV p GHWHUPLQDGR SHODV SRVLo}HV
LGHROyJLFDVFRORFDGDVHPMRJRQRSURFHVVRVyFLRKLVWyULFRHPTXHDVSDODYUDVVmR
SURGX]LGDV´
 $VVLPRTXHSUHWHQGRpSRUPHLRGDDQiOLVHGRVVHQWLGRVGDGRVDFHUWRV
WHUPRV FRPROLYUHDEHUWROLEHUGDGHDWUDVRH¿FLrQFLDHRXWURV FHUWDVLGHLDV R
TXHpVHUOLYUHRTXHpVHUHFRQRPLFDPHQWHYLiYHORTXHpVHUFRPXQLVWDRTXHp
DSROtWLFDSRUH[HPSOR FHUWRVQRPHVSUySULRV /LQX[H*18/LQX[RX:LQGRZV 
HQWHQGHUFRPRVHFRQVWLWXLRSROtWLFRHRQGHVHSRVLFLRQDPRVVXMHLWRVLGHRORJLFDPHQWH
QHVVHGHEDWHTXHHPFHUWRVPRPHQWRVVHSUHWHQGHH[FOXVLYDPHQWHWHFQROyJLFR
 (QWHQGHU D FRQVWLWXLomR GHVVHV VHQWLGRV VHUi WDPEpP FRPR YHUHPRV
HQWHQGHUDFRQVWLWXLomRHRSRVLFLRQDPHQWRGRVVXMHLWRV$TXLSHQVRRVXMHLWRFRPR
GHVFULWR WHRULFDPHQWH SHOD$QiOLVH GH 'LVFXUVR FRPR LQWHUSHODGR SHOD LGHRORJLD
$VVLP HOH QmR HVFROKH OLYUHPHQWH VHX SRVLFLRQDPHQWR p WRUQDGR VXMHLWR D SDUWLU
GHFHUWDVFRQGLo}HVKLVWyULFDVGHSURGXomRGHVHQWLGRVTXHRFRORFDPHPDomR
HPSURFHVVRGHVLJQL¿FDomR VRERGHVtJQLRGDLGHRORJLD'HDFRUGRFRP2UODQGL
³DLGHRORJLDID]SDUWHRXPHOKRUpDFRQGLomRSDUDDFRQVWLWXLomRGRVXMHLWRHGRV
VHQWLGRV´(HODFRQWLQXDFLWDQGRHUHIRUPXODQGR03HFKHX[³RLQGLYtGXRpLQWHU
SHODGRHPVXMHLWRSHODLGHRORJLDSDUDTXHVHSURGX]DRGL]HU´
 9HUHPRVFRPRXPGRVHOHPHQWRVPDLVLPSRUWDQWHVQRGHEDWHVREUHDDGR
omRGRVRIWZDUHOLYUHVHUiDFRQVWDQWHUHVVLJQL¿FDomRGHFHUWDVSDODYUDVHWHUPRV
2PRGRFRPRHVVHVVHQWLGRVVHUmRUHIRUPXODGRVHUHVVLJQL¿FDGRVHPUHODo}HVGH
SROLVVHPLDHSDUiIUDVHLPSOLFDUiHPGHVORFDPHQWRVHHPWRPDGDVGHSRVLo}HVGRV
VXMHLWRV$RPHVPRWHPSRHVVHVPRYLPHQWRVGHVLJQL¿FDomRVHUmRGHULYDGRVGH
FHUWDVSRVVLELOLGDGHVGRGL]HUHGRLQWHUSHODPHQWRGHVVHVVXMHLWRVSHODLGHRORJLD2

 1R VHQWLGR TXH HVVH FRQFHLWR WHP SDUD 2UODQGL  ³R LQWHUGLVFXUVR p R FRQMXQWR GR GL]tYHO KLVWyULFD H
OLQJXLVWLFDPHQWHGH¿QLGR´
2UODQGL
,GHPS
Software livre, cultura hacker e o ecossistema da colaboração • 83

GHEDWHHPWRUQRGRVRIWZDUHOLYUH HTXHHQIDWL]DFHUWDVTXDOLGDGHVRXGHIHLWRVGRV
VRIWZDUHVRXHQWmRFHUWRVEHQHItFLRVRXGHVYDQWDJHQVGDVOLFHQoDVOLYUHV PRVWUD
VHXPFDPSREDVWDQWHLQWHUHVVDQWHSDUDVHUHÀHWLUVREUHTXHWLSRGHLQWHUDomRHQWUH
PiTXLQDHXVXiULRHVWiHPTXHVWmRHpLPDJLQDGDSRUDTXHOHVTXHDRSOHLWHDUHP
R XVR GH FHUWDV WHFQRORJLDV IDODP WDPEpP VREUH GHVHQYROYLPHQWR LQFOXVmR
DXWRQRPLDLQGHSHQGrQFLDHQWUHRXWURV
 3DUD UHDOL]DU R REMHWLYR GHVWH WUDEDOKR ± R H[DPH GR IXQFLRQDPHQWR GR
SROtWLFRQRGHEDWHVREUHRVRIWZDUHOLYUHWHQGRHPYLVWDXPDDQiOLVHVREUHDKLVWyULD
GRVVHQWLGRV±SURSRQKRDUHDOL]DomRGHDOJXQVSDVVRVHVVHQFLDLV
 2SULPHLURGHOHVHXPGRVPDLVIXQGDPHQWDLVpDDQiOLVHGHGXDVOLFHQoDV
TXHH[HPSOL¿FDPRRUGHQDPHQWRGRUHDOSURSRVWRUHVSHFWLYDPHQWHSHORVRIWZDUH
OLYUHHSHORVRIWZDUHSURSULHWiULR$VOLFHQoDVVmRFRQWUDWRVMXUtGLFRVTXHHQXQFLDP
TXHWLSRGHUHODomRDTXHOHTXHSDJDSRGHUiHVWDEHOHFHUFRPRSURGXWRVRIWZDUH
DGTXLULGR $QDOLVDUHL D OLFHQoD SDGUmR GR ZLQGRZV  SDUD SHQVDU R VRIWZDUH
SURSULHWiULRHD*HQHUDO3XEOLF/LFHQVH *3/ SDUDUHÀHWLUVREUHRVRIWZDUHOLYUH
 1XPVHJXQGRSDVVRSURFXURDQDOLVDUXPPRPHQWRTXHSHQVRIXQGDPHQWDO
SDUD R VRIWZDUH OLYUH R VXUJLPHQWR GR WHUPR FyGLJR DEHUWR H D FULDomR GD 2SHQ
6RXUFH ,QLWLDWLYH 26,  LQVWLWXLomR TXH HP PXLWRV PRPHQWRV ULYDOL]D FRP D )UHH
6RIWZDUH)RXQGDWLRQ )6) $26,SRVVXLIXQo}HVPXLWRVHPHOKDQWHVjVGD)6)
PDVVHXIXQFLRQDPHQWRGLVFXUVLYRHLQVWLWXFLRQDOVHPRVWUDUiGLIHUHQFLDGR
 1D WHUFHLUD SDUWH YROWR D DQiOLVH SDUD R FRQWH[WR GRV SDtVHV SHULIpULFRV
PDLVHVSHFL¿FDPHQWHSDUDSDtVHVGD$PpULFDGR6XO %UDVLOH3HUX ,QWHUHVVDPH
HQWHQGHUFRPRIXQFLRQDDLGHLDGHSURGXomRHXVRGHVRIWZDUHVOLYUHVHPSDtVHV
FRPSRXFRDFHVVRjWHFQRORJLDHFRPDOWDGHVLJXDOGDGHVRFLDO3DUDLVVRDQDOLVR
DOJXQV3URMHWRVGH/HLTXHLQVWLWXHPDSUHIHUrQFLDGRXVRGHVLVWHPDVOLYUHVSDUD
D DGPLQLVWUDomR S~EOLFD GHVVHV SDtVHV 2 SRGHU OHJLVODWLYR GH %UDVLO H 3HUX GH
PDQHLUD SLRQHLUD QR FRQWH[WR PXQGLDO SURSXVHUDP HVVDV OHLV TXH PDUFDP XPD
LQWHUYHQomR GLUHWD GR SRGHU S~EOLFR VREUH R XVR GH GHWHUPLQDGDV WHFQRORJLDV GH
LQIRUPDomRDomRMXVWL¿FDGDSRUSULQFtSLRVpWLFRVHHFRQ{PLFRVTXHH[DPLQR
 1HVVDVWUrVVHo}HVIDoRXVRGHPDWHULDOMRUQDOtVWLFRGHGLYHUVRVJrQHURV
FRPHQWiULRVHQWUHYLVWDVDUWLJRVFU{QLFDV FRPRHOHPHQWRLPSRUWDQWHSDUDDDQi
OLVH$VIRQWHVIRUDPWDQWRVLWHVGHQRWtFLDVFRPJUDQGHYLVLWDomRFRPREORJVSi
JLQDVLQGHSHQGHQWHVQDLQWHUQHWHOLVWDVGHGLVFXVVmR$VVLPSURFXURFRPELQDUD
DQiOLVH GH GRFXPHQWRV FRPR FRQWUDWRV H SURMHWRV GH OHL FRP SURQXQFLDPHQWRV H
FRPHQWiULRVS~EOLFRVTXHFLUFXODPQDYHORFLGDGHGDLQWHUQHWHTXHSDUWHPGHIRQ
WHVGLYHUVDVFRPRH[HFXWLYRVSURJUDPDGRUHVMRUQDOLVWDVHDWLYLVWDV,QWHUHVVDPH
HPHVSHFLDOHQWHQGHUFRPRFLUFXODPRVVHQWLGRVHDVLQWHUSUHWDo}HVVREUHRTXHp
RXQmRGLWR
84 • Software livre, cultura hacker e o ecossistema da colaboração

Seção I
Duas licenças, diferentes restrições

(PERUDRWHUPRsoftware livreVHMDOLJDGRXVXDOPHQWHDRVLVWHPDRSHUDFLRQDO
*18/LQX[ R SURMHWR *18 GH 5LFKDUG 6WDOOPDQ PDLV R NHUQHO /LQX[ GH /LQXV
7RUYDOGV RWHUPRGHVLJQDPXLWRPDLVGRTXHLVVR(OHRS}HVHGLDPHWUDOPHQWHDR
WHUPRVRIWZDUHSURSULHWiULR±RXFRPRYHUHPRVHGLVFXWLUHPRVHPRXWURPRPHQWR
VRIWZDUHFRPHUFLDO±GHDFRUGRFRPFRQGLo}HVTXHH[DPLQDUHPRVDVHJXLU
 3DUD TXH XP VRIWZDUH VHMD OLYUH HOH QmR SUHFLVD WHU QHP XPD OLQKD GH
FyGLJR GHVVHV SURJUDPDV PDLV IDPRVRV 1mR p R PRGR FRPR XP SURJUDPD p
FRQVWUXtGRWHFQLFDPHQWHTXHGH¿QHVHHVWHpOLYUHRXSURSULHWiULRPDVVLPRPRGR
FRPRHVWHpOLFHQFLDGRRXVHMDFRPRpIHLWRRUHJLVWUROHJDOGHVVDREUDWpFQLFD
%DVWDTXHDVXDOLFHQoDLQFRUSRUHFHUWRVSULQFtSLRVTXHIRUDPVLVWHPDWL]DGRVSRU
5LFKDUG6WDOOPDQXPGRVSLRQHLURVGRPRYLPHQWRVRIWZDUHOLYUHHIXQGDGRUGD)UHH
6RIWZDUH)RXQGDWLRQ$OHLGHUHJLVWURGDSURSULHGDGHGHVRIWZDUHQDPDLRULDGRV
SDtVHV LQFOXLQGR R %UDVLO HVWDEHOHFH TXH D H[SUHVVmR GR SURJUDPD RX VHMD DV
OLQKDV GH FyGLJR TXH R FRQVWLWXHP p TXH GHYH VHU REMHWR GH UHJLVWUR$VVLP DV
LGHLDVFRQWLGDVHPXPSURJUDPDSRGHPVHUUHSHWLGDVHPRXWURVHPTXHRDXWRU
OHJDOWHQKDGLUHLWRVREUHHOD1RHQWDQWRDH[SUHVVmRGHVVDVLGHLDV DVVLPFRPR
DVQRWDVGHXPDP~VLFDRXDRUGHPGDVSDODYUDVFRQWLGDVHPXPOLYUR pTXHpGH
FRQWUROHGHTXHPDUHJLVWUD
 4XDQGR R FRQVXPLGRU YDL DWp XPD ORMD GH VRIWZDUH H FRPSUD XPD FDL[D
FRQWHQGRRV&'VGHLQVWDODomRGHDOJXPSURJUDPDHVVDSHVVRDHVWiQDYHUGDGH
DGTXLULQGRDSHQDVRGLUHLWRGHXVDUDTXLOR(ODQXQFDVHUiGRQDGRVRIWZDUHTXH
FRQWLQXD GH SURSULHGDGH GH VHXV DXWRUHV e FRPR TXDQGR VH FRPSUD XP &' GH
P~VLFDRXXP¿OPHHP'9'pSHUPLWLGRRXYLURXDVVLVWLUDTXLORPDVQmRpSHUPLWLGD
DYHQGDGHFySLDVHQHPPHVPRDYHQGDGHXPDYHUVmRDOWHUDGDGRRULJLQDOVHPD
SHUPLVVmRGRDXWRU±XPUHPL[SRUH[HPSOR
3RUpPQRFDVRGRVRIWZDUHDVFRQGLo}HVGHYHQGDVmRDLQGDPDLVGXUDV

*18pXPDFU{QLPRSDUD³*18QmRp8QL[´2SURMHWR*18IRLIXQGDGRSRU5LFKDUG6WDOOPDQ*18H/LQX[VmRDV
GXDVSDUWHVTXHIRUPDPRVLVWHPDRSHUDFLRQDOOLYUHPDLVXWOL]DGRQRPXQGR*18pDEDVHGRVLVWHPDHPTXHHVWi
TXDVH D WRWDOLGDGH GRV SURJUDPDV QHFHVViULRV SDUD R IXQFLRQDPHQWR 2 /LQX[ GHVLJQD XPD SHTXHQD SDUWH GHVVH
VLVWHPDRSHUDFLRQDORFKDPDGRNHUQHO FHUQH PDVGHYLWDOLPSRUWkQFLDSDUDRIXQFLRQDPHQWRGRVLVWHPDSRLVUHDOL]D
DRJHUHQFLDPHQWRGRVGLVSRVLWLYRV PRXVHWHFODGRPRQLWRUHRXWURV $GLVFXVVmRHDKLVWyULDGHDPERVVHUmRWUDWDGDV
SRVWHULRUPHQWHDVVLPFRPRDVFRQVHTXrQFLDVGRXVRGHFDGDXPGRVQRPHV
6RIWZDUH3URSULHWiULRHVRIWZDUHFRPHUFLDOQmRVmRVLQ{QLPRV2VRIWZDUHOLYUHWDPEpPpSDVVtYHOGHYHQGDFRPHUFLDO
(QWUHWDQWRRVGHIHQVRUHVGRVRIWZDUHSURSULHWiULRWUDWDPRVWHUPRVFRPHUFLDOHSURSULHWiULRHVWDEHOHFHQGRXPDUHODomR
SDUDIUiVWLFD$VVLPRVRIWZDUHOLYUHWHULDFRPRDQW{QLPRRVRIWZDUHSDJRSURGX]LQGRVHDLGHLDGHTXHHOHQmRSRGHULD
VHUYHQGLGR$DQiOLVHGHVVDUHODomRVHUiDSURIXQGDGDQRSUy[LPRFDStWXOR
Software livre, cultura hacker e o ecossistema da colaboração • 85

$FRPSDQKDGRGRV&'VGHLQVWDODomRHVWiHVVHGRFXPHQWRGHYDORUMXUtGLFRFKD
PDGR OLFHQoD 1D OLFHQoD HVWmR GHVFULWRV RV GLUHLWRV H RV GHYHUHV GRV ³XVXiULRV´
± QmR GRQRV QHP SURSULHWiULRV ± GDTXHOH SURJUDPD 2V YHUGDGHLURV GRQRV RV
GHWHQWRUHV GRV GLUHLWRV DXWRUDLV RX GDV SDWHQWHV FRORFDP FHUWDV UHVWULo}HV SDUD
RVXVXiULRVHVWLSXODQGRRTXHHOHSRGHID]HURXQmRFRPRSURJUDPD1DSUiWLFD
p FRPR VH DV JUDYDGRUDV SXGHVVHP GL]HU HP TXH DSDUHOKR RV &'V SRGHP VHU
WRFDGRVRXFRPRVHXPDHGLWRUDSXGHVVHOLPLWDUTXHPSRGHOHURVOLYURVTXHHOD
SXEOLFD
 3DUDTXHXPVRIWZDUHVHMDOLYUHHVVDOLFHQoDSUHFLVDVHU¿ORVR¿FDPHQWH
LGHRORJLFDPHQWH GLIHUHQWH GDV OLFHQoDV SURSULHWiULDV GR :LQGRZV SRU H[HPSOR 
4XDQGRDOJXpPFRPSUDXPSURJUDPDSURSULHWiULRQDYHUGDGHDGTXLUHRGLUHLWRGH
XVDUDOJRTXHpGHSURSULHGDGHGHRXWUR3DUDXViORpSUHFLVRDFHLWDUDVOLPLWDo}HV
LPSRVWDVSHORSURSULHWiULR-iSDUDXVDU DSHQDVSDUDRXVR XPSURJUDPDOLYUHQmR
pQHFHVViULRQHPDRPHQRVDFHLWDUDOLFHQoDQHOHFRQWLGD&RPRYHUHPRVDTXLD
OLEHUGDGHpFRQVLGHUDGDXPSULQFtSLREiVLFRpXPDSDODYUDXWLOL]DGDFRPIUHTXrQFLD
HDQFRUDGDQXPDUHLYLQGLFDomRSROtWLFD3DUDD)UHH6RIWZDUH)RXQGDWLRQXPSUR
JUDPD p OLYUH TXDQGR FySLD DOWHUDomR XVR H GLVWULEXLomR SRGHP VHU IHLWRV SRU
TXDOTXHUXPLQGHSHQGHQWHGHDXWRUL]DomRSUpYLD
 0DVRVRIWZDUHTXHpTXDOL¿FDGRFRPROLYUHWDPEpPFRORFDUHVWULo}HVDWp
SRUTXHFRPRYHUHPRVRVHQWLGRGDGRjSDODYUDOLEHUGDGHQmRpRGDDXVrQFLDGH
UHJUDV3DUDVHHVWDEHOHFHUHPDVOLEHUGDGHVUHLYLQGLFDGDVSHORPRYLPHQWRVRIWZDUH
OLYUHpSUHFLVRTXHVHMDPFRORFDGDVFHUWDVQRUPDV9HUHPRVTXHLVVRGHFRUUHGR
IDWR GH TXH D GLVSXWD GH VHQWLGRV HP WRUQR GD SDODYUD OLEHUGDGH GHVFRUWLQD XP
HPEDWHTXHVySRGHVHUHQWHQGLGRQRFDPSRGDSROtWLFD8VRRVHQWLGRGHSROtWLFR
DTXLFRPRRGHVHQYROYLGRSRU(GXDUGR*XLPDUmHV

³2 SROtWLFR RX D SROtWLFD p SDUD PLP FDUDFWHUL]DGR SHOD FRQWUDGLomR


GHXPDQRUPDWLYLGDGHTXHHVWDEHOHFH GHVLJXDOPHQWH XPDGLYLVmRGR
UHDOHDD¿UPDomRGHSHUWHQFLPHQWRGRVTXHQmRHVWmRLQFOXtGRV'HVWH
PRGRRSROtWLFRpXPFRQÀLWRHQWUHXPDGLYLVmRQRUPDWLYDHGHVLJXDOGR
UHDOHXPDUHGLYLVmRSHODTXDORVGHVLJXDLVD¿UPDPVHXSHUWHQFLPHQWR
0DLVLPSRUWDQWHDLQGDSDUDPLPpTXHGHVWHSRQWRGHYLVWDRSROtWLFR
pLQFRQWRUQiYHOSRUTXHRKRPHPIDOD2KRPHPHVWiVHPSUHDDVVXPLU
DSDODYUDSRUPDLVTXHHVWDOKHVHMDQHJDGD
(VWD FRQFHSomR QRV OHYD D DOJXPDV FRQVLGHUDo}HV DSDUHQWHPHQWH
FRQWUDGLWyULDV HP SULQFtSLR 2 3ROtWLFR HVWi DVVLP VHPSUH GLYLGLGR
SHODGHVPRQWDJHPGDFRQWUDGLomRTXHRFRQVWLWXL'HWDOPRGRTXHR
HVWDEHOHFLPHQWRGDGHVLJXDOGDGHVHDSUHVHQWDFRPRQHFHVViULRjYLGD
VRFLDO H D D¿UPDomR GH SHUWHQFLPHQWR H GH LJXDOGDGH p VLJQL¿FDGD
FRPRDEXVRLPSURSULHGDGH´

*XLPDUmHVS
86 • Software livre, cultura hacker e o ecossistema da colaboração

&RPRYHUHPRVPDLVDGLDQWHDD¿UPDomRGHSHUWHQFLPHQWRGHLJXDOGDGH
TXH LPSXOVLRQD R PRYLPHQWR VRIWZDUH OLYUH VHUi FODVVL¿FDGD SRU H[HFXWLYRV GH
HPSUHVDV GH VRIWZDUH SURSULHWiULR FRPR DEXVR LPSURSULHGDGH DOJR TXH VHULD
FDSD]GHFRUURPSHUDLQWHJULGDGHVRFLDOHGRPHUFDGRFDSLWDOLVWD
 8PSURJUDPDOLYUHVHPSUHSHUPLWHRXVRRHVWXGRDDOWHUDomRHGLVWULEXLomR
GH VHX FyGLJR H GH VXD GRFXPHQWDomR ± RV PDQXDLV GH XVR 0DV HQTXDQWR RV
GRLV SULPHLURV SRQWRV QXQFD VmR UHVWULQJLGRV D DOWHUDomR H D GLVWULEXLomR VmR
GLVFLSOLQDGDV1LQJXpPSRGHSHJDUXPSURJUDPDOLYUHHWRUQiORSURSULHWiULRWRUQDU
H[FOXVLYDPHQWHVHXRTXHIRLIHLWRSRURXWURPHVPRTXHHVVDSHVVRDWHQKDDOWHUDGR
RFyGLJRPHVPRWHQGRPHOKRUDGRRSURJUDPDTXHUHFHEHX
 $VUHVWULo}HVQDYHUGDGHVmRPXLWRSHTXHQDVVHFRPSDUDGDVjVLPSRVWDV
SHOR VRIWZDUH SURSULHWiULR (ODV DSHQDV GLVFLSOLQDP DOJR TXH p LPSRVVtYHO HP
VRIWZDUHVFRPRR:LQGRZVRXVHMDROKDUHPRGL¿FDURFyGLJR-iDTXLORTXHRV
VLVWHPDV SURSULHWiULRV GLVFLSOLQDP ± D H[HFXomR H R HVWXGR GR FyGLJR ± p DOJR
SHUPLWLGRGHIRUPDLUUHVWULWDSHODVOLFHQoDVOLYUHV&LGDGmRVGHSDtVHVFRQVLGHUDGRV
LQLPLJRVGRV(8$FRPR&XEDTXHVmRVXMHLWRVDVDQo}HVFRPHUFLDLVQmRSRGHP
XVDURVSURGXWRVGD0LFURVRIWXPDHPSUHVDHVWDGXQLGHQVHGHYLGRjVOHLVGDTXHOH
SDtV
 8PDDQiOLVHGRWH[WRGHOLFHQoDVSURSULHWiULDVHOLYUHVSRGHQRVGL]HUDOJR
VREUHDSRVLomRGLVFXUVLYDGHFDGDXPDGHODVDMXGDQGRQRVDVLWXiODVXPDVHP
UHODomRjVRXWUDVHQRVGDQGRSLVWDVSDUDPHOKRUGHVYHQGDUPRVHFRPSUHHQGHUPRV
RTXHKiGHSROtWLFRHPFDGDXPDGHODV$OLFHQoDpXPGRFXPHQWRFKDYHDTXHOH
HPTXHHVWiFRQWLGDHSRGHVHUHQWHQGLGDDGLYLVmRHQWUHGRLVJUXSRVTXHSURS}HP
UHODo}HVGLIHUHQWHVFRPRFyGLJRHFRPRPXQGRRVGHIHQVRUHVGRVRIWZDUHOLYUHH
RVDGYRJDGRVGRVRIWZDUHSURSULHWiULR4XDQGRXPGRVODGRVFULWLFDRXTXHVWLRQDR
RXWURHVWiGHIRUPDGLUHWDRXLQGLUHWDID]HQGRUHIHUrQFLDjVOLFHQoDV
 $*3//LFHQoD3~EOLFD*HUDOpDPDLVHPSUHJDGDGDV³OLYUHV´HPERUDQmR
VHMDDSULPHLUDHPVHXJUXSR$(8/$ End User License Agreement $FRUGRGH
/LFHQoDSDUDR8VXiULR)LQDOpDTXHUHJHFRPDOJXPDVSHTXHQDVYDULDo}HVGH
DFRUGRFRPRVVRIWZDUHVRVSURGXWRVGD0LFURVRIW

A relevância das licenças

(PXPHYHQWRUHDOL]DGRQD8QLYHUVLGDGHGH1RYD,RUTXHHPPDLRGH
RYLFHSUHVLGHQWHGD0LFURVRIW&UDLJ0XQGLHIH]FRPHQWiULRVHFUtWLFDVGLUHWDVj
*3/ DWLWXGH TXH JHURX UHVSRVWDV FRQWXQGHQWHV GRV SULQFLSDLV GHIHQVRUHV GR
 2XWUDV OLFHQoDV OLYUHV FRPR D GR %6' TXH FRORFD PHQRV FRQGLo}HV SDUD D DOWHUDomR H D UHGLVWULEXLomR
DVVHPHOKDQGRVHDRFKDPDGR³GRPtQLRS~EOLFR´MiH[LVWLDP
Software livre, cultura hacker e o ecossistema da colaboração • 87

VRIWZDUHOLYUH2WtWXORGDSDOHVWUDIRL³7KH&RPPHUFLDO6RIWZDUH0RGHO´HKiXP
ORQJRWUHFKRTXHWUDWDGD*3/HGRPRGHORGHGHVHQYROYLPHQWRGHVRIWZDUHTXH
HODJHUD

³7KH SKUDVH ³RSHQ VRXUFH VRIWZDUH´ RU 266 LV RIWHQ XVHG DV DQ
XPEUHOOD WHUP IRU D FROOHFWLRQ RI SURGXFW GHYHORSPHQW GLVWULEXWLRQ
DQGOLFHQVLQJSUDFWLFHVPDQ\RIZKLFKKDYHH[LVWHGLQGLYLGXDOO\VLQFH
WKH HDUO\ GD\V RI FRPSXWLQJ7KHUH DUH DFWXDOO\ D QXPEHU RI GLIIHUHQW
DSSURDFKHVZLWKLQWKLVFRPPXQLW\EXWWKHFRPPRQWUDLWVDUHSURYLGLQJ
SHRSOHZLWKDFFHVVWRVRXUFHFRGHDQGDOORZLQJRWKHUVWRPRGLI\DQG
UHGLVWULEXWHWKDWFRGH

7KH266GHYHORSPHQWPRGHOOHDGVWRDVWURQJSRVVLELOLW\RIXQKHDOWK\
³IRUNLQJ´ RI D FRGH EDVH UHVXOWLQJ LQ WKH GHYHORSPHQW RI PXOWLSOH
LQFRPSDWLEOHYHUVLRQVRISURJUDPVZHDNHQHGLQWHURSHUDELOLW\SURGXFW
LQVWDELOLW\ DQG KLQGHULQJ EXVLQHVVHV¶ DELOLW\ WR VWUDWHJLFDOO\ SODQ IRU
WKH IXWXUH )XUWKHUPRUH LW KDV LQKHUHQW VHFXULW\ ULVNV DQG FDQ IRUFH
LQWHOOHFWXDOSURSHUW\LQWRWKHSXEOLFGRPDLQ
6RPH RI WKH PRVW VXFFHVVIXO 266 WHFKQRORJ\ LV OLFHQVHG XQGHU WKH
*18 *HQHUDO 3XEOLF /LFHQVH RU *3/ 7KH *3/ PDQGDWHV WKDW DQ\
VRIWZDUH WKDW LQFRUSRUDWHV VRXUFH FRGH DOUHDG\ OLFHQVHG XQGHU WKH
*3/ZLOOLWVHOIEHFRPHVXEMHFWWRWKH*3/:KHQWKHUHVXOWLQJVRIWZDUH
SURGXFWLVGLVWULEXWHGLWVFUHDWRUPXVWPDNHWKHHQWLUHVRXUFHFRGHEDVH
IUHHO\DYDLODEOHWRHYHU\RQHDWQRDGGLWLRQDOFKDUJH7KLVYLUDODVSHFWRI
WKH*3/SRVHVDWKUHDWWRWKHLQWHOOHFWXDOSURSHUW\RIDQ\RUJDQL]DWLRQ
PDNLQJ XVH RI LW ,W DOVR IXQGDPHQWDOO\ XQGHUPLQHV WKH LQGHSHQGHQW
FRPPHUFLDOVRIWZDUHVHFWRUEHFDXVHLWHIIHFWLYHO\PDNHVLWLPSRVVLEOHWR
GLVWULEXWHVRIWZDUHRQDEDVLVZKHUHUHFLSLHQWVSD\IRUWKHSURGXFWUDWKHU
WKDQMXVWWKHFRVWRIGLVWULEXWLRQ

,QFRQWUDVWWZRGHFDGHVRIH[SHULHQFHKDYHVKRZQWKDWDQHFRQRPLF
PRGHO WKDW SURWHFWV LQWHOOHFWXDO SURSHUW\ DQG D EXVLQHVV PRGHO WKDW
UHFRXSVUHVHDUFKDQGGHYHORSPHQWFRVWVKDYHVKRZQUHSHDWHGO\WKDW
WKH\FDQFUHDWHLPSUHVVLYHHFRQRPLFEHQH¿WVDQGGLVWULEXWHWKHPYHU\
EURDGO\´

1RWUHFKRDFLPDDFUtWLFDUHVVLGHQRIDWRGHTXHRVSURMHWRVGHVHQYROYLGRV
VRED*3/SRUWHUHPRFyGLJRDEHUWRSRVVtYHOGHVHUOLGRHDOWHUDGRSRUTXDOTXHU
XP SRGHP JHUDU GLYHUVRV SURMHWRV SDUDOHORV FKDPDGRV SRU HOH XVDQGR XP
MDUJmR GD iUHD GH ³IRUN´  (VVHV IRUNV VmR DGMHWLYDGRV FRPR ³XQKHDOWK\´ QmR
VDXGiYHLV1DSUiWLFDHOHVOHYDULDPVHJXQGRRWH[WRRVFyGLJRVGRVSURJUDPDV
SURWHJLGRV SRU GLUHLWRV DXWRUDLV D WRPDUHP R FDPLQKR GR GRPtQLR S~EOLFR -i R
PRGHOR GH GHVHQYROYLPHQWR TXH HOH GHIHQGH R PRGHOR SURSULHWiULR JDUDQWLULD
XPD UHFRPSHQVD DRV LQYHVWLPHQWRV HP SHVTXLVD H JHUDULD JUDQGHV EHQHItFLRV
³3UHSDUHG7H[WRI5HPDUNVE\&UDLJ0XQGLH0LFURVRIW6HQLRU9LFH3UHVLGHQW7KH&RPPHUFLDO6RIWZDUH0RGHO´
HP 0LFURVRIW VLWH LQVWLWXFLRQDO 9LVXDOL]DGR HP   KWWSZZZPLFURVRIWFRPSUHVVSDVVH[HFFUDLJ
VKDUHGVRXUFHDVS
88 • Software livre, cultura hacker e o ecossistema da colaboração

HFRQ{PLFRVGLVWULEXtGRVDWRGRV
 2PRGHORGRVRIWZDUHOLYUHpFKDPDGRGHopen source softwareRXVRIWZDUH
GHFyGLJRDEHUWR2PRGHORGHIHQGLGRQHVVHGLVFXUVRRGRVRIWZDUHSURSULHWiULRp
QRPHDGRFRPR³PRGHORGRVRIWZDUHFRPHUFLDO´(VVHVQRPHVHVWmRVHQGRWUDWDGRV
SRUHVVHVXMHLWRFRPRHTXLYDOHQWHV2LPSDFWRHRVHQWLGRGDHVFROKDGHTXHQRPH
XWLOL]DUVHUiWUDWDGRHPRXWURPRPHQWR
 1R PrV GH IHYHUHLUR QR PHVPR DQR GHFODUDo}HV GH RXWUR H[HFXWLYR GD
0LFURVRIW -LP$OOFKLQ WDPEpP JHUDUDP JUDQGH UHSHUFXVVmR HQWUH D FRPXQLGDGH
HQYROYLGDFRPRVRIWZDUHOLYUH$OOFKLQD¿UPRXTXHRVRIWZDUHOLYUHDPHDoDDSUR
SULHGDGH LQWHOHFWXDO HD¿UPRX TXH VXD HPSUHVD DWpDTXHOH PRPHQWR DLQGD QmR
WLQKDIHLWRRVX¿FLHQWHSDUDPRVWUDULVVRjTXHOHVTXHVmRUHVSRQViYHLVSHODVSROtWLFDV
JRYHUQDPHQWDLV $ IUDVH GH $OOFKLQ QD IRUPXODomR GDGD SRU XPD UHSRUWDJHP
FLUFXORX LQWHQVDPHQWH SHOD LQWHUQHW ³µ¶,¶P DQ$PHULFDQ , EHOLHYH LQ WKH$PHULFDQ
:D\¶¶KHVDLGµ¶,ZRUU\LIWKHJRYHUQPHQWHQFRXUDJHVRSHQVRXUFHDQG,GRQ¶WWKLQN
ZH¶YHGRQHHQRXJKHGXFDWLRQRISROLF\PDNHUVWRXQGHUVWDQGWKHWKUHDW¶¶´
8PGRVPRWLYRVGHDIUDVHWHUVLGRUHSURGX]LGDLQWHQVDPHQWHSRGHWHUVLGR
DLGHQWL¿FDomRGHDOJRTXHSUHWHQVDPHQWHFRQWUDULDRamerican way(PGLYHUVRV
VLWHVDIUDVHIRLUHIRUPXODGDSDUDDOJRFRPR³D0LFURVRIWGL]TXHRVRIWZDUHOLYUHp
DOJRQmRDPHULFDQR´2FRPHQWiULRDEDL[RpSDUWHGHXPSHTXHQRWH[WRSXEOLFDGR
QREORJGHXPSHVTXLVDGRU XPELyORJRLQWHUHVVDGRHPVRIWZDUH HpXPDUHIRU
PXODomRGHVVHVGRLVFRPHQWiULRVGRVH[HFXWLYRVGDHPSUHVDHGDGHFODUDomRGR
H[HFXWLYRFKHIHGD0LFURVRIW6WHYH%DOOPHUIHLWDQRPHVPRSHUtRGRHTXHFRP
SDURXRVRIWZDUHOLYUHDXP³FkQFHU´

³)UHHO\ DYDLODEOH VRXUFH FRGH XQGHUPLQHV WKH FRPPHUFLDO VRIWZDUH


EXVLQHVVPRGHOEDVHGRQVHOOLQJSURJUDPVDVSURGXFWVWKDWFXVWRPHUV
FDQQRW PRGLI\ RU VKDUH 7KH *3/¶V ³SDVV DORQJ´ HIIHFW FRQWLQXDOO\
HQODUJHVWKHFRGHEDVH*3/SURJUDPPHUVFDQGUDZIURPZKHQZULWLQJ
QHZ SURJUDPV 7KLV LV ZK\ 0LFURVRIW GHVFULEHV WKH OLFHQFH DV EHLQJ
³YLUDO´ ³D FDQFHU´ DQG ³XQDPHULFDQ´LW XQGHUPLQHV WKH ZD\ WKH\ GR
EXVLQHVVDQGNHHSVJHWWLQJELJJHU´

³0LFURVRIW([HFXWLYH6D\V/LQX[7KUHDWHQV,QQRYDWLRQ´HPNews.comYLVXDOL]DGRHPKWWSZHEDUFKLYH
RUJZHEQHZVFQHWFRPLQYHVWRUQHZVQHZVLWHP5+$7KWPO
8PGHVHQYROYHGRUGHVRIWZDUHOLYUHEUDVLOHLURUHSURGX]LXDVVLPDIDODGH%DOOPHU³0DLVXPDGHFODUDomRSROrPLFD
GRDWXDO&(2GD0LFURVRIW6WHYH%DOOPHU2/LQX[pXPFkQFHUTXHVHDSRGHUDGHWXGRRTXHWRFD /LQX[LVDFDQFHU
WKDWDWWDFKHVLWVHOILQDQLQWHOOHFWXDOSURSHUW\VHQVHWRHYHU\WKLQJLWWRXFKHV GLWDGXUDQWHXPDHQWUHYLVWDDR&KLFDJR
6XQ7LPHV´0RULPRWR&DUORV³0LFURVRIW2/LQX[pXPFkQFHU QmRVHULDRFRQWUiULR"" ´HP*XLDGR+DUGZDUHQHW
9LVXDOL]DGRHPKWWSZZZJXLDGRKDUGZDUHQHWDUWLJRV0DLVDGLDQWHRDXWRUUHYHODTXH%DOOPHUHVWDYD
VHUHIHULQGRDXPDFDUDFWHUtVWLFDGD*3/TXHpH[LJLUTXHRVVRIWZDUHVGHULYDGRVGHVRIWZDUHVSRUHODOLFHQFLDGRV
WDPEpPVHMDP*3/
 $KPHG =LPUDQ´9LUDO VRIWZDUH SURGXFWLRQ´ HP  :LQWHUVSHDNFRP 3XEOLFDGR HP  H YLVXDOL]DGR HP
KWWSZZZZLQWHUVSHDNFRPFROXPQVKWPO
Software livre, cultura hacker e o ecossistema da colaboração • 89

eLQWHUHVVDQWHQRWDUFRPRR³DWDTXH´YHUEDOGRVH[HFXWLYRVGD0LFURVRIWDR
VRIWZDUHOLYUHIRLLQWHUSUHWDGRSRUXPDXWRUEUDVLOHLURFRPRXPDFUtWLFDj*3/1D
YHUGDGHDSHQDVRFRPHQWiULRGH0XQGLHUHIHUHVHHVSHFL¿FDPHQWHDFDUDFWHUtVWLFDV
GDOLFHQoDRVFRPHQWiULRVGH%DOPHUUHIHUHPVHDR/LQX[HRVGH$OOFKLQGLULJHP
VHPDLVDPSODPHQWHDRPRGHORGRVRIWZDUHOLYUH*3//LQX[HVRIWZDUHOLYUHVmR
HQWHQGLGRVFRPRXPVy&RPR%DOPHUDVVLPFRPR0XQGLHXVRXXPDGHPHWiIRUD
PpGLFDIRLSRVVtYHOFULDUDVHJXLQWHIRUPXODomR

³$JRUDIRLDYH]GD*3/6HJXQGRD0LFURVRIWD*3/pDQWLDPHULFDQD
³YLUDO´HFDSD]GHWRUQDUWRGRVRVSURGXWRVGHXPDHPSUHVD³GRPtQLR
S~EOLFR´1mRPHVXUSUHHQGHULDVHGLVVHVVHPTXHHODWDPEpPHQJRUGD
HFDXVDFkQFHUHPUDWRVGHODERUDWyULR´

2LPSDFWRGDDVVRFLDomRGRVRIWZDUHOLYUH HGD*3/ DDOJR³QmRDPHULFDQR´


RX³DQWLDPHULFDQR´IRLDOJRWmRIRUWHTXHSURYRFRXXPDUHVSRVWDGRSUHVLGHQWHGD
)UHH 6RIWZDUH )RXQGDWLRQ 5LFKDUG 6WDOOPDQ (P VXD UHVSRVWD HOH UHWUDEDOKD D
GHFODUDomRSXEOLFDGDGH$OOFKLQFRPRXPFRPHQWiULRj*3/SDUDHPVHJXLGDDU
JXPHQWDUTXHD*3/HVWiGHDFRUGRFRPRamerican wayHEDVHDGDQRVYDORUHV
GDTXHOHVTXHOXWDUDPSHODLQGHSHQGrQFLDGRV(8$'HIHQGHUD*3/VHULDXPDWR
GHOXWDSHODOLEHUGDGH(HVWDVHULDRFHUQHGRVYDORUHVHGRVLGHDLVGRPRYLPHQWR
VRIWZDUHOLYUH
 1DKLVWyULDPDLVUHFHQWHGRV(VWDGRV8QLGRVDSDODYUDunamericanOHPEUD
o House Committee on Un-American Activities +8$&  FRPLVVmR LQVWDXUDGD QR
SDUODPHQWR HVWDGXQLGHQVH TXH VH QRWDELOL]RX SHODV LQYHVWLJDo}HV GH DWLYLGDGHV
H SURSDJDQGD FRPXQLVWD HQWUH R ¿QDO GRV DQRV  H LQtFLR GH  )RL SRU
VXD DWXDomR QHVVD FRPLVVmR TXH R VHQDGRU -RVHSK 0F&DUWK\ LQVSLURX R QRPH
0F&DUWKLVPRTXHpHQWHQGLGRFRPRRSHUtRGRQDKLVWyULDGRV(VWDGRV8QLGRVPDU
FDGRSHODSHUVHJXLomRSROtWLFRFXOWXUDOSULQFLSDOPHQWHFRQWUDDUWLVWDVVREDDOHJD
omRGHOLJDo}HVFRPRFRPXQLVPRHFRPD8QLmR6RYLpWLFD

³20RYLPHQWR2SHQ6RXUFHTXHIRLODQoDGRHPWHPRREMHWLYR
GH GHVHQYROYHU VRIWZDUHV SRGHURVRV H FRQ¿iYHLV H XPD WHFQRORJLD
DYDQoDGD FRQYLGDQGR R S~EOLFR D FRODERUDU FRP R GHVHQYROYLPHQWR
GRVRIWZDUH0XLWRVGHVHQYROYHGRUHVTXHSDUWLFLSDPGHVVHPRYLPHQWR
XVDPD*18*3/HVmREHPYLQGRVSDUDXWLOL]iOD0DVDVLGHLDVHD
OyJLFDGD*3/QmRSRGHPVHUHQFRQWUDGDVQR0RYLPHQWR2SHQ6RXUFH
(ODVGHULYDPGRVREMHWLYRVHYDORUHVPDLVSURIXQGRVGR0RYLPHQWRGH
6RIWZDUH/LYUH

³0LFURVRIWYHUVXV*3/´HP5HYLVWDGR/LQX[(G9LVXDOL]DGRHPKWWSZZZUHYLVWDGROLQX[FRPEU
HGDVVLQDQWHVRSLQLDRSKS
90 • Software livre, cultura hacker e o ecossistema da colaboração

2 0RYLPHQWR GH 6RIWZDUH /LYUH IRL IXQGDGR HP  PDV VXD
LQVSLUDomR YHP GRV LGHDLV GH  OLEHUGDGH FRPXQLGDGH H
FRRSHUDomR YROXQWiULD ,VWR p R TXH OHYD j OLYUH HPSUHVD j OLEHUGDGH
GHRSLQLmRHjOLEHUGDGHGHVRIWZDUH$VVLPFRPRHP³OLYUHHPSUHVD´
H³OLYUHRSLQLmR´R³OLYUH´GH³VRIWZDUHOLYUH´VHUHIHUHjOLEHUGDGHHQmR
DSUHoRHVSHFL¿FDPHQWHLVVRTXHUGL]HUTXHYRFrWHPDOLEHUGDGHGH
HVWXGDU PXGDU H UHGLVWULEXLU R VRIWZDUH TXH XWLOL]DU (VVDV OLEHUGDGHV
SHUPLWHPTXHFLGDGmRVDMXGHPDVLPHVPRVHXQVDRVRXWURVHGHVVD
IRUPD SDUWLFLSHP GH XPD FRPXQLGDGH ,VWR HVWDEHOHFH XP FRQWUDVWH
FRP R VRIWZDUH SURSULHWiULR PDLV FRPXP TXH PDQWpP RV XVXiULRV
LQGHIHVRVHGLYLGLGRVRIXQFLRQDPHQWRLQWHUQRpVHFUHWRHYRFrHVWi
SURLELGR GH FRPSDUWLOKDU R SURJUDPD FRP VHX YL]LQKR 8P VRIWZDUH
SRGHURVRHFRQ¿iYHOHXPDWHFQRORJLDDYDQoDGDVmRVXESURGXWRV~WHLV
GDOLEHUGDGHPDVDOLEHUGDGHGHWHUXPDFRPXQLGDGHpWmRLPSRUWDQWH
TXDQWR´

9DOH DTXL UHWRPDU D QRomR GH 3ROtWLFR HPSUHJDGD SRU *XLPDUmHV SDUD
GLVFXWLU DV REVHUYDo}HV GH 6WDOOPDQ$R D¿UPDU TXH R PRYLPHQWR VRIWZDUH OLYUH
UHSUHVHQWD VLP RV YDORUHV GR american way 6WDOOPDQ UHGLVFXWH H UHVVLJQL¿FD
american way$RID]rORSURFXUDVLJQL¿FDUDH[SUHVVmRFRPRDOJRFRHUHQWHFRP
RVSULQFtSLRVGRVRIWZDUHOLYUHHQXQFLDGRVQD*3/DRPHVPRWHPSRHPTXHWUDWDR
VRIWZDUHSURSULHWiULRFRPRDOJRTXHPDQWpPVHXV³XVXiULRVLQGHIHVRVHGLYLGLGRV´
UHVVLJQL¿FDQGRSRURSRVLomRWDPEpPHVVHWHUPRFRPRDOJR³QmRDPHULFDQR´
 0DLV DGLDQWH QR PHVPR WH[WR 6WDOOPDQ SURVVHJXH VHX WUDEDOKR GH
UHVVLJQL¿FDomRGRamerican way(PVXDDUJXPHQWDomRHPGHIHVDGRVRIWZDUHOLYUH
HGD*3/HOHSURFXUDH[SOLFDURVHQWLGRGRVGLUHLWRVHGHYHUHVHVWDEHOHFLGRVSRU
VHXPRYLPHQWRHGHL[DUFODURRIXQFLRQDPHQWRGHVXDOLFHQoD,VVRpWmRLPSRUWDQWH
TXDQWRPRVWUDUTXHHVVHVSULQFtSLRVHVWmRGHDFRUGRFRPRTXHpLPDJLQDGRFRPR
³VHUDPHULFDQR´

³1mRSXGHPRVHVWDEHOHFHUXPDFRPXQLGDGHGHOLEHUGDGHQDWHUUDGR
VRIWZDUH SURSULHWiULR RQGH FDGD SURJUDPD WHP VHX VHQKRU 7LYHPRV
GH FRQVWUXLU XPD QRYD WHUUD QR FLEHUHVSDoR  R VLVWHPD RSHUDFLRQDO
*18GHVRIWZDUHOLYUHTXHFRPHoDPRVDHVFUHYHUHP(P
TXDQGRR*18HVWDYDTXDVHWHUPLQDGRRNHUQHO/LQX[HVFULWRSRU/LQXV
7RUYDOGVSUHHQFKHXD~OWLPDODFXQDHPSRXFRWHPSRRVLVWHPD*18
/LQX[OLYUHHVWDYDGLVSRQtYHO+RMHPLOK}HVGHXVXiULRVXWLOL]DPR*18
/LQX[HGHVIUXWDPGRVEHQHItFLRVGHOLEHUGDGHHFRPXQLGDGH

$0LFURVRIWXWLOL]DXPDHVWUDWpJLDDQWLFRPSHWLWLYDFKDPDGD³DEUDoDUH
HVWHQGHU´,VWRVLJQL¿FDTXHHOHVFRPHoDPFRPDWHFQRORJLDTXHRXWURV
HVWmR XWLOL]DQGR DGLFLRQDP XPD SHTXHQD LQIRUPDomR DGLFLRQDO TXH p
VHFUHWDGHPRGRTXHQLQJXpPPDLVSRGHLPLWiODHHPVHJXLGDXVDP
6WDOOPDQ5LFKDUG³$*18*3/HR0RGR$PHULFDQRGH9LYHU´9LVXDOL]DGRHPKWWSJQXZHENRRNHORUJ
SKLORVRSK\JSODPHULFDQZD\SWKWPO
Software livre, cultura hacker e o ecossistema da colaboração • 91

HVVDLQIRUPDomRVHFUHWDGHIRUPDTXHDSHQDVRVRIWZDUHGD0LFURVRIW
SRVVD VH FRPXQLFDU FRP RXWUR VRIWZDUH 0LFURVRIW (P DOJXQV FDVRV
LVVR WRUQD GLItFLO TXH YRFr XWLOL]H XP SURJUDPD QmR0LFURVRIW TXDQGR
RXWURV FRP RV TXDLV YRFr WUDEDOKD XVDP XP SURJUDPD 0LFURVRIW
(P RXWURV FDVRV LVVR WRUQD GLItFLO SDUD YRFr XVDU XP SURJUDPD QmR
0LFURVRIWSDUDRWUDEDOKR$VHYRFrXVDXPSURJUDPD0LFURVRIWSDUDR
WUDEDOKR%'HTXDOTXHUPRGR³DEUDoDUHHVWHQGHU´DPSOLDRHIHLWRGR
SRGHUGHPHUFDGRGD0LFURVRIW
1HQKXPD OLFHQoD SRGH LPSHGLU D 0LFURVRIW GH SUDWLFDU ³DEUDoDU H
HVWHQGHU´ VH HOD HVWLYHU GHWHUPLQDGD D ID]rOR jV QRVVDV FXVWDV 6H
HOHVHVFUHYHPVHXSUySULRSURJUDPDGR]HURHQmRXWLOL]DUHPQDGDGR
QRVVRFyGLJRDOLFHQoDVREUHQRVVRFyGLJRQmRRVDIHWDUi0DVXPD
UHHVFULWXUDWRWDOFXVWDPXLWRFDURHpPXLWRGLItFLOHPHVPRD0LFURVRIW
QmRFRQVHJXHID]HULVVRRWHPSRWRGR'DtHVVDFDPSDQKDGHOHVSDUD
QRVFRQYHQFHUDDEDQGRQDUDOLFHQoDTXHSURWHJHQRVVDFRPXQLGDGH
DOLFHQoDTXHQmRRVGHL[DUiGL]HU³2TXHpVHXpPHXHRTXHpPHX
pPHX´(OHVTXHUHPTXHQyVRVGHL[HPRVSHJDURTXHTXLVHUHPVHP
QXQFDGHYROYHUQDGD(OHVTXHUHPTXHDEDQGRQHPRVQRVVDVGHIHVDV
0DVVHULQGHIHVRQmRpR$PHULFDQ:D\1DWHUUDGREUDYRHGROLYUH
GHIHQGHPRVQRVVDOLEHUGDGHFRPR*18*3/´

1HVVHWUDEDOKRGHUHVVLJQL¿FDomRGRamerican way6WDOOPDQSURFXUDGH
PRQVWUDUFRPRRXVRGHVRIWZDUHVSURSULHWiULRVVHDVVHPHOKDDXPDSULVLRQDPHQWR
D XPD GHSHQGrQFLD$R PHVPR WHPSR SURFXUD FRORFDU D *3/ H R VRIWZDUH OLYUH
FRPRRVLQVWUXPHQWRVGHFRPEDWHFRPRVTXDLVIRLFRQVWUXtGDD³QRVVDWHUUDQR
FLEHUHVSDoR´eSRVVtYHOGHVHQKDURVHJXLQWHGLDJUDPD

 0LFURVRIW VRIWZDUHSURSULHWiULR GHSHQGrQFLD ,QJOHVHV


 *18*3/ VRIWZDUHOLYUH OLEHUGDGH 3DWULRWDV

(VVHWLSRGHFRPSDUDomRXVDQGRHOHPHQWRVGDKLVWyULDGDLQGHSHQGrQFLD
GRV(VWDGRV8QLGRVMiIRLUHSHWLGRRXWUDVYH]HVSRURXWURVDXWRUHV(PGH]HPEUR
GH  SHUJXQWDGR VREUH RV TXHVWLRQDPHQWRV OHJDLV GD 0LFURVRIW DR VRIWZDUH
OLYUH 0DWWKHZ 6]XOLN H[HFXWLYRFKHIH GD 5HG +DW HPSUHVD TXH SUHVWD VHUYLoRV
XVDQGR*18/LQX[XVRXGHDQDORJLDVHPHOKDQWHDTXLUHSURGX]LGDFRPRGLVFXUVR
LQGLUHWRHPXPDUHSRUWDJHP³/LNHQLQJWKH/LQX[ULVLQJWRWKH%RVWRQ7HD3DUW\LQ
ZKLFKWKHRULJLQDO3DWULRWVUHVLVWHGWD[DWLRQZLWKRXWUHSUHVHQWDWLRQWKH5HG+DW&(2
DGPRQLVKHG0LFURVRIWIRUFUXVKLQJFRPSHWLWLRQ´
$5HG+DWpDSULQFLSDOHPSUHVDHVWDGXQLGHQVHTXHWUDEDOKDFRPVRIWZDUH
OLYUH$DGSWDomRGR*18/LQX[TXHFULRXpXPDGDVPDLVXVDGDVQRV(8$HHP
3DWULRWDVRXPatriotsIRUDPRVHVWDGXQLGHQVHVTXHOXWDUDPFRQWUDRGRPtQLREULWkQLFR
 5RRQH\ 3DXOD ³5HG +DW &(2
6FDUHG
$ERXW 0LFURVRIW
V /HJDO 7DFWLFV 7R &UXVK /LQX[´ HP CRN. 3XEOLFDGR HP
9LVXDOL]DGRHPKWWSZZZFUQFRPVHFWLRQVEUHDNLQJQHZVGDLO\DUFKLYHVMKWPOMVHVVLRQLG '*=
34;:/<%2461'%&&.+6&-80(.-91"DUWLFOH,G  BUHTXHVWLG 
92 • Software livre, cultura hacker e o ecossistema da colaboração

WRGRPXQGR6HXVH[HFXWLYRVQmRVmRFRQKHFLGRVSRUVHUHPUDGLFDLVQRGLVFXUVR
HPGHIHVDGDOLEHUGDGHQRVRIWZDUHOLYUHSHORFRQWUiULRVmROLJDGRVDRVVHWRUHV
PDLVPRGHUDGRV RPRYLPHQWRFyGLJRDEHUWR 2HYHQWRDTXHHOHDOXGHD%RVWRQ
7HD3DUW\RFRUUHXHPWUrVDQRVDQWHVGDLQGHSHQGrQFLDGRV(8$HIRLXP
PDUFRGDUHVLVWrQFLDRUJDQL]DGDHSDFt¿FDDRGRPtQLRHFRQ{PLFRGD,QJODWHUUD2
DFRQWHFLPHQWRQRHQWDQWRIRLFKDYHSDUDRSURFHVVRTXHOHYRXjVHSDUDomRSROt
WLFDGDVWULQWDFRO{QLDVQRUWHDPHULFDQDVGR,PSpULR%ULWkQLFR
 1RWHVHTXHRUHSUHVHQWDQWHGRXPVHWRUPDLVFRQVHUYDGRUQRHVFRSRGR
PRYLPHQWR VRIWZDUH OLYUH H[HPSOL¿FD D SDUWLU GH XP IDWR GR SDVVDGR SROtWLFR TXH
OHPEUD XPD UHVLVWrQFLD SDFt¿FD HQTXDQWR SRU VXD YH] XP UHSUHVHQWDQWH GH XP
VHWRU PDLV UDGLFDO ID] OHPEUDU R PRPHQWR ORJR DSyV D JXHUUD GD ,QGHSHQGrQFLD
&DGDXPDQFRUDRVHXGLVFXUVRHPFHUWRVIDWRVGDPHPyULDSROtWLFDHQmRRXWURV
TXHIDODPjVXDSRVLomRFRPUHODomRDRHQIUHQWDPHQWRHQWUHDVSDUWHV VRIWZDUH
OLYUH YV VRIWZDUH SURSULHWiULR  PDV WDPEpP j SRVLomR TXH FDGD XP RFXSD QR
SUySULRPRYLPHQWRSHORVRIWZDUHOLYUH

Nas licenças, as diferenças

3DUDHVWDDQiOLVHVHUiIHLWRRXVRGHGXDVOLFHQoDVWRPDGDVFRPRPRGH
OR GH XPD OLFHQoD OLYUH H XPD OLFHQoD SURSULHWiULD D *3/ HP VXD YHUVmR R¿FLDO
WUDGX]LGDSDUDRSRUWXJXrVHD(8/$GR0LFURVRIW:LQGRZV$*3/pDSHQDV
XPDGDVYiULDVOLFHQoDVOLYUHVH[LVWHQWHV&RQWXGRpHODTXHUHJLVWUDDPDLRUSDUWH
GRVVRIWZDUHVVLVWHPDRSHUDFLRQDO*18/LQX[3DUDHVWDDQiOLVHVHUiXWLOL]DGDD
&&*18*3/IUXWRGHXPSURMHWRTXHUHXQLXR,QVWLWXWR1DFLRQDOGH7HFQRORJLD
GD,QIRUPDomR ,7, DXWDUTXLDGD&DVD&LYLOGRJRYHUQREUDVLOHLURD)UHH6RIWZDUH
)RXQGDWLRQ )6) RDXWRUGDYHUVmRRULJLQDOHPLQJOrVGD*3/5LFKDUG6WDOOPDQ
DGYRJDGRVEUDVLOHLURVGD)XQGDomR*HW~OLR9DUJDV )*9 HPHPEURVGD&UHDWLYH
&RPPRQVHQWLGDGHVHGLDGDQRV(VWDGRV8QLGRVHTXHEXVFDGDUXPHVFRSROHJDO
SDUD XPD ÀH[LELOL]DomR GRV GLUHLWRV DXWRUDLV$V OLFHQoDV GD &UHDWLYH &RPPRQV
FULDGDV SDUD REUDV DUWtVWLFDV H MRUQDOtVWLFDV EDVHLDPVH QRV SULQFtSLRV GDV OLFHQ
oDVOLYUHV OLEHUGDGHSDUDFRSLDUH[HFXWDUGLVWULEXLUHDOWHUDU HHVWmRVHPSUHGLV
SRQtYHLVHPWUrVIRUPDWRVXPUHVXPLGRSDUDOHLWXUDUiSLGDHVFULWDHP³OLQJXDJHP
VLPSOL¿FDGD´QRRULJLQDOHPLQJOrV³human-readable commons deed´RXWUDD³SDUWH
MXUtGLFD´³lawyer-readable GNU GPL´QRRULJLQDOHPLQJOrVHRXWUDXP³FyGLJR
GHOHLWXUDSHODPiTXLQD´³machine-readable digital code´QRRULJLQDOHPLQJOrV±
XPFyGLJRHPOLQJXDJHPKWPOOLGRSHORVQDYHJDGRUHVGDLQWHUQHWHGLVSRQLELOL]DGR

KWWSZZZVRIWZDUHOLYUHJRYEU/LFHQFDV/LFHQFD&F*SO%UYLHZ
Software livre, cultura hacker e o ecossistema da colaboração • 93

SDUD TXH VHMD LQVHULGR QDV SiJLQDV GDTXHOHV TXH OLFHQFLDP VHX VRIWZDUHV (P
JHUDORVSURJUDPDGRUHVTXHOLFHQFLDPVHXVVRIWZDUHVSHOD*3/DSHQDVDQH[DP
DVHXFyGLJRXPDUTXLYRWH[WRFRQWHQGRRRULJLQDOGHVVDOLFHQoDHPLQJOrV3DUD
HIHLWRGHVWDDQiOLVHVHUiXWLOL]DGDDYHUVmRHPSRUWXJXrVGD³SDUWHMXUtGLFD´GDOL
FHQoD TXH p XPD WUDGXomR GD PDLV UHFHQWH YHUVmR HP LQJOrV PRGL¿FDGD SHOD
)UHH6RIWZDUH)RXQGDWLRQHP
 1R PXQGR SURSULHWiULR D GLYHUVLGDGH GDV YHUV}HV GDV OLFHQoDV p PDLRU
&RPRHVVHVVRIWZDUHVVmRGHSURSULHGDGHGHHPSUHVDVHVWDVHPJHUDOWrPXP
GHSDUWDPHQWRMXUtGLFRUHVSRQViYHOSRUGH¿QLUYDULDo}HVGHOLFHQFLDPHQWRSUDFDGD
SURGXWR6HUiXWLOL]DGDDOLFHQoDGR:LQGRZVSRUVHUDLQGDDSODWDIRUPDSDGUmR
SDUDERDSDUWHGRVFRPSXWDGRUHVGRPXQGR(QWUHWDQWRDOLFHQoDGR:LQGRZV;3
DPDLVQRYDYHUVmRGRVLVWHPDRSHUDFLRQDOGD0LFURVRIWWDPEpPIRLH[DPLQDGD
(PFRPSDUDomRFRPDOLFHQoDGR:LQGRZVQmRIRUDPHQFRQWUDGDVGLIHUHQoDV
VXEVWDQFLDVDSHQDVUHVWULo}HVHVSHFt¿FDVHPUHODomRDFHUWRVXVRVFRPRDUHV
WULomRDTXHRXWURVFRPSXWDGRUHVVHFRQHFWHPDRFRPSXWDGRUHPTXHRVLVWHPD
RSHUDFLRQDOIRLLQVWDODGRRXDQHFHVVLGDGHGHDWLYDomRGRVLVWHPDMXQWRDRIDEUL
FDQWH HP GHWHUPLQDGR SUD]R &RQWXGR HVVDV GLIHUHQoDV QmR VmR UHOHYDQWHV DR
SURSyVLWRGHVWDDQiOLVH
 $VGLIHUHQoDVHQWUHD*3/HD(8/$FRPHoDPSHODSUySULDOLQJXDJHPHP
SUHJDGD$PEDVVmRLQVWUXPHQWRVMXUtGLFRVWH[WRVWLGRVFRPRGHOHLWXUDGLItFLOQmR
PXLWRDJUDGiYHO0DVRWH[WRGD*3/GLVWDQFLDVHGHVVHPRGHOR1HOHTXHPIDOD
QmRpXPDHQWLGDGHMXUtGLFDVHPSUHQDWHUFHLUDSHVVRDPDVRFROHWLYR$WHUFHLUD
SHVVRDGRSOXUDOpVHPSUHXVDGD±³TXHUHPRVSURWHJHU´³TXHUHPRVHYLWDU´VHMD
OLWHUDOPHQWHRXGHIRUPDLPSOtFLWD$QWHVGHTXDOTXHUQRUPDHODFRORFDH[SOLFDo}HV
MXVWL¿FD DV UHVWULo}HV TXH HVWDEHOHFH ³3DUD SURWHJHU VHXV GLUHLWRV QHFHVVLWDPRV
ID]HUUHVWULo}HVTXHSURtEHPTXHDOJXpPQHJXHHVVHVGLUHLWRVDYRFrRXTXHVROLFLWH
TXHYRFrUHQXQFLHDHOHV´GL]&RPLVVRTXHEUDVHRHIHLWRGHLPSHVVRDOLGDGHGR
WH[WRMXUtGLFRFRPXP
 0DV DPERV WDQWR D *3/ FRPR D (8/$ VmR FRQWUDWRV MXUtGLFRV GH
OLFHQFLDPHQWR$PERVUHJXODPDFRQFHVVmRGHGLUHLWRGHXVRDSDUWLUGHXPDPHVPD
YLDOHJDO1RHQWDQWRD*3/FRORFDQGRVHFRPRXPDQHJDomRjVUHVWULo}HVGDV
OLFHQoDVSURSULHWiULDVSDUHFHQHJDUWDPEpPVXDFDUDFWHUtVWLFDMXUtGLFD(PQHQKXP
PRPHQWR SRU H[HPSOR D SDODYUD FRQWUDWR p FLWDGD FRPR UHIHUrQFLD DR SUySULR
GRFXPHQWR
$GLVSRQLELOL]DomRGDOLFHQoDHP³WUrVYHUV}HV´pXPDSUiWLFDGD&UHDWLYH&RPPRQVTXHLQWHUQDFLRQDOPHQWHRFXSD
VHHPOLFHQFLDUSULRULWDULDPHQWHDXGLRYLVXDLV WH[WRVLPDJHQVYtGHRV $H[LVWrQFLDHP³WUrVYHUV}HV´GD*3/QR%UDVLO
FDVR ~QLFR QR PXQGR GHYHVH DR IDWR GH D &UHDWLYH &RPPRQV WHU SDUWLFLSDGR GR SURFHVVR GH DGHTXDomR jV OHLV
EUDVLOHLUDV
$QH[RD5HWLUDGRGHKWWSFUHDWLYHFRPPRQVRUJOLFHQVHV*3/OHJDOFRGHSW
KWWSZZZJQXRUJOLFHQVHVJSOW[W
$QH[RE5HWLUDGRGHKWWSZZZFLSVJDRUJEUVHFWLRQVSKS"RS YLHZDUWLFOH DUWLG 
94 • Software livre, cultura hacker e o ecossistema da colaboração

a. A EULA

-iD(8/$HQIDWL]DVHXFDUiWHUGHXPLQVWUXPHQWROHJDO2VLWHQVVmRGLV
SRVWRV HP FOiXVXODV H D SULPHLUD IUDVH GR WH[WR p XP DYLVR HP OHWUDV JDUUDIDLV
³,03257$17(±/(,$&20$7(1d­2´2UHFXUVRjFDL[DDOWDpHPSUHJDGRGLYHU
VDV YH]HV QR WH[WR SDUD PDUFDU R LQtFLR GH FDGD LWHPFOiXVXOD RX SDUD PDUFDU
FHUWDVSDODYUDV(VVDVSDODYUDVVmR

(8/$±62)7:$5(±&20387$'25

$ SDODYUD ³352'872´ WDPEpP p JUDIDGD HP FDL[D DOWD ORJR QR SULPHLUR
SDUiJUDIR PDV FRPR p HQXQFLDGD FRPR VLQ{QLPR GH ³62)7:$5(´ QmR p PDLV
XWLOL]DGDFRPHVVDUHIHUrQFLD7DPEpPVmRUHIHULGDVFRPFDUDFWHUHVHVSHFLDLVDV
GXDVSDUWHVGRFRQWUDWRDTXHOHTXHDGTXLUHDOLFHQoDUHIHULGRFRPR³96D´HHP
SUHVDTXHFRQFHGHDOLFHQoDUHIHULGDFRPR³)DEULFDQWH´
 2QRPHGDHPSUHVDSURSULHWiULDGRVGLUHLWRVVREUHRVLVWHPDD0LFURVRIWp
UHIHULGRHPDOJXPDVVLWXDo}HVGHPDQHLUDDPEtJXD¬H[FHomRGRWtWXORGRFRQWUDWR
JUDIDGR HP FDL[D DOWD ³&2175$72 '( /,&(1d$ '( 868È5,2 ),1$/ 3$5$
62)7:$5(0,&5262)7´ QDSULPHLUDYH]HPTXHRQRPHGDHPSUHVDpUHIHULGR
pSDUDTXDOL¿FDUPDUFDURSURGXWR³R V SURJUDPD V GHFRPSXWDGRU0LFURVRIW´
1DVHJXQGDYH]HODDSDUHFHFRPRHQWLGDGHGLVWLQWDGD¿JXUDGR³)DEULFDQWH´$IRU
PXODomRGDIUDVHp³&DVR96DQmRHVWHMDGHDFRUGRFRPRVWHUPRVGHVWH(8/$
R)DEULFDQWHHD0LFURVRIWQmROLFHQFLDUmRR62)7:$5(SDUD96D´$VVLPHOD
DSDUHFHGHGXDVIRUPDVFRPRPDUFDTXHDFRPSDQKDRQRPHGRSURGXWRHFRPR
OLFHQFLDGRUDGRVRIWZDUHQmRVHDVVLPLODQGRDR³)DEULFDQWH´
 2XWUD VLWXDomR HP TXH R QRPH GD HPSUHVD DSDUHFH QmR DSHQDV FRPR
QRPHDX[LOLDUGDPDUFDGRSURGXWRTXHHVWiOLFHQFLDGRpQRVXELWHP³5HVFLVmR´GR
LWHP³'(6&5,d­2'(287526',5(,726(/,0,7$d®(6´2WH[WRGRVXELWHPp
RVHJXLQWH³6HPSUHMXt]RGHTXDLVTXHURXWURVGLUHLWRVD0LFURVRIWSRGHUiUHVFLQGLU
HVWH(8/$FDVR96DQmRFXPSUDFRPVHXVWHUPRVHFRQGLo}HV1HVWHFDVR96D
GHYHUiGHVWUXLUWRGDVDVFySLDVGR62)7:$5(HGHVHXVFRPSRQHQWHV´$TXLD
HPSUHVDDSDUHFHFRPRHQWLGDGHDWLYDFRPSRGHUHVSDUDYHWDUDFRQWLQXLGDGHGR
XVRGRVRIWZDUHVHDVFRQGLo}HVHVWDEHOHFLGDVQmRIRUHPFXPSULGDV
1D~OWLPDYH]HPTXHQRPHGDHPSUHVDpUHIHULGRQmRVRPHQWHFRPRDVVHPHOKDGR
DR SURGXWR p SDUD LVHQWiOD GD REULJDomR GH RIHUHFHU DOJXP DSRLR DR XVXiULR
1HVVH PRPHQWR HOD QRYDPHQWH VH GLVWDQFLD GD ¿JXUD GR ³)DEULFDQWH´ H p D
~QLFDRSRUWXQLGDGHHPTXHpHQXQFLDGRRQRPHFRPSOHWRGDHPSUHVD³0LFURVRIW
 1D YHUVmR PDLV UHFHQWH GR SURGXWR QD OLFHQoD GR :LQGRZV ;3 R SURQRPH GH WUDWDPHQWR SDUD R FRPSUDGRU GD
OLFHQoDpDOWHUDGRSDUD³YRFr´
Software livre, cultura hacker e o ecossistema da colaboração • 95

&RUSRUDWLRQ´ 2 WUHFKR VHJXLQWH UHIHUHVH DR LWHP GH Q~PHUR  ³683257( $2
352'872´

³2 VXSRUWH DR SURGXWR SDUD R 62)7:$5( QmR p SUHVWDGR SHOD


0LFURVRIW &RUSRUDWLRQ RX VXDV VXEVLGLiULDV 3DUD REWHU LQIRUPDo}HV
TXDQWRDRVXSRUWHDRSURGXWRIDYRUFRQVXOWDURQ~PHURGHVXSRUWHGR
)DEULFDQWHLQGLFDGRQDGRFXPHQWDomRGR&20387$'25&DVR96D
WHQKD TXDLVTXHU G~YLGDV UHODWLYDV D HVWH (8/$ RX GHVHMH FRQWDWDU R
)DEULFDQWH SRU TXDOTXHU RXWUD UD]mR XWLOL]H R HQGHUHoR LQGLFDGR QD
GRFXPHQWDomRGR&20387$'25´

&DEHP DTXL DOJXPDV REVHUYDo}HV FRP UHODomR DR HIHLWR GHVVD GLYLVmR
HQWUH³0LFURVRIW´H³)DEULFDQWH´HVVHMRJRHPTXHXPDGDVSDUWHVGRFRQWUDWRRUD
p GHVFULWD FRPR XP RUD FRPR RXWUR$R DVVXPLU XPD LGHQWLGDGH GLVWLQWD GD ¿JX
UD GR ³)DEULFDQWH´ QR FRQWUDWR D HPSUHVD WRUQDVH SDUWH GHOH GH XPD PDQHLUD
LQGLUHWD$RPHVPRWHPSRHPTXHVXUJHFRPRGHWHQWRUDGHXPDSURSULHGDGHTXH
QmRpYHQGLGDPDVVLPOLFHQFLDGDHODGHVDSDUHFHFRPRHQWLGDGHFRPDTXDOR
FRQWUDWDQWHHVWiUHDOL]DQGRXPDRSHUDomRGHOLFHQFLDPHQWR$VSDUWHVHQXQFLDGDV
FRPR FRQWUDWDQWHV VmR ³96D´ H R ³)DEULFDQWH´ 6H ³96D´ QmR FRQFRUGDU FRP D
(8/$QmRVHUij0LFURVRIWDTXHPGHYHUiUHFRUUHUPDVVLPDR³)DEULFDQWH´SRLV
HVWiSRVWRORJRQRLQtFLRGDOLFHQoD³1HVWHFDVR96DQmRSRGHUiXWLOL]DURXFRSLDU
R62)7:$5(HGHYHUiFRQWDWDULPHGLDWDPHQWHR)DEULFDQWHSDUDREWHULQVWUXo}HV
VREUHFRPRGHYROYHUR V SURGXWR V QmRXWLOL]DGRVHSDUDUHFHEHUXPUHHPEROVR´
 &RPLVVRWHPVHXPDFRUGRTXHVHHVWDEHOHFHOHJDOPHQWHHQWUHGXDVSDU
WHVFRPRHQXQFLDGRSHORFRQWUDWRPDVHPTXHXPDGHVVDVSDUWHVSRGHVHGLYL
GLUHPGXDV³)DEULFDQWH´H³0LFURVRIW´3DUDD~OWLPDFDEHRSDSHOGHURPSHUR
DFRUGR VH D SDUWH OLFHQFLDGD LQIULQJLU DOJXPD FOiXVXOD H VH LVHQWDU QR PRPHQWR
GHRIHUHFHUDOJXPDDMXGDDHVVDSDUWHOLFHQFLDGD3DUDDSULPHLUDHVVHHQWHVHP
URVWR QRPHDGR JHQHULFDPHQWH FRPR ³)DEULFDQWH´ FDEHP DOJXPDV SRXFDV UHV
SRQVDELOLGDGHVFRPRDWHQGHUROLFHQFLDGRTXDQGRHVVHSURFXUDUSRUVXSRUWH
 6HSHQVDUPRVRSROtWLFRDTXLFRPRMiGH¿QLGRDFLPDpSRVVtYHOGL]HUTXH
RTXHDHPSUHVDID]pHVWDEHOHFHUXPDGLYLVmRGRUHDOHPTXHFRQGLo}HVGHVLJXDLV
VmR QRUPDWL]DGDV 3DUD TXH R OLFHQFLDGR TXH QmR GHWpP DTXHOH SURGXWR SRVVD
XVXIUXLUGHOHVHUiSUHFLVRTXHSDJXHXPDGHWHUPLQDGDWD[DRFXVWRSDUDREWHUR
GLUHLWRGHXVR3RUpPFRPRQmRpDSURSULHGDGHGDTXHOHFyGLJRTXHHVWiVHQGR
DGTXLULGD DSHQDV R XVR p FRQFHGLGR R SURSULHWiULR HVWDEHOHFHUi WDPEpP FHUWDV
UHVWULo}HV SDUD HVVH XVR FRQGLomR HVVD TXH VH YLRODGD LPSOLFDUi HP TXHEUD

³(VWH62)7:$5(pSURWHJLGRSHODVOHLVGHFRS\ULJKWHWUDWDGRVLQWHUQDFLRQDLVEHPFRPRSRURXWUDVOHJLVODo}HVH
WUDWDGRVVREUHSURSULHGDGHLQWHOHFWXDO262)7:$5(pOLFHQFLDGRHQmRYHQGLGR´GL]RSUHkPEXORGDSULPHLUDVHomR
GRFRQWUDWRLQWLWXODGD³/,&(1d$'262)7:$5(´
96 • Software livre, cultura hacker e o ecossistema da colaboração

GR FRQWUDWR 2V OLFHQFLDGRUHV FRORFDP FRQGLo}HV EDVWDQWH FODUDV SUHVHQWHV QR
FRQWUDWRDFHLWDURXGHVLVWLUDSDJDUHGHYROYHURSURGXWR
 $LQFOXVmRGHVVHWLSRGHSUpFRQGLomRSDUDRXVR³DFHLWHRXGHVLVWD´pHP
VLXPDGHPRQVWUDomRGHVVDGHVLJXDOGDGHHQWUHDVSDUWHVHODVySRGHHVWDUSUH
VHQWH SRUTXH XPD GDV SDUWHV HVWDEHOHFHX XQLODWHUDOPHQWH DV FRQGLo}HV D VHUHP
DFHLWDVHPVXDWRWDOLGDGH(HVVDVFRQGLo}HVXQLODWHUDLVVySRGHPH[LVWLUSRUTXH
R FRQWUDWR HVWi VHQGR HVWDEHOHFLGR HQWUH SDUWHV QmRLJXDLV HQWUH SURSULHWiULRV
GRQRVSRVVXLGRUHVHPHURVXVXiULRVOLFHQFLDGRV
 3DUDTXHVHIDoDXVRGRVRIWZDUHSURSULHWiULRpSUHFLVRDFHLWDUDOLFHQoDH
HVWHDWRDDFHLWDomRGRFRQWUDWRpXPDWRGHUHFRQKHFLPHQWRGDGLVWLQomRHQWUH
OLFHQFLDGRUHOLFHQFLDGRTXHUHFRQKHFHDH[LVWrQFLDGD¿JXUDGRSURSULHWiULR0HV
PRTXHD(8/$OLFHQFLHXPVRIWZDUHSDUDRTXDORGHWHQWRUGHGLUHLWRVQmRHVWD
EHOHoDXPDWD[DSDUDRXVRQDTXHOHPRPHQWR±RTXHSRGHVHURFDVRGRVLVWHPD
RSHUDFLRQDO:LQGRZVRIHUHFLGRGHJUDoDDHVFRODVSRUH[HPSOR±RXVXiULRSUHFLVD
FRQFRUGDUTXHRGLUHLWRGHXVRpDOJRFRQFHGLGRSRURXWURHSRGHVHUUHYRJDGRQR
IXWXUR
 (VVH³FRPSURPLVVR´HQWUHDVSDUWHVpHVWDEHOHFLGRQRFDVRGR:LQGRZV
QRPRPHQWRGDLQVWDODomRGRVRIWZDUH0HVPRTXHDFySLDGLVSRQtYHODRXVXiULR
WHQKD VLGR DGTXLULGD LOHJDOPHQWH D OLFHQoD LPSOLFD QR UHFRQKHFLPHQWR GH XPD
LQIUDomR OHJDO (OD ID] R TXH GL] HVWDEHOHFH XPD SURSULHGDGH PHVPR TXDQGR R
XVXiULRYLRODRVWHUPRVSRUHODHVWDEHOHFLGRVSRLVHVWHWRUQDVHSDVVtYHOGHSXQLomR
OHJDOMiTXHDOLFHQoDH[LVWH

b. A GPL

,VVRRFRUUHGHPDQHLUDGLVWLQWDFRPD*3/&RPRQmRKiUHVWULo}HVjH[H
FXomRHjFySLDGRSURJUDPDQmRpUHTXHULGRDRXVXiULRTXHDFHLWHDOLFHQoDSDUD
LVVR3RUpPHVWHSUHFLVDFRQFRUGDUFRPRVWHUPRVSRVWRVSHOD*3/VHGHVHMDGLV
WULEXLURXPRGL¿FDURVRIWZDUHPDVDSURSRVWDGHDGHVmRDHVVDVFRQGLo}HVQXQFD
pIRUPXODGDFRPRXPDFRQGLomRLPSRVWDQmRQHJRFLiYHO2LWHPGHQ~PHURGD
VHomR³7(5026(&21',d®(63$5$&Ï3,$',675,%8,d­2(02',),&$d­2´
TXHSHGHDFRQFRUGkQFLDFRPRVWHUPRVGDOLFHQoDQmRVHXWLOL]DGDIRUPXODomR
³YRFrGHYHUi´FRPRQD(8/$3HORFRQWUiULRDQmRDGHVmRDRVWHUPRVDSDUHFH
FRPRXPGLUHLWR$SULPHLUDIUDVHHVWDEHOHFHHVVHGLUHLWR$VHJXQGDPRVWUDFRPRD
DFHLWDomRGRVWHUPRVpR~QLFRPHLRSDUDTXHRGLUHLWRjUHGLVWULEXLomRHjDOWHUDomR
GLUHLWRVLQDFHVVtYHLVSHODOLFHQoDSURSULHWiULD GRVRIWZDUHVHMDFRQFHGLGR$SHQDV
QDWHUFHLUDIUDVHDOHJLVODomRpFLWDGDHSRUFRQVHTXrQFLDDTXLORWXGRTXHHVVD
SDODYUD UHIHUH QD PHPyULD GLVFXUVLYD LQVWLWXLo}HV FRPR R 'LUHLWR D -XVWLoD H DV
Software livre, cultura hacker e o ecossistema da colaboração • 97

SXQLo}HVTXHFDEHPDHVWHVHVWDEHOHFHU$IRUPXODomRpDVHJXLQWH

³9RFrQmRpREULJDGRDDFHLWDUHVWD/LFHQoDXPDYH]TXHYRFrQmRD
DVVLQRX3RUpPQDGDPDLVFRQFHGHDYRFrSHUPLVVmRSDUDPRGL¿FDU
RXGLVWULEXLUR3URJUDPDRXUHVSHFWLYDVREUDVGHULYDWLYDV7DLVDWRVVmR
SURLELGRVSRUOHLVHYRFrQmRDFHLWDUHVWD/LFHQoD&RQVHTXHQWHPHQWH
DR PRGL¿FDU RX GLVWULEXLU R 3URJUDPD RX TXDOTXHU REUD EDVHDGD QR
3URJUDPD YRFrHVWDUiPDQLIHVWDQGRVXDDFHLWDomRGHVWD/LFHQoDSDUD
ID]rOREHPFRPRGHWRGRVRVVHXVWHUPRVHFRQGLo}HVSDUDFRSLDU
GLVWULEXLURXPRGL¿FDUR3URJUDPDRXREUDVQHOHEDVHDGDV´

$*3/pXPDOLFHQoDTXHIXQFLRQDHPRXWURQtYHO0HVPRTXHRXVXiULR
QmR D DFHLWH HOH QmR VHUi LPSHGLGR GH XWLOL]DU R VRIWZDUH 2 TXH HOD HVWDEHOHFH
QmRpDOJRTXHVHUHVWULQJHDXPFRQWUDWRHQWUHOLFHQFLDGRUHOLFHQFLDGR(ODIDODGH
XPDWHUFHLUDSHVVRDTXHQmRHVWiQRFRQWUDWRFRORFDQGRUHVWULo}HVjUHODomRGR
OLFHQFLDGR OLFHQFLDQWHQDTXHOHPRPHQWR FRPRVQRYRVOLFHQFLDGRVTXHVXUJLUmR
QRIXWXUR,PSHGHTXHROLFHQFLDGRUDVVXPDXPDFRQGLomRGLIHUHQWHGROLFHQFLDGR
GHPRGRTXHSRVVDHVWDEHOHFHUDRXWURVUHVWULo}HVPDLRUHVGRVTXHDVGHTXHIRL
REMHWR
 $*3/SRGHVHUGLYLGLGDHPGXDVSDUWHVXPD³,QWURGXomR´TXHDQWHFHGH
DVFOiXVXODVGDOLFHQoDHRVWHUPRVSURSULDPHQWHGLWRVHPTXH¿JXUDPRVLWHQV
DVHUHPREVHUYDGRVXPD³(;&/86­2'(*$5$17,$´HVFULWDHPOHWUDVPDL~V
FXODVHDVXEVHomR³),1$/'267(5026(&21',d®(6´HPTXHROLFHQFLDGR
p HQVLQDGR D DSOLFDU D OLFHQoD QRV VRIWZDUHV D TXH YLHU D PRGL¿FDU$ VXEVHomR
³(;&/86­2'(*$5$17,$´pR~QLFRPRPHQWRHPTXHDVOHWUDVPDL~VFXODVVmR
XVDGDVQRWH[WRPDVPHVPRDVVLPRTXHHODHVWDEHOHFHDH[FOXVmRGDJDUDQWLD
pDOJRTXHpREMHWRGHMXVWL¿FDomRGHH[SOLFDo}HV
 $³,QWURGXomR´pRWUHFKRGRWH[WRTXHVRDPHQRVSDUHFLGRFRPXPFRQWUDWR
MXUtGLFR(ODOHPEUDPDLVXPDSHTXHQDGLVVHUWDomRFRPXPDMXVWL¿FDWLYDSDUDRV
GLUHLWRVHGHYHUHVHVWDEHOHFLGRVSHODOLFHQoD'HVGHRLQtFLRHODVHFRORFDFRPR
XPD DOWHUQDWLYD FRPR DOJR TXH QmR SHUWHQFH DR PXQGR MXUtGLFR GRV FRQWUDWRV
WUDGLFLRQDLVSDUDRXVRGHSURJUDPDVGHFRPSXWDGRU'L]RSULPHLURSDUiJUDIR

³&2022352*5$0$e/,&(1&,$'26(0&86721­2+È1(1+80$*$5$17,$3$5$2352*5$0$
12 /,0,7( 3(50,7,'2 3(/$ /(, $3/,&È9(/ (;&(72 48$1'2 '( 2875$ )250$ (67$%(/(&,'2 325
(6&5,72267,78/$5(6'26',5(,726$8725$,6(282875$63$57(6)251(&(02352*5$0$12
(67$'2(048(6((1&2175$6(01(1+80$*$5$17,$'(48$/48(57,327$172(;35(66$&202
,03/Ë&,7$,1&/8,1'2'(175(2875$6$6*$5$17,$6,03/Ë&,7$6'(&20(5&,$%,/,'$'(($'(48$d­2
$80$),1$/,'$'((63(&Ë),&$25,6&2,17(*5$/48$172¬48$/,'$'(('(6(03(1+2'2352*5$0$
e$6680,'232592&Ç&$622352*5$0$&217(1+$'()(,72692&Ç$5&$5È&2026&86726'(
72'26266(59,d265(3$52628&255(d®(61(&(66È5,$6´
98 • Software livre, cultura hacker e o ecossistema da colaboração

³$VOLFHQoDVGDPDLRULDGRVVRIWZDUHVVmRHODERUDGDVSDUDVXSULPLUVXD
OLEHUGDGH GH FRPSDUWLOKiORV H PRGL¿FiORV $ /LFHQoD 3~EOLFD *HUDO
GR *18 DR FRQWUiULR YLVD JDUDQWLU VXD OLEHUGDGH GH FRPSDUWLOKDU H
PRGL¿FDUVRIWZDUHVOLYUHVSDUDDVVHJXUDUTXHRVRIWZDUHVHMDOLYUHSDUD
WRGRV RV VHXV XVXiULRV   9RFr WDPEpP SRGHUi DSOLFiOD DRV VHXV
SURJUDPDV´

$OLFHQoDFRORFDDVLPHVPDFRPRXPLQVWUXPHQWRSDUDDJDUDQWLDGHGLUHL
WRVGLUHLWRVHVWHVTXHYmRDOpPGRFRQWUDWRDVHUHVWDEHOHFLGRTXHH[WUDSRODPR
HVFRSRGHXPDFRUGRMXUtGLFR(ODWHPXP¿PTXHQmRVHHVJRWDQDUHODomRHQWUH
ROLFHQFLDGRUHROLFHQFLDGRQDTXHOHPRPHQWRGHYHVHUXVDGDFRPRLQVWUXPHQWR
SDUD D JDUDQWLD GD OLEHUGDGH GH PRGL¿FDomR H DOWHUDomR GR VRIWZDUH GRV IXWXURV
OLFHQFLDGRV1mRVyDTXHOHOLFHQFLDGRQDTXHOHPRPHQWRPDVDOLFHQoDIRLFULDGD
SDUDVHUXVDGDH[HPSODUPHQWHSRURXWURVGHVHQYROYHGRUHVHPVXDVFULDo}HV
 1HVVHVHQWLGRHODVHFRORFDFRPRPHLRSDUDTXHGHVLJXDLV DTXHOHVTXH
QmRVmRSURSULHWiULRVGRVRIWZDUH SRVVDPVHLJXDODUDRV³VHQKRUHV´GRVSURJUDPDV
± SDUD XVDU D PHWiIRUD HVWDEHOHFLGD SRU 6WDOOPDQ QR WH[WR DQDOLVDGR QR LWHP 
GHVWHWUDEDOKRRXVHMDDTXHOHVFDSD]HVOHJDOPHQWHGHHYLWDUDWUDQVIRUPDomRGRV
VRIWZDUHVGHTXHVmRSURSULHWiULRVHWDPEpPSDUWLFLSHPGDFRPXQLGDGHFDSD]GH
GLVWULEXLUPHOKRUDUHDGDSWDURVSURJUDPDV
 /RJR DSyV HVVH SDUiJUDIR LQLFLDO Mi FRPHQWDGR R TXH VH VHJXH p XPD
H[SOLFDomRMXVWL¿FDGDGRTXHVLJQL¿FDDOLFHQoDHVHXIXQFLRQDPHQWR'HVGHORJR
SURFXUDVHUHVROYHUXPDFRQWURYpUVLDVREUHRVHQWLGRGDSDODYUDfreeGRRULJLQDOHP
LQJOrVeGLWRHQWmRTXHDSDODYUDfreepXVDGDFRPRVLQ{QLPRGHOLEHUGDGHHQmR
FRPRJUDWXLGDGHLQHUHQWHDRSURGXWR$VLPSOLFDo}HVHDFRQWURYpUVLDVREUHHVVH
WHUPRVHUmRH[DPLQDGDVDTXLHPRXWURPRPHQWR
 1R WHUFHLUR SDUiJUDIR DFRQWHFH XPD LQYHUVmR EDVWDQWH LQWHUHVVDQWH (P
JHUDOXPFRQWUDWRGHOLFHQoDpHVWDEHOHFLGRWHQGRVHHPYLVWDRGLUHLWRGRSURSULH
WiULRGRVRIWZDUHTXHFRQFHGHDOJXQVEHQHItFLRVDROLFHQFLDGRHPWURFDGHXPD
FRPSHQVDomR¿QDQFHLUD±HROLFHQFLDGRWDPEpPDGTXLUHDOJXPDVJDUDQWLDV1R
FDVRGD*3/QHVVHWUHFKRGHLQWURGXomRGDOLFHQoDRIRFRVmRRVGLUHLWRVGROL
FHQFLDGRHTXHFRPRMiGLWRYmRDOpPGRSURGXWRVRIWZDUHHPTXHVWmR

“3DUD SURWHJHU VHXV GLUHLWRV QHFHVVLWDPRV ID]HU UHVWULo}HV TXH SURt


EHP TXH DOJXpP QHJXH HVVHV GLUHLWRV D YRFr RX TXH VROLFLWH TXH
YRFrUHQXQFLHDHOHV(VVDVUHVWULo}HVVHWUDGX]HPHPGHWHUPLQDGDV
UHVSRQVDELOLGDGHVTXHYRFrGHYHUiDVVXPLUVHIRUGLVWULEXLUFySLDVGR
VRIWZDUHRXPRGL¿FiOR 
3URWHJHPRV VHXV GLUHLWRV DWUDYpV GH GRLV SDVVRV   HVWDEHOHFHQGR
GLUHLWRVDXWRUDLVVREUHRVRIWZDUHH  FRQFHGHQGRDYRFrHVWDOLFHQoD
TXHGiSHUPLVVmROHJDOSDUDFRSLDUGLVWULEXLUHRXPRGL¿FDURVRIWZDUH´
Software livre, cultura hacker e o ecossistema da colaboração • 99

$ OLFHQoD VH FRORFD PHGLDQGR QmR DSHQDV D UHODomR HQWUH OLFHQFLDGRU H


OLFHQFLDGRPDVDUHODomRGROLFHQFLDGRFRPRPXQGRH[WHUQR(ODHVWiLQWHUFHGHQGR
MXQWRDRGHVLJXDOGHPRGRDJDUDQWLUDHOHXPDLJXDOGDGHTXHSRGHVHUDPHDoDGD
$RID]HULVVRHODD¿UPDWDQWRDXQLmRHQWUHOLFHQFLDGRUHOLFHQFLDGRFRPRRGLUHLWRGH
DPERVGHUHDOL]DUHPRSHUDo}HVTXHVyRV³GRQRV´GRVSURJUDPDVVHULDPFDSD]HV
DOWHUDUPRGL¿FDUHGLVWULEXLU $XWRUHXVXiULRVHHTXLYDOHPWrPRVPHVPRVGLUHLWRV
VREUHRVRIWZDUHGHVGHTXHJDUDQWDPHVVHVGLUHLWRVWDPEpPDRXWURV$TXLQmRp
LPSRUWDQWHRTXHDOLFHQoDID]RXQmRID]UHDOPHQWHVHHODHIHWLYDPHQWHFRQVHJXH
JDUDQWLURVGLUHLWRVGROLFHQFLDGRIUHQWHDRH[WHULRUPDVRTXHHODGL]ID]HUDOJRTXH
SRGHVHUYHUL¿FDGRQDPDWHULDOLGDGHGRWH[WR
 (VVDFRQMXQomROLFHQFLDGRUOLFHQFLDGRHVWiPDUFDGDHPRXWURVWUHFKRVGR
WH[WR 2 SULPHLUR SDUiJUDIR GD VHJXQGD SDUWH ³7(5026 ( &21',d®(6 3$5$
&Ï3,$',675,%8,d­2(02',),&$d­2´VHUYHSDUDFRPRpXVXDOQRVFRQWUDWRV
HQXQFLDUDVSDUWHVFRQWUDWDQWHV

³ (VWD /LFHQoD VH DSOLFD D TXDOTXHU SURJUDPD RX RXWUD REUD TXH
FRQWHQKDXPDYLVRLQVHULGRSHORUHVSHFWLYRWLWXODUGRVGLUHLWRVDXWRUDLV
LQIRUPDQGRTXHDUHIHULGDREUDSRGHVHUGLVWULEXtGDHPFRQIRUPLGDGH
FRP RV WHUPRV GHVWD /LFHQoD 3~EOLFD *HUDO 2 WHUPR ³3URJUDPD´
XWLOL]DGRDEDL[RUHIHUHVHDTXDOTXHUSURJUDPDRXREUDHRWHUPR³REUDV
EDVHDGDVQR3URJUDPD´VLJQL¿FDWDQWRR3URJUDPDFRPRTXDOTXHUREUD
GHULYDGDQRVWHUPRVGDOHJLVODomRGHGLUHLWRVDXWRUDLVLVWRpXPDREUD
FRQWHQGRR3URJUDPDRXXPDSDUWHGHOHWDQWRGHIRUPDLGrQWLFDFRPR
FRPPRGL¿FDo}HVHRXWUDGX]LGDSDUDRXWUDOLQJXDJHP 'RUDYDQWHR
WHUPR ³PRGL¿FDomR´ LQFOXL WDPEpP VHP UHVHUYDV D WUDGXomR  &DGD
OLFHQFLDGRGRUDYDQWHVHUiGHQRPLQDGR³YRFr´´

(PERUDH[LVWDD¿JXUDGR³WLWXODUGRVGLUHLWRVDXWRUDLV´HVWHQmRpPDUFDGR
FRPXPWHUPRHVSHFt¿FRDVHUHVWDEHOHFLGRFRPRXPDGDVSDUWHV6yKiGRLVHQWHV
VXEOLQKDGRV³YRFr´ROLFHQFLDGR JUDIDGRVHPOHWUDPDL~VFXOD HRVRIWZDUHREMHWR
GHOLFHQFLDPHQWRGHQRPLQDGR³3URJUDPD´ LQLFLDGRSRUOHWUDPDL~VFXOD 

Mais restrições

&RQVLGHURLQWHUHVVDQWHWDPEpPUHVVDOWDUFHUWDVGLIHUHQoDVHQWUHDVOLFHQ
oDV TXH PDUFDP HVVD VLWXDomR GH GHVLJXDOGDGH HQWUH SURSULHWiULR H OLFHQFLDGR
$ OLFHQoD SURSULHWiULD FRORFD FRQGLo}HV TXH YmR DOpP GR PHUR XVR GR VRIWZDUH
$VUHVWULo}HVFRORFDGDVSHOD(8/$VmRWDQWDVHPHVSHFLDOHPVXDUHGDomRSDUD
R VLVWHPD RSHUDFLRQDO PDLV UHFHQWH R :LQGRZV ;3 TXH p SURYiYHO TXH PXLWRV
100 • Software livre, cultura hacker e o ecossistema da colaboração

XVXiULRVYLROHPVHXVWHUPRVVHPVDEHURTXHFRORFDPHVPRDTXHOHVTXHDGTXLUHP
DOLFHQoD±HQmRXVDPVRIWZDUHSLUDWD±QDLOHJDOLGDGH4XHPFRPSUDXPDFDL[LQKD
FRP :LQGRZV RX DGTXLUH XP FRPSXWDGRU FRP R VLVWHPD SUpLQVWDODGR WHP DWp
WULQWDGLDVSDUD³DWLYDU´RSURGXWR,VVRVLJQL¿FDHQYLDUj0LFURVRIWSRUWHOHIRQHRX
SHODLQWHUQHWDOJXPDVLQIRUPDo}HVVREUHRXVXiULR
 /RJRTXDQGRRVRIWZDUHpLQVWDODGRpSHGLGRTXHRXVXiULRDFHLWHDVFRQ
GLo}HVGD(8/$GR:LQGRZV;3,QVWDODURVLVWHPDRSHUDFLRQDORXDWLYiORVLJQL¿FD
FRQFRUGDUFRPVHXVWHUPRVHXPGHOHVGL]³9RFrFRQFRUGDTXHD06D0LFURVRIW
&RUSRUDWLRQHVXDVD¿OLDGDVSRGHPFROHWDUHXVDULQIRUPDo}HVWpFQLFDVUHFROKLGDV
GH TXDOTXHU IRUPD FRPR SDUWH GR VXSRUWH RIHUHFLGR D YRFr VH KRXYHU DOJXP
UHODFLRQDGRDRVRIWZDUH´1mRpGLWRRTXHSRGHHRTXHQmRSRGHVHUFRQVLGHUDGR
LQIRUPDomRWpFQLFD
 $PHVPDFOiXVXODDLQGDHVWLSXODTXHHVVDLQIRUPDomRSRGHVHUXVDGDSHOD
0LFURVRIWRXVXDVD¿OLDGDV³VRPHQWHSDUDDPHOKRULDGRVSURGXWRVRXSDUDRIHUHFHU
VHUYLoRV H WHFQRORJLDV DGDSWDGRV SDUD YRFr´ 2X VHMD D HPSUHVD H[LJH UHFROKHU
GRVXVXiULRVLQIRUPDo}HVTXHVHUmR~WHLVSDUDDPHOKRULDGHVHXVSURGXWRV±H
SRUWDQWRSURSRUFLRQDUmRjHPSUHVDPHOKRUDUVXDSDUWLFLSDomRQRPHUFDGR0DVHOD
QmRRIHUHFHQDGDHPWURFDHREWpPLQIRUPDo}HVGROLFHQFLDGRTXHVHUmRXWLOL]DGDV
SDUDDFHQWXDUDGLVWkQFLDHQWUHDVGXDVSDUWHVDSURSULHWiULDHDQmRSURSULHWiULD
 +iDLQGDDVOLPLWDo}HVSDUDDLQVWDODomR(QTXDQWRRVVRIWZDUHOLYUHVSRGHP
VHULQVWDODGRVHPTXDQWRVFRPSXWDGRUHVHHPTXDQWDVPiTXLQDVRXVXiULRTXLVHU
D(8/$QDVXDYHUVmRWtSLFDSDUDRXVXiULRGRPpVWLFROLPLWDDLQVWDODomRDDSHQDV
XPDPiTXLQD&DGDSDFRWHGHVRIWZDUHGHYHVHOLJDUDXP~QLFRFRPSXWDGRU6H
RFRPSXWDGRUIRUFRPSUDGRFRPRVLVWHPDRSHUDFLRQDOMiLQVWDODGRHVWHVySRGHUi
VHUYHQGLGRDFRPSDQKDGRHPFRQMXQWRFRPDPiTXLQD
 $VOLPLWDo}HVDWLQJHPWDPEpPRVSHULIpULFRVTXHSRGHUmRVHULQVWDODGRVHRV
FRPSXWDGRUHVHPUHGHTXHSRGHUmRID]HUXVRGHVHUYLoRVGRVLVWHPDRSHUDFLRQDO
$OJXPDVYHUV}HVGD(8/$GR:LQGRZVOLPLWDPRQ~PHURGHSURFHVVDGRUHV FKLSV
FHQWUDLV DVHUHPXVDGRVQRFRPSXWDGRUHPTXHRVRIWZDUHHVWiLQVWDODGR$(8/$
GR :LQGRZV ;3 +RPH (GLWLRQ OLPLWD D FLQFR R Q~PHUR GH DSDUHOKRV TXH SRGHP
HVWDUOLJDGRVDRFRPSXWDGRU
 $VOLPLWDo}HVLPSRVWDVSHODVOLFHQoDVSURSULHWiULDVQmRH[LVWHPSRUDFDVR
DVVLPFRPRDVOLEHUGDGHVGRVRIWZDUHOLYUH(ODVUHVXPHPGLIHUHQWHVPRGHORVGH
QHJyFLR 1R PRGHOR SURSULHWiULR XPD HPSUHVD GHVHQYROYH XP SURGXWR FRP XP
FHUWR JDVWR H FRQVHJXH PXOWLSOLFDU DR LQ¿QLWR VHXV OXFURV SRLV YHQGH FySLDV GH
DOJRTXHSRGHVHUUHSURGX]LGRRFyGLJR2PRGHORGHQHJyFLROLYUHpRXWUR$¿QDOR
SURJUDPDIRLSURGX]LGRFRRSHUDWLYDPHQWHSRUXPDFRPXQLGDGHHGHYHSHUPDQHFHU
OLYUHSDUDWRGRVSRGHQGRVHUFRSLDGRVHPUHVWULo}HV
Software livre, cultura hacker e o ecossistema da colaboração • 101

Conclusão

/DQoDUXPROKDUDWHQWRSDUDDVFDUDFWHUtVWLFDVGLVFXUVLYDVGDVOLFHQoDVGH
VRIWZDUH QRV DMXGD D HQWHQGHU FRPR QD UHJXODomR H QD GHIHVD RX DWDTXH  GH
XPVLVWHPDGHIXQFLRQDPHQWRGHXPREMHWRWpFQLFRRVRIWZDUHSRGHPVHHQWUH
YHUFRQFHSo}HVLGHROyJLFDVVREUHFRPRGHYHPVHHVWDEHOHFHUFHUWDVUHODo}HVKX
PDQDV(LYDGRGHSROtWLFDHVVHHPEDWHGLVFXUVLYRRS}HPSURSULHWiULRVGRQRVGH
GLUHLWRVH[FOXVLYRVH³FROHWLYLVWDV´DXWRUHVTXHDEGLFDPGHVHXVGLUHLWRVH[FOXVLYRV
GHPRGL¿FDomRYHQGDHGLVWULEXLomRSDUDWRUQiORVGLUHLWRVGHWRGRVDTXHOHVTXH
WDPEpPDFHLWDPFRQWULEXLUFRPVHXWUDEDOKR
 $OJXPDV PDUFDV HQFRQWUDGDV QR GLVFXUVR GHYHU VHU UHWRPDGDV DTXL $
PDLVLPSRUWDQWHGHODVSDUHFHVHUDWHQWDWLYDGHQLYHODPHQWRGHHVWDEHOHFLPHQWR
GH LJXDOGDGH FRORFDGD SHOD *3/$R SHUPLWLU R XVR LUUHVWULWR HVWDEHOHFHQGR XPD
DXWRUL]DomR SUpYLD H H[WHQVLYD D TXDOTXHU XVXiULR HOD FRORFD R SURGXWR VRIWZDUH
FRPRXPEHPFRPXP
 -iDRSHUPLWLUDOWHUDo}HVPRGL¿FDo}HVHDOLYUHUHGLVWULEXLomRHVVDOLFHQoD
GHQXQFLDDH[LVWrQFLDGHXPDGHVLJXDOGDGHIXQGDQWHHQWUHRVTXHWrPHRVTXH
QmR WrP &RP D FRQGLomR GH TXH QmR KDMD WHQWDWLYDV GH UHVWDEHOHFLPHQWR GHVVD
GHVLJXDOGDGHGHDSURSULDomRGDTXLORTXHHODSURS}HTXHVHMDGHWRGRVSRVWXODR
GLUHLWRjPRGL¿FDomRGRFyGLJRHP~OWLPDLQVWkQFLDDRWUDEDOKRTXHVHMDSHUPLWLGR
DWRGRV
 3HQVR TXH p SULQFLSDOPHQWH DR RIHUHFHU D OLEHUGDGH SDUD D DOWHUDomR H
GLVWULEXLomRGRFyGLJRDTXDOTXHUXPTXHDOLFHQoDOLYUHD¿UPDTXHDGHVLJXDOGDGH
QmRpFRQGLomRQHFHVViULDjYLGDVRFLDO$RID]HULVVRDOLFHQoDHVWDEHOHFHTXHQmR
pQHFHVViULRTXHXVXiULRVGLVWLQJDPVHGRVSURGXWRUHVTXHKDMDVXMHLWRVHPFRQ
GLo}HVGHVLJXDLVFRPUHODomRjSRVVHGRPHLRGHSURGX]LUPHUFDGRULDV
 1mR p j WRD TXH D OLFHQoD OLYUH RX R PRYLPHQWR VRFLDO TXH D XWLOL]D p
FODVVL¿FDGDFRPRSUHMXGLFLDOSRUDTXHOHVTXHSHUWHQFHPjHVIHUDGDQRUPDHVWD
EHOHFLGD GD GHVLJXDOGDGH TXH QmR GHYH VH WRUQDU DSDUHQWH 1mR Vy D GHQ~QFLD
GDGHVLJXDOGDGHFRPRDWHQWDWLYDGHVHFRQVWUXLUXPDRXWUDRUGHPVmROLJDGDVj
DQRUPDOLGDGHjVSDWRORJLDVFODVVL¿FDGRVFRPR³YtUXV´RX³FkQFHU´7DPEpPQmR
p JUDWXLWR TXH DV UHDo}HV D HVVDV D¿UPDo}HV WHQKDP VLGR LQÀDPDGDV H SDUWLGR
GHGLYHUVRVOXJDUHV8PSRQWRFHQWUDOIRLWRFDGRDH[LVWrQFLDGDGHVLJXDOGDGHIRL
QHJDGDHRVGHVLJXDLVIRUDPWUDWDGRVFRPRQmRSHUWHQFHQWHVDHVVHPXQGR
$OJXQVDXWRUHVMiEXVFDPFODVVL¿FDURVRIWZDUHOLYUHQmRFRPRXPEHPFRPXPPDVFRPR³FRQKHFLPHQWROLYUH´
6DUDLYD SRU H[HPSOR D¿UPD TXH RV EHQV FRPXQV VmR FRPSDUWLOKDGRV SRU WRGRV FRPR DV SUDoDV RX D iJXD 2
FRQKHFLPHQWRSRUVHULQWDQJtYHOHPXOWLSOLFiYHOLQ¿QLWDPHQWH VHWHQKRXPDLGHLDHSDVVRDDDOJXpPQmRGHL[RGHWrOD
HRXWURWDPEpPDWHUiDVVLPFRPRXPVRIWZDUHSRGHVHUFRSLDGRLQ¿QLWDPHQWH 3RULVVRSHGHSRUXPDGLVWLQomRHQWUH
EHQVFRPXQVHFRQKHFLPHQWROLYUH6DUDLYD'LHJRHRXWURV
³(O FRQRFLPLHQWR ¢OLEUH FRP~Q SULYDGR R GLVSHUVR"´   KWWSERXQVDHGXDUGRFDFDGVRIWZDUHOLEUH
DUWLFXORVOLEUHRFRPXQ
102 • Software livre, cultura hacker e o ecossistema da colaboração

 'DPHVPDIRUPDRDGMHWLYR³unamerican´IRLDPSODPHQWHUHSOLFDGRFRPR
WHQGRVLGRXWLOL]DGRSHOD0LFURVRIWSDUDFODVVL¿FDURPRYLPHQWRVRIWZDUHOLYUH8PD
GHFODUDomR FRPRHVVDIXQFLRQRXFRPRXPDD¿UPDomRGHQmRSHUWHQFLPHQWRGH
H[FOXVmRGRTXHVHULDPRVYDORUHVHVVHQFLDLVGHXPDQDomR2SUySULRSUHVLGHQWHGD
)UHH6RIWZDUH)RXQGDWLRQ5LFKDUG6WDOOPDQWUDWRXGHUHVSRQGHUDHVVDD¿UPDomR
HRIH]SURFXUDQGRHVWDEHOHFHUXPFHUWRVHQWLGRGRTXHpVHUDPHULFDQR3DUDID]HU
LVVREXVFRXDPHPyULDGDWUDMHWyULDSROtWLFDGHVHXSDtVD¿UPRXFHUWRVYDORUHVTXH
FRQVLVWLULDPQDHVVrQFLDKLVWyULFDIXQGDGRUDGDQDomR
 1R%UDVLORWHUPRunamerican UHFHEHXGXDVWUDGXo}HV³QmRDPHULFDQR´ e
³DQWLDPHULFDQR´([LVWHXPDGLYHUJrQFLDGHVHQWLGRHQWUHRVGRLVWHUPRV(QTXDQWR
R SULPHLUR RSHUD VLJQL¿FDQGR QmR LQWHJUDU DTXHOD QDomR VHMD FXOWXUDOPHQWH
VHMD VRFLDOPHQWH R WHUPR ³DQWLDPHULFDQR´ OHPEUD RSRVLomR FRQWUDULHGDGH QmR
HVWDEHOHFHDSHQDVXPDGLIHUHQoDPDVXPDDQWtWHVH
 0DLVGHXPDYH]6WDOOPDQMiIRLWDFKDGRGHFRPXQLVWDHHOHpFRQKHFLGR
SHODVXDPLOLWkQFLDSROtWLFDHPGHIHVDGRVGLUHLWRVFLYLVHGHRXWUDVFDXVDVVRFLDLV
3RULVVRUHVSRQGHXHQIDWLFDPHQWHDHVVDVHJXQGDFRQFHSomRGRWHUPR$RUHV
VLJQL¿FDUR³american way´FRPRRVYDORUHVTXHOHYDUDPjLQGHSHQGrQFLDGRV(8$
IUHQWHDRGRPtQLREULWkQLFR6WDOOPDQDJLXVREUHDPHPyULDGRVHQWLGRGHVHUDPH
ULFDQR UHIRUoDQGR XPD FHUWD SDVVDJHP GD KLVWyULD HP OXJDU GDTXHOD TXH RS{V
GXUDQWHD*XHUUD)ULDRVLVWHPDFRPXQLVWDHRVLVWHPDFDSLWDOLVWDHTXHWDPEpPp
OHPEUDGDSHORWHUPR³unamerican´
 &DEHDTXLWDPEpPGLVFXWLUXPSRXFRVREUHRFDUiWHUSHUIRUPDWLYRGHVVDV
OLFHQoDV(PERUDD*3/GLJDH[LVWLUSDUDJDUDQWLUOLEHUGDGHVHVWDVQmRVHUHIHUHP
DROLFHQFLDGRTXHQDTXHOHPRPHQWRWHPDOLFHQoDHPVXDVPmRV RXHVWiXVDQGR
XPVRIWZDUHOLFHQFLDGRSHOD*3/ (VVHOLFHQFLDGRVHDOLFHQoDVLPSOHVPHQWHQmR
H[LVWLVVHMiWHULDJDUDQWLGDDOLEHUGDGHGHDOWHUDomRHGLVWULEXLomRSRLVXPVRIWZDUH
QmRUHJLVWUDGRQmRWHPGRQRSRGHVHUDSURSULDGRSRUTXDOTXHUXP$*3/H[LVWH
SDUDJDUDQWLUTXHDTXHOHVRIWZDUHpXPEHPFROHWLYRHTXHQXQFDSRGHWRUQDUVHGH
SURSULHGDGHH[FOXVLYD
 (QTXDQWRD(8/$HVWiOiSDUDPDUFDURXVXiULRFRPRSRVVtYHOLQIUDWRUGHOHLV
VHQmRWLYHUDGTXLULGRDFySLDGRVRIWZDUHOHJDOPHQWH D*3/H[LVWHSDUDLPSHGLOR
GHVHDOoDUjFRQGLomRGH³VHQKRU´SDUDHYLWDUTXHVHMDUHVWDEHOHFLGDDGLVWLQomR
HQWUHXVXiULRVHGRQRVH[FOXVLYRVGRVGLUHLWRVDXWRUDLV(ODVHFRORFDFRPRXPD
QHJDomRGDVOLFHQoDVSURSULHWiULDVUHVSRQGHQGRjH[LVWrQFLDGDGHVLJXDOGDGH

 2
 5HLOO\ 7LP ³,V 2SHQ 6RXUFH 8Q$PHULFDQ"´ HP 21/DPSFRP 3XEOLFDGR HP   H YLVXDOL]DGR HP
KWWSZZZRQODPSFRPSXEDRQODPSXQDPHULFDQKWPO
 ³$ YH] GR GHVNWRS´ HP Revista do Linux  9LVXDOL]DGR HP  KWWSZZZUHYLVWDGROLQX[FRPEUHG
DVVLQDQWHVFDSDSKS
 ³,QWHUYLHZ 5LFKDUG 0 6WDOOPDQ³ 9LVXDOL]DGR HP  KWWSJQXRSHQPLUURUFRPSKLORVRSK\OXLVSRUPV
LQWHUYLHZKWPO
Software livre, cultura hacker e o ecossistema da colaboração • 103

 &RQFRUGDUFRPD*3/ DFHLWiOD VLJQL¿FDVHFRPSURPHWHUDQXQFDUHVWD


EHOHFHUHVVDGHVLJXDOGDGHHQWUHGHVHQYROYHGRUHVHXVXiULRVQXQFDLPSHGLUTXH
HVWHVDWLQMDPDFRQGLomRGDTXHOHV

Seção II
GNU/Linux ou Linux?
Software livre ou código aberto?

1DFRPXQLGDGHVRIWZDUHOLYUHH[LVWHXPDFRQVWDQWHGLVSXWDVREUHRVQRPHV
HDVSDODYUDVXWLOL]DGDV2SUySULRQRPHGDFRPXQLGDGHpFRQWURYHUVR(QTXDQWR
XQVSUHIHUHPVRIWZDUHOLYUHRXWURVIDODPHPFyGLJRDEHUWR$OJXQVQHVVHFDVRQmR
PXLWRVGL]HPTXHWDQWRID]HTXHpSRVVtYHODWpPHVPRVRPDURVQRPHV2QRPH
GRSULQFLSDOVLVWHPDRSHUDFLRQDOOLYUHWDPEpPpREMHWRGHFRQWURYpUVLDVHDTXLVLP
PXLWRVD¿UPDPTXHVmRVLQ{QLPRV(QTXDQWRDOJXQVVHUHIHUHPDHOHVLPSOHVPHQWH
FRPR/LQX[RXWURVID]HPTXHVWmRGHGL]HU*18/LQX[(VVDGLVFXVVmRjVYH]HV
WRUQDWXGRPXLWRPDLVFRQIXVRSDUDTXHPQmRSDUWLFLSDGRGHEDWH6HULDPXLWRPDLV
VLPSOHV VH KRXYHVVH DOJXP WLSR GH XQLIRUPL]DomR QHVVH YRFDEXOiULR VXJHUHP
DOJXQVHROHLJRSRGHULDWRPDUSDUWHGHOHPXLWRPDLVIDFLOPHQWH
 0DVRSWDUSRUXPQRPHRXSRURXWURQmRpDOJRWULYLDO'L]HUpVHFRORFDU
QR PXQGR p DVVXPLU SRVLomR $¿QDO Ki DOJXPD GLIHUHQoD HQWUH IDODU /LQX[ RX
*18/LQX["2XHQWUHVHGL]HUXPDGHSWRGRPRYLPHQWRSHORVRIWZDUHOLYUHRXGR
PRYLPHQWRGHFyGLJRDEHUWR"+iVLP$RSomRSRUXPQRPHRXSRURXWURPDUFD
SDUD DOpP GH SRVVtYHLV GLIHUHQoDV WpFQLFDV D SRVLomR GLVFXUVLYD RFXSDGD SHOR
3HUJXQWDGRVREUHRPRWLYRGRXVRGDVLJOD6/&$SDUDGHVLJQDUVRIWZDUHOLYUHGHFyGLJRDEHUWRRGLUHWRUGHXPD
21*EUDVLOHLUDUHVSRQViYHOSRUSURJUDPDVGHLQFOXVmRGLJLWDOUHVSRQGHXGDVHJXLQWHPDQHLUD³eLVVRPHVPR5DIDHO
1mRKiGHVOL]HLGHROyJLFRHPFKDPDUGHVRIWOLYUHHGHFyGLJRDEHUWRpDSHQDVSDUDDVVHJXUDUTXH¿TXHFODURTXHQmR
VyDGLVWULEXLomRGRFyGLJRREMHWRpOLYUHPDVHVWHWHPTXHVHUVHPSUHDFRPSDQKDGRGRFyGLJRIRQWH´
eIUHTXHQWHTXHHPOLVWDVGHGLVFXVVmRVREUHVRIWZDUHOLYUHDOJXQVPHPEURV±HPJHUDORVPDLVQRYRV±SXEOLTXHP
PHQVDJHQVFRPRDVHJXLU(PJHUDOHOHVMiFLHQWHVGDVGLIHUHQoDVWpFQLFDVFRQVLGHUDPTXHRWHUPR/LQX[GHYHULD
DEVRUYHUGH¿QLWLYDPHQWHRWHUPR*18$PHQVDJHPDEDL[RIRLFROHWDGDHPXPDOLVWDGHGLVFXVVmRYHQH]XHODQD SDtV
FXMRJRYHUQRIHGHUDOQRV~OWLPRVPHVHVWHPDSURIXQGDGRVXDVUHODo}HVFRPRVRIWZDUHOLYUH HFXMRWHPDGH¿QLGRUp
³RQGHRQRYDWRpUHVSHLWDGR´
 ³+RODDWRGRV
 ¢1ROHVSDUHFHTXHHVXQSRFRWRQWRLQVLVWLUHQGHFLU*18/LQX[HQOXJDUGHVRORGHFLU/LQX["
 (VFRPRVLGLMHUDPRV0LFURVKDIW:LQEORZVFXDQGRWRGRVGHFLPRVVROR:LQEORZVRFRPRVLGLMHUDPRV0
'26
FXDQGRHQUHDOLGDGVRORGHFLPRV'26RFRPRVLGLMHUDPRV0$SSOH0$&26FXDQGRVRORGHFLPRV0$&26
 <DVHTXHPHYDQDGHFLUTXHGHEHQDFODUDUTXH/LQX[QRVRORORKL]R/LQXV7RUYDOVHWFHWF\WRGRORGHPDV
WDPELHQSHUR¢QROHVSDUHFHTXHHVUHGXQGDQWHFRPRVLGLMHUDQHVWDFD\HQGROOXYLDPRMDGDGHOFLHOR"
 1RORGLJRFRQODLQWHQFLRQGHRIHQGHUVRORORFRPHQWDED
 0DWDQH
 127$7RGDVODVPDUFDVDTXLPHQFLRQDGDVVRQSURSLHGDGGHORVFKLYRVTXHFREUDQSRUHOODV ´
104 • Software livre, cultura hacker e o ecossistema da colaboração

VXMHLWRHPUHODomRjKLVWyULDGRPRYLPHQWR
 'HDFRUGRFRP2UODQGL

³DR IDODUPRV QRV ¿OLDPRV D UHGHV GH VHQWLGRV PDV QmR DSUHQGHPRV
FRPRID]rOR¿FDQGRDRVDERUGDLGHRORJLDHGRLQFRQVFLHQWH3RUTXH
VRPRV DIHWDGRV SRU FHUWRV VHQWLGRV H QmR RXWURV" )LFD SRU FRQWD GD
KLVWyULDHGRDFDVRGRMRJRGDOtQJXDHGRHTXtYRFRTXHFRQVWLWXLQRVVD
UHODomRFRPHOHV0DVFHUWDPHQWHRID]HPRVGHWHUPLQDGRVSRUQRVVD
UHODomRFRPDOtQJXDHFRPDKLVWyULDSRUQRVVDH[SHULrQFLDVLPEyOLFD
HGHPXQGRDWUDYpVGDLGHRORJLD´

3DUD RV ¿QV GHVWH WUDEDOKR HVWi VHQGR FRQVLGHUDGD FRPR R ³PRYLPHQWR
VRIWZDUHOLYUH´XPDJDPDDPSODGHJUXSRVVRFLDLVTXHDGYRJDPDVTXDWUROLEHUGDGHV
HVVHQFLDLVSDUDRVXVXiULRVGRVVRIWZDUHVTXHSURGX]HPLQFUHPHQWDPGLVWULEXHP
H[HFXomRDOWHUDomRGLVWULEXLomRHFySLD1HVVHVHQWLGRRPRYLPHQWRFyGLJRDEHUWR
pXPGHVVHVJUXSRV$OJXQVSHVTXLVDGRUHVSDUDGHVLJQDURPRYLPHQWRGHIRUPD
PDLV DPSOD WrP XVDGR R WHUPR ³)UHH/LEUH2SHQ 6RXUFH 6RIWZDUH )/266 ´
&RPRQR%UDVLORWHUPR³FyGLJRDEHUWR´pSRXFRXWLOL]DGR±FRPRYHUHPRVPDLV
WDUGH±DRSomRDTXLpSHORWHUPR³VRIWZDUHOLYUH´

Duas correntes. A mesma luta?

+iDOJXQVPRPHQWRVTXHVmRIXQGDQWHVQDKLVWyULDGRPRYLPHQWRVRIWZDUH
OLYUHeSRVVtYHOGL]HUTXHRPDUFRLQLFLDOVHGiHPPDUoRGHTXDQGR5LFKDUG
6WDOOPDQ HVFUHYH R 0DQLIHVWR *18 GRFXPHQWR TXH GHVHQKD RV SULQFtSLRV GR
FRS\OHIWTXHGDUiEDVHSDUDDVUHJUDVGHVFULWDVQD*3/HTXHpXPFRQYLWHSDUD
TXH RXWURV SURJUDPDGRUHV VH XQDP DR HVIRUoR GD )UHH 6RIWZDUH )RXQGDWLRQ GH
SURGX]LU XP VLVWHPD RSHUDFLRQDO OLYUH 2XWUR DQR LPSRUWDQWH p  TXDQGR HP
VHWHPEUR/LQXV7RUYDOGVODQoDDSULPHLUDYHUVmRGRNHUQHO/LQX[TXHFRPSOHWRXR
VLVWHPDSURMHWDGRSHOD)6)DQWHVGHHODPHVPDRID]HU(PERUDVLJDRVSULQFtSLRV
GD*3/R/LQX[VLJQL¿FRXQDSUiWLFDRVXUJLPHQWRGHXPDQRYDFRUUHQWHGHIRUoD
GHQWURGRPRYLPHQWRTXHFXOPLQDUiFRPRVXUJLPHQWRGRPRYLPHQWRFyGLJRDEHUWR
open source  HP  1HVVH DQR (ULF 5D\PRQG SXEOLFRX R DUWLJR ³*RRGE\H
³IUHHVRIWZDUH´KHOOR³RSHQVRXUFH´´HIXQGRXFRP%UXFH3HUHQVD2SHQ6RXUFH
,QLWLDWLYH
2UODQGLS
8PGHVVHVJUXSRVLQWHJUDR6WDQIRUG,QVWLWXWHIRU(FRQRPLF3ROLF\5HVHDUFK 6,(35
&RS\OHIWpXPWHUPRFULDGRSDUDVHRSRUDRFRS\ULJKWHIRLFULDGRSRU5LFKDUG6WDOOPDQ6HJXQGRHOHDLGHLDYHLR
GHXPFROHJDTXHJUDIRX³&RS\OHIWDOOULJKWVUHYHUVHG´ID]HQGRXPWURFDGLOKRFRPRWHUPRHFRPDIUDVH³DOOULJKWV
UHVHUYHG´TXHDFRPSDQKDRFRS\ULJKW2WHUPRWDPEpPpLQWHUSUHWDGRFRPRXPDDOXVmRDRHVSHFWURGDHVTXHUGDQD
SROtWLFD
 5D\PRQG (ULF ³*RRGE\H IUHH VRIWZDUH KHOOR RSHQ VRXUFH´ 9LVXDOL]DGR HP  HP KWWSZZZFDWE
Software livre, cultura hacker e o ecossistema da colaboração • 105

 e LQWHUHVVDQWH DFRPSDQKDU D KLVWyULD SDUD HQWHQGHU DOJXPDV TXHVW}HV


1LQJXpP QHJD TXH WXGR VDLX GDV PmRV H GD FDEHoD GR JXUX 5LFKDUG 6WDOOPDQ
TXH DLQGD QD GpFDGD GH  GHOLQHRX RV SULQFtSLRV pWLFRV GHVVH PRYLPHQWR
1D pSRFD 6WDOOPDQ IXQGDGRU GD )UHH 6RIWZDUH )RXQGDWLRQ )6) )XQGDomR GR
6RIWZDUH/LYUHHPLQJOrV HVWDEHOHFHXDVTXDWUROLEHUGDGHVTXHIXQGDPHQWDPR
PRYLPHQWR R VRIWZDUH GHYH VHU OLYUH SDUD VHU PRGL¿FDGR H[HFXWDGR FRSLDGR H
GLVWULEXtGR2GRFXPHQWRSRUH[FHOrQFLDTXHPDUFDDOXWDSRUHVVDVOLEHUGDGHVpD
*3/
 6HPG~YLGD6WDOOPDQFRQWLQXDVHQGRRJUDQGH¿OyVRIRGRPRYLPHQWR1R
HQWDQWRDSDUWLUGHHOHVHYrREULJDGRDGLYLGLURSDOFRFRPXPDMRYHPHVWUHOD
GD)LQOkQGLD/LQXV7RUYDOGV&DULVPiWLFRHPSUHHQGHGRUHVDEHQGRXVDUPHOKRUD
LQWHUQHWHOHFRQVHJXLXGDUVROXomRDXPSUREOHPDDTXHD)6)VHGHGLFDYDKiDQRV
FRQVWUXLUXPNHPHOTXHVXSRUWDVVHXPVLVWHPDRSHUDFLRQDODOWHUQDWLYR2NHUQHOp
XPDSDUWHFHQWUDOGRVLVWHPDUHVSRQViYHOSHODFRQ¿JXUDomRHJHUHQFLDPHQWRGRV
GLVSRVLWtYRV WHFODGRPRXVHPRQLWRUHWF $)6)MiWLQKDWRGRRUHVWRGDHVWUXWXUD
GRVLVWHPDSURQWDHWUDEDOKDYDQRGHVHQYROYLPHQWRGHVHXNHUQHO/LQXVIRLPDLV
UiSLGRHPDQWHQGRD¿ORVR¿DOLYUHDGRWRXVROXo}HVWHFQLFDPHQWHPDLVH¿FLHQWHV
FULDQGRR/LQX[HVVDSDUWHHVVHQFLDOGRVLVWHPD
 2PpWRGRGHGHVHQYROYLPHQWRDGRWDGRSRU/LQXVHVWiHPA Catedral e o
BazarOLYURHVFULWRSRU(ULF5D\PRQGHP$REUDpWDPEpPXPDDO¿QHWDGD
HP6WDOOPDQDFXVDGRGHDGRWDUXPDSRVWXUDFHQWUDOL]DGRUDGHGHVHQYROYLPHQWR
$ FUtWLFD GH 5D\PRQG DSDUHQWHPHQWH p YROWDGD DR PRGHOR GH GHVHQYROYLPHQWR
SURSULHWiULRPDVWDPEpPVHUHIHUHDRGHVHQYROYLPHQWR*18GL]HQGRTXHHVVHV
FyGLJRVVmRFRPRVHIRVVHPFDWHGUDLVPRQXPHQWRVVyOLGRVFRQVWUXtGRVDSDUWLU
GHXPJUDQGHSODQHMDPHQWRFHQWUDO-iRGHVHQYROYLPHQWRDGRWDGRSRU/LQXVVHULD
FRPRXPED]DUFRPXPDGLQkPLFDDOWDPHQWHGHVFHQWUDOL]DGD'L]5D\PRQG

³'H IDWR HX SHQVR TXH D HQJHQKRVLGDGH GR /LQXV H D PDLRU SDUWH
GR TXH GHVHQYROYHX QmR IRUDP D FRQVWUXomR GR NHUQHO GR /LQX[ HP
VLPDVVLPDVXDLQYHQomRGRPRGHORGHGHVHQYROYLPHQWRGR/LQX[
4XDQGRHXH[SUHVVHLHVWDRSLQLmRQDVXDSUHVHQoDXPDYH]HOHVRUULX
HFDOPDPHQWHUHSHWLXDOJRTXHIUHTXHQWHPHQWHGL]CC6RXEDVLFDPHQWH
XPDSHVVRDPXLWRSUHJXLoRVDTXHJRVWDGHJDQKDUFUpGLWRSRUFRLVDV
TXHRXWUDVSHVVRDVUHDOPHQWHID]HP¶¶3UHJXLoRVRFRPRXPDUDSRVD
2XFRPR5REHUW+HLQOHLQWHULDGLWRPXLWRSUHJXLoRVRSDUDIDOKDU´

0DV Ki PDLV QD IDOD GH 5D\PRQG FRP UHODomR DR PRGHOR /LQX[ GR TXH
RUJaHVURSHQVRXUFHKWPO
5D\PRQG(ULF$&DWHGUDOHR%D]DU9HUVmRWUDGX]LGDSDURSRUWXJXrVSRU(ULN.RKOHUKWWSZZZJHRFLWLHVFRP
&ROOHJH3DUN8QLRQSWFDWKHGUDOED]DDUKWPO
106 • Software livre, cultura hacker e o ecossistema da colaboração

RHORJLRGDWpFQLFD±HPERUDRVXFHVVRGHVWDVHMDLQHJiYHO6WDOOPDQVHPSUHIRL
XPD¿JXUDSROLWLFDPHQWHPXLWRDWXDQWHQmRDSHQDVQRFDPSRGDLQIRUPiWLFD0DLV
YHOKRWHQGRYLYLGRWRGDDH[SHULrQFLDGDOXWDSHORVGLUHLWRVFLYLVQRV(8$FDUUHJD
HPVXDIDODFUtWLFDVQmRPXLWRDRJRVWRGDVHPSUHVDV(PVHXVLWHSHVVRDOSRU
H[HPSORDRODGRGHDUWLJRVHPIDYRUGRVRIWZDUHOLYUHHQFRQWUDPVHWDPEpPHQ
VDLRVSROtWLFRVVREUHWHPDVFRPRDLQYDVmRHVWDGXQLGHQVHDR,UDTXHHRPXURGH
,VUDHOQD3DOHVWLQD5D\PRQGSRUVXDYH]pXPDUGRURVRGHIHQVRUGDOLEHUDOL]DomR
GRXVRGHDUPDVWHPDXVXDOPHQWHPDLVOLJDGRjVEDQGHLUDVGDGLUHLWDOLEHUDO
/LQXVSRUVXDYH]DOpPGHVHUSROLWLFDPHQWHPDLVPRGHUDGRHSUDJPiWLFR
FRQVHJXLXFULDUXPDLGHQWLGDGHPDLRUFRPDQRYDJHUDomRGHSURJUDPDGRUHVDEDL[R
GRV  DQRV GD TXDO 5D\PRQG ID] SDUWH (VVD JHUDomR VHJXQGR 6DP :LOOLDQV
DXWRUGROLYURFree as in FreedompPDLVHQHUJpWLFDHDPELFLRVD'L]HOH

³:LWK 6WDOOPDQ UHSUHVHQWLQJ WKH ROGHU ZLVHU FRQWLQJHQW RI ,768QL[


KDFNHUV DQG 7RUYDOGV UHSUHVHQWLQJ WKH \RXQJHU PRUH HQHUJHWLF FURS
RI /LQX[ KDFNHUV WKH SDLULQJ LQGLFDWHG D V\PEROLF VKRZ RI XQLW\ WKDW
FRXOGRQO\EHEHQH¿FLDOHVSHFLDOO\WRDPELWLRXV\RXQJHU LHEHORZ 
KDFNHUVVXFKDV5D\PRQG´

'HVGHDDVFHQVmRGRWUDEDOKRGH/LQXVERDSDUWHGRWHPSRGH6WDOOPDQ
WHPVLGRJDVWDHPSHGLGRVSDUDTXHWRGRVVHUH¿UDPDRFRQMXQWRGRVRIWZDUHFRPR
*18/LQX[HQmRDSHQDV/LQX['L]DSHQDVTXHUHUTXHVHXWUDEDOKRHGHWRGD)6)
VHMDUHFRQKHFLGRMiTXHVHPHOHQmRWHULDVLGRSRVVtYHODH[LVWrQFLDGR/LQX[
 6H R GLVFXUVR SROLWL]DGR H D LQWHJULGDGH UDGLFDO GH 6WDOOPDQ QXQFD IRUDP
GHIiFLOGLJHVWmRSDUDRVSURJUDPDGRUHVGDQRYDJHUDomRDPERVVmRDLQGDPDLV
LQGLJHVWRV SDUD RV HPSUHViULRV 5D\PRQG WHYH XP SDSHO GHFLVLYR QD FULDomR
GD DOWHUQDWLYD PDLV DR JRVWR GR SDODGDU FRUSRUDWLYR (P A Catedral e o Bazar
HOH GHVFUHYHX XP SURFHVVR GH SURGXomR LQRYDGRU H GHVFHQWUDOL]DGR HP TXH DV
DOWHUDo}HVQRVRIWZDUHVmRUDSLGDPHQWHHQWUHJXHVjFRPXQLGDGH(VWDWHVWDQGR
H DYDOLDQGR R SURGXWR HVWDEHOHFHULD XPD HVSpFLH GH VHOHomR QDWXUDO HP TXH DV
PHOKRULDVVREUHYLYHPHDVVROXo}HVIDOKDVVmRORJRLGHQWL¿FDGDV$GHVFULomRHQ
FDQWRXRVH[HFXWLYRVGD1HWVFDSHGRQDGHQDYHJDGRUGHLQWHUQHWTXHKDYLDVLGR
GHVWUXtGR SHOD RIHQVLYD DJUHVVLYD ± H DQWLFRPSHWLWLYD VHJXQGR RV SUySULRV WULEX
QDLVGRV(8$GD0LFURVRIWHGHVHX,QWHUQHW([SORUHU(P5D\PRQGIRLD
SHoDFKDYHQRSURFHVVRGHFRQYHQFLPHQWRGRVH[HFXWLYRVGD1HWVFDSHSDUDTXH
:LOOLDPV6DP)UHHDVLQ)UHHGRP5LFKDUG6WDOOPDQ
V&UXVDGHIRU)UHH6RIWZDUH(8$PDUoR'LVSRQtYHO
HPKWWSZZZRUHLOO\FRPRSHQERRNIUHHGRP
 ,GHP ³$QDO\]LQJ WKH VXFFHVV RI WKH 7RUYDOGV DSSURDFK 5D\PRQG LVVXHG D TXLFN DQDO\VLV XVLQJ WKH ,QWHUQHW DV
KLVSHWULGLVKDQGWKHKDUVKVFUXWLQ\RIWKHKDFNHUFRPPXQLW\DVDIRUPRIQDWXUDOVHOHFWLRQ7RUYDOGVKDGFUHDWHGDQ
HYROXWLRQDU\PRGHOIUHHRIFHQWUDOSODQQLQJ´
Software livre, cultura hacker e o ecossistema da colaboração • 107

OLEHUDVVHPRFyGLJRVREXPDOLFHQoDOLYUHSDUDTXHDFRPXQLGDGHFRQWLQXDVVHVHX
GHVHQYROYLPHQWR
 2 SUHVWtJLR DGTXLULGR SRU 5D\PRQG VRPDGR DR GR FDULVPiWLFR /LQXV
IRUDPHVVHQFLDLVSDUDTXHRPRYLPHQWRGHFyGLJRDEHUWRSXGHVVHVHHVWDEHOHFHU
)UHTXHQWHPHQWH6WDOOPDQSURFXUDFKHJDQGRDVHULQVLVWHQWHGHL[DUFODURTXHR
free de free software GRWHUPRRULJLQDOHPLQJOrV QmRVLJQL¿FDJUiWLVPDVOLYUH
$FRQIXVmRHQWUHOLYUHHJUiWLVWRUQRXVHDMXVWL¿FDWLYDSHUIHLWDSDUDTXHVXUJLVVHR
WHUPRFyGLJRDEHUWR
 1mR Ki GLIHUHQoDV VXEVWDQFLDLV HQWUH R TXH RV WHUPRV ³VRIWZDUH OLYUH´ H
³FyGLJR DEHUWR´ SUHWHQGHP GH¿QLU$PERV HVWDEHOHFHP SUDWLFDPHQWH RV PHVPRV
SDUkPHWURV TXH XPD OLFHQoD GH VRIWZDUH GHYH FRQWHU SDUD VHU FRQVLGHUDGD OLYUH
RXDEHUWD$PEDVHVWDEHOHFHPQDSUiWLFDTXHRVRIWZDUHGHYHUHVSHLWDUDTXHODV
TXDWUR OLEHUGDGHV EiVLFDV TXH D )6) HVWDEHOHFHX 0DV RV GHIHQVRUHV GR WHUPR
FyGLJRDEHUWRD¿UPDPTXHRWHUPRIH]FRPTXHRVHPSUHViULRVSHUFHEHVVHPTXH
RVRIWZDUHOLYUHWDPEpPSRGHVHUFRPHUFLDOL]DGR7HULDPVLGRPXGDQoDV³SUDJPi
WLFDV´HQmR³LGHROyJLFDV´
 2 LU{QLFR p TXH R FRIXQGDGRU GD 2SHQ 6RXUFH ,QLWLDWLYH MXQWR FRP (ULF
5D\PRQGYHLRGHXPGRVVHWRUHVWLGRVFRPRGRVPDLVLGHROyJLFRVGRPRYLPHQWR
%UXFH 3HUHQV p XP GRV OtGHUHV GD GLVWULEXLomR 'HELDQ FODVVL¿FDGD SHOR SUySULR
6WDOOPDQ FRPR XPD GDV TXH PDLV VH DSUR[LPD GRV LGHDLV GD )UHH 6RIWZDUH
)RXQGDWLRQ
 &DEHDTXLXPDSHTXHQDH[SOLFDomRVREUHRTXHVLJQL¿FDXPDGLVWULEXLomR
&RPRRFyGLJRGR*18/LQX[pOLYUHRXVHMDSRGHVHUPRGL¿FDGRHDGDSWDGRSRU
TXDOTXHUXPRVSDFRWHVGHVRIWZDUHTXHREHGHFHPDFHUWRVSDGU}HVHWHPFHUWDV
OLQKDVGHGHVHQYROYLPHQWRVmRDJUXSDGRVQDVFKDPDGDVGLVWULEXLo}HV(PJHUDO
VmR DV HPSUHVDV TXH FRPHUFLDOL]DP HVVHV VRIWZDUHV TXH RV DJUXSDP ID]HQGR
FRPTXHIXQFLRQHPDSDUWLUGHFHUWDVUHJUDVWpFQLFDVHYHQGHQGRRVHPFDL[LQKDV
SDUD VHXV FOLHQWHV 1R HQWDQWR H[LVWHP WDPEpP DV FKDPDGDV GLVWULEXLo}HV GD
FRPXQLGDGH*UXSRVGHXVXiULRVHSURJUDPDGRUHVHPSDFRWDPYiULRVSURJUDPDV
GH PRGR D TXH IRUPHP XP VLVWHPD FRPSOHWR LQWHJUDQGR R VLVWHPD RSHUDFLRQDO
FRPGLYHUVDVIHUUDPHQWDVGHGHVHQYROYLPHQWRGHHVFULWyULRMRJRVHRXWURV$GLVWUL
EXLomR'HELDQFXMD'H¿QLomR'HELDQGH6RIWZDUH/LYUHWHYHVXDUHGDomR¿QDOIHLWD
SRU 3HUHQV p FRQVWUXtGD H[FOXVLYDPHQWH FRP VRIWZDUHV FRQVLGHUDGRV OLYUHV (OD
WHPLQFOXVLYHXPFRQWUDWRVRFLDO
 $ GH¿QLomR GH &yGLJR $EHUWR XVDGD SHOD 2SHQ 6RXUFH ,QLWLDWLYH p D
$V UHJUDV GR &RQWUDWR 6RFLDO 'HELDQ VmR ³ 'HELDQ VHUi  OLYUH  9DPRV UHWULEXLU j FRPXQLGDGH VRIWZDUH
OLYUH1mRHVFRQGHUHPRVSUREOHPDV1RVVDSULRULGDGHVmRRVXVXpULRVHRVRIWZDUHOLYUH3URJUDPDVTXHQmR
DWHQGHPQRVVRVSDGU}HVGHVRIWZDUHOLYUH>VHUmRGLVSRQLELOL]DGRVHPRXWUDViUHDVDVVLPLGHQWL¿FDGDV@´(PKWWSZZZ
EUGHELDQRUJVRFLDOBFRQWUDFW
$QH[RF5HWLUDGRGHKWWSZZZRSHQVRXUFHRUJGRFVGH¿QLWLRQSKSHP
108 • Software livre, cultura hacker e o ecossistema da colaboração

'H¿QLomR'HELDQGH6RIWZDUH/LYUHFRPDPHVPDIRUPXODomRDSHQDVFRPDRPLV
VmR GDV UHIHUrQFLDV DR 'HELDQ 1R HQWDQWR D GH¿QLomR GH FyGLJR DEHUWR FRQWD
WDPEpPHPFDGDLWHPFRPXPDH[SOLFDomRXPDMXVWL¿FDWLYDGHVXDH[LVWrQFLDR
TXHQmRH[LVWHQDGH¿QLomR'HELDQ
'L]RLWHPFRPVXDMXVWL¿FDWLYD

³7UDEDOKRV'HULYDGRV
$ OLFHQoD GHYH SHUPLWLU PRGL¿FDo}HV H WUDEDOKRV GHULYDGRV H GHYHP
SHUPLWLU TXH HVWHV VHMDP GLVWULEXtGRV VRE D PHVPD OLFHQoD TXH R
WUDEDOKRRULJLQDO
)XQGDPHQWDomR $ VLPSOHV KDELOLGDGH GH YHU R FyGLJR IRQWH QmR p
VX¿FLHQWH SDUD DSRLDU D UHYLVmR LQGHSHQGHQWH H D UiSLGD VHOHomR
HYROXWLYD3DUDTXHDUiSLGDHYROXomRVHFRQFUHWL]HDVSHVVRDVGHYHP
VHUFDSD]HVGHUHDOL]DUH[SHULPHQWRVHGLVWULEXLUPRGL¿FDo}HV´

$TXLKiDPHQomRFODUDDR³DFKDGR´GH5D\PRQGDVHOHomRHYROXWLYDGH
FRUUHQWHGRPRGRGHGHVHQYROYLPHQWRGH/LQXV7RUYDOGV2¿PGRLWHPH[SOLFLWDGR
SHODIXQGDPHQWDomRpSHUPLWLUDFRQWLQXLGDGHGRPpWRGRGHWUDEDOKREDVHDGDQD
UHYLVmRGRVSDUHVHQRHQFDPLQKDPHQWRGHVROXo}HVDXW{QRPDVVHPDQHFHVVLGDGH
GH DXWRUL]DomR GR DXWRU DQWHULRU $ SRVVLELOLGDGH GH DOWHUDomR H GLVWULEXLomR GD
YHUVmRPRGL¿FDGDMiHUDDOJRSHUPLWLGRHLQFHQWLYDGRSHOD*3/SRUpPFRPRXWURV
¿QVTXHQmRDPHOKRULDWpFQLFD1mRVHWUDWDGHDEGLFDUGRFRQWUROHGDDXWRULD
GDSURSULHGDGHHPQRPHGR³SURJUHVVR´HPQRPHGDPHOKRULDGRVRIWZDUHHGD
FRUUHomRGHHUURV2TXHH[LVWHpXPDQRomRGHDXWRULDFROHWLYDGLUHLWRVFROHWLYRV
HSRUWDQWREHPFROHWLYRFRPXQLWiULR9HMDPRVXPWUHFKRGRVXELWHPFGRLWHP
GD *3/ TXH IDOD VREUH D OLEHUGDGH SDUD D PRGL¿FDomR ³3RUWDQWR HVWD FOiXVXOD
QmRWHPDLQWHQomRGHD¿UPDUGLUHLWRVRXFRQWHVWDURVVHXVGLUHLWRVVREUHXPDREUD
HVFULWDLQWHLUDPHQWHSRUYRFrDLQWHQomRpDQWHVGHH[HUFHURGLUHLWRGHFRQWURODUD
GLVWULEXLomRGHREUDVGHULYDGDVRXREUDVFROHWLYDVEDVHDGDVQR3URJUDPD´
(PIHYHUHLURGH%UXFH3HUHQVDOHJDQGRGLYHUJrQFLDVpWLFDVHSHV
VRDLVFRP(ULF5D\PRQGDEDQGRQRXD2SHQ6RXUFH,QLWLDWLYHHUHWRUQRXjFRPX
QLGDGH'HELDQGHTXHPKDYLDVHGLVWDQFLDGRSRUPHLRGHXPHPDLOHQYLDGRjOLVWD
GHGLVFXVVmRGRVGHVHQYROYHGRUHV'HELDQLQWLWXODGR³,W¶V7LPHWR7DON$ERXW)UHH
6RIWZDUH$JDLQ´1RWUHFKRGDPHQVDJHPUHSURGX]LGRDEDL[RHOHD¿UPDTXH open
source e free softwareVLJQL¿FDPDPHVPDFRLVDPDVTXHD26,QmRWHPHQIDWL]DGR
DLPSRUWkQFLDGDOLEHUGDGHRTXHFRQVLGHUDXPHUUR1DPHVPDPHQVDJHPHOH
UHIHUHVH DR VLVWHPD RSHUDFLRQDO FRPR /LQX[ H QmR *18/LQX[ FRPR D SUySULD
FRPXQLGDGHUHIHUHVHHPVHXZHEVLWH±HFRPRFRQVWDQR&RQWUDWR6RFLDO'HELDQ
Software livre, cultura hacker e o ecossistema da colaboração • 109

³0RVWKDFNHUVNQRZWKDW)UHH6RIWZDUHDQG2SHQ6RXUFHDUHMXVWWZR
ZRUGVIRUWKHVDPHWKLQJ8QIRUWXQDWHO\WKRXJK2SHQ6RXUFHKDVGH
HPSKDVL]HGWKHLPSRUWDQFHRIWKHIUHHGRPVLQYROYHGLQ)UHH6RIWZDUH
,W¶VWLPHIRUXVWR¿[WKDW:HPXVWPDNHLWFOHDUWRWKHZRUOGWKDWWKRVH
IUHHGRPVDUHVWLOOLPSRUWDQWDQGWKDWVRIWZDUHVXFKDV/LQX[ZRXOGQRW
EHDURXQGZLWKRXWWKHP´

3HUHQV FHUWDPHQWH IRL XP GRV VXMHLWRV TXH PDLV WHQWRX FRQFLOLDU RV GLWRV
SURSyVLWRV SUDJPiWLFRV GD 26,FRP RGHEDWH VREUH DOLEHUGDGH SDWURFLQDGR SHOD
)6)(PORJRDSyVDVGHFODUDo}HVGRH[HFXWLYRGD0LFURVRIW&UDLJ0XQGLH
TXH FULWLFRX R FDUiWHU ³YLUDO´ GD *3/ 3HUHQV HVFUHYHX XPD FDUWD DVVLQDGD FRQ
MXQWDPHQWHSRUGH]PHPEURVGDFRPXQLGDGHVRIWZDUHOLYUHLQFOXLQGRHOHPHVPR
7RUYDOGV5D\PRQGH6WDOOPDQ
 2 GRFXPHQWR LQWLWXODGR ³)UHH 6RIWZDUH /HDGHUV 6WDQG7RJHWKHU´ XVD DR
PHVPR WHPSR H FRP PXLWD KDELOLGDGH R WHUPR free software e open software
7RGDV DV UHIHUrQFLDV DR VLVWHPD VmR IHLWDV FRPR *18/LQX[ H MXQWR GD PHQomR
j FUHVFHQWH DGRomR GR PRGHOR open source SHODV HPSUHVDV HVWi R DOHUWD TXH p
UHSHWLGR FRP IUHTXrQFLD SRU 6WDOOPDQ ³5HPHPEHU WKDW Free UHIHUV WR OLEHUW\ QRW
SULFH´
 1D FDUWD GH 3HUHQV Ki WUHFKRV FRP DUJXPHQWDomR PXLWR VHPHOKDQWH j
GHVHQYROYLGDSRU6WDOOPDQHP³7KH*18*3/DQGWKH$PHULFDQ:D\´6HJXHXP
WUHFKRGDFDUWD

³,W¶VWKHVKDUHDQGVKDUHDOLNHIHDWXUHRIWKH*3/WKDWLQWLPLGDWHV0LFURVRIW
EHFDXVHLWGHIHDWVWKHLU(PEUDFHDQG([WHQGVWUDWHJ\0LFURVRIWWULHVWR
UHWDLQ FRQWURO RI WKH PDUNHW E\ WDNLQJ WKH UHVXOW RI RSHQ SURMHFWV DQG
VWDQGDUGV DQG DGGLQJ LQFRPSDWLEOH 0LFURVRIWRQO\ IHDWXUHV LQ FORVHG
VRXUFH$GGLQJDQLQFRPSDWLEOHIHDWXUHWRDVHUYHUIRUH[DPSOHWKHQ
UHTXLUHVDVLPLODUO\LQFRPSDWLEOHFOLHQWZKLFKIRUFHVXVHUVWR³XSJUDGH´
0LFURVRIW XVHV WKLV GHOLEHUDWHLQFRPSDWLELOLW\ VWUDWHJ\ WR IRUFH LWV ZD\
KWWSOLVWVGHELDQRUJGHELDQGHYHOPVJKWPO
0LFURVRIWVXUHO\ZRXOGOLNHWRKDYHWKHEHQH¿WRIRXUFRGHZLWKRXWWKHUHVSRQVLELOLWLHV%XWLWKDVDQRWKHUPRUHVSHFL¿F
SXUSRVHLQDWWDFNLQJWKH*18*3/0LFURVRIWLVNQRZQJHQHUDOO\IRULPLWDWLRQUDWKHUWKDQLQQRYDWLRQ:KHQ0LFURVRIW
GRHVVRPHWKLQJQHZLWVSXUSRVHLVVWUDWHJLFQRWWRLPSURYHFRPSXWLQJIRULWVXVHUVEXWWRFORVHRIIDOWHUQDWLYHVIRUWKHP
0LFURVRIW XVHV DQ DQWLFRPSHWLWLYH VWUDWHJ\ FDOOHG HPEUDFH DQG H[WHQG 7KLV PHDQV WKH\ VWDUW ZLWK WKH WHFKQRORJ\
RWKHUVDUHXVLQJDGGDPLQRUZULQNOHZKLFKLVVHFUHWVRWKDWQRERG\HOVHFDQLPLWDWHLWWKHQXVHWKDWVHFUHWZULQNOHVR
WKDWRQO\0LFURVRIWVRIWZDUHFDQFRPPXQLFDWHZLWKRWKHU0LFURVRIWVRIWZDUH,QVRPHFDVHVWKLVPDNHVLWKDUGIRU\RXWR
XVHDQRQ0LFURVRIWSURJUDPZKHQRWKHUV\RXZRUNZLWKXVHD0LFURVRIWSURJUDP,QRWKHUFDVHVWKLVPDNHVLWKDUGIRU
\RXWRXVHDQRQ0LFURVRIWSURJUDPIRUMRE$LI\RXXVHD0LFURVRIWSURJUDPIRUMRE% (LWKHUZD\³HPEUDFHDQGH[WHQG´
PDJQL¿HVWKHHIIHFWRI0LFURVRIW¶VPDUNHWSRZHU
1ROLFHQVHFDQVWRS0LFURVRIWIURPSUDFWLFLQJ³HPEUDFHDQGH[WHQG´LIWKH\DUHGHWHUPLQHGWRGRVRDWDOOFRVWV,IWKH\
ZULWHWKHLURZQSURJUDPIURPVFUDWFKDQGXVHQRQHRIRXUFRGHWKHOLFHQVHRQRXUFRGHGRHVQRWDIIHFWWKHP%XWDWRWDO
UHZULWHLVFRVWO\DQGKDUGDQGHYHQ0LFURVRIWFDQ¶WGRLWDOOWKHWLPH+HQFHWKHLUFDPSDLJQWRSHUVXDGHXVWRDEDQGRQ
WKHOLFHQVHWKDWSURWHFWVRXUFRPPXQLW\WKHOLFHQVHWKDWZRQ¶WOHWWKHPVD\³:KDW¶V\RXUVLVPLQHDQGZKDW¶VPLQHLV
PLQH´7KH\ZDQWXVWROHWWKHPWDNHZKDWHYHUWKH\ZDQWZLWKRXWHYHUJLYLQJDQ\WKLQJEDFN7KH\ZDQWXVWRDEDQGRQ
RXUGHIHQVHV(PKWWSJQXZHENRRNHORUJIWSZZZJQXRUJSKLORVRSK\JSODPHULFDQZD\KWPO
110 • Software livre, cultura hacker e o ecossistema da colaboração

WKURXJKWKHPDUNHWSODFH%XWLI0LFURVRIWZHUHWRDWWHPSWWR³HPEUDFH
DQG H[WHQG´ *3/ VRIWZDUH WKH\ ZRXOG EH UHTXLUHG WR PDNH HDFK
LQFRPSDWLEOH ³HQKDQFHPHQW´ SXEOLF DQG DYDLODEOH WR LWV FRPSHWLWRUV
7KXVWKH*3/WKUHDWHQVWKHVWUDWHJ\WKDW0LFURVRIWXVHVWRPDLQWDLQLWV
PRQRSRO\´

(PDPEDVDVIRUPXODo}HVD0LFURVRIWpGHVFULWDFRPRXPDHPSUHVDTXH
GHVHMD³FRQWURODU´VHMDRPHUFDGRVHMDPRVXVXiULRV(PERUDQDFDUWDD*3/VHMD
UHWUDWDGDGHPDQHLUDPDLVDWLYD ³GPL defeats´³GPL threatens´ GRTXHQRDUWLJR
GH6WDOOPDQ ³GPL our defense´ HPDPERVHODpWLGDFRPRLQVWUXPHQWRGHGHIHVD
FRQWUDD³XVXUSDomR´GRFyGLJRSURPRYLGDSHODHPSUHVD
 &KDPDDDWHQomRWDPEpPQDFDUWDDRUGHPGDVDVVLQDWXUDVLQGtFLRGDV
UHODo}HVGHSRGHUHSUHVWtJLR(PSULPHLUROXJDU3HUHQVTXHPWRPRXDLQLFLDWLYD
H DUWLFXORX R JUXSR (P VHJXLGD 6WDOOPDQ VHJXLGR SRU 5D\PRQG H Vy GHSRLV
7RUYDOGV 2V TXDWUR H PDLV VHLV ³OtGHUHV´ HQWUH FKHIHV GH SURMHWRV LPSRUWDQWHV H
HPSUHViULRVGRQRYRPRGHOR7RGRVFRQWUDRLQLPLJRFRPXPDPDLRUGHIHQVRUDGR
PRGHORSURSULHWiULRHGRVGLUHLWRVDXWRUDLVHQULMHFLGRV
 5LFKDUG6WDOOPDQGL]QmRYHURJUXSRGRFyGLJRDEHUWRFRPRRLQLPLJRDGMH
WLYRTXHHOHJXDUGDSDUDRPRGHORSURSULHWiULR³:HGLVDJUHHRQWKHEDVLFSULQFLSOHV
EXWDJUHHPRUHRUOHVVRQWKHSUDFWLFDOUHFRPPHQGDWLRQV6RZHFDQDQGGRZRUN
WRJHWKHURQPDQ\VSHFL¿FSURMHFWV:HGRQ¶WWKLQNRIWKH2SHQ6RXUFHPRYHPHQWDV
DQHQHP\7KHHQHP\LVSURSULHWDU\VRIWZDUH´GL]
 2IDWRpTXHD26,HQWLGDGHFXMDFULDomRIRLSURSRVWDSRU(ULF5D\PRQG
VLJQL¿FRXXPDSRODUL]DomRGHSRGHUFRPD)6)GH6WDOOPDQ&RPRDPEDVDVHQWL
GDGHVHRPRYLPHQWRFRPRXPWRGRVyFUHVFHUDPQRV~OWLPRVDQRVDORQJRSUD]R
LVVR QmR VLJQL¿FRX TXH 6WDOOPDQ WHQKD GHVDSDUHFLGR PDV VXD SHUVRQDOLGDGH H
VHXVPRGRVGHDomRVmRWUDWDGRVFUHVFHQWHPHQWHGHPDQHLUDFDULFDWDHMRFRVD
 3HUHQV SRU RXWUR ODGR QD FDUWD TXH PDUFRX VHX UHWRUQR j FRPXQLGDGH
'HELDQD¿UPDTXHSHORPHQRVQRSHUtRGRORJRDSyVD26,DVEDQGHLUDVGD)6)
¿FDUDPHQIUDTXHFLGDV(OHWDPEpPUHD¿UPDVHXSDSHOFRQFLOLDGRU

³2QHRIWKHXQIRUWXQDWHWKLQJVDERXW2SHQ6RXUFHLVWKDWLWRYHUVKDGRZHG
WKH)UHH6RIWZDUH)RXQGDWLRQ¶VHIIRUWV7KLVZDVQHYHUIDLUDOWKRXJK
VRPHGLVDSSURYH RI5LFKDUG6WDOOPDQ¶VUKHWRULFDQGGLVDJUHHZLWKKLV
EHOLHI WKDW BDOOB VRIWZDUH VKRXOG EH IUHH WKH 2SHQ 6RXUFH 'H¿QLWLRQ
LV HQWLUHO\ FRPSDWLEOH ZLWK WKH )UHH 6RIWZDUH )RXQGDWLRQ¶V JRDOV DQG
DVFKLVPEHWZHHQWKHWZRJURXSVVKRXOGQHYHUKDYHEHHQDOORZHGWR
GHYHORS,REMHFWHGWRWKDWVFKLVPEXWZDVQRWDEOHWRJHWWKHWZRSDUWLHV
WRJHWKHU´

6WDOOPDQ5LFKDUGFree Software. Free SocietyS


Software livre, cultura hacker e o ecossistema da colaboração • 111

(PVHXOLYURGHHQVDLRVFree Software, Free Society6WDOOPDQDUJXPHQWD


TXHRWHUPRFyGLJRDEHUWRQDYHUGDGHFRQIXQGLXPDLVGRTXHHVFODUHFHX

³7KH RI¿FLDO GH¿QLWLRQ RI µRSHQ VRXUFH VRIWZDUH¶ DV SXEOLVKHG E\ WKH
2SHQ6RXUFH,QLWLDWLYHLVYHU\FORVHWRRXUGH¿QLWLRQRIIUHHVRIWZDUH
KRZHYHULWLVDOLWWOHORRVHULQVRPHUHVSHFWVDQGWKH\KDYHDFFHSWHG
D IHZ OLFHQVHV WKDW ZH FRQVLGHU XQDFFHSWDEO\ UHVWULFWLYH RI WKH XVHUV
+RZHYHUWKHREYLRXVPHDQLQJIRUWKHH[SUHVVLRQµRSHQVRXUFHVRIWZDUH¶
LVµ<RXFDQORRNDWWKHVRXUFHFRGH¶´

'HIDWRQmREDVWDTXHXPXVXiULRSRVVDOHURFyGLJRGHXPSURJUDPDSDUD
TXHHOHVHMDOLYUH$OLEHUGDGHSDUDROKDURFyGLJRpDSHQDVXPDGDVTXDWUROLEHU
GDGHVIXQGDPHQWDLV
 6WDOOPDQFRQWLQXDFRORFDQGRRGHGRQDIHULGDDSRQWDQGRXPDGHVSROLWL]DomR
GRWHUPR

³7KH PDLQ DUJXPHQW IRU WKH WHUP ³RSHQ VRXUFH VRIWZDUH´ LV WKDW ³IUHH
VRIWZDUH´PDNHVVRPHSHRSOHXQHDV\7KDW¶VWUXHWDONLQJDERXWIUHHGRP
DERXW HWKLFDO LVVXHV DERXW UHVSRQVLELOLWLHV DV ZHOO DV FRQYHQLHQFH LV
DVNLQJSHRSOHWRWKLQNDERXWWKLQJVWKH\PLJKWUDWKHULJQRUH7KLVFDQ
WULJJHUGLVFRPIRUWDQGVRPHSHRSOHPD\UHMHFWWKHLGHDIRUWKDW,WGRHV
QRWIROORZWKDWVRFLHW\ZRXOGEHEHWWHURIILIZHVWRSWDONLQJDERXWWKHVH
WKLQJV´

'H IDWR 6WDOOPDQ SDUHFH WHU UD]mR TXDQGR IDOD GR GHVFRQIRUWR TXH VXDV
UHLYLQGLFDo}HVWUD]HP(PDJRVWRGHHPXPHYHQWRQD&DOLIyUQLDFKDPDGR
2SHQ6RXUFH'HYHORSPHQW'D\HOHIRLFRQYLGDGRDSDOHVWUDUHUHFHEHXLQVWUXo}HV
H[SOtFLWDVGHTXHQmRGHYHULDWRFDUHPSRQWRVTXHSXGHVVHPDIXJHQWDURVH[HFXWLYRV
GDV HPSUHVDV SDUD TXHP R HYHQWR HUD GLULJLGR 5HODWD 6WDOOPDQ HP XP GHEDWH
FRP(ULF5D\PRQGSXEOLFDGRQDUHYLVWDHVWDGXQLGHQVH6DORQFRP³,ZDVDVNHGWR
NHHSVLOHQWDERXWP\YLHZVWKDWWKHRWKHUVGLVDJUHHZLWKEXWWKH\KDGQRLQWHQWLRQ
RIKROGLQJEDFNWKHLUYLHZVRQWKHVDPHLVVXHV´
 0DV DV LQFRPSDWLELOLGDGHV SDUHFHP VHU GH DPEDV DV SDUWHV $ UHWyULFD
HPSUHVDULDO WDPEpP p DOJR TXH GyL DRV RXYLGRV GR SUHVLGHQWH GD )UHH 6RIWZDUH
)RXQGDWLRQ&RQWLQXD6WDOOPDQGHVFUHYHQGRRHYHQWR

,GHP
,GHP
112 • Software livre, cultura hacker e o ecossistema da colaboração

³6HYHUDO ORQJ VSHHFKHV GXULQJ WKH GD\ ZHUH >SHUYDGHG@ E\ WKH
DVVXPSWLRQWKDWQRQIUHHVRIWZDUHWKDWUHODWHVVRPHKRZWRIUHHVRIWZDUH
FRQVWLWXWHV³YDOXHDGGHG´DQDVVXPSWLRQZKLFKLVWKHGLUHFWRSSRVLWH
RIZKDW,DPWU\LQJWRWHOOSHRSOH,ZDVQRWVXSSRVHGWRVWDWHP\VLGHRI
WKLVLVVXH,ZDVVXSSRVHGWRWDONDERXWDQRWKHUWRSLF,EURXJKWXSWKLV
LVVXHDQ\ZD\GXULQJP\VSHHFKEHFDXVH,ZDVLQFHQVHGDWKRZWKH
DJHQGDKDGEHHQVHWXSWRSUHVHQWRQO\WKHRWKHUVLGH´

 5D\PRQG SRU VXD YH] QmR HVFRQGH TXH FRP R WHUPR open source
FyGLJR DEHUWR SURFXURX FDODU DV HYLGrQFLDV LGHROyJLFDV GR PRYLPHQWR OLGHUDGR
SRU6WDOOPDQ(PRXWUDHQWUHYLVWDSDUDDUHYLVWD6DORQFRPSRXFRVPHVHVDSyVD
IXQGDomRGD26,GL]HOH

³6XUH>$IWHUPHHWLQJZLWK1HWVFDSH@,JRWWRJHWKHUZLWKDEXQFKRIIUHH
VRIWZDUHKDFNHUVDQGZHKDGRXURZQVWUDWHJ\FRQIHUHQFH7KHLVVXHRQ
WKHWDEOHZDVKRZWRH[SORLWWKH1HWVFDSHEUHDNWKURXJK:HZRUNHGRXW
VRPHVWUDWHJLHVDQGWDFWLFV)LUVWFRQFOXVLRQ7KHQDPH³IUHHVRIWZDUH´
KDVWRJR7KHSUREOHPLVQRERG\NQRZVZKDW³IUHH´PHDQVDQGWRWKH
H[WHQW WKDW WKH\ GR WKLQN WKH\ NQRZ LW¶V WLHG LQ ZLWK D ZKROH EXQFK RI
LGHRORJ\DQGWKDWFUD]\JX\IURP%RVWRQ5LFKDUG6WDOOPDQ´

¬GHFODUDomRGHFRQWH~GRIRUWHGH5D\PRQGTXHDFDEDUDGHFKDPDUGH
ORXFR XP GRV GRLV PDLRUHV UHSUHVHQWDQWHV GR PRYLPHQWR R UHSyUWHU PRVWUDVH
VXUSUHVRDRTXH5D\PRQGFRPSOHPHQWD

³,ORYH5LFKDUGGHDUO\DQGZH¶YHEHHQIULHQGVVLQFHWKHµVDQGKH¶V
GRQHYDOXDEOHVHUYLFHWRRXUFRPPXQLW\EXWLQWKHEDWWOHZHDUH¿JKWLQJ
QRZ LGHRORJ\ LV MXVW D KDQGLFDS :H QHHG WR EH PDNLQJ DUJXPHQWV
EDVHGRQHFRQRPLFVDQGGHYHORSPHQWSURFHVVHVDQGH[SHFWHGUHWXUQ
:HGRQRWQHHGWREHKDYHOLNH&RPPXQDUGVSXPSLQJRXU¿VWVRQWKH
EDUULFDGHV 7KLV LV D ORVLQJ VWUDWHJ\ 6R LQ RUGHU WR H[HFXWH WKDW ZH
QHHGHGDQHZODEHODQGZHEUDLQVWRUPHGDEXQFKRIWKHPDQGWKHRQH
WKDWZH¿QDOO\FDPHXSZLWKLV³RSHQVRXUFH´

$FDUDFWHUL]DomRGDDWLWXGHGH6WDOOPDQFRPRFRPXQLVWDQmRpXPDQRYLGDGH
HpDOJRUHSHWLGRDWpHPWRPGHEULQFDGHLUD&RPPXQDUGpXVDGRSRU5D\PRQG
HP DOXVmR DR JRYHUQR VRFLDOLVWD TXH FRPDQGRX 3DULV SRU PHQRV GH WUrV PHVHV
HP  2V WUDEDOKDGRUHV TXH WRPDUDP R SRGHU QD RFDVLmR WDPEpP ¿FDUDP
 KWWSDUFKLYHVDORQFRPVWIHDWXUHFRYBIHDWXUHKWPO
 1R GLD R GH DEULO GH  R VLWH 1HZV)RUJH EDVWDQWH YLVLWDGR SHOD FRPXQLGDGH GD7HFQRORJLD GD ,QIRUPDomR
SXEOLFRXFRPRSLDGDXPDIDOVDQRWtFLDTXHD¿UPDYDTXHIUDVHVGHLQFLWDomRDRFRPXQLVPRWHULDPVLGRHQFRQWUDGDVHP
XPVRIWZDUHGHVHQYROYLGRSRU5LFKDUG6WDOOPDQKWWSWUHQGVQHZVIRUJHFRPDUWLFOHSO"VLG 
Software livre, cultura hacker e o ecossistema da colaboração • 113

FRQKHFLGRV SRU WHUHP GHL[DGR LQWDFWRV ELOK}HV GH IUDQFRV GR %DQFR 1DFLRQDO GD
)UDQoD GLQKHLUR TXH GHSRLV IRL XWLOL]DGR SDUD ¿QDQFLDU R H[pUFLWR TXH GHUURWRX D
&RPXQD/RQJHGHGDUXPH[HPSORIRUWXLWR5D\PRQGHVWiOHPEUDQGRDWRGRVGH
XP PRPHQWR HP TXH D KHVLWDomR HP DGRWDU XPD SRVWXUD ³SUDJPiWLFD´ DFDERX
FRQGHQDQGRWRGRRPRYLPHQWR
 6WDOOPDQSRUVXDYH]QmRQHJDVXDLQFOLQDomRLGHROyJLFDSDUDDHVTXHUGD
PDV SURFXUD LVHQWDU R PRYLPHQWR VRIWZDUH OLYUH GH TXDOTXHU ¿OLDomR D FRUUHQWHV
SROtWLFRSDUWLGiULDV'L]HOHHPUHSRVWDjSHUJXQWD³2VRIWZDUHOLYUHHVWiPXGDQGRR
UHODFLRQDPHQWRHQWUHDGLUHLWDHDHVTXHUGD"´IHLWDSRUXPDGXSODGHMRUQDOLVWDV

³3HUWHQFHQGR j HVTXHUGD HX JRVWDULD GH GL]HU TXH D LGpLD p GD


HVTXHUGDPDVQRV(8$DPDLRULDGDTXHOHVTXHHVWiLQWHUHVVDGRHP
VRIWZDUHOLYUHHVWmRQDGLUHLWDHVmROLEHUDLV(XQmRFRQFRUGRFRPHOHV
DFKRTXHQyVGHYHPRVFXLGDUGRVSREUHVGRVGRHQWHVHQmRGHL[DUDV
SHVVRDVPRUUHUHPGHIRPH´

5HFXVDQGRVHDUHFRQKHFHUTXHRPRYLPHQWRLGHQWL¿FDVHFRPRHVSHFWUR
LGHROyJLFR GD HVTXHUGD 6WDOOPDQ DVVXPH R VXFHVVR GR PRYLPHQWR open source
QRV(8$SDUDPRVWUDUVLJQL¿FDQGRRTXHHQWHQGHSRUGLUHLWDHHVTXHUGD³(XQmR
FRQFRUGRFRPHOHV>GLUHLWDHOLEHUDLV@DFKRTXHGHYHPRVFXLGDUGRVSREUHV>HOHV
GD GLUHLWD QmR DFKDP@ GRV GRHQWHV >HOHV QmR DFKDP@ H QmR GHL[DU DV SHVVRDV
PRUUHUHPGHIRPH>HOHVQmRDFKDP@´2UHFDGRpGLUHWRSDUD5D\PRQGPLOLWDQWHGR
/LEHUWDULDQ3DUW\GRV(8$HTXHFRPIUHTXrQFLDPDQLIHVWDVHFRQWUDULDPHQWHD
TXDOTXHUUHJXODomRJRYHUQDPHQWDOVREUHDHFRQRPLDHHPDVVXQWRVVRFLDLV
 5D\PRQG SRU RXWUR ODGR UHFXVD D FODVVL¿FDomR GH ³GLUHLWLVWD´ GL]HQGR
DFKDU³DPERVRVFDPSRVGRHVSHFWURLJXDOPHQWHUHSXJQDQWHV´9DOHGHVWDFDUDTXL
GRLVPRWLYRVHPHVSHFLDOHQWUHRVGH]TXHHOHHOHQFDGHVXDDYHUVmRjHVTXHUGD

³&RPPXQLVP,KDYHQ¶WIRUJLYHQWKH/HIWIRUVXFNLQJXSWRWKHPRQVWURXV
HYLOWKDWZDVWKH6RYLHW8QLRQ$QG,QHYHUZLOO
6RFLDOLVP /LEHUDOV KDYH QHYHU PHW D WD[ D JRYHUQPHQW LQWHUYHQWLRQ
RU D IRUFLEOH UHGLVWULEXWLRQ RI ZHDOWK WKH\ GLGQ¶W OLNH 7KHLU HFRQRPLF
SURJUDPLV&RPPXQLVPZLWKRXWWKHJXWVWRDGPLWLW
 'H¿QLQJ GHYLDQF\ GRZQ /LEHUDOV DUH LQ VXFK D GHVSHUDWH UXVK
KWWSZZZJHRFLWLHVFRP&ROOHJH3DUN8QLRQGLUHLWDBHVTXHUGDKWPO
2/LEHUWDULDP3DUW\GHVFUHYHDVVLPVHXVFRPSURPLVVRV³7KH/LEHUWDULDQ3DUW\LVFRPPLWWHGWR$PHULFD
VKHULWDJH
RIIUHHGRPLQGLYLGXDOOLEHUW\DQGSHUVRQDOUHVSRQVLELOLW\DIUHHPDUNHWHFRQRP\RIDEXQGDQFHDQGSURVSHULW\DIRUHLJQ
SROLF\RIQRQLQWHUYHQWLRQSHDFHDQGIUHHWUDGH´KWWSZZZOSRUJ
(VVHVFRPHQWiULRVGH5D\PRQGIRUDPIHLWRVHPVHXEORJ³$UPHGDQG'DQJHURXV´ KWWSZZZLELEOLRRUJHVUEORJ $
IRUPXODomRFRPSOHWDp³,¶PQRWDFRQVHUYDWLYHRUULJKWZLQJHUP\VHOIEXWDUDGLFDOOLEHUWDULDQZKR¿QGVERWKHQGVRIWKH
FRQYHQWLRQDOVSHFWUXPDERXWHTXDOO\UHSXJQDQW0\WUDGLWLRQLVWKHIUHHPDUNHWFODVVLFDOOLEHUDOLVPRI/RFNHDQG+D\HN
,XWWHUO\UHMHFWERWKWKH0DU[LVWSURJUDPDQGWKHUHDFWLRQDU\FXOWXUDOFRQVHUYDWLVPRI(GPXQG%XUNH5XVVHOO.LUNDQG
WRGD\ WKH5HOLJLRXV5LJKW&RQVHUYDWLVPLVGH¿QHGE\DGHVLUHWRSUHVHUYHVRFLHW\¶VH[LVWLQJSRZHUUHODWLRQVKLSVJLYHQ
DFKRLFH,SUHIHUVXEYHUWLQJWKHPWRSUHVHUYLQJWKHP´
114 • Software livre, cultura hacker e o ecossistema da colaboração

WR HPEUDFH WKH CYLFWLPL]HG E\ VRFLHW\¶ DQG VSHDN WKH ODQJXDJH RI
FRPSDVVLRQ WKDW WKH\¶YH IRUJRWWHQ KRZ WR FRQGHPQ KDUPIXO VHOI
GHVWUXFWLYHDQGRWKHUGHVWUXFWLYHEHKDYLRU´

2SULPHLURHPHVSHFLDOHRVHJXQGRSRQWRHPSDUWLFXODUVmRUHOHYDQWHV
SRU VHUHP D PDQLIHVWDomR GH 5D\PRQG VREUH XPD FDUDFWHUtVWLFD DVVRFLDGD FRP
IUHTXrQFLDDRPRYLPHQWRVRIWZDUHOLYUHHPDLVHVSHFL¿FDPHQWHj¿JXUDGH6WDOOPDQ
0DVR~OWLPRSRQWRFRPELQDGRFRPRVHJXQGRpLPSRUWDQWHSRUGDUFRQWDGHVXD
YLVmRVREUHXPDTXHVWmRDSDUWLUGDTXDOD*3/FRPRMiYLPRVFRORFDVHQRMRJR
SROtWLFRDGLYLVmRHQWUHRVTXHWrPHRVTXHQmRWrP ULTXH]DPHLRVGHSURGXomR
RX R FyGLJRIRQWH  &RPR YLPRV D *3/ QR MRJR PHWDIyULFR GD OLQJXDJHP H GH
VHX GHVOL]DPHQWR QmR VLJQL¿FD DSHQDV R DFHVVR H D SRVVLELOLGDGH GH DOWHUDomR
GRFyGLJRGHXPSURJUDPD(ODDSOLFDGDpDUHVWDXUDomRGDLJXDOGDGHHQWUHSUR
GXWRUHV H XVXiULRV 2 SUySULR QRPH OLYUH FRORFDVH HP RSRVLomR D SURSULHWiULR
SURSULHGDGH
 3DUDTXHDPHQVDJHPTXH5D\PRQGTXHUSDVVDUSDUDDFRPXQLGDGHGH
HPSUHViULRV SRVVD IXQFLRQDU OHYDU j IUHQWH XP GLVFXUVR VREUH D GHVLJXDOGDGH H
VREUHRVTXHWrPHRVTXHQmRWrPQmRSDUHFHVHUDGHTXDGR1mRVHWUDWDDSHQDV
GHXPDOyJLFDXWLOLWiULDFRQVFLHQWHPHQWHHPSUHJDGDSRUHOH±HPERUDH[LVWDDFODUD
QRomRGHTXHRTXH6WDOOPDQIDODLQFRPRGD5D\PRQGTXHU³YHQGHU´DVLGHLDVGR
open source'L]HOHFRQWLQXDQGRRGHEDWHTXHWHYHFRP6WDOOPDQSXEOLFDGRQD
6DORQFRP

³:KHQWKHSXUSRVHRIWKHHYHQWLVWRVHOORXULGHDVWRWKHWUDGHSUHVVDQG
EXVLQHVV WKHUH DUH WLPHV ZKHQ WKH VSHHFKHV RI SHRSOH \RX GLVDJUHH
ZLWKDUHIXQFWLRQDOO\KHOSIXODQG\RXUVDUHQRW7KHUHIRUHLI,DPWU\LQJ
WRJHWYLFWRU\IRUDOORIXV,PD\KDYHWRSXWSUHVVXUHRQ\RXEXWQRWRQ
WKHSHRSOHZKRGLVDJUHHZLWK\RXHYHQLIP\SULYDWHYLHZVDUHDFWXDOO\
FORVHUWR\RXUV

0DVQHPDVLGHLDVTXH5D\PRQGSDWURFLQRXFRPVXD2SHQ6RXUFH,QLWLWLDYH
HVWmRWRWDOPHQWHGHDFRUGRFRPVXDYLVmR(OHGHIHQGHRVSULQFtSLRVopen source
SHODH¿FLrQFLDTXHYrQDSUiWLFDSHODTXDOLGDGHGRVRIWZDUHJHUDGRSHOD³VHOHomR
QDWXUDO´TXHGHVFUHYHXHPA Catedral e o Bazar2HIHLWR³SUiWLFR´WHPPDLVUH
OHYkQFLDGRTXHRVSULQFtSLRVFRORFDGRV&RQWLQXDHOHQRPHVPRGHEDWH

³,¶PQRWEHLQJDK\SRFULWHZKHQ,VD\WKLVEHFDXVH,P\VHOIKDYHSRVLWLRQV
WKDW,NHHSTXLHWDERXWIRUSROLWLFDODQGPDUNHWLQJUHDVRQV,IWKH2SHQ
Software livre, cultura hacker e o ecossistema da colaboração • 115

6RXUFH'H¿QLWLRQFRPSOHWHO\UHÀHFWHGP\SHUVRQDOFRQYLFWLRQVLWZRXOG
EHDELWGLIIHUHQWWKDQLWLV%XW,¶YHOHIWLWDORQHEHFDXVHLWZRUNV7KHIDFW
WKDWLWZRUNVDQGWKHFRQVHQVXVDURXQGLWLVPRUHLPSRUWDQWWKDQWKH
SRLQWVRQZKLFK,GLIIHUZLWKLW

(LWKHURSHQVRXUFHLVDQHWZLQIRUERWKSURGXFHUVDQGFRQVXPHUVRQ
SXUH VHOILQWHUHVW JURXQGV RU LW LV QRW ,I LW LV \RX FDQQRW ORVH LI LW LV
QRW\RXFDQQRW DQGVKRXOGQRW ZLQ(LWKHUZD\WKHPRUDOL]LQJ\RXGR
DERXWKRZWKLQJV³RXJKW´WREHLVDWEHVWXVHOHVVDQGDWZRUVWDFWLYHO\
KDUPIXO´

+iDLQGDRXWURHOHPHQWRTXHGLVWLQJXHDIDODGHDPERVHDVUHODo}HVGHUL
YDGDVGRPRGHORTXHSURS}HP5D\PRQGUHIHUHVHFRPIUHTXrQFLDjVDWLVIDomRGRV
XVXiULRVFRPRYHPRVDFLPDPDQWHQGRDVHSDUDomRSURGXWRUHVFRQVXPLGRUHV$
PDUFDGHVHXGLVFXUVRQmRpDHOLPLQDomRGDGHVLJXDOGDGHpDH¿FLrQFLDWpFQLFD
GHXPPpWRGRTXHHVWDEHOHFHXPD³VHOHomRQDWXUDO´SHODTXDORVRIWZDUH³HYROXL´
9HMDPRVRSDUiJUDIRTXHH[SOLFDRTXHpRSHQVRXUFHQDSULPHLUDSiJLQDGRZHEVLWH
GD2SHQ6RXUFH,QLWLDWLYH

³7KHbasic idea behind open sourceLVYHU\VLPSOH:KHQSURJUDPPHUV


FDQUHDGUHGLVWULEXWHDQGPRGLI\WKHVRXUFHFRGHIRUDSLHFHRIVRIWZDUH
WKHVRIWZDUHHYROYHV3HRSOHLPSURYHLWSHRSOHDGDSWLWSHRSOH¿[EXJV
$QGWKLVFDQKDSSHQDWDVSHHGWKDWLIRQHLVXVHGWRWKHVORZSDFHRI
FRQYHQWLRQDOVRIWZDUHGHYHORSPHQWVHHPVDVWRQLVKLQJ
:H LQ WKH RSHQ VRXUFH FRPPXQLW\ KDYH OHDUQHG WKDW WKLV UDSLG
HYROXWLRQDU\ SURFHVV SURGXFHV EHWWHU VRIWZDUH WKDQ WKH WUDGLWLRQDO
FORVHGPRGHOLQZKLFKRQO\DYHU\IHZSURJUDPPHUVFDQVHHWKHVRXUFH
DQGHYHU\ERG\HOVHPXVWEOLQGO\XVHDQRSDTXHEORFNRIELWV
2SHQ6RXUFH,QLWLDWLYHH[LVWVWRPDNHWKLVFDVHWRWKHFRPPHUFLDOZRUOG
2SHQVRXUFHVRIWZDUHLVDQLGHDZKRVHWLPHKDV¿QDOO\FRPH)RUWZHQW\
\HDUVLWKDVEHHQEXLOGLQJPRPHQWXPLQWKHWHFKQLFDOFXOWXUHVWKDWEXLOW
WKH ,QWHUQHW DQG WKH :RUOG :LGH :HE 1RZ LW¶V EUHDNLQJ RXW LQWR WKH
FRPPHUFLDOZRUOGDQGWKDW¶VFKDQJLQJDOOWKHUXOHV$UH\RXUHDG\"´

$OJXPDVH[SUHVV}HVPHUHFHPVHUGHVWDFDGDVSRLVVmRDVPDUFDVGHVVH
GLVFXUVR GHULYDGR GD LGHLD GH ³VHOHomR QDWXUDO´ (VWi GLWR ³R VRIWZDUH HYROXLWKH
VRIWZDUHHYROYHV´±FRPRVHIRVVHXPDHVSpFLHDQLPDOSDUDDTXDORVSURJUDPDGRUHV
VmR RV UHVSRQViYHLV SHOD VHOHomR 7DPEpP ³4XDQGR D FRPXQLGDGH GR FyGLJR
DEHUWRDSUHQGHXTXHHVVHYHOR]SURFHVVRHYROXFLRQiULR´(PDLV³+iDQRVHVVH
PRPHQWXPHVWiVHQGRFRQVWUXtGRQDVFXOWXUDVWpFQLFDV>HPRSRVLomRDLGHROyJLFDV
RX LGHDOLVWDV@ TXH FRQVWUXtUDP D ,QWHUQHW´ RX VHMD p XP IHQ{PHQR DOKHLR DRV
LGHyORJRVFRQVWUXtGRHPXPDPELHQWHSUDJPiWLFRRFRQWUiULRGRTXH5D\PRQGGL]
VHUD)6)
KWWSZZZRSHQVRXUFHRUJ
116 • Software livre, cultura hacker e o ecossistema da colaboração

 (OHPHQWRLQHUHQWHDRSURFHVVRHYROXWLYRDFRPSHWLomRSRURXWURODGRp
DOJRTXHVHDFLUUDGDQmRpYLVWDFRPERQVROKRVSRU6WDOOPDQ±HSULQFLSDOPHQWH
FRPRHOHPHQWRGRFDSLWDOLVPR1R0DQLIHVWR*18TXHHVFUHYHXHPDQWHV
GDUHGDomRGD*3/HFRPRWH[WRFRQYLWHGL]HOH

³2SDUDGLJPDGDFRPSHWLomRpXPDFRUULGDUHFRPSHQVDQGRRYHQFH
GRUQyVHQFRUDMDPRVWRGRVDFRUUHUPDLVUiSLGR4XDQGRRFDSLWDOLVPR
UHDOPHQWH IXQFLRQD GHVWH PRGR HOH ID] XP ERP WUDEDOKR PDV RV
GHIHQVRUHVHVWmRHUUDGRVHPDVVXPLUTXHDVFRLVDVVHPSUHIXQFLRQDP
GHVWDIRUPD6HRVFRUUHGRUHVVHHVTXHFHPGRSRUTXrDUHFRPSHQVD
VHU RIHUHFLGD H EXVFDUHP YHQFHU QmR LPSRUWD FRPR HOHV SRGHP
HQFRQWUDU RXWUDV HVWUDWpJLDV  FRPR SRU H[HPSOR DWDFDU RV RXWURV
FRUUHGRUHV 6H RV FRUUHGRUHV VH HQYROYHUHP HP XPD OXWD FRUSRD
FRUSRWRGRVHOHVFKHJDUmRPDLVWDUGH
6RIWZDUH SURSULHWiULR H VHFUHWR p R HTXLYDOHQWH PRUDO DRV FRUUHGRUHV
HP XPD OXWD FRUSRDFRUSR e WULVWH GL]HU PDV R ~QLFR MXL] TXH QyV
FRQVHJXLPRVQmRSDUHFHVHRSRUjVOXWDVHOHVRPHQWHDVUHJXOD ³SDUD
FDGDPHWURVYRFrSRGHGLVSDUDUXPWLUR´ (OHQDYHUGDGHGHYHULD
HQFHUUDUFRPDVOXWDVHSHQDOL]DURVFRUUHGRUHVTXHWHQWDUHPOXWDU´

Software livre, cerveja grátis e liberdade de expressão

(VWiQR0DQLIHVWR*18DTXLORTXHRSUySULR6WDOOPDQFKDPDGH³GHVFXLGRV´
RX³PDOHQWHQGLGRV´HPWRUQRGRWHUPR³free”$RDQXQFLDURSURMHWRGHFRQVWUXomR
GRVLVWHPDRSHUDFLRQDO*186WDOOPDQH[SOLFLWRXVHXSODQRGHFRQVWUXomRGHXP
VLVWHPDRSHUDFLRQDO³free´GL]HQGRQDSULPHLUDIUDVHGRWH[WR

³*18ZKLFKVWDQGVIRU*QX¶V1RW8QL[LVWKHQDPHIRUWKHFRPSOHWH
8QL[FRPSDWLEOHVRIWZDUHV\VWHPZKLFK,DPZULWLQJVRWKDW,FDQJLYH
LWDZD\IUHHWRHYHU\RQHZKRFDQXVHLW6HYHUDORWKHUYROXQWHHUVDUH
KHOSLQJPH&RQWULEXWLRQVRIWLPHPRQH\SURJUDPVDQGHTXLSPHQWDUH
JUHDWO\QHHGHG´

 (P XPD QRWD HVFULWD HP  6WDOOPDQ EXVFD IHFKDU R VHQWLGR SDUD R
WHUPRDFUHVFHQWDQGRDVHJXLQWHH[SOLFDomR

³7KHZRUGLQJKHUHZDVFDUHOHVV7KHLQWHQWLRQZDVWKDWQRERG\ZRXOG
KDYH WR SD\ IRU SHUPLVVLRQ  WR XVH WKH *18 V\VWHP %XW WKH ZRUGV
(PWRGRRWH[WRWHQKRRSWDGRSRUXWLOL]DUDVYHUV}HVTXDQGRGLVSRQtYHLVHPSRUWXJXrV HPJHUDOWUDGX]LGDVSRU
PHPEURVGDFRPXQLGDGHVRIWZDUHOLYUH SRLVPLQKDSRVLomRFRPRDQDOLVWDpGHXPIDODQWHQDWLYRGRSRUWXJXrV
EUDVLOHLUR  LQWHUHVVDPPH HP SDUWLFXODU RV HIHLWRV GH VHQWLGR SDUD D FRPXQLGDGH EUDVLOHLUD 1HVWH WUHFKR HP
SDUWLFXODUHQWUHWDQWRRSWRSRUXVDUDYHUVmRHPLQJOrVSDUDTXDDDPELJXLGDGHGRWHUPRVHMDPDQWLGD
Software livre, cultura hacker e o ecossistema da colaboração • 117

GRQ¶W PDNH WKLV FOHDU DQG SHRSOH RIWHQ LQWHUSUHW WKHP DV VD\LQJ WKDW
FRSLHVRI*18VKRXOGDOZD\VEHGLVWULEXWHGDWOLWWOHRUQRFKDUJH7KDW
ZDVQHYHUWKHLQWHQWODWHURQWKHPDQLIHVWRPHQWLRQVWKHSRVVLELOLW\RI
FRPSDQLHVSURYLGLQJWKHVHUYLFHRIGLVWULEXWLRQIRUDSUR¿W6XEVHTXHQWO\
, KDYH OHDUQHG WR GLVWLQJXLVK FDUHIXOO\ EHWZHHQ ³IUHH´ LQ WKH VHQVH RI
IUHHGRPDQG³IUHH´LQWKHVHQVHRISULFH)UHHVRIWZDUHLVVRIWZDUHWKDW
XVHUV KDYH WKH IUHHGRP WR GLVWULEXWH DQG FKDQJH 6RPH XVHUV PD\
REWDLQ FRSLHV DW QR FKDUJH ZKLOH RWKHUV SD\ WR REWDLQ FRSLHVDQG LI
WKHIXQGVKHOSVXSSRUWLPSURYLQJWKHVRIWZDUHVRPXFKWKHEHWWHU7KH
LPSRUWDQW WKLQJ LV WKDW HYHU\RQH ZKR KDV D FRS\ KDV WKH IUHHGRP WR
FRRSHUDWHZLWKRWKHUVLQXVLQJLW´

&RPRXVHPDFREUDQoDSHOD³SHUPLVVmR´GHXVRGRVRIWZDUHXPDRXWUD
IUDVH GR PHVPR WH[WR PRVWUD FRPR 6WDOOPDQ VHP SUHFLVDU VH D FREUDQoD VHULD
DGPLWLGDRXUHVWULWDSHQVDYDRVLVWHPDRSHUDFLRQDOFRPRXPEHPFRPXPFROHWLYR
1HVVHWUHFKRHOHFRQVLGHUDWDPEpPTXHKRXYHXPDIDOWDGHSUHFLVmRGHVXDSDUWH
³2QFH*18LVZULWWHQHYHU\RQHZLOOEHDEOHWRREWDLQJRRGV\VWHPVRIWZDUHIUHH
MXVWOLNHDLU´
 3DUDWHQWDUFRQVROLGDURVHQWLGRGRWHUPRTXHFULRXIUHHVRIWZDUH6WDOOPDQ
UHSHWHH[DXVWLYDPHQWHTXHRWHUPRQmRGHYHVHUHQWHQGLGRFRPRVRIWZDUHJUiWLV
3DUDLVVRHOHXVDXPDFHUWDDQDORJLDGL]HQGRTXHDSDODYUD³free”WHPRPHVPR
VHQWLGRGRTXH³free speech´ OLEHUGDGHGHH[SUHVVmR RX³freedom´2XVRGRWHUPR
QmR p QD DFHSomR GH ³JUDWXLWR´ SRLV DR IDODU HP OLEHUGDGH GH H[SUHVVmR RX QD
SDODYUD ³freedom´ 6WDOOPDQ XVD GRLV WHUPRV PXLWR LPSRUWDQWHV SDUD D GH¿QLomR
GRV YDORUHV GRV (8$ 'HVVH PRGR HOH QmR DSHQDV SUHFLVD R VHQWLGR GD VXD
H[SUHVVmRPDVUHD¿UPDFHUWRVYDORUHVGRV(8$TXHRSUySULR6WDOOPDQWDPEpP
HVWLPD LGHQWL¿FDVH FRP RV YDORUHV GH VHX SDtV DIDVWDQGRVH GR HVWHUHyWLSR GH
³FRPXQLVWD´HGijOXWDSHODOLEHUGDGHGRVRIWZDUHRPHVPRVWDWXVTXHDOXWDSHOD
OLEHUGDGH GH H[SUHVVmR (VFUHYHU FyGLJRV p XP GRV PHLRV GH H[SUHVVmR GH XP
SURJUDPDGRU
 0DVDPHVPDDQDORJLD ³free as in freedom´ WDPEpPGH¿QH³free software´
SRU RSRVLomR 'L] D )6) QR GRFXPHQWR HP TXH H[SOLFD R TXH p VRIWZDUH OLYUH H
DSRQWD DV TXDWUR OLEHUGDGHV HVVHQFLDLV ³¶)UHH VRIWZDUH¶ LV D PDWWHU RI OLEHUW\ QRW
SULFH7RXQGHUVWDQGWKHFRQFHSW\RXVKRXOGWKLQNRI³IUHH¶¶DVLQ³IUHHVSHHFK¶¶QRW
DVLQ³IUHHEHHU¶¶´
 $LGHLDGH³FHUYHMDJUiWLV´GHULYDGHXPDIUDVHTXH¿FRXIDPRVDFRPRVHQGR
GRHFRQRPLVWDOLEHUDO0LOWRQ)ULHGPDQ pQDYHUGDGHRWtWXORGHXPGHVHXVOLYURV 
HTXHHQFHUUDDLGHLDGHTXHQDGDpGHJUDoDSDUDWXGRKiXPSUHoR³7KHUH¶VQR
VXFKWKLQJDVDIUHHOXQFK´$IUDVHpXPDDOXVmRjSUiWLFDGHFHUWRVUHVWDXUDQWHV

KWWSZZZJQXRUJSKLORVRSK\IUHHVZKWPO
118 • Software livre, cultura hacker e o ecossistema da colaboração

GHRIHUHFHUFRPLGDVDOJDGDHGHEDL[RFXVWRGHSURGXomRJUDWXLWDPHQWHSDUDTXH
R FOLHQWH SDJDVVH SHODV EHELGDV $R GL]HU ³QmR SHQVH HP DOPRoR JUiWLVFHUYHMD
JUiWLV´ D )6) HVWi GL]HQGR TXH R PRGHOR p HFRQRPLFDPHQWH YLiYHO TXH QmR Ki
QHQKXP WUXTXH RX HVSHUWH]D HVFRQGLGR SRU WUiV GHOH 0DV HVVD IUDVH QmR p GH
)ULHGPDQHHVWHDRFRPHQWDUHVVDDWULEXLomRHUU{QHDQRVPRVWUDPDLVXPHIHLWR
GHVHQWLGRSRUHODHQJHQGUDGR

³,KDYHVRPHWLPHVEHHQDVVRFLDWHGZLWKWKHDSKRULVP³7KHUH¶VQRVXFK
WKLQJDVDIUHHOXQFK´ZKLFK,GLGQRWLQYHQW,ZLVKPRUHDWWHQWLRQZHUH
SDLGWRRQHWKDW,GLGLQYHQWDQGWKDW,WKLQNLVSDUWLFXODUO\DSSURSULDWH
LQWKLVFLW\³1RERG\VSHQGVVRPHERG\HOVH¶VPRQH\DVFDUHIXOO\DVKH
VSHQGVKLVRZQ´%XWDOODSKRULVPVDUHKDOIWUXWKV2QHRIRXUIDYRULWH
IDPLO\SXUVXLWVRQORQJGULYHVLVWRWU\WR¿QGWKHRSSRVLWHRIDSKRULVPV
)RU H[DPSOH ³+LVWRU\ QHYHU UHSHDWV LWVHOI´ EXW ³7KHUH¶V QRWKLQJ QHZ
XQGHUWKHVXQ´2U³ORRNEHIRUH\RXOHDS´EXW³+HZKRKHVLWDWHVLVORVW´
7KHRSSRVLWHRI³7KHUH¶VQRVXFKWKLQJDVDIUHHOXQFK´LVFOHDUO\³7KH
EHVWWKLQJVLQOLIHDUHIUHH´

 )ULHGPDQ QmR p DOJXpP TXH HVWi HQYROYLGR GLUHWDPHQWH QR GHEDWH VREUH
R PRGHOR GR VRIWZDUH OLYUH PDV R SDUiJUDIR DFLPD p SDUD QyV LQWHUHVVDQWH SHOD
RSRVLomRTXHQRVSURS}H'L]HOHTXHRDIRULVPRVREUHRDOPRoRJUiWLVHQFRQWUD
VHXRSRVWRHP³DVPHOKRUHVFRLVDVGDYLGDVmRGHJUDoD´IUDVHTXHVySRGHVHU
GLWDSRUDOJXpP³LQJrQXR´TXHQmRGiYDORUjVFRLVDVPDWHULDLV2UDpGHVVDIRUPD
TXHRVGHIHQVRUHVGRVRIWZDUHOLYUHWrPVLGRUHWUDWDGRVFRPRVRQKDGRUHVSRXFR
UHDOLVWDVTXHSURS}HPDOJRLQYLiYHO2ODGRRSRVWRRVGHIHQVRUHVGRVRIWZDUHSUR
SULHWiULRVHULDPHQWmRRVTXH³VDEHPTXHQmRKiDOPRoRJUiWLV´RVUHDOLVWDVRV
FpWLFRVTXHYLYHPRGLDDGLDGRVQHJyFLRV
 1mRDSHQDV6WDOOPDQHD)6)UHSHWHPHVVDDQDORJLDHQWUHfree software
e free speecheDOJRTXHDFRPXQLGDGHLQFRUSRURXFRPRXPDH[SOLFDomRSDGUmR
SDUD GL]HU TXH OLYUH QmR VLJQL¿FD JUiWLV 0DV PHVPR UHSHWLGR SRU FRQVHFXWLYDV
YH]HVSRU6WDOOPDQHSHORVGHIHQVRUHVGRPRGHOROLYUHRVLJQL¿FDGRGHfreeFRPR
OLYUHHQFRQWUDUHVLVWrQFLDVSULQFLSDOPHQWHQDLPSUHQVD9HMDPRVRVHJXLQWHWUHFKR
GH XP OLYUR GH GLYXOJDomR FLHQWt¿FD HGLWDGR SHOD UHYLVWD Superinteressante GD
HGLWRUD$EULO

³4XDOTXHU XP TXH Mi WHQKD WURSHoDGR HP DOJXP WH[WR RX HP DOJXPD
LGHLDGH6WDOOPDQFRQKHFHVHXPDQWUDOLYUH HPLQJOrVIUHH VHUHIHUHD
OLEHUGDGHQmRDSUHoR7LYHDVRUWHGHHQFRQWUiORSHODSULPHLUDYH]HP
MXOKRGHSDUDXPDHQWUHYLVWD(QTXDQWRPDVFDYDHWLUDYDGRFHV
³)UHHLVXVHGDVLQWKHSKUDVHIUHHVSHHFK DULJKWZHFRYHW UDWKHUWKDQWKHSKUDVHIUHHEHHU DOZD\VWRRJRRG
WREHWUXH RUIUHHNLWWHQ ZKLFKVRXQGVJRRGEXWKDVDKLJKRYHUKHDG ´IRLRXWUDIRUPXODomRHQFRQWUDGDKWWSQHZV
FRPFRPKWPO"WDJ IGBQFB
Software livre, cultura hacker e o ecossistema da colaboração • 119

0 0GRSDFRWHFRPDPmRGLUHLWDHWHQWDYDGHVHPEDUDoDURVORQJRV
FDEHORVFRPDHVTXHUGD6WDOOPDQQmRSDUDYDGHUHSHWLUVHXFUHGR$
SDODYUD IUHH QD H[SUHVVmR 6RIWZDUH /LYUH )UHH 6RIWZDUH HP LQJOrV 
QmRVLJQL¿FDJUiWLV1mRVLJQL¿FDTXHpSURLELGRFREUDUSHORVRIWZDUH
6LJQL¿FD DSHQDV TXH YRFr GHYH VHU OLYUH SDUD H[HFXWiOR FRSLiOR
PRGL¿FiOR H UHGLVWULEXLU XPD YHUVmR PHOKRUDGD 6WDOOPDQ D¿UPD TXH
DSDODYUDIUHHHVWiVXMHLWDDPXLWDFRQIXVmRSDUDDTXHOHVFXMDOtQJXD
PDWHUQDpRLQJOrVSRLVWHPGXSORVHQWLGRUHIHUHVHWDQWRjOLEHUGDGH
TXDQWRjJUDWXLGDGH3DUDPLPSRUpPXPIDODQWHQDWLYRGHSRUWXJXrV
WDODPELJXLGDGHQmRWUDULDSUREOHPDDOJXPSRLVHPSRUWXJXrVKiGXDV
SDODYUDVXPDSDUDFDGDFDVR3RULVVRWUDGX]LPRVDSDODYUDIUHHHP
IUHHVSHHFKHHPIUHHEHHUSRUGXDVSDODYUDVGLVWLQWDVOLYUH RGLVFXUVR 
HJUiWLV DFHUYHMD UHVSHFWLYDPHQWH7XGRRTXHHUDSUHFLVRID]HUSDUD
HQWHQGHU R FRQFHLWR VHULD HPSUHJDU D WUDGXomR FRUUHWD HP SRUWXJXrV
SDUDDH[SUHVVmR)UHH6RIWZDUHRXVHMD6RIWZDUH/LYUH
6WDOOPDQHQWmRFRPHoDYDDSUHJDUTXHDOLEHUGDGHDpWLFDHRGHVHMR
GH YLYHU XPD YLGD GHFHQWH IRUDP VXDV PRWLYDo}HV SDUD IXQGDU D
)UHH 6RIWZDUH )RXQGDWLRQ )XQGDomR SHOR 6RIWZDUH /LYUH  H SXEOLFDU
D *3/ (OH MDPDLV DGPLWLX WHU DOJR FRQWUD R PXQGR GRV QHJyFLRV RX
FRQWUD YHQGHU VRIWZDUH SDUD REWHU OXFUR 1HJDYD GH WRGDV DV IRUPDV
SRVVtYHLV VHU DQWLFRPHUFLDO 'HYR FRQIHVVDU TXH GHL[HL D HQWUHYLVWD
FRPSOHWDPHQWH KLSQRWL]DGR H DEVROXWDPHQWH VHGX]LGR SHOD LGHLD GH
TXHR6RIWZDUH/LYUHHUDD~QLFDIRUPDGHFHQWHFRPRXPVHUKXPDQR
GHFHQWHSRGHULDVHUHODFLRQDUFRPRVRIWZDUH HHXUHSHWLDVHPSDUDU
SDUDPLPPHVPRFRPRIXLEXUURHLQJrQXRDRFRQIXQGLUDOLEHUGDGH
FRPRHPIUHHVSHHFKFRPRSUHoRFRPRHPIUHHEHHU 'HUHSHQWH
DFRUGHL2SRQWRGH6WDOOPDQFRPDGLVWLQomRHQWUHIUHHVSHHFKHIUHH
EHHUpWmRVHGXWRUTXDQWRLQyFXR3RUXPDUD]mRWULYLDOTXDQGRYRFrp
OLYUH FRPRHPIUHHVSHHFK SDUDFRSLDUXPSURJUDPDVHPSDJDUQDGD
HR6RIWZDUH/LYUHGHDFRUGRFRPVXDGH¿QLomRGHYHSHUPLWLUHVVD
OLEHUGDGHHQWmRRSURJUDPDVHWRUQDJUDWXLWR FRPRHPIUHHEHHU 6H
YRFrVHPSUHWHPGHSDJDUSDUDID]HUXPDFySLDHVWDPRVGHYROWDDR
PXQGRGRVRIWZDUHSURSULHWiULR6HQmRRSURJUDPDQmRFXVWDQDGDe
JUiWLV(SRQWR¿QDO´

 &DEH DTXL GHVFUHYHU H FDUDFWHUL]DU R PRGR FRPR R DXWRU GHVFUHYH D


¿JXUDGH6WDOOPDQHVHXVDUJXPHQWRV(VVDGHVFULomRLPSOLFDUiQDIRUPDFRPRDV
SDODYUDV GH 6WDOOPDQ VmR UHFHELGDV FRQVWUXLUi XP UHIHUHQFLDO SDUD R OHLWRU VREUH
TXHPSURIHUHDVSDODYUDVHQWUHDVSDV$OJXQVSRQWRV

 6WDOOPDQUHSHWHPDQWUDV
 6WDOOPDQWHPORQJRVFDEHORV
 6WDOOPDQUHSHWHVHXFUHGR
 6WDOOPDQSUHJD
 6WDOOPDQKLSQRWL]DpKLSQyWLFR

*XURYLW]+pOLRLinux. &ROHomR3DUDVDEHUPDLV(G$EULO
120 • Software livre, cultura hacker e o ecossistema da colaboração

 2DXWRUDRGHVFUHYHU6WDOOPDQGHVVDIRUPDUHWUDWDD¿JXUDGRSUHVLGHQWH
GD)6)FRPRDOJXpPTXHQmRWUDEDOKDFRPXPDDUJXPHQWDomRUDFLRQDO DPHVPD
GR³PXQGRGRVQHJyFLRV´ (OHVHWUDQVIRUPDHQWmRHPXPSHUVRQDJHPUHOLJLRVR
TXHUHSHWHPDQWUDVTXHSUHJDHKLSQRWL]D'XUDQWHD³KLSQRVH´GRUHSyUWHUHVWH
UHODWD TXH 6WDOOPDQ ³ MDPDLV DGPLWLX WHU DOJR FRQWUD R PXQGR GRV QHJyFLRV RX
FRQWUDYHQGHUVRIWZDUHSDUDREWHUOXFUR1HJDYDGHWRGDVDVIRUPDVSRVVtYHLVVHU
DQWLFRPHUFLDO´$FRQFOXVmRVHUiVRIWZDUHOLYUHpLJXDODVRIWZDUHJUiWLVDOJRTXH
QmRSRGHVHUFRPHUFLDOL]DGR
 $RSRVLomRVRIWZDUHFRPHUFLDOVRIWZDUHOLYUHHPOXJDUGDRSRVLomRVRIWZDUH
SURSULHWiULRVRIWZDUHOLYUHWDPEpPSRGHVHUHQFRQWUDGDQRWH[WRGH&UDLJ0XQGLH
H[HFXWLYR GD 0LFURVRIW GDWDGR GH  ³7KH &RPPHUFLDO 6RIWZDUH 0RGHO´ R
PHVPR TXH JHURX D FDUWDUHVSRVWD GRV OtGHUHV GR VRIWZDUH OLYUH RUJDQL]DGD SRU
%UXFH 3HUHQV 0XQGLH HVFUHYHX DLQGD XP RXWUR WH[WR PHQRV GH  GLDV GHSRLV
LQWLWXODGR³&RPPHUFLDOVRIWZDUHVXVWDLQDEOHLQQRYDWLRQ´HPTXHUHSHWLXRPHVPR
WHUPR(PDPERVDRSRVLomRpHQWUHFyGLJRDEHUWRVRIWZDUHFRPHUFLDO
 $RTXHSDUHFHDRWUDoDUHVVHVSDUDOHORVHVVHVVXMHLWRVFRQVHJXHPRHIHLWR
GHFDUUHJDURVVRIWZDUHVGHFyGLJRDEHUWRRXOLYUHFRPRDOJRIRUDGRPHUFDGRIRUD
GHXPPXQGRHPTXHRTXHSUHYDOHFHVmRRVDUJXPHQWRVSUiWLFRVHUDFLRQDLV
 (PSiJLQDR¿FLDOQDLQWHUQHWPDQWLGDSHOR,QVWLWXWR1DFLRQDOGH7HFQRORJLD
GD ,QIRUPDomR ,7,  R JRYHUQR EUDVLOHLUR EDVWDQWH HQYROYLGR FRP R PRYLPHQWR
VRIWZDUHOLYUHSXEOLFDXPSHTXHQRJORVViULRTXHPDUFDDVHJXLQWHGH¿QLomRSDUD
VRIWZDUHFRPHUFLDO

³6RIWZDUHFRPHUFLDOpRVRIWZDUHGHVHQYROYLGRSRUXPDHPSUHVDFRPR
REMHWLYRGHOXFUDUFRPVXDXWLOL]DomR1RWHTXHµFRPHUFLDO¶HµSURSULHWiULR¶
QmRVmRRPHVPR$PDLRULDGRVRIWZDUHFRPHUFLDOpSURSULHWiULRPDV
H[LVWHVRIWZDUHOLYUHTXHpFRPHUFLDOHH[LVWHVRIWZDUHQmROLYUHQmR
FRPHUFLDO´

$RFULDURWHUPRopen sourceXPGRVPRWLYRVH[SRVWRVSRU(ULF5D\PRQG
IRLUHVROYHURSUREOHPDGDDPELJXLGDGHGRWHUPROLYUHHPLQJOrV'L]HOHQRWH[WR
³*RRGE\H³IUHHVRIWZDUH´KHOOR³RSHQVRXUFH´´

6SHFL¿FDOO\ZHKDYHDSUREOHPZLWKWKHterm³IUHHVRIWZDUH´LWVHOIQRW
WKHFRQFHSW,¶YHEHFRPHFRQYLQFHGWKDWWKHWHUPKDVWRJR
7KHSUREOHPZLWKLWLVWZRIROG)LUVWLW¶VFRQIXVLQJWKHWHUP³IUHH´LVYHU\
DPELJXRXV VRPHWKLQJWKH)UHH6RIWZDUH)RXQGDWLRQ¶VSURSDJDQGDKDV
 0XQGLH &UDLJ ³&RPPHUFLDO VRIWZDUH VXVWDLQDEOH LQQRYDWLRQ´ (P KWWSQHZVFRPFRP
KWPO"OHJDF\ FQHW9LVXDOL]DGRHP
KWWSZZZVRIWZDUHOLYUHJRYEU6Z/LYUH
Software livre, cultura hacker e o ecossistema da colaboração • 121

WRZUHVWOHZLWKFRQVWDQWO\ 'RHV³IUHH´PHDQ³QRPRQH\FKDUJHG"´RU
GRHVLWPHDQ³IUHHWREHPRGL¿HGE\DQ\RQH´RUVRPHWKLQJHOVH"
6HFRQGWKHWHUPPDNHVDORWRIFRUSRUDWHW\SHVQHUYRXV:KLOHWKLVGRHV
QRWLQWULQVLFDOO\ERWKHUPHLQWKHOHDVWZHQRZKDYHDSUDJPDWLFLQWHUHVW
LQ FRQYHUWLQJ WKHVH SHRSOH UDWKHU WKDQ WKXPELQJ RXU QRVHV DW WKHP
7KHUH¶V QRZ D FKDQFH ZH FDQ PDNH VHULRXV JDLQV LQ WKH PDLQVWUHDP
EXVLQHVV ZRUOG ZLWKRXW FRPSURPLVLQJ RXU LGHDOV DQG FRPPLWPHQW WR
WHFKQLFDO H[FHOOHQFH  VR LW¶V WLPH WR UHSRVLWLRQ :H QHHG D QHZ DQG
EHWWHUODEHO

0XQGLH DR HVWDEHOHFHU VXD FUtWLFD DR PRGHOR OLYUH H j *3/ HP QHQKXP
PRPHQWRXVDDH[SUHVVmR³VRIWZDUHOLYUH´ ³IUHHVRIWZDUH´ 7RGDVDVYH]HVTXHD
SDODYUDOLYUHpXVDGDpQRVHQWLGRGH³GDUGHJUDoD´2open sourceDRFRQWUiULRp
FLWDGRYiULDVYH]HVDVVLPFRPRD2SHQ6RXUFH,QLWLDWLYH$RTXHSDUHFHDVROXomR
GRSUREOHPDGDDPELJXLGDGHGRWHUPRGDGDSRU5D\PRQGRQRPHopen source
DSHQDV SURSRUFLRQRX j 0LFURVRIW XPD EDVH GH FRPSDUDomR FRP VHX SURJUDPD
Shared Source DOJRFRPRFyGLJRFRPSDUWLOKDGR HPTXHDHPSUHVD³DEUH´SDUWHV
GRFyGLJRGHFHUWRVSURJUDPDVGHVXDSURSULHGDGHSDUDDOJXPDVHQWLGDGHVVHOH
FLRQDGDVFRPRJRYHUQRVHHPSUHVDV(QWUHD0LFURVRIWHHVVDVHQWLGDGHVpHVWD
EHOHFLGRXPUtJLGRFRQWUDWRGHFRQ¿GHQFLDOLGDGHHPTXHHPQHQKXPPRPHQWRD
HPSUHVDDEUHPmRGHVXDSURSULHGDGHLQWHOHFWXDO$H[LVWrQFLDGD26,HGRWHUPR
open sourceDOpPGLVVRSHUPLWLXj0LFURVRIWGLDORJDUFRPXPDGYHUViULRWmRFRP
SURPHWLGR FRP YDORUHV SUiWLFRV TXDQWR HOD $R PHVPR WHPSR SRVVLELOLWRX TXH
R WHUPR ³free software´ H SRU FRQVHTXrQFLD VHXV UHSUHVHQWDQWHV H VXDV OXWDV 
SXGHVVHVHUGHVFRQVLGHUDGRQRHL[RKRUL]RQWDOGHIRUPXODo}HVSRVVtYHLVGRGL]HU
MiTXHKDYLDRXWURjGLVSRVLomR

Conclusão

$DQiOLVHIHLWDDWpDTXLXVRXFRPPXLWDIUHTXrQFLDDVGHFODUDo}HVHWH[WRV
GH GRLV SHUVRQDJHQV (UFL 5D\PRQG H 5LFKDUG 6WDOOPDQ $ RSomR SHOD OHLWXUD H
DQiOLVHGRPDWHULDOSURGX]LGRSRUDPERVDFRQWHFHSRUVHUHPRVGRLVRVSULQFLSDLV
³SRUWDYR]HV´GHVVHPRYLPHQWRSRODUL]DGR6WDOOPDQH5D\PRQGVmRFRQVLGHUDGRV
RV³¿OyVRIRV´GHVVDVGXDVSULQFLSDLVFRUUHQWHVHSRUHOHVSDVVDPDVGHFODUDo}HV
S~EOLFDV GH GXDV LQVWLWXLo}HV LPSRUWDQWHV D )6) H D 26, 1mR VH SUHWHQGH HP
QHQKXPPRPHQWRWUDEDOKDUVREUHDV³FULDo}HV´GHVVHVGRLVVXMHLWRVHVLPSHUFHEHU
 (P 2UODQGL   ³&RXUWLQH   H[SOLFLWD HVVD GLIHUHQoD FRQVLGHUDQGR D FRQVWLWXLomR ± R TXH HVWDPRV
FKDPDQGRGHLQWHUGLVFXUVR±UHSUHVHQWDGDSRUXPHL[RYHUWLFDORQGHWHUtDPRVWRGRVRVGL]HUHVMiGLWRV±HHVTXHFLGRV
± HP XPD HVWUDWL¿FDomR GH HQXQFLDGRV TXH HP VHX FRQMXQWR UHSUHVHQWD R GL]tYHO ( WHUtDPRV R HL[R KRUL]RQWDO ±
R LQWUDGLVFXUVR ± TXH VHULD R HL[R GD IRUPXODomR LVWR p DTXLOR TXH HVWDPRV GL]HQGR QDTXHOH PRPHQWR GDGR HP
FRQGLo}HVGDGDV´
122 • Software livre, cultura hacker e o ecossistema da colaboração

FRPR DV LQVWLWXLo}HV TXH FKH¿DP XVDP GH DUJXPHQWRV EDVHDGRV HP PHPyULDV
GLVFXUVLYDVFRPGLIHUHQWHVLQWHUSUHWDo}HV
 8PSRXFRGRTXHFRQVHJXLPRVSHUFHEHUDTXLWUDoDQGRRSHUFXUVRGHVVHV
GLVFXUVRVIRLFRPRDFULDomRGHXPDHQWLGDGH D2SHQ6RXUFH,QLWLDWLYH GHXP
WHUPRHPSDUWLFXODU open source IRLDOJRGHJUDQGHLPSDFWRQDDFHLWDomRGRPR
YLPHQWRSRUXPDSDUWHGDVRFLHGDGH3DUDPHOKRUUHWUDWDURSRVLFLRQDPHQWRGHVVHV
WHUPRVRTXDGURDEDL[RVHUiLQWHUHVVDQWH

software livre código aberto software proprietário (comercial)


liberdade H¿FLrQFLDHYROXomR UHDOLGDGHH[SHULrQFLD
*18/LQX[ /LQX[ :LQGRZV
FSF OSI Microsoft

1RGLVFXUVRRVVHQWLGRVGHVVHVWHUPRVGHULYDPWUDQVIRUPDPVHUHODFLR
QDPVHHUHVVLJQL¿FDPVHXQVDRVRXWURV'L]HUGHXPDIRUPDRXGHRXWUDXVDU
HVWD RX DTXHOD SDODYUD LPSOLFD HP XPD FDGHLD GH UHODo}HV GH VHQWLGRV H GH
PHPyULDVHP¿OLDo}HV2SUySULR6WDOOPDQID]XPDHVWULWD³YLJLOkQFLD´QHVVHVHQ
WLGRHFRQVLGHUDRXVRGHFHUWRVWHUPRVFRPRSURYDGHFRPSURPLVVRFRPD)6)
HFRPRVRIWZDUHOLYUH1mRVHWUDWDDSHQDVGRUHFRQKHFLPHQWRGRWUDEDOKRGD)6)
QDFRQVWUXomRGR*18/LQX[GL]HUDSHQDV/LQX[LPSOLFDHPDVVRFLDomRFRPD26,
1DPHPyULDGL]HU/LQX[VHPRVWUDFRPRGL]HU³HVWRXQLVVRSHODH¿FLrQFLDSHODV
YDQWDJHQVWpFQLFDV´
 3HODV GHFODUDo}HV GH 5D\PRQG R REMHWLYR FRP D 26, HUD UHVROYHU R
SUREOHPDGDDPELJXLGDGHGRWHUPRHFULDUXPDOLQJXDJHPTXHQmRGHL[DVVHGHV
FRQIRUWiYHLVRVH[HFXWLYRVHDVHPSUHVDVYLVWRVFRPRSRWHQFLDLVSDUFHLURV0DV
RTXHYHPRVpTXHHQTXDQWRKiIDODKiSROtWLFD3HODGHULYDomRGRVVHQWLGRVR
QRYRWHUPRQmRVHHVYD]LRXSROLWLFDPHQWHSHORFRQWUiULRDSUR[LPRXVHGR³RXWUR
ODGR´GRPXQGRGDSURSULHGDGH2TXDGURDFLPDPRVWUDFRPRQDKLVWyULDFHUWRV
VHQWLGRVVHOLJDPDRXWURVHSDUDHOHVGHULYDP)RLGHSRLVTXHXPQRYRVHQWLGRVH
HVWDELOL]RXRopen sourceTXHDOJXQVHPSUHViULRVGHFLGLUDPVHDYHQWXUDUQHVVH
QRYRPRGHORGHQHJyFLRV
 'HIDWRRPXQGRGRVQHJyFLRVSULQFLSDOPHQWHQRV(8$UHIHUHVHTXDVH
TXHH[FOXVLYDPHQWHDRopen source(QmRSRGHULDVHUGLIHUHQWHGDGRTXHDH[
SUHVVmRfreeVRIWZDUHWUD]FRQVLJRDGHQ~QFLDGDGHVLJXDOGDGHGHTXHH[LVWHPRV
³3HUJXQWDVHJXLGDGHUHVSRVWDGRSUySULRIHLWDD5LFKDUG06WDOOPDQ³(QTXDQWRR3URMHWR.'(HD)UHH6RIWZDUH
)RXQGDWLRQ DOJXPDV YH]HV WLYHUDP XP GXUR UHODFLRQDPHQWR SDUHFH TXH DOJXQV GH VHXV GHVHQYROYHGRUHV WrP
HVWHQGLGRDPmRj)6)±SRUH[HPSORLQFOXLQGR*18QRWHUPRTXHDOJXQVDGRWDUDPSDUDVHUHIHULUDRGHVNWRS*18
/LQX[EDVHDGRQR.'(.*; .'(*18OLQX; 9RFrDFKDTXHSRGHH[LVWLUHVSDoRSDUDPDLVFRRSHUDomRHQWUHRVGRLV
SURMHWRVHPXPIXWXURSUy[LPR"
506&HUWDPHQWH  4XDQWRPDLVHOHVTXLVHUHPFRRSHUDUFRQRVFRPDLVQyVSRGHPRVFRRSHUDU´
Software livre, cultura hacker e o ecossistema da colaboração • 123

TXHWrPHRVTXHQmRWrP1mRVHUiHVVHGLVFXUVRTXHIDUiVHQWLGRSDUDRVHP
SUHViULRV
0DVKiPDLVDVUD]}HVGRVXFHVVRGRWHUPRopen sourceSRGHPVHUHQ
FRQWUDGDVWDPEpPQDVXDSUR[LPLGDGHFRPDLGHLDGHVHOHomRQDWXUDOHGHDPELHQWH
FRPSHWLWLYR3DUDRVTXHWrPSDUDRVGRQRVGRVPHLRVGHSURGXomRDGHVLJXDOGDGH
pIUXWRGDGLIHUHQoDGHSHUIRUPDQFHGDTXHOHVTXHVmRPDLVH¿FLHQWHVHGRVTXHVmR
LQDSWRV2V³PHOKRUHV´VREUHYLYHPHQULTXHFHPHVmRUHFRPSHQVDGRV2V³LQDSWRV´
PRUUHPHFRPLVVRRVLVWHPDHPVLPHOKRUD6HPHVWDUGHDFRUGRFRPHVVD¿
ORVR¿DGHGHVHQYROYLPHQWRRWHUPRopen sourceHVWDULDIDGDGRDRIUDFDVVRHQmR
IDULDVHQWLGR1mRpSRVVtYHOVLPSOHVPHQWHGHVDVVRFLDUVHGHXPFDPSRVHUiQH
FHVViULRDVVLPLODUVHDRRXWURGRPLQDQWHGDQGRDLPSUHVVmRGHTXHRTXHKDYLD
GHLGHROyJLFRVHFDORXTXDQGRDSHQDVWUDQVPXWRXVHGHXPDUJHPDGHULYDo}HV
 7DPEpPDRH[LVWLURWHUPRFyGLJRDEHUWRFRQWULEXLXFRPXPDPDUJLQDOL]DomR
GDH[SUHVVmRVRIWZDUHOLYUHID]HQGRFRPTXHHODIRVVHFDGDYH]PDLVDVVRFLDGD
FRP³LGHDOLVPR´³UHOLJLmR´³FUHGR´³UDGLFDOLGDGH´6HpVRERWHUPR³FyGLJRDEHUWR´
TXHVHDEULJDPDTXHOHVGRPRYLPHQWRTXHSULYLOHJLDPDWpFQLFDHDH¿FLrQFLDRV
RXWURVVmRRV³LGHyORJRV´RV³FRPXQLVWDV´HRVPHQRV³H¿FLHQWHV´
 1mRSDUHFHVHUFRUUHWRDWULEXLUDDGHVmRGRVHPSUHViULRVDRVRIWZDUHOLYUH
FRPRDOJRH[FOXVLYDPHQWHOLJDGRjFULDomRGHXPQRYRWHUPRFRPR³FyGLJRDEHUWR´
'HVGHPHDGRVGDGpFDGDGHHUDFUHVFHQWHRQ~PHURGHHPSUHVDVTXHSDVVRX
D WUDEDOKDU FRP VRIWZDUH OLYUHV 2 TXH R WHUPR H D LQVWLWXLomR TXH R FRUURERURX
D26, SDUHFHPWHUSHUPLWLGRIRLDOLJDomRGHVVDVLQLFLDWLYDVHPSUHVDULDLVDXPD
LQVWLWXLomR D 26,  H XP WHUPR R ³FyGLJR DEHUWR´  HP TXH D QmR GLVWLQomR HQWUH
XVXiULR H SURGXWRU DSDUHFHVVH GH IRUPD QHXWUDOL]DGD DWp PHVPR UHFXViYHO RX
SDVVtYHOGHVHUHVTXHFLGD 
 0DVQmRVHULDDSHQDVQRH[DPHGRVWHUPRVfree e openTXHFRQVHJXLUtDPRV
LGHQWL¿FDUHVVHVIDWRUHV2VHQWLGRQmRVHUHVWULQJHDHVVHVWHUPRVHOHVWrPXPD
KLVWyULD VmR GLWRV SRU FHUWDV SHVVRDV HVWmR QR PXQGR ( p QD KLVWyULD TXH HOHV
VLJQL¿FDPVHVmRUHIRUPXODGRVHDVVRFLDGRVDLGHLDVTXHYmRDOpPGRVLJQL¿FDGR
LPHGLDWRGDTXHODVSDODYUDV
124 • Software livre, cultura hacker e o ecossistema da colaboração

Seção III
Software livre na periferia do sistema

1DVFLGRQRV(8$H³FRPSOHWDGR´SRUXP¿QODQGrVRVLVWHPDRSHUDFLRQDO
*18/LQX[HVXD¿ORVR¿DGHGHVHQYROYLPHQWRSDVVDPDSDUWLUGR¿PGHGpFDGD
GHDDWUDLUDDWHQomRWDPEpPQRVSDtVHVSHULIpULFRV1R%UDVLORVSULPHLURV
JUXSRVGHXVXiULRVVXUJHPQHVVHPHVPRSHUtRGRDOJXQVGHOHVOLJDGRVDXQLYHU
VLGDGHV RXWURV IRUPDGRV SRU WpFQLFRV H MRYHQV D¿FFLRQDGRV SRU LQIRUPiWLFD $
SULPHLUD GLVWULEXLomR EUDVLOHLUD GH /LQX[ D &RQHFWLYD SURGX]LGD QXPD HPSUHVD
VHGLDGDHP&XULWLEDIRLODQoDGDHP
 1R HQWDQWR XPD GDV SULPHLUDV LQLFLDWLYDV LQVWLWXFLRQDLV SHOD DGRomR GR
VRIWZDUHOLYUHHPODUJDHVFDOD HPERUDVHPWHUDOFDQoDGRr[LWR YHPGHXPSROtWLFR
(PGH]HPEURGHRGHSXWDGR:DOWHU3LQKHLURGR3DUWLGRGRV7UDEDOKDGRUHV
HQYLRXDR&RQJUHVVR1DFLRQDOXPSURMHWRGH/HLTXHSHGLDDDGRomRSUHIHUHQFLDO
SRUSDUWHGRSRGHUS~EOLFRGHVRIWZDUHVFRPOLFHQFLDPHQWROLYUH2SURMHWRDWpKRMH
QmRIRLYRWDGRQD&kPDUD
 'HSURMHWRVFRPRHVVHVTXHPDUFDPXPDLQWHUYHQomRFODUDGRSRGHUS~EOLFR
QDDGRomRGHFHUWRVSDGU}HVGHUHODomRGHSURSULHGDGHGRSURGXWRVRIWZDUHHSRU
FRQVHTXrQFLDGHGHWHUPLQDGDVWHFQRORJLDVGHULYDPGHEDWHVPXLWRLQWHUHVVDQWHV
SULQFLSDOPHQWHVHFRQVLGHUDUPRVTXHDOLFHQoDOLYUHLQVWLWXLXPDQRYDUHODomRHQWUH
XVXiULRHSURGXWRU RXGRQR GRVRIWZDUHHPTXHDRSULPHLURpSHUPLWLGRLJXDODUVH
DRVHJXQGRRXVHMDHPTXHDGLIHUHQoDHQWUHRVLPSOHVXVXiULRHRGHVHQYROYHGRU
GRVRIWZDUHpQXEODGDHSRGHVHUDQXODGD
 &RPRYLPRVKiXPDFRQWUDGLomRHQWUHDOLFHQoDOLYUHHDOLFHQoDSURSULH
WiULD HP TXH RV SURSRQHQWHV GD SULPHLUD VmR REMHWR GH XPD WHQWDWLYD GH VLOHQ
FLDPHQWRSHORVGHIHQVRUHVGDVHJXQGD$OLFHQoDOLYUHDSRQWDDFRQGLomRGHVLJXDO
HQWUHDTXHOHVTXHSRGHPHRVTXHQmRSRGHPDOWHUDUGLVWULEXLUHFRSLDURVRIWZDUH
SRVWXODQGRXPDQRYDQRUPD&RPRVHSRVLFLRQDPHQWmRQHVVHGHEDWHVXMHLWRVTXH
YLYHPHPVRFLHGDGHVHPTXHDGLIHUHQoDVRFLDOHGHFODVVHpEDVWDQWHDFHQWXDGD"
&RPR LPDJLQDP R SDSHO GHVVD WHFQRORJLD TXH WUD] HP VL XPD QRYD UHODomR GH
SURSULHGDGHHFRPRDUHODFLRQDPFRPDLQVHUomRSHULIpULFDHGHSHQGHQWHGHVHXV
SDtVHV"
 6REHVVHSRQWRGHYLVWDVHUiLQWHUHVVDQWHHQWmRDQDOLVDUWUrVGRFXPHQWRV
KWWSZZZFDPDUDJRYEU,QWHUQHWVLOHJ3URSB'HWDOKHDVS"LG 
 &RPR Mi SXGHPRV YHU HPERUD R TXH HVWHMD VHQGR DGRWDGR SUHIHUHQFLDOPHQWH VHMD XP GHWHUPLQDGR WLSR GH
OLFHQFLDPHQWRLVVRLPSOLFDWDPEpPQDDGRomRGHFHUWRVSDGU}HVWHFQROyJLFRVMiTXHKiWRGDXPDOLQKDGHVRIWZDUHV
TXHIXQFLRQDPHPFRQMXQWRHSDUDLVVRWHPXPVLVWHPDGHOLFHQFLDPHQWRFRPSDWtYHO
Software livre, cultura hacker e o ecossistema da colaboração • 125

GHEDWHVHPHVSHFLDORMiUHIHULGR3URMHWRGH/HLGRGHSXWDGREUDVLOHLUR:DOWHU3L
QKHLUR R SURMHWR GH FDUiWHU VHPHOKDQWH GR GHSXWDGR SHUXDQR (GJDUG 9LOODQXHYD
1XxH]TXHIRLVHJXLGRGHFDUWDGHUHSUHVHQWDQWHGD0LFURVRIWFRQWHVWDQGRRSURMHWR
HGHWUpSOLFDGRGHSXWDGRHRGHEDWHPDUFDGRSHORLQtFLRGRJRYHUQR/XODQR%UDVLO
TXHLQLFLRXXPDVpULHGHDo}HVYROWDGDVSDUDRXVRSUHIHUHQFLDOGRVRIWZDUHOLYUH
8PGRVPRPHQWRVPDLVLQWHQVRVGHVVHGHEDWHGHXVHTXDQGRGHXPDDomRMXGLFLDO
GD0LFURVRIWFRQWUDRSUHVLGHQWHGR,QVWLWXWR1DFLRQDOGH7HFQRORJLDGD,QIRUPDomR
6pUJLR$PDGHXDFXVDGRGHGLIDPDUDHPSUHVD

O projeto de Pinheiro e os apensados

$SUHVHQWDGRHPGH]HPEURGHRSURMHWRGH/HLGRGHSXWDGR:DOWHU
3LQKHLUR HQFRQWUDVH HP WUDPLWDomR QD &kPDUD )HGHUDO$ HOH IRUDP DSHQVDGRV
PDLV FLQFR RXWURV SURMHWRV WLGRV FRPR GH WHRU VHPHOKDQWH 8P IRL DSUHVHQWDGR
HPSHORGHSXWDGR:HUQHU:DQGHUHU 3)/ RXWURHPSHORGHSXWDGR
/XL] %LWWHQFRXUW 30'%  RXWUR HP  SHOR GHSXWDGR 6pUJLR 0LUDQGD 3& GR
% RXWURHPSHORGHSXWDGR&RURQHO$OYHV 3/ HR~OWLPRHPSHOR
GHSXWDGR/XL]&RXWR 37 
 %RDSDUWHGDMXVWL¿FDWLYDSUHVHQWHQRSURMHWRGRGHSXWDGR:DOWHU3LQKHLUR
pDSHQDVXPDWUDGXomR¿HOGHWUHFKRVGRWH[WR³<HDUVRI)UHH6RIWZDUH´HVFULWR
SRU5LFKDUG6WDOOPDQSDUDDUHYLVWDLinux TodayHPPDUoRGH7UDWDVHGH
XPSHTXHQRKLVWyULFRGRSURMHWR*18HPTXH6WDOOPDQD¿UPDVXDPRWLYDomRDR
LQLFLDURSURMHWRFRPRHVWHIRLFRPSOHWDGRFRPRNHUQHO/LQX[HFRPRRFRQMXQWR
MiVHULDXWLOL]DGRSRUPLOK}HVGHSHVVRDVHPWRGRPXQGR
 1RWUHFKR¿QDOGDMXVWL¿FDWLYDGRGHSXWDGRpDGLFLRQDGRRVHJXLQWHWUHFKR
TXHQmRH[LVWHQRWH[WRGH6WDOOPDQ

³(VWH SURJUDPD >R *18/LQX[@ p DSHQDV XP H[HPSOR GH FRPR D


OLEHUGDGH QD DOWHUDomR GLVWULEXLomR H XWLOL]DomR GH SURJUDPDV GH
FRPSXWDGRU SRGH WUDQVIRUPDU DLQGD PDLV UDSLGDPHQWH H GH PDQHLUD
PDLVGHPRFUiWLFDRSHU¿OGRGHVHQYROYLPHQWRVRFLDOHWHFQROyJLFRQR
PXQGR
KWWSZZZFDPDUDJRYEU,QWHUQHWVLOHJ3URSB'HWDOKHDVS"LG 
KWWSZZZFDPDUDJRYEU,QWHUQHWVLOHJ3URSB'HWDOKHDVS"LG 
KWWSZZZFDPDUDJRYEU,QWHUQHWVLOHJ3URSB'HWDOKHDVS"LG 
KWWSZZZFDPDUDJRYEU,QWHUQHWVLOHJ3URSB'HWDOKHDVS"LG 
KWWSZZZFDPDUDJRYEU,QWHUQHWVLOHJ3URSB'HWDOKHDVS"LG 
 6WDOOPDQ 5LFKDUG ³ \HDUV RI )UHH 6RIWZDUH´ Linux Today  KWWSOLQX[WRGD\FRPQHZVBVWRU\
SKS"OWVQ 1:/)
 ³(PHUDLPSRVVtYHOXVDUXPFRPSXWDGRUPRGHUQRVHPDLQVWDODomRGHXPVLVWHPDRSHUDFLRQDOSURSULHWiULR
IRUQHFLGR PHGLDQWH OLFHQoDV UHVWULWLYDV GH DPSOR HVSHFWUR 1LQJXpP WLQKD SHUPLVVmR SDUD FRPSDUWLOKDU SURJUDPDV
VRIWZDUH  OLYUHPHQWH FRP RXWURV XVXiULRV GH FRPSXWDGRU H GL¿FLOPHQWH DOJXpP SRGHULD PXGDU RV SURJUDPDV SDUD
VDWLVID]HUDVVXDVQHFHVVLGDGHVRSHUDFLRQDLVHVSHFt¿FDV´
126 • Software livre, cultura hacker e o ecossistema da colaboração

2 (VWDGR FRPR HQWH IRPHQWDGRU GR GHVHQYROYLPHQWR WHFQROyJLFR H


GDGHPRFUDWL]DomRGRDFHVVRDQRYDVWHFQRORJLDVSDUDDVRFLHGDGH
QmRSRGHVHIXUWDUDVXDUHVSRQVDELOLGDGHGHSULRUL]DUDXWLOL]DomRGH
SURJUDPDVDEHUWRVRXRV³IUHHVRIWZDUHRSHQVRXUFH´(VHDVSHTXH
QDV PpGLDV H JUDQGHV HPSUHVDV PXOWLQDFLRQDLV Mi HVWmR DGRWDQGR
SURJUDPDV DEHUWRV HYLWDQGR DVVLP R SDJDPHQWR GH FHQWHQDV GH
PLOK}HVGHGyODUHVHPOLFHQFLDPHQWRGHSURJUDPDVSRUTXHGHYHULDR
(VWDGR FRP XPD LQ¿QLGDGH GH FDXVDV VRFLDLV FDUHQWHV GH UHFXUVRV
FRQWLQXDUFRPSUDQGRHFDURRVSURJUDPDVGHPHUFDGR"´

/RJRQDSULPHLUDIUDVHRPRGHOROLYUHGHOLFHQFLDPHQWRTXHJHURXR*18
/LQX[ p GHVFULWR FRPR DOJR TXH SRGH  ³WUDQVIRUPDU DLQGD PDLV UDSLGDPHQWH´ RX
VHMDDFHOHUDUXPDWUDQVIRUPDomRMiHPFXUVRGH³RSHU¿OGRGHVHQYROYLPHQWRVR
FLDOHWHFQROyJLFRQRPXQGR´¬UiSLGDWUDQVIRUPDomRQR³SHU¿O´DGLFLRQDVHXPD
FDUDFWHUtVWLFDVHULD³PDLVGHPRFUiWLFD´$OLFHQoDOLYUHTXHSHUPLWHTXHXVXiULRV
DOWHUHPRVSURJUDPDVSRGHULDDFHOHUDUDDOWHUDomR ³WUDQVIRUPDU´R³SHU¿O´ GDURWD
GHGHVHQYROYLPHQWRVRFLDOHWHFQROyJLFR
 (PVHJXLGDR(VWDGRpFRORFDGRHPXPSDSHODWLYRQR³GHVHQYROYLPHQWR
WHFQROyJLFR´HQD³GHPRFUDWL]DomRGRDFHVVR´$RPHVPRWHPSRSDUDVXDDomRp
HVWDEHOHFLGRXPUHIHUHQFLDOH[WHUQRLQWHUQDFLRQDODV³JUDQGHVPpGLDVHSHTXHQDV
HPSUHVDVPXOWLQDFLRQDLV´TXHMiHVWDULDPHPSURFHVVRGHDGRomRGH³SURJUDPDV
DEHUWRV´PDVFRPRREMHWLYRGHUHGX]LUHPFXVWRV2(VWDGR³FDUHQWHGHUHFXUVRV´
GHYHULDID]HURPHVPR
 $RMXVWL¿FDUD/HLRSURMHWRHQWmRFDPLQKDHPGXDVGLUHo}HVDSULPHLUDD
GDrQIDVHQDWUDQVIRUPDomRVRFLDOHWHFQROyJLFDUXPRDDOJR³PDLVGHPRFUiWLFR´
D VHJXQGD D GD MXVWL¿FDWLYD HFRQ{PLFD R (VWDGR WHP TXH HFRQRPL]DU GHYH
SULRUL]DU RV LQYHVWLPHQWRV VRFLDLV  SDUD D TXDO EXVFDVH XP H[HPSOR YLQGR GR
H[WHULRUHGRVHWRUHPSUHVDULDO DTXHOHTXHUDFLRQDOL]DDRPi[LPRVHXVJDVWRV e
PXLWRLQWHUHVVDQWHWDPEpPFRPRHPERUDVHMDGLWRTXHR*18/LQX[pXVDGRSRU
HPSUHVDVHOHpFRORFDGRIRUDGR³PHUFDGR´2(VWDGRGHYHULDGHL[DUGHFRPSUDU
RV³SURJUDPDVGHPHUFDGR´
 $MXVWL¿FDWLYDHFRQ{PLFDpD~QLFDTXHSRGHVHUHQFRQWUDGDWDPEpPHP
WRGRV RXWURV FLQFR SURMHWRV GH /HL DSHQVDGRV DR GH 3LQKHLUR 2V SURMHWRV GRV
GHSXWDGRV :DQGHUHU GH   H %LWWHQFRXUW GH   DSUHVHQWDP HVVD FRPR
~QLFD MXVWL¿FDWLYD -i R SURMHWR GH$OYHV GH   VRPD D HVVD MXVWL¿FDWLYD XPD
PHOKRU H¿FLrQFLD GR VLVWHPD OLYUH HP DUJXPHQWDomR VHPHOKDQWH j XVDGD FRPR
YLPRV QR FDStWXOR DQWHULRU SHORV GHIHQVRUHV GR RSHQ VRXUFHFyGLJR DEHUWR -i R
 (P RXWUR WH[WR SUHSDUDGR HP  SDUD XP )yUXP QD &kPDUD GRV 'HSXWDGRV 3LQKHLUR DLQGD UHIRUoD HVVD
DUJXPHQWDomRGL]HQGRHPXPSULPHLURPRPHQWR
³*RVWDUtDPRV TXH R OHLWRU DWHQWDVVH DR PRYLPHQWR LQWHUQDFLRQDO SHOR VRIWZDUH OLYUH SRUTXH HVWDPRV IDODQGR GH
XPD UHYROXomR QD LQIRUPiWLFD H PDLV TXH LVVR QR DFHVVR DR FRQKHFLPHQWR (VWDPRV IDODQGR GH SURJUDPDV VHP
SURSULHWiULRVSURJUDPDVOLYUHV´
Software livre, cultura hacker e o ecossistema da colaboração • 127

SURMHWRGH0LUDQGD GH GLULJHVHjRIHUWDSRUSDUWHGRJRYHUQRIHGHUDOGH


VHUYLoRVQDLQWHUQHWTXHIXQFLRQHPWDPEpPHPFRPSXWDGRUHVTXHWHQKDPVLVWHPDV
OLYUHVLQVWDODGRV2SURMHWRGH&RXWR GH SRUVXDYH]HVWiYROWDGRDRXVRGH
VLVWHPDVOLYUHVSDUDDHGXFDomRHXVDWUHFKRVFRQWLGRVQRVSURMHWRVGH3LQKHLURH
%LWWHQFRXUW
 'RVVHLVSURMHWRVRGH$OYHVpR~QLFRTXHIDODHPVRIWZDUHOLYUH2VRXWURV
XVDPRWHUPR³SURJUDPDVLVWHPDDEHUWR´ID]HQGRUHIHUrQFLDjOLYUHPDQLSXODomRH
GLVWULEXLomRGRFyGLJRIRQWH2VSURMHWRVGH3LQKHLURH&RXWRIDODPWDPEpPHP³IUHH
VRIWZDUHRSHQVRXUFH´H³RSHQIUHHVRIWZDUH´3HODGHVFULomRFRQWLGDQRSURMHWRGH
:DQGHUHUSHUFHEHVHTXHRWHUPR³SURJUDPDVLVWHPDDEHUWR´QmRpXVDGRFRPR
VLQ{QLPRQHPGHRSHQVRXUFHQHPGHVRIWZDUHOLYUH$UHIHUrQFLDpDSHQDVDXP
OLFHQFLDPHQWRTXHSHUPLWHDRXVXiULRDOHLWXUDGRFyGLJRIRQWHGRSURJUDPDVHP
QHFHVVDULDPHQWH HVWDU SHUPLWLGD D DOWHUDomR RX UHGLVWULEXLomR (VVH SURMHWR QmR
SURS}HDDGRomRGHXPDVROXomROLYUHHPOXJDUGHXPDVROXomRSURSULHWiULDHOHIDOD
QDDGRomRGHVLVWHPDVDEHUWRVHPOXJDUGHVLVWHPDV³IHFKDGRV´ DVSDVFRQWLGDV
QR3URMHWR RXVHMDSHGHRXVRGHVLVWHPDVTXHSRGHPVHUSURSULHWiULRVPDVGRV
TXDLVVHSRVVDOHURFyGLJRIRQWH
 2TXHFKDPDEDVWDQWHDDWHQomRHPWRGRVRVSURMHWRVpDUHODomRTXHHV
WDEHOHFHPFRPRH[WHULRU RXWURVSDtVHV FRPDVHPSUHVDVFRPRPHUFDGRHHP
HVSHFLDOFRPDPDLRUHPSUHVDGHVRIWZDUHSURSULHWiULRD0LFURVRIWHVHXVLVWHPD
RSHUDFLRQDOR:LQGRZV
 4XHUR GHVWDFDU R VHJXLQWH WUHFKR FRQWLGR QR SURMHWR GR GHSXWDGR /XL]
%LWWHQFRXUW GH 

³>*18/LQX[@FRORFDVHFRPRDOWHUQDWLYDYLiYHOHH[WUHPDPHQWHEHP
VXFHGLGD D VLVWHPDV RSHUDFLRQDLV SURSULHWiULRV WDO FRPR R :LQGRZV
FXMRVGLVWULEXLGRUHVDGRWDPSUiWLFDVPRQRSROtVWLFDVPXLWRDJUHVVLYDV
7DLV SURJUDPDV DEHUWRV YrP PRVWUDQGR VXD H¿FiFLD HP LQ~PHUDV
DSOLFDo}HVHPHVSHFLDOQRVHWRUSULYDGRFRPDYDQWDJHPGHSRGHUHP
VHU DGDSWDGRV H H[HFXWDUHP HP GLYHUVRV HTXLSDPHQWRV *UDQGHV
PXOWLQDFLRQDLVDH[HPSORGD&KU\VOHU%RHLQJ6RQ\H0HUFHGHV%HQ]
DGRWDPHPPXLWRVGHVHXVVLVWHPDVVROXo}HVDEHUWDVUHGX]LQGRFXVWRV
FRP OLFHQFLDPHQWR GH SURJUDPDV H JDUDQWLQGR XPD XQLIRUPLGDGH GH
VROXo}HVLQGHSHQGHQWHGHSODWDIRUPDV´

 1RSURMHWRGH3LQKHLURH[LVWHDPHQomRDR³VLVWHPDRSHUDFLRQDOSURSULH
WiULR´ PDV HVWH QmR UHFHEH QHQKXP QRPH HP HVSHFLDO QHQKXP ³SURSULHWiULR´ p
HVSHFL¿FDGR$H[SUHVVmRLQFOXVLYHHVWiQRWUHFKRTXHpXPDUHSURGXomRGRDUWLJR
GH6WDOOPDQ1RSURMHWRGH%LWWHQFRXUWD¿JXUDGRVRIWZDUHSURSULHWiULRSRUH[FH
128 • Software livre, cultura hacker e o ecossistema da colaboração

OrQFLDJDQKDXPQRPH ³:LQGRZV´ HDHPSUHVDTXHRGHWpP D0LFURVRIW UHFHEH


XPD GHVFULomR SDUD VHX PRGR GH ID]HU QHJyFLRV ³SUiWLFDV PRQRSROtVWLFDV PXLWR
DJUHVVLYDV´ $R PHVPR WHPSR ³JUDQGHV PXOWLQDFLRQDLV D H[HPSOR GD &KU\VOHU
%RHLQJ6RQ\H0HUFHGHV%HQ]´GmRXPH[HPSORGHFRPRIXJLUGHVVDHPSUHVDH
UHGX]LUFXVWRV
 $GHVFULomRGDSUiWLFDGHVVDHPSUHVDFRPRDJUHVVLYDHPGHPDVLDDSDUHFH
WDPEpP QR SURMHWR GH :HUQHU :DQGHUHU GH  1R HQWDQWR HOD QmR p FLWDGD
QRPLQDOPHQWH

³&DEH OHPEUDU DLQGD TXH D LQLFLDWLYD >FRPSUD GH SURJUDPDV GH


FRPSXWDGRU PDLV EDUDWRV FRP IXQFLRQDOLGDGH HTXLYDOHQWH@ IRL
SHUVHJXLGDGXUDQWHDQRVSHOR3RGHU([HFXWLYR)HGHUDODWUDYpVGHXP
SURJUDPDQRUPDWLYRGHFRPSUDVJRYHUQDPHQWDLVTXHDFDERXSUHWHULGR
HP YLUWXGH GH SUHVV}HV GH PDUNHWLQJ GH JUDQGHV IRUQHFHGRUHV GH
SURJUDPDVGHFRPSXWDGRU´

 $DFXVDomRGH³SUDWLFDVPRQRSROtVWLFDV´FRQWUDRV³GHWHQWRUHVGHVVHVLVWH
PD>:LQGRZV@´pUHSHWLGDQRWH[WRGRSURMHWRGH0LUDQGDTXHQmRFLWDDHPSUHVD
QRPLQDOPHQWHDSHQDVRSURGXWR2QRPHGD0LFURVRIWYDLDSDUHFHUQRSURMHWRGR
GHSXWDGR$OYHV TXH GL] ³&DGD YH] TXH D 0LFURVRIW ODQoD XPD QRYD YHUVmR GR
:LQGRZVOiVHYmRELOK}HVGHGyODUHVQRPXQGRLQWHLURSDUDSDJDPHQWRGHOLFHQoDV
SDUDRSHUDURVLVWHPD´
 2WH[WRGRSURMHWRGRGHSXWDGR&RXWRDTXHOHTXHVRPDWUHFKRVGRVSURMHWRV
GH 3LQKHLUR H %LWWHQFRXUW PDQWpP GR SULPHLUR DSHQDV R WUHFKR TXH GHVFUHYH
UHVXPLGDPHQWHDKLVWyULDGR*18/LQX[HUHSURGX]GRVHJXQGRDUHIHUrQFLDjV
JUDQGHVHPSUHVDVTXHMiXVDPVLVWHPDVOLYUHVDJUHJDQGRTXDLVVHULDPRVPRWLYRV
GHVWDV

³+RMH HVWH VLVWHPD RSHUDFLRQDO p XVDGR SRU PLOK}HV GH SHVVRDV


GH IRUPD OLYUH QR PXQGR LQWHLUR 0DLV GR TXH LVVR Ki XP LQFRQWiYHO
Q~PHURGH(PSUHVDVHQWUHHODVDVJLJDQWHVPXOWLQDFLRQDLV0HUFHGHV
%HQ]*HQHUDO0RWRUV6RQ\(OHFWURQLFVRSWDUDPSHORXVRGHVRIWZDUHV
OLYUHV  6mR WUrV RV SULQFLSDLV PRWLYRV TXH OHYDUDP WDLV (PSUHVDV D
HVVD RSomR   D OLEHUGDGH SDUD FULDU VROXo}HV SUySULDV TXH PXLWDV
YH]HV¿FDPFRPSURPHWLGDVSHODGHSHQGrQFLDHDWUHODPHQWRDSDGU}HV
IHFKDGRVGHVRIWZDUHV DVHJXUDQoDGHVHXVVLVWHPDVGHLQIRUPDomR
QDSURGXomRRUJDQL]DomRJHUHQFLDPHQWRHGLVWULEXLomRGHLQIRUPDo}HV
  R PDLV LPSRUWDQWH PRWLYR  D GUiVWLFD UHGXomR GH FXVWRV &RP D
DGRomRGHVRIWZDUHVOLYUHVHVWDV(PSUHVDVH[RQHUDPVHGDREULJDomR
GHSDJDPHQWRGHOLFHQoDVHDLQGDFRQWDPFRPDYDQWDJHPGHWHUSDUWH
GHVVHVSURJUDPDVDEHUWRVGLVWULEXtGRVJUDWXLWDPHQWH´
Software livre, cultura hacker e o ecossistema da colaboração • 129

 &RPRRSURMHWRGH3LQKHLURRGH&RXWRQmRFLWDGLUHWDPHQWHR:LQGRZV
QHPD0LFURVRIW1RHQWDQWRHOHGHVFUHYHFRQVHTXrQFLDVQRFLYDVGD³KHJHPRQLD
GRVVLVWHPDVIHFKDGRV´HDSUR[LPDVHGH3LQKHLURDRDSRQWDUFHUWDVYDQWDJHQVDR
GHVHQYROYLPHQWRQDFLRQDOGHULYDGDGRXVRGHVLVWHPDVDEHUWRV

³7DPEpPKiHPFXUVRSRUWRGRR3DtVXPDPSORHQHFHVViULRGHEDWH
VREUHRXVRPRQRSROLVWDGRVSURJUDPDVGHFRPSXWDGRUHVGHQRPLQDGRV
GH VRIWZDUHV SURSULHWiULRV  $ KHJHPRQLD GRV VLVWHPDV IHFKDGRV
FDXVDPSUHMXt]RVDHFRQRPLDQDFLRQDOHLQLEHPRGHVHQYROYLPHQWRGH
FLrQFLDHWHFQRORJLDQDFLRQDO
1DiUHDGHLQIRUPiWLFDRHQVLQRS~EOLFRGHYHUHSHQVDUHVVHPRGHOR
TXH WUDQVIRUPD DV SHVVRDV HP  ³FOLFDGRUHV´ GH ERW}HV TXH PDLV VH
DVVHPHOKDPDURE{VDGHVWUDGRVSDUDDH[HFXomRGHXPD~QLFDWDUHID
2SDSHOGDHGXFDomRS~EOLFDSRURXWURODGRpHVWLPXODUDFDSDFLGDGH
FULDWLYDGDVSHVVRDVREMHWLYDQGRWUDQVIRUPiODVHPFLGDGmRVSHQVDQWHV
FDSD]HV GH SURGX]LU H UHSURGX]LU FRQKHFLPHQWR H GH IRPHQWDU RV
HPSUHHQGHGRUHVVRFLDLVHPSUHVDULDLVHWHFQROyJLFRV´

 ³&OLFDGRUHVGHERW}HVTXHPDLVVHDVVHPHOKDPDURE{VDGHVWUDGRV´VmR
RVXVXiULRVGR:LQGRZV&RPHOHVQmRVHFRQVHJXLULDR³GHVHQYROYLPHQWR´6HULD
SUHFLVRHQWmRFULDU³FLGDGmRVSHQVDQWHVFDSD]HVGHSURGX]LU´$VVLPVHPGHL[DU
GH DUJXPHQWDU WDPEpP HP IDYRU GD UHGXomR GRV JDVWRV S~EOLFRV &RXWR UHWRPD
RHORJLRGDSRVVtYHOLQGLVWLQomRHQWUHSURGXWRUHVHXVXiULRVQDDUJXPHQWDomRHP
IDYRUGRVRIWZDUHOLYUH8PSRXFRPDLVjIUHQWHQRWH[WRHOHDLQGDGL]UHIRUoDQGRD
LGHLDGHPXGDQoDVRFLDOSURSRUFLRQDGDSHORVRIWZDUHOLYUH

³&RPLVVRPRGL¿FDVHDRULHQWDomRWUDGLFLRQDOGHQRVVDHGXFDomRQD
iUHD GH LQIRUPiWLFD WDPEpP FRQVWLWXLVH FRPR SDVVR LPSRUWDQWH QR
VHQWLGR GH IRPHQWDU RXWUDV SRVVLELOLGDGHV GH H[SORUDomR GH VRIWZDUH
H HTXLSDPHQWR DPSOLDQGR KRUL]RQWHV GH FRQKHFLPHQWRV H DMXGDQGR
SULQFLSDOPHQWHDUHGX]LUFXVWRV´

$VVLPFRPRRSURMHWRGH3LQKHLURIDODHP³WUDQVIRUPDURGHVHQYROYLPHQWR´
RSURMHWRGH&RXWRIDODHPPRGL¿FDU³DRULHQWDomRWUDGLFLRQDOGHQRVVDHGXFDomR´$
FUtWLFDDTXLWDPEpPpFRQWUDD0LFURVRIWTXHpFRQKHFLGDQDFRPXQLGDGHVRIWZDUH
OLYUHSRURIHUHFHUGHJUDoDRVLVWHPDRSHUDFLRQDO:LQGRZVSDUDHVFRODVHSURMHWRV
GHLQFOXVmRGLJLWDO$RRIHUHFHUVHXVSURJUDPDVDHPSUHVDWUHLQDULDRVEHQH¿FLDGRV
HPVXDWHFQRORJLDIDFLOLWDQGRDSHQHWUDomRGRSURGXWRQRPHUFDGR

$FRPSDUDomRPDLVIUHTXHQWHpFRPXP³SUHVHQWHGHJUHJR´4XHLUR]5XEHQV³3UHVHQWHGHJUHJR´6LWH'LFDVO
KWWSZZZGLFDVOXQLFDPSEUDUWLJRVOLQX[SUHVHQWHBGHBJUHJRVKWPO
130 • Software livre, cultura hacker e o ecossistema da colaboração

O projeto do Peru

 7RUQRXVH QRWyULD QD FRPXQLGDGH VRIWZDUH OLYUH D GLVFXVVmR TXH RS{V R


FRQJUHVVLVWDSHUXDQR(GJDU9LOODQXHYD1XxH]HD0LFURVRIWTXDQGRGDDSUHVHQ
WDomRHPGRSURMHWRGHDXWRULDGH1XxH]TXHSURS}HDDGRomRSULRULWiULDGH
VLVWHPDVOLYUHVSHORJRYHUQRSHUXDQR3RXFRPDLVGHWUrVPHVHVDSyVDSUHVHQWDomR
GRSURMHWRGH/HLHPPDUoRGHDHPSUHVDHQYLRXXPDFDUWDDRFRQJUHVVLVWD
SHUXDQRTXHVWLRQDQGRRSURMHWR$WUpSOLFDGH1XxH]TXHSURFXURXUHEDWHUTXDVH
SDUiJUDIRSRUSDUiJUDIRDFDUWDGDHPSUHVDFLUFXORXYLJRURVDPHQWHSHODLQWHUQHW
VHQGRXVDGDFRPRH[HPSORGHERDDUJXPHQWDomRSRUWRGDDFRPXQLGDGHOLYUH
 1RHQWDQWRJRVWDULDGHPHGHWHUHVSHFLDOPHQWHQDDQiOLVHGRWH[WRGRSUR
MHWRGD1XxH]HQDFDUWDDVVLQDGDSHORJHUHQWHJHUDOGD0LFURVRIW3HUX-XDQ
$OEHUWR *RQ]iOH] HQGHUHoDGD DR FRQJUHVVLVWD &RQVLGHUR TXH DOL VH HQFRQWUD R
FHQWURGDGLVFXVVmRTXHHVWDEHOHoRDTXLGHXPDPDQHLUDJHUDO DUHÀH[mRVREUHD
3ROtWLFD HHPHVSHFLDOQHVWHFDStWXOR DUHÀH[mRVREUHFRPRHVVHGHEDWHVHGHV
GREUDQDSHULIHULD 
 (P SULPHLUR OXJDU TXHUR FRPHQWDU DOJXQV WUHFKRV GR SURMHWR$ SULPHLUD
VHomRGRWH[WRpLQWLWXODGD³&RQVLGHUDQGR´HHVWDEHOHFHFHUWRVSUHVVXSRVWRVOHJDLV
SDUD D MXVWL¿FDWLYD ³H[SRVLFLyQ GH PRWLYRV´  TXH YLUi D VHJXLU $ SULPHLUD FRQ
VLGHUDomRUHIHUHVHDRSDSHOGR(VWDGRFRPUHODomRDRGHVHQYROYLPHQWRGDFLrQFLD
HGDWHFQRORJLDHQIDWL]DQGRRDWLYRSDSHOHVWDWDOHUHFHEHDVHJXLQWHIRUPXODomR
“4XHHODUWtFXORžGHOD&RQVWLWXFLyQHVWDEOHFHTXHHVGHEHUGHO(VWDGRSURPRYHU
HOGHVDUUROORFLHQWt¿FR\WHFQROyJLFRGHOSDtV´
 (PVHJXLGDDMXVWL¿FDomRGHVFUHYHXPFRQWH[WRKLVWyULFR DJOREDOL]DomR 
HVWDEHOHFHXPDUHODomRHQWUHVRIWZDUHHFRQKHFLPHQWRHDSRQWDSDUDXPDVLWXDomR
GHSHQGHQWHHQWUHXVXiULRSURSULHWiULRPDVTXHWDPEpPVHGHVGREUDHQWUHQDFLRQDO
HVWUDQJHLUR9HMDPRVRVSULPHLURVTXDWURSDUiJUDIRV

³(QODpSRFDGHJOREDOL]DFLyQTXHYLYLPRVXQRGHORVIDFWRUHV
FODYHVSDUDHOGHVDUUROORGHORVSDtVHVHVHOGRPLQLRGHODFLHQFLD
\GHODWHFQRORJtD

(VWRHVHVSHFLDOPHQWHFLHUWRFRQUHODFLyQDODLQIRUPiWLFDTXH
SHUPLWHPHGLDQWHSURJUDPDVR³VRIWZDUH´SURFHVDULQIRUPDFLyQ
QHFHVDULD SDUD ODV GLVWLQWDV iUHDV GHO FRQRFLPLHQWR (Q OD
DFWXDOLGDG QR H[LVWH SUiFWLFDPHQWH QLQJXQD DFWLYLGDG TXH
QR HV UHODFLRQDGD GH XQD X RWUD PDQHUD FRQ OD LQIRUPiWLFD \
REYLDPHQWHFRQORVSURJUDPDVLQIRUPiWLFRV

KWWSZZZJQXRUJSHSUROH\KWPO
KWWSZZZJQXRUJSHPVFDUWDKWPO
Software livre, cultura hacker e o ecossistema da colaboração • 131

(VWR FUHD XQD VLWXDFLyQ GH GHSHQGHQFLD HQ OD TXH QRV
FRQYHUWLPRVHQFRQVXPLGRUHVGHWHFQRORJtDHODERUDGDHQRWURV
SDtVHV (V PiV HVWD WHFQRORJtD VH HQFXHQWUD HQ FRQVWDQWH
GHVDUUROOR\FRPRFRQVHFXHQFLDGHHOORORTXHKR\HVQRYHGRVR
HQ SRFR WLHPSR VH FRQYLHUWH HQ REVROHWR REOLJiQGRQRV DVt D
WHQHU TXH DGTXLULU OD QXHYD WHFQRORJtD VLQR TXHUHPRV TXHGDU
UH]DJDGRV

(VWDFDUUHUDSRUQRTXHGDUDWUDVDGRVUHVXOWDHQHOHYDGRVFRVWRV
SRUSDJRGHOGHUHFKRGHXVRGHHVWDWHFQRORJtDLQIRUPiWLFD(VWR
HVSDUWLFXODUPHQWHFLHUWRHQODDGPLQLVWUDFLyQS~EOLFDFRPRHQ
OD DFWLYLGDG SULYDGD HQ ODV TXH SRU FRQFHSWR GH OLFHQFLDV GH
³VRIWZDUH´VHGHEHDERQDUHOHYDGDVVXPDVGHGLQHURFDGDDxR´

 eHVSHFLDOPHQWHLQWHUHVVDQWHFRPRDIXQomRRIXQFLRQDPHQWRGRVRIWZDUH
p GHVFULWR FRPR ³SURFHVVDU LQIRUPDomR´ H FRPR VH HVWDEHOHFH D LPDJHP GH TXH
³SUDWLFDPHQWHQHQKXPDDWLYLGDGH´GHL[DGHHVWDUUHODFLRQDGDDHOH´(PVHJXLGD
D UHODomR TXH VHULD DSHQDV GH FRQVXPR WRUQDVH HTXLYDOHQWH D XPD VLWXDomR GH
³GHSHQGrQFLD´(VVD³GHSHQGrQFLD´VHPRVWUDDLQGDPDLVSHULJRVDSRUVHGDUHP
UHODomRDRH[WHULRUDXPRXWURSDtV
 $LQGDQRPHVPRWHUFHLURSDUiJUDIRHGHSRLVQRTXDUWRVXUJHDLPDJHPGR
DWUDVR ³TXHGDUUH]DJDGRV´ $FRPSDQKDURULWPRGHGHVHQYROYLPHQWRGDWHFQRORJLD
LQWHUQDFLRQDOVHUiDOJRFDURPDVDRPHVPRWHPSRQmRDFRPSDQKDUVLJQL¿FDVHU
GHL[DGR SDUD WUiV 2 GHVHQYROYLPHQWR WHFQROyJLFR p GHVFULWR FRPR XPD FRUULGD
³FDUUHUD´ HPTXHRVSDUWLFLSDQWHVVHULDPHQWmRRVSDtVHV
 $DUJXPHQWDomRHFRQ{PLFDHVWiSUHVHQWHPDVRDOWRFXVWRGHVVD³FRUULGD´
pGHULYDGRGDVLWXDomRGH³FRQVXPLGRU´RFXSDGDSHORSDtV(PXPSURMHWRLQWLWXODGR
³3URMHFWRGH/H\6RIWZDUH/LEUH´RVRIWZDUHOLYUHMiVHDQXQFLDFRPRXPPHLRSDUD
URPSHUHVVH³FtUFXORYLFLRVR´GHGHSHQGrQFLDH[WHUQD
 0HVPRXVDQGRRWHUPRVRIWZDUHOLYUHHQmRFyGLJRRXSURJUDPDDEHUWRH
FLWDQGRDVTXDWUROLEHUGDGHVTXHGH¿QHPRVRIWZDUHOLYUHVHJXQGRD)UHH6RIWZDUH
)RXQGDWLRQ )6) RSURMHWRSRVVLYHOPHQWHSDUDHQIDWL]DUDHFRQRPLDGHUHFXUVRV
UHSHWHDGLFRWRPLDVRIWZDUHOLYUH[VRIWZDUHFRPHUFLDO GLFRWRPLDTXHD)6)UHSXGLD
SRLV R VRIWZDUH OLYUH WDPEpP SRGH VHU FRPHUFLDOL]DGR  $VVLP FRPR QR SURMHWR
EUDVLOHLURGH3LQKHLURSRVLFLRQDRVVLVWHPDVOLYUHVIRUDGRPHUFDGR
³3UHFLVDPHQWH OD DOWHUQDWLYD LQWHOLJHQWH \ YLDEOH D ORV SURJUDPDV
LQIRUPiWLFRVR³VRIWZDUH´FRPHUFLDOYLHQHDVHUHOGHQRPLQDGR³VRIWZDUH
OLEUH´ GHQRPLQDGR DVt SRUTXH VH EDVD HQ HO OLEUH HPSOHR GH ORV
SURJUDPDVGHFRPSXWDFLyQ´

2VH[WRSDUiJUDIRGHVVDVHomRGRSURMHWRGL]³(VWHSDQRUDPDKDFHQHFHVDULRTXHHO(VWDGRVHSUHRFXSHGHGDU
DOWHUQDWLYDVGHVROXFLyQTXHSHUPLWDQURPSHUHOFtUFXORYLFLRVRGHGHSHQGHQFLDWHFQROyJLFDHQODTXHQRVHQFRQWUDPRV
DVtFRPRDORVSUREOHPDVTXHGHHOORVHGHULYDQ´
132 • Software livre, cultura hacker e o ecossistema da colaboração

 3DUDH[HPSOL¿FDULQLFLDWLYDVVHPHOKDQWHVjGHVVHSURMHWRGH/HLTXHLQVWLWXLUi
D SUHIHUrQFLD SHOR VRIWZDUH OLYUH R H[HPSOR p LQWHUQDFLRQDO H LQFOXL HPSUHVDV H
³RUJDQL]Do}HV´1RHQWDQWRRVQRPHDGRVVmRSDtVHV

³&DEH UHLWHUDU TXH GHELGR D ODV YHQWDMDV TXH RIUHFH TXH ORV PLVPRV
XVXDULRVFUHHQVROXFLRQHVSURSLDVHVWDEOHFLHQGRVXVSURSLRVSDWURQHV
GHVHJXULGDGKDFHTXHVHDQFDGDYH]PiVHOQ~PHURGHHPSUHVDV\
RUJDQLVPRVTXHDGRSWHQHOVLVWHPDGHVRIWZDUHOLEUHFRPRSRUHMHPSOR
HO0LQLVWHULRGH'HIHQVDGH)UDQFLD\OD5HS~EOLFD3RSXODU&KLQD´

 $V ³VROXo}HV SUySULDV´ SRVVtYHLV GH VHUHP HQFRQWUDGDV SHOR XVXiULR GR
VRIWZDUH OLYUH OHYDULDP D SDGU}HV GH VHJXUDQoD ~QLFRV 2V H[HPSORV UHIHULGRV
)UDQoD H &KLQD SDtVHV FRQKHFLGRV SRU VXD RSRVLomRGHVFRQ¿DQoD FRP UHODomR
DR JRYHUQR GRV (VWDGRV 8QLGRV ID]HP FRP TXH D RULJHP GD DPHDoD FRQWUD D
VHJXUDQoDVHMDLPDJLQDGDQmRFRPRSDUWLQGRGHLQGLYtGXRVPDVVLPGRJRYHUQR
GRV(VWDGRV8QLGRV6HQGRRVRIWZDUHXPSURFHVVDGRUGHLQIRUPDo}HVFRPRIRL
DQXQFLDGRDQWHULRUPHQWHHOHHVWDULDYXOQHUiYHODRJRYHUQRGRV(8$VHRVRIWZDUH
OLYUHQmRIRUXWLOL]DGR
 3DUD FRQWUDDUJXPHQWDU R SURMHWR D FDUWD HQYLDGD SHOR UHSUHVHQWDQWH GD
0LFURVRIWDSyLDVHQDFRQVWUXomRGHXPDLPDJHPGDHPSUHVDFRPRSDUFHLUDGRV
(VWDGRV H GHIHQVRUD GH OHLV TXH VmR DSOLFDGDV LQWHUQDFLRQDOPHQWH $R PHVPR
WHPSRWHQWDFDUDFWHUL]DURGHSXWDGRFRPRDOJXpPTXHQmRPDQHMDFRUUHWDPHQWH
RVFRQFHLWRVTXHHPSUHJDQRWH[WRGRSURMHWR0DVGHPDLVLPSDFWRVHUiDDPHDoD
YHODGDTXHDFDUWDID]GHTXHHVVDHVSpFLHGHDWDOKRSDUDURPSHUR³FtUFXORYLFLRVR´
TXHVHULDDDGRomRGRVRIWZDUHOLYUHSRGHUiVHULQWHUSUHWDGDFRPRXPDLOHJDOLGDGH
XP EXUODU GH UHJUDV LQWHUQDFLRQDLV TXH WHULD SRU FRQVHTXrQFLD D UHGXomR GRV
LQYHVWLPHQWRVH[WHUQRVVLJQL¿FDQGRDFRQGHQDomRGH¿QLWLYDGR3HUXDRDWUDVR
 9HMDPRV R WUHFKR LQLFLDO TXH ID] DOXVmR D XP HQFRQWUR SUpYLR HQWUH R
GHSXWDGRHUHSUHVHQWDQWHVGDHPSUHVD

³   3UHFLVDPHQWH IUXWR GH QXHVWUD UHXQLyQ KR\ 8VWHG FRQRFH GH
QXHVWURVDYDQFHVDQLYHOLQWHUQDFLRQDOHQHOGLVHxRGHQXHYRVVHUYLFLRV
SDUDHOFLXGDGDQRGHQWURGHOPDUFRGHXQ(VWDGRPRGHORTXHUHVSHWD
\SURWHJHORVGHUHFKRVGHDXWRU
(VWHDFFLRQDUWDOFRPRFRQYHUVDPRVHVSDUWHGHXQDLQLFLDWLYDPXQGLDO
\KR\HQGtDH[LVWHQGLYHUVDVH[SHULHQFLDVTXHKDQSHUPLWLGRFRODERUDU
FRQSURJUDPDVGHDSR\RDO(VWDGR\DODFRPXQLGDGHQODDGRSFLyQGH
ODWHFQRORJtDFRPRXQHOHPHQWRHVWUDWpJLFRSDUDLPSDFWDUHQODFDOLGDG
GHYLGDGHORVFLXGDGDQRV´
Software livre, cultura hacker e o ecossistema da colaboração • 133

'HLQtFLRRGHSXWDGRpFRORFDGRFRPRDOJXpPTXHHVWiUHFHEHQGRLQIRU
PDo}HV±TXHSRGHPVHUHQWHQGLGDVFRPRDTXHODVjVTXDLVHOHQmRWHULDWLGRDFHVVR
DQWHVRXDVTXDLVHOHQRIXWXURQmRSRGHUiQHJDUWHUUHFHELGR±GHTXHDHPSUHVD
SRGH³RIHUHFHUVHUYLoRVSDUDRFLGDGmR´VHR(VWDGRIRU³PRGHOR´RXVHMD³UHVSHLWDU
RVGLUHLWRVDXWRUDLV´1RPXQGRWRGRpUHIRUoDGRQRSDUiJUDIRVHJXLQWHHODDJLULD
DVVLP)UHQWHjrQIDVHQDDomRHPQtYHOPXQGLDOGDHPSUHVDR(VWDGRSHUXDQR
VH DSHTXHQD ( DR UHIRUoDU D OHJDOLGDGH H D GHIHVD GH GLUHLWRV GH SURSULHGDGH
LQWHOHFWXDOGRVRIWZDUHSURSULHWiULRPDUFDRVRIWZDUHOLYUHFRPRDOJRPDLVSUy[LPR
GDLOHJDOLGDGH
 $RHVWDEHOHFHURSDUOHJDOLGDGH[LOHJDOLGDGHHDRUHIHUHQFLDUDo}HVPXQ
GLDLVRUHSUHVHQWDQWHGD0LFURVRIWHVWiOHPEUDQGRDH[LVWrQFLDGDVLQVWLWXLo}HVTXH
]HODP SHODV QRUPDV GR FRPpUFLR PXQGLDO FRPR D 2UJDQL]DomR 0XQGLDO GR &R
PpUFLR 20& $FDUWDFODVVL¿FDRSURMHWRGH/HLGH1XxH]FRPR³GLVFULPLQDWyULR´H
³DQWLFRPSHWLWLYR´(VVHVVmRRVWHUPRVH[DWRVTXHGH¿QHPDOJXPDVGDVYLRODo}HV
GHQRUPDVGD20&RTXHSRGHYDOHUDRSDtVVDQo}HVFRPHUFLDLV
 $JLJDQWDGDIUHQWHDR(VWDGRSHUXDQRDSRLDGDQRVRPEURVGD20&DLQ
G~VWULDGRVRIWZDUHSURSULHWiULR±³DTXHODTXHYHUGDGHLUDPHQWHID]LQYHVWLPHQWRV
LPSRUWDQWHV´±DPHDoDHQWmRGHL[DURSDtVRTXHFDXVDULDGHVHPSUHJRHXPDUH
GXomRQR3URGXWR,QWHUQR%UXWRGRSDtV

³$VtDOREOLJDUDO(VWDGRDIDYRUHFHUXQPRGHORGHQHJRFLRVTXHDSR\DUtD
H[FOXVLYDPHQWHHOVRIWZDUHGHFyGLJRDELHUWRHOSUR\HFWRVyORHVWDUtD
GHVDOHQWDQGRDODVFRPSDxtDVIDEULFDQWHVORFDOHVHLQWHUQDFLRQDOHVTXH
VRQ ODV TXH YHUGDGHUDPHQWH UHDOL]DQ LPSRUWDQWHV LQYHUVLRQHV FUHDQ
XQ VLJQL¿FDWLYR Q~PHUR GH SXHVWRV GH HPSOHRV GLUHFWRV H LQGLUHFWRV
DGHPiVGHFRQWULEXLUDO3%,YVXQPRGHORGHVRIWZDUHGHFyGLJRDELHUWR
TXHWLHQGHDWHQHUXQLPSDFWRHFRQyPLFRFDGDYH]PHQRUGHELGRDTXH
FUHDSULQFLSDOPHQWHHPSOHRVHQVHUYLFLR´

 (PERUDRSURMHWRGRGHSXWDGRIDOHH[FOXVLYDPHQWHHPVRIWZDUHOLYUHDFDU
WDLQVLVWHQRWHUPRFyGLJRDEHUWRHFRQVLGHUDRWHUPROLYUHFRPRXPHUUR

³(OSUR\HFWRPDQHMDGHPDQHUDHUUyQHDORVFRQFHSWRVGHVRIWZDUHGH
FyGLJRDELHUWRTXHQRQHFHVDULDPHQWHLPSOLFDTXHVHDVRIWZDUHOLEUH
R GH FRVWR FHUR OOHJDQGR D UHDOL]DU FRQFOXVLRQHV HTXtYRFDV VREUH
DKRUURVSDUDHO(VWDGRVLQQLQJ~QVXVWHQWRFRVWREHQH¿FLRTXHYDOLGH
ODSRVLFLyQ
(VHTXLYRFDGRSHQVDUTXHHO6RIWZDUHGH&yGLJR$ELHUWRHVJUDWXLWR
,QYHVWLJDFLRQHVUHDOL]DGDVSRU*DUWQHU*URXS LPSRUWDQWHLQYHVWLJDGRUD
134 • Software livre, cultura hacker e o ecossistema da colaboração

GHOPHUFDGRWHFQROyJLFRUHFRQRFLGDDQLYHOPXQGLDO KDQVHxDODGRTXH
HOFRVWRGHDGTXLVLFLyQGHOVRIWZDUH VLVWHPDRSHUDWLYR\DSOLFDFLRQHV 
VHUHGXFHDVyORGHOWRWDOGHFRVWRVTXHODVHPSUHVDVHLQVWLWXFLRQHV
GHEHQ DVXPLU FRPR FRQVHFXHQFLD GHO XVR UDFLRQDO \ UHDOPHQWH
SURYHFKRVR GH OD WHFQRORJtD (O RWUR  OR FRQVWLWX\HQ FRVWRV GH
LPSODQWDFLyQ FDSDFLWDFLyQ VRSRUWH PDQWHQLPLHQWR DGPLQLVWUDFLyQ H
LQRSHUDWLYLGDG´

 0HVPRTXHDFRQIXVmRHQWUHRVWHUPRVOLYUHHJUiWLVQmRH[LVWDQRHVSD
QKRODVVLPFRPRQmRH[LVWHQRSRUWXJXrVRGHSXWDGRpDFXVDGRGHWHUFRPHWLGR
XP HUUR GH FRQVLGHUDU R VRIWZDUH OLYUH FRPR VRIWZDUH JUDWXLWR ³GH FXVWR ]HUR´ 
3DUDGHVPHQWLURGHSXWDGRVXUJHXPDLQVWLWXLomRLQWHUQDFLRQDOR*DUWQHU*URXS
GHVFULWDFRPR³LPSRUWDQWHLQYHVWLJDGRUD´HUHFRQKHFLGDHP³QtYHOPXQGLDO´$JRUD
TXHPVHWRUQDUHGX]LGRpRSUySULRGHSXWDGRIUHQWHDXPDLQVWLWXLomRGHPDLRUUHOH
YkQFLDLQWHUQDFLRQDOTXHHOH(PDLVHVVHVQ~PHURVTXHPRVWUDULDPTXHRFXVWR
GDV OLFHQoDV p UHGX]LGR VHULDP REWLGRV TXDQGR R XVR GD WHFQRORJLD p ³UDFLRQDO´
H ³UHDOPHQWH SURYHLWRVR´$QWHV PHVPR GH TXDOTXHU FRQWUDDUJXPHQWDomR GR GH
SXWDGRTXHSRGHTXHVWLRQDUHVVHVQ~PHURVDUHVSRVWDDFDEDVHQGRSUHYLDPHQWH
DGMHWLYDGDFRPRQmRUDFLRQDO

Dois momentos no Brasil

5HWRUQDQGRHVVDDQiOLVHSDUDRFRQWH[WREUDVLOHLURTXHURFDUDFWHUL]DUGRLV
PRPHQWRVGRGHEDWHTXHFRQVLGHURUHOHYDQWHVSRLVH[HPSOL¿FDPRXVRGHFDWH
JRULDVPXLWRVHPHOKDQWHVjVTXHYLPRVDWpDJRUDWDQWRFRPUHODomRjGHIHVDGR
XVR GDV OLFHQoDV OLYUHV FRPR FRP UHODomR jV UHVSHFWLYDV WHQWDWLYDV GH VLOHQFLD
PHQWR(PHVSHFLDOTXHURPHGHWHUQDDQiOLVHGHGRLVSRQWRVTXHFRQVLGHURWHUHP
PRVWUDGRVXDUHOHYkQFLDDWpDTXL2SULPHLURpRMRJRHQWUHDGLIHUHQFLDomRRXQmR
GLIHUHQFLDomRHQWUHXVXiULRVHSURGXWRUHVTXDQGRpUHVVDOWDGDDFDUDFWHUtVWLFDGD
OLFHQoDOLYUHGHSHUPLWLUDRXVXiULRTXHDOWHUHHUHGLVWULEXDRVRIWZDUH2VHJXQGR
SRQWR UHODFLRQDVH j H[SRVLomR GH FHUWRV VXMHLWRV SDtVHV HPSUHVDV LQGLYtGXRV
LQLFLDWLYDV TXHXVDPRXQmRXVDPRVRIWZDUHOLYUH$RVHXWLOL]DUGHVVHVH[HPSORV
RTXHHVWmRGL]HQGRRVVXMHLWRVVREUHRVLJQL¿FDGRGRHPSUHJRGDVWHFQRORJLDV"$
SDUWLUGHVVDTXHVWmRVXUJHPVLJQL¿FDGRVSDUDSDODYUDVFRPR³DWUDVR´³DXWRQRPLD´
³GHSHQGrQFLDLQGHSHQGrQFLD´³GHVHQYROYLPHQWR´HRXWURV
 2VGRLVPRPHQWRVTXHDQDOLVDUHLWrPFRPRFRQWH[WRDHOHLomRHRH[HUFtFLR
GR SRGHU SRU SDUWH GR 3DUWLGR GRV 7UDEDOKDGRUHV 37  QD HVIHUD H[HFXWLYD 2
3URMHWR 6RIWZDUH /LYUH 56 36/56  FROHWLYR GHGLFDGR j SURPRomR GR VRIWZDUH
Software livre, cultura hacker e o ecossistema da colaboração • 135

OLYUHEDVHDGRQR5LR*UDQGHGR6XODVVLPFRPRRXWURV36/¶VGHRXWURVHVWDGRV
WHPHQWUHVHXVPHPEURVGLYHUVRVPLOLWDQWHVGR370DUFHOR%UDQFRGR36/56IRL
HQWUHYLVWDGRQR¿QDOGHHGHPRQVWURXJUDQGHH[SHFWDWLYDVFRPRJRYHUQR
/XODD¿UPDQGRVHURQRYRJRYHUQRXPHVSDoRSDUDDH[SDQVmRGRXVRGDVOLFHQoDV
OLYUHV3DUDUHVSRQGHUjVD¿UPDo}HVGH%UDQFRRH[HFXWLYRGD0LFURVRIWGR%UDVLO
(GXDUGR&DPSRVSHGLXSDUDVHUHQWUHYLVWDGRSHORPHVPRYHtFXORDUJXPHQWDQGR
FRQWUDULDPHQWHjVOLFHQoDVOLYUHVWHQGRFRPRSHUVSHFWLYDDVFRQVHTXrQFLDVSDUDR
%UDVLO
2 VHJXQGR PRPHQWR TXH TXHUR DQDOLVDU UHIHUHVH D PHDGRV GH 
TXDQGRWHQGRRJRYHUQR/XODMiLQLFLDGRDOJXPDVDo}HVHPIDYRUGRXVRGRVRIWZDUH
OLYUHRSUHVLGHQWHGR,QVWLWXWR1DFLRQDOGH7HFQRORJLDGD,QIRUPDomR ,7, 6pUJLR
$PDGHXUHFHEHXXPSHGLGRMXGLFLDOGHH[SOLFDo}HV SULPHLUDLQVWkQFLDSDUDRLQtFLR
GH XP SURFHVVR OHJDO  UHPHWLGR SHOD 0LFURVRIW$ HPSUHVD DPHDoDYD SURFHVVDU
$PDGHXSRUGLIDPDomRSHODVGHFODUDo}HVGDGDVSRUHOHjUHYLVWDCarta Capital
TXDQGRFRPSDURXDDWLWXGHGDHPSUHVDj³SUiWLFDGHWUD¿FDQWH´(OHID]LDUHIHUrQFLD
j SROtWLFD GD HPSUHVD GH RIHUHFHU JUDWXLWDPHQWH VHXV VRIWZDUHV D HVFRODV H D
SURMHWRVGHLQFOXVmRGLJLWDO(VVDSUiWLFDOHYDULDDXP³DSULVLRQDPHQWR´GRXVXiULR
TXHVyVDEHULDXWLOL]DUDWHFQRORJLDSURSULHWiULD
 1DHQWUHYLVWDFRQFHGLGDSRU%UDQFRQR¿QDOGHGHVWDFDVHDrQIDVH
TXH R HQWUHYLVWDGR Gi SDUD D UHODomR HQWUH WHFQRORJLD GHVHQYROYLPHQWR H D QH
FHVVLGDGHGHXPDHVSpFLHGHVLQFURQLDHQWUHR%UDVLOHRVSDtVHVFHQWUDLV(PERUD
R VRIWZDUH OLYUH WHQKD XPD DPSOD XWLOL]DomR WDPEpP QRV (8$ HVWmR VHGLDGDV Oi
WDQWRD)UHH6RIWZDUH)RXGDWLRQFRPRD2SHQ6RXUFH,QLWLDWLYH RVH[HPSORVGDGRV
SRU%UDQFRYrPSULQFLSDOPHQWHGRFRQWLQHQWH(XURSHX%UDQFRIDODHPDXWRQRPLD
WDQWRGRXVXiULRFRPRGR%UDVLODRPHVPRWHPSRHPTXHIDODHPUHODomRFRPR
H[WHULRU

³7HQKR D FHUWH]D GH TXH R SUy[LPR JRYHUQR )HGHUDO YDL SURSRUFLRQDU


JUDQGHV RSRUWXQLGDGHV SDUD R GHVHQYROYLPHQWR GH XPD WHFQRORJLD
QDFLRQDO autônoma H FRP JUDQGH intercâmbio FRP D FRPXQLGDGH
FLHQWt¿FD LQWHUQDFLRQDO$ FRPXQLGDGH LQWHUQDFLRQDO HVWi PXLWR OLJDGD
QDV PXGDQoDV TXH HVWmR DFRQWHFHQGR QR %UDVLO H HVWi SURQWD SDUD
DMXGDU $ TXHVWmR GR VRIWZDUH OLYUH QmR p DSHQDV XPD RSRUWXQLGDGH
SDUDDVHPSUHVDVEUDVLOHLUDVHSDUDRVHWRUGHLQIRUPiWLFDEXVFDUHP
XPDOLGHUDQoDQRFHQiULRLQWHUQDFLRQDOPDVDJUDQGHHWDOYH]D~QLFD
RSRUWXQLGDGHGHFRPEDWHUPRVD³H[FOXVmRGLJLWDO´$LQVHUomRpassiva
LVWRpVHPdomínioGDWHFQRORJLDHGRVFRQWH~GRVGDLQWHUQHWDFDUUHWD
XPDXPHQWRGDdependênciaGLJLWDODRLQYpVGHGLPLQXLUDexclusão
&RP R VRIWZDUH OLYUH HVWDPRVHP“tempo real”FRPDWHFQRORJLDGR
 ³$OWHUQDWLYD SDUD D LQGHSHQGrQFLD GLJLWDO´ (QWUHYLVWD GH 0DUFHOR %UDQFR Baguete, KWWSZZZEDJXHWHFRPEU
HQWUHYLVWDSKS"QRPH PDUFHORBEUDQFR
 ³$ YLVmR GR SURSULHWiULR´ (QWUHYLVWD GH (GXDUGR &DPSRV Baguete, KWWSZZZEDJXHWHFRPEUHQWUHYLVWD
SKS"QRPH HGXDUGRBFDPSRV
136 • Software livre, cultura hacker e o ecossistema da colaboração

primeiro mundo H RV GHVHQYROYHGRUHV H DV HPSUHVDV EUDVLOHLUDV


GRPLQDP WRWDOPHQWH HVVD WHFQRORJLD 3RGHUHPRV VHU sujeitos GHVVD
UHYROXomR GLJLWDO H QmR PHURV consumidores GH FRQWH~GRV H WHFQR
ORJLDVGRhemisfério norte´

 eSRVVtYHOGHPDUFDUFHUWRVSHUVRQDJHQVGHVVDIDOD(VWmRQHODR%UDVLOHR
³LQWHUQDFLRQDO´TXHVHGHVGREUDHP³SULPHLURPXQGR´H³KHPLVIpULRQRUWH´&RPR
³SULPHLURPXQGR´TXHHVWiGLVSRVWRD³DMXGDU´SRUPHLRGD³FRPXQLGDGHFLHQWt¿FD´
p SRVVtYHO XP ³LQWHUFkPELR´ ³DXW{QRPR´ HP TXH R ³QDFLRQDO´ VHMD ³VXMHLWR´ &RP
RVRIWZDUHOLYUHHFRPD³DMXGD´GDFRPXQLGDGHLQWHUQDFLRQDOR%UDVLOVHUiFRPR
TXHDFHOHUDGRSDUD¿FDU³HPWHPSRUHDO´&RORFDVHDTXLHQWmRXPDUHODomRHQWUH
³GHVHQYROYLPHQWR´ SRLVVHWUDWDGR³GHVHQYROYLPHQWRGHXPDWHFQRORJLDQDFLRQDO´ 
HHVWDUQRSDVVDGRRXQRSUHVHQWHIXWXUR-iGR³KHPLVIpULRQRUWH´WHUPRTXHID]
OHPEUDUDUHODomRGHVLJXDOHQWUH1RUWHH6XOHQWUHFHQWURHSHULIHULDR%UDVLOVy
SRGHUiVHU³FRQVXPLGRU´
 7DPEpP p PXLWR LQWHUHVVDQWH D UHODomR TXH VH HVWDEHOHFH HQWUH R SDtV
%UDVLOHRVLQGLYtGXRVTXHVHUmRREMHWRVGHSURJUDPDVGH³LQFOXVmRGLJLWDO´4XDQGR
%UDQFRIDODGH³LQVHUomRSDVVLYD´SRGHHVWDUIDODQGRWDQWRGHDOJXpPTXHVHWRUQRX
XPLQFOXtGRGLJLWDOFRPRGDLQVHUomRGRSDtVQRFHQiULRHFRQ{PLFRLQWHUQDFLRQDO
,QGLYtGXRVHQDomRVHPLVWXUDPHXPGHVHQYROYLPHQWRTXHVHMDGHSHQGHQWH RTXH
QRVID]OHPEUDUDWHRULDGDGHSHQGrQFLDGHVHQYROYLGDSHORH[SUHVLGHQWH)HUQDQGR
+HQULTXH&DUGRVR SRGHVHUFULWLFDGRIDODQGRVHWDQWRGHSURJUDPDVGHLQFOXVmR
GLJLWDOTXHXVDPVRIWZDUHSURSULHWiULRFRPRGHXPFHUWRSDSHODVHUDVVXPLGRSHOR
%UDVLOQRPHUFDGRJOREDO
 8PSRXFRPDLVDGLDQWHQDHQWUHYLVWD%UDQFRpTXHVWLRQDGRSRUVXDSDUWLFL
SDomR HP HYHQWRV LQWHUQDFLRQDLV$R HOHQFiORV IDOD GD YLVLWD D FLQFR SDtVHV GD
$PpULFD/DWLQD &XED3RUWR5LFR$UJHQWLQD&KLOHH8UXJXDL HDGRLVSDtVHVGD
(XURSD (VSDQKDH,WiOLD 
 3DUDUHVSRQGHUjVGHFODUDo}HVGH%UDQFR(GXDUGR&DPSRVGD0LFURVRIW
YDL SURFXUDU GDU DR VRIWZDUH OLYUH QmR HVVD FDUDFWHUtVWLFD GH DFHOHUDGRU RX XPD
HVSpFLHGHDWDOKR SDUDRGHVHQYROYLPHQWRPDVSURFXUDVLJQL¿FiORFRPR³DWUDVR´
DVVHPHOKDQGRR D SROtWLFDV HVWDEHOHFLGDV QR SDVVDGR QR %UDVLO D UHVHUYD GH
PHUFDGR SDUD D LQIRUPiWLFD  TXH QD WHQWDWLYD GH HVWDEHOHFHUHP XPD DXWRQRPLD
SDUD R SDtV R WHULDP FRQGHQDGR DR ³DWUDVR´ D XPD HVSpFLH GH GHVFRPSDVVR
FRPRUHVWRGRPXQGR$VVLP&DPSRVWHQWDPRVWUDUTXHVyKiXPFDPLQKRSDUD
R GHVHQYROYLPHQWR H HVVH FDPLQKR p D LQWHJUDomR VHP TXHVWLRQDU VH HOD VHUi
SDVVLYDRXQmR 
 &RPRDHQWUHYLVWDpXPDUpSOLFDjRXWUD&DPSRVORJRQRLQtFLRSURFXUD
Software livre, cultura hacker e o ecossistema da colaboração • 137

HVWDEHOHFHUDOJRTXHWHULDVLGRGLWRSRU%UDQFRHDSDUWLUGHVVDLGHLDVREUHRTXH
WHULDVLGRGLWRIDUiVXDVD¿UPDo}HV6HJXQGRHOHR³REMHWLYRpRIHUHFHUDRVOHLWRUHV
do Baguete>RZHEVLWHTXHSXEOLFRXDPEDVDVHQWUHYLVWDV@XPDYLVmRPDLVDPSOD
EDVHDGD HP GDGRV LPSRUWDQWHV VREUH D LQG~VWULD EUDVLOHLUD GH VRIWZDUH TXH QmR
IRUDP OHYDGRV HP FRQVLGHUDomR H RV LPSDFWRV GD REULJDWRULHGDGH GR XVR GHVWD
RXGDTXHODWHFQRORJLDSHORJRYHUQR´%UDQFRTXDQGRIRLHQWUHYLVWDGRDFDEDUDGH
GHL[DUXPFDUJRQD8QLYHUVLGDGH(VWDGXDOGR5LR*UDQGHGR6XO'HVFUHYHQGRVH
FRPRSRUWDGRUGH³GDGRVLPSRUWDQWHVVREUHDLQG~VWULDEUDVLOHLUD´&DPSRVFRORFD
VHFRPRDOJXpPGRPHUFDGRHQTXDQWR%UDQFRVHULDDOJXpPVHPHVVDH[SHULrQFLD

³1mRH[LVWHXPDFUtWLFDDRTXHIRLIDODGRPDVVLPDRTXHQmRIRL2
HQWUHYLVWDGR QmR HVFODUHFH FRPR D DGRomR REULJDWyULD GH XPD ~QLFD
WHFQRORJLDQRkPELWRJRYHUQDPHQWDOJHUDULDEHQHItFLRSDUDRSDtV1D
YHUGDGH R HIHLWR p R FRQWUiULR 6HULDP FULDGDV DV FRQGLo}HV LGHDLV
SDUDRVXUJLPHQWRGHXPDQRYDUHVHUYDGHPHUFDGRDPHVPDTXHQR
SDVVDGRDSULVLRQRXQRVVRSDtVHPDQRVGHDWUDVRWHFQROyJLFRQD
TXDODSHQDVVRIWZDUHHKDUGZDUHQDFLRQDOSRGLDPVHUFRPHUFLDOL]DGRV
QRSDtVLQFOXLQGRVHDtDVFRPSUDVGRJRYHUQR$UHVHUYDOHYRXR3&D
FXVWDU86PDLVTXHPXLWRVFDUURVHDPDLRULDGRVSURJUDPDV
QDFLRQDLV D VHUHP FySLDV ¿HLV GH SURJUDPDV LPSRUWDGRV SRUpP FRP
QRPHV QDFLRQDLV GHVUHVSHLWDQGR GLUHLWRV GH SURSULHGDGH LQWHOHFWXDO
TXH QR PXQGR WRGR IRUDP RV JUDQGHV UHVSRQViYHLV SHOR IDQWiVWLFR
GHVHQYROYLPHQWRGDLQG~VWULDGHWHFQRORJLD$VVLPFRPRQDVSURSRVWDV
GHDGRomRREULJDWyULDGHRSHQVRXUFHSHORJRYHUQRQDpSRFDWtQKDPRV
WHFQRORJLDQDFLRQDODXW{QRPDFRPVXEVtGLRVSURWHomRGDOHLIHGHUDOH
LQWHUFkPELRFRPDFRPXQLGDGHFLHQWt¿FDLQWHUQDFLRQDO´

 $RFRPSDUDUDVSROtWLFDVHPEHQHItFLRGRXVRGHVRIWZDUHOLYUHFRPDUH
VHUYDGHPHUFDGR&DPSRVOLJDXPDDomRGRJRYHUQRQRVHQWLGRGHRULHQWDomRGR
PHUFDGR ± H SRU FRQVHTXrQFLD R SUySULR VRIWZDUH OLYUH ± D XP IDWR GR SDVVDGR
UHFHQWH EDVWDQWH OLJDGR j LGHLD GH Gp¿FLW WHFQROyJLFR GR %UDVLO IUHQWH DRV SDtVHV
FHQWUDLV$RPHVPRWHPSRID]FRPTXHHVVDVSROtWLFDVVLJQL¿TXHPXPDDPHDoDGH
DXPHQWRPXLWRJUDQGHQRSUHoRGHVVDVWHFQRORJLDV6HPHVWDEHOHFHUDIRUPXODomR
³RVRIWZDUHOLYUHVLJQL¿FDRGHVUHVSHLWRjSURSULHGDGHLQWHOHFWXDO´ID]FRPTXHHVVD
DVVRFLDomR VHMD OHPEUDGD SHOD UHODomR GH HTXLYDOrQFLD TXH HVWDEHOHFHX HQWUH
SROtWLFDVSHORVRIWZDUHOLYUHHUHVHUYDGHPHUFDGRTXHVHJXQGRHOHGHVUHVSHLWDUDP
DSURSULHGDGHLQWHOHFWXDO
 )DODQGRVHPSUHHP³open source´&DPSRVOHPEUDTXHQDpSRFDGDUH
VHUYD GH PHUFDGR KDYLD ³LQWHUFkPELR FRP D FRPXQLGDGH LQWHUQDFLRQDO´ SRUpP
 (P RXWUR PRPHQWR QD PHVPD HQWUHYLVWD &DPSRV WDPEpP GL] ³1D PLQKD RSLQLmR DSHQDV DV SHVVRDV FXMR
VDOiULRQmRGHSHQGHGLUHWDPHQWHGRRSHQVRXUFHpTXHFRQVHJXHPGHIHQGrORWDQWRVRERSRQWRGHYLVWDGHDGRomR
HPSUHVDULDO´
138 • Software livre, cultura hacker e o ecossistema da colaboração

LVVRQmRWHULDEDVWDGRSDUDID]HUGDSROtWLFDGHUHVHUYDXPVXFHVVR'HVVHPRGR
DFDEDFRORFDQGRTXHSDUDR%UDVLOQmREDVWDUiRLQWHUFkPELRFRPDFRPXQLGDGH
LQWHUQDFLRQDOSDUDDWLQJLURGHVHQYROYLPHQWRVHUiQHFHVViULDDLQWHJUDomRHFRQ{
PLFDFRPRVPHUFDGRV
 (PVHJXLGDUHVSRQGHQGRDXPDRXWUDTXHVWmR&DPSRVGHVFUHYHUiRPHU
FDGR FRPR DOJR FRPSOH[R H DR PHVPR WHPSR LQFRQWUROiYHO (VWDEHOHFHQGR XPD
DQDORJLDFRPDQDWXUH]D ³HFRVVLVWHPD´ GDUiDLPSUHVVmRGHTXHHOHpDOJRTXH
QmRGHYHVHUWRFDGRVRERULVFRGHVHDOWHUDUVHXHTXLOtEULRQDWXUDO

³2 PDLV LPSRUWDQWH p D FDGHLD GH YDORU TXH H[LVWH KRMH HVVD FDGHLD
p WmR DPSOD H FRPSOH[D TXH SRGH VHU FRQVLGHUDGD XP HFRVVLVWHPD
GLJLWDO6HJXQGRHVWXGRGD3ULFH:DWHUKRXVH&RRSHUVVmRPDLVGH
PLO EUDVLOHLURV WUDEDOKDQGR GLUHWD RX LQGLUHWDPHQWH HP XPD LQG~VWULD
UREXVWD TXH PRYLPHQWD DQXDOPHQWH PDLV GH 86  ELOK}HV HP
YHQGDV GH VRIWZDUH H VHUYLoRV UHFROKHQGR FHUFD GH 5  PLOK}HV
HP LPSRVWRV $OpP GLVVR R IDWRU GH JHUDomR GH HPSUHJRV LQGLUHWRV
QDLQG~VWULDGHWHFQRORJLDEUDVLOHLUDpGHSDUD2XVHMDSDUDFDGD
HPSUHJRGLUHWRRXWURVLQGLUHWRVVmRJHUDGRV
  *HUDomR GH HPSUHJRV FRP R RSHQ VRXUFH GHVHQYROYLPHQWR
VXVWHQWDGR p PXLWR ERQLWR QD WHRULD 1D SUiWLFD R PRGHOR QmR VH
VXVWHQWD´

$RD¿UPDUDH[LVWrQFLDGHVVHHFRVVLVWHPDHGHVFUHYHQGRVXDLPSRUWkQFLD
DSDUWLUGRVHPSUHJRVTXHJHUD¿FDDDPHDoDGHTXHRGHVHTXLOtEULRDWHQWDWLYD
GHFRQWUROHLPSOLFDUiQDSHUGDGHHPSUHJRVSDUDPLOKDUHVGHSHVVRDV$PHWiIRUD
ELROyJLFD VHMD FRP R FRUSR KXPDQR ³YLUDO´ ³FkQFHU´ FRPR YLPRV QR VHJXQGR
FDStWXOR VHMDFRPRPXQGRQDWXUDODSDUHFHQRYDPHQWHXPSRXFRPDLVWDUGH³2
UHVXOWDGRpTXHRRSHQVRXUFHmataDFDGHLDGHYDORUGHXPDLQG~VWULDsaudável e
QLQJXpPJDQKDQDGDFRPLVVR´
 eLQWHUHVVDQWHWDPEpPREVHUYDUTXHTXDQGRRHQWUHYLVWDGRUSHUJXQWD³TXDO
D VXD YLVmR SDUWLFXODU VREUH D TXHVWmR GR VRIWZDUH OLYUH"´ FRP HVVH ³SDUWLFXODU´
DSRQWDQGRSDUDXPDRSLQLmRSHVVRDOHQmRGDHPSUHVD&DPSRVUHVSRQGH

³0LQKDYLVmRSDUWLFXODUpTXHFRPRWXGRQDYLGDRVRIWZDUHOLYUHWHP
VXDV YDQWDJHQV H GHVYDQWDJHQV $ YDQWDJHP TXH PDLV DGPLUR p D
FRPXQLGDGH DSHQDV GHL[DQGR FODUR TXH QHP WRGR PXQGR WHP ERDV
LQWHQo}HV HYDLFULDUSURJUDPDVHSDWFKHVVHJXURVGHJUDoD0DVp
LQHJiYHO TXH R FRQFHLWR GH ³XVXiULRV DMXGDP XVXiULRV´ FRQWULEXL SDUD
D HYROXomR GD WHFQRORJLD $ PDLRU GHVYDQWDJHP HVWi QR PRGHOR GH
QHJyFLRV(OHGHVWUyLDFDGHLDGHYDORU  ´
Software livre, cultura hacker e o ecossistema da colaboração • 139

 0HVPRDRUHVVDOWDUXPYDORUXQLYHUVDOFRQWUDRTXDOpGLItFLOVHSURQXQFLDU
R HVStULWR FRPXQLWiULR R DX[tOLR DR SUy[LPR  &DPSRV VHPHLD D GHVFRQ¿DQoD H
GiPRVWUDVGHXPUHDOLVPRGHXPGHVHQFDQWRGHDOJXpPTXHQmRpLQJrQXRRX
VRQKDGRU$FRQ¿DQoDQmRSRGHULDVHUGDGDDTXDOTXHUXPSRLVRPXQGRUHDOVHp
XPHFRVVLVWHPDpWDPEpPXPDVHOYDFKHLDGHSHULJRV
 ( DR IDODU GD DMXGD P~WXD GD FRPXQLGDGH &DPSRV QmR FODVVL¿FD R
GHVHQYROYHGRULQGHSHQGHQWHTXHGHVHQYROYHWHFQRORJLDWDPEpPFRPRXPKREE\
LGHLD VHPSUH DVVRFLDGD j FRPXQLGDGH GR VRIWZDUH OLYUH  FRPR XP SURGXWRU 2
GHVHQYROYHGRU GH VRIWZDUH OLYUH FRQWLQXD VHQGR XP ³XVXiULR´ PHVPR TXH SRVVD
DMXGDURXWUR³XVXiULR´2SURGXWRUpDHPSUHVD ROXJDUGDSURGXomRGRYDORUpD
HPSUHVD HQXQFDXPLQGLYtGXRRXXPFROHWLYRQmRSUR¿VVLRQDOL]DGR
(VVHGHEDWHHQWUH0LFURVRIWHRVRIWZDUHOLYUHEUDVLOHLURJDQKRXXPDLQWHQ
VLGDGHPXLWRPDLRU SHORPHQRVGRSRQWRGHYLVWDGDUHSHUFXVVmRMXQWRjLPSUHQVD 
QR LQtFLR GH MXQKR GH  2 HVWRSLP IRL XPD PDWpULD GD UHYLVWD Carta Capital
LQWLWXODGD³23LQJXLP$YDQoD´HPTXHRSUHVLGHQWHGR,7,6pUJLR$PDGHXDFXVRX
DHPSUHVDGH³SUiWLFDGHWUD¿FDQWH´
 $Carta CapitalRFXSDXPQLFKREDVWDQWHSHFXOLDUGHPHUFDGR$RPHVPR
WHPSRHPTXHDSXEOLFDomRWHPXPERPWUkQVLWRHQWUHRVVHWRUHVPDLVSURJUHVVLVWDV
GDVRFLHGDGH±QDVHOHLo}HVSUHVLGHQFLDLVGHHODDVVXPLXVHIDYRUDYHOPHQWHj
HOHLomRGRSUHVLGHQWH/XODIDWRUDURQDLPSUHQVDEUDVLOHLUDGLULJHVHSULQFLSDOPHQWH
DRV HPSUHViULRV H H[HFXWLYRV FRP XPD TXDQWLGDGH LPSRUWDQWH GH LQIRUPDo}HV
VREUHLQYHVWLPHQWRV
 $UHSRUWDJHPGDUHYLVWDWUDWRXGDGLVVHPLQDomRGRXVRGHVRIWZDUHVOLYUHVQR
PHUFDGRFRUSRUDWLYRUHVVDOWDQGRDSRVVtYHOGLPLQXLomRGHFXVWRVSDUDDVHPSUHVDV
HDDVYDQWDJHQVWpFQLFDVGHULYDGDVGDOLYUHPRGL¿FDomRGRFyGLJR DVHPSUHVDV
SRGHULDPDGDSWiORFRQIRUPHVXDVQHFHVVLGDGHV 3DUDLVVRIRUDPHQWUHYLVWDGRV
HPSUHViULRVTXHMiXVDP*18/LQX[ WUDWDGRFRPR³/LQX[´ HPSUHViULRVGRVHWRU
GHKDUGZDUHH[HFXWLYRVGD0LFURVRIWHRSUHVLGHQWHGR,7,6pUJLR$PDGHX
 4XHUR HQWmR UHVVDOWDU DOJXQV SRQWRV GD PDWpULD HP HVSHFLDO DV IDODV
GH$PDGHXUHSRUWDGDV0DVSULPHLURGHVWDFRDGHVFULomRVREUHRTXHVHULDPRV
³VLVWHPDVDEHUWRV´QRPHTXHpXVDGRQRWH[WR

³$R FRQWUiULR GRV FKDPDGRV VRIWZDUHV SURSULHWiULRV FXMR XVR HVWi


EDVHDGRQRSDJDPHQWRGHOLFHQoDVRVVLVWHPDVDEHUWRVFRPRRSUySULR
QRPHGL]GmROLYUHDFHVVRDRFyGLJRIRQWHFRQMXQWRGHFRPDQGRVTXH
IRUPD XP GHWHUPLQDGR SURJUDPD ,VVR SHUPLWH DR XVXiULR FRQKHFHU
H[DWDPHQWH R TXH WHP GHQWUR GR VRIWZDUH H PRGL¿FiOR VH DVVLP
GHVHMDUeVRQKRGHWRGRQHUGFRQKHFHUSRUH[HPSORRFyGLJRIRQWH
 0DUTXHV 0DULQHLGH ³2 3LQJXLP $YDQoD´ HP Carta Capital KWWSFDUWDFDSLWDOWHUUDFRPEUVLWHH[LEHBPDWHULD
SKS"LGBPDWHULD 
140 • Software livre, cultura hacker e o ecossistema da colaboração

GR:LQGRZVGD0LFURVRIWXPVHJUHGRWmRFRELoDGRTXDQWRDIyUPXOD
GD&RFD&ROD´

 3DUDDOWHUDUXPVRIWZDUHQmREDVWDFRQKHFHURVHXFyGLJRIRQWHpSUHFLVR
WHUDSHUPLVVmROHJDO$RGHVFUHYHUR³VLVWHPDDEHUWR´FRPRXPVLVWHPDFRPRFy
GLJRIRQWHHPH[SRVLomRDUHSRUWDJHPUH~QHDVGH¿QLo}HVGHVRIWZDUHOLYUHRSHQ
VRXUFH FRQIRUPHD26, HFyGLJRDEHUWR QmRSHODGH¿QLomRGD26,PDVFRPRR
VLVWHPDHPTXHRFyGLJRSRGHVHUOLGR DHVVD~QLFDFDWHJRULD4XDVHQR¿QDOGD
PDWpULDRWHUPR³VRIWZDUHOLYUH´pXVDGRSRUXPGRVHQWUHYLVWDGRV0DVFRPRHVWi
HPXPSDUiJUDIRHPTXHpUHIHULGRFRPRVLQ{QLPRGH³/LQX[´SRUFRQVHTXrQFLD
WDPEpPpWRPDGRFRPRVLQ{QLPRGH³VLVWHPDOLYUH´
 9ROWDQGRDRWUHFKRDFLPDHVWHGHVFUHYHXPREMHWRGHGHVHMR ³RFyGtJR
IRQWHGR:LQGRZV´ XPSHUVRQDJHP ³RQHUG´ HDVVLPID]FRPTXHVHLPDJLQH
TXHDPRWLYDomRSDUDDFULDomRGRVVLVWHPDVOLYUHV SHORVQHUGV WHQKDVLGRRGHVHMR
GHFRQKHFHUOHUGRPLQDURFyGLJRIRQWHGHXPVLVWHPDRSHUDFLRQDO
 1R SDUiJUDIR VHJXLQWH DSDUHFHP DV YDQWDJHQV TXH D OLYUH DOWHUDomR GR
FyGLJRGRVLVWHPDSRGHWUD]HUSDUDRVHPSUHViULRV

³$SRVVLELOLGDGHGHDGRWDUXPVLVWHPDTXHSRGHVHUDGDSWDGRDRVHX
QHJyFLR RX FXVWRPL]DGR QD OLQJXDJHP JHUHQFLDO DOLDGD DR PHQRU
FXVWR HP UHODomR DRV VLVWHPDV SURSULHWiULRV VHGX] XP Q~PHUR FDGD
YH]PDLRUGHHPSUHVDV´

 (PVHJXLGDVmRGHVFULWRVRVEHQHItFLRVTXHDDGRomRGR*18/LQX[WURX[H
SDUDDUHGHGHVXSHUPHUFDGRV&DUUHIRXUHFRPSOHWDQGRDIDODGHVHXHQWUHYLVWDGR
RUHSyUWHUWUD]QRYDPHQWHD0LFURVRIW

³(OH>RHQWUHYLVWDGR@GHVWDFDDLQGDRJDQKRHPERUDQmRPHQVXUiYHO
GHLQGHSHQGrQFLD GHIRUQHFHGRURXVHMDQmR¿FDUSUHVRDXP~QLFR
IDEULFDQWHXPDYH]TXHR/LQX[pGHVHQYROYLGRSRUYiULDVHPSUHVDV2
JHUHQWHQmRFLWDQRPHVPDVTXHPFRQKHFHXPSRXFRGRXQLYHUVRGH
ELWVHE\WHVVDEHTXHHOHHVWiIDODQGRGD0LFURVRIWGRQDGR:LQGRZV
 ´

$RID]HUXPDSHTXHQDGLJUHVVmRSDUDFRQWDUDKLVWyULDGRVXUJLPHQWRGR/LQX[RUHSyUWHUYROWDDXVDUDLPDJHP
GR³VLVWHPDSDUDQHUGV´$RPHVPRWHPSRDWULEXLDFULDomRGDOLFHQoDOLYUHD/LQXV7RUYDOGVHQmRD5LFKDUG6DWOOPDQ
³&ULDGRHPSRU7RUYDOGVQDpSRFDHVWXGDQWHGH&LrQFLDGD&RPSXWDomRGD8QLYHUVLGDGHGH+HOVLQTXHHWHQGR
FRPRPDVFRWHXPSLQJXLPR/LQX[IH]DDOHJULDGRVQHUGVJUDoDVjSRVVLELOLGDGHGHDFHVVRDRFyGLJRIRQWH(PSRXFR
WHPSRGHVSHUWRXDDWHQomRGDVHPSUHVDV3DUDHYLWDUTXHDOJXpPVHDSURSULDVVHGDVPHOKRULDVH¿]HVVHXPDYHUVmR
IHFKDGD7RUYDOGVFULRXXPDOLFHQoDHVSHFLDOGHXVRTXHSURtEHTXHRFyGLJRRULJLQDORXTXDOTXHUPRGL¿FDomRIHLWDFRP
EDVHQHOHVHMDPIHFKDGRV´
Software livre, cultura hacker e o ecossistema da colaboração • 141

 &RQWLQXDQGRHDQWHVGHGDUDSDODYUDDRH[HFXWLYRGD0LFURVRIWRUHSyUWHU
GHVFUHYHDHPSUHVDFRPDGMHWLYRVTXHUHSHWLUiSRUWRGDDPDWpULDDHPSUHVDp
³JLJDQWH´HVHXGRQRXP³PLOLRQiULR´³2DYDQoRGR/LQX[QRPHUFDGRFRUSRUDWLYR
QmRpGHVSUH]DGRSHOD0LFURVRIWPDVDgiganteIXQGDGDSHORmilionário%LOO*DWHV
YrRVVLVWHPDVDEHUWRVFRPRDSOLFDo}HVGHQLFKR´
 8PSRXFRPDLVDGLDQWHQRWH[WRDSDODYUDJLJDQWHVHUiXVDGDWDPEpPSDUD
DGMHWLYDUGXDVHPSUHVDVGHKDUGZDUHHGHVRIWZDUHTXHMiSUHVWLJLDPR³VLVWHPD
DEHUWR´$IRUPXODomRpDVHJXLQWH

³¬ PHGLGD TXH FUHVFH R Q~PHUR GH HPSUHVDV TXH XWLOL]DP VRIWZDUHV
DEHUWRVDXPHQWDDRIHUWDGHIRUQHFHGRUHVGHVVHVVLVWHPDVGigantes
mundiaisGHKDUGZDUHHVRIWZDUHFRPR+3H,%0SHUFHEHUDPTXHQmR
Gi SDUD LJQRUDU HVVD H[SDQVmR H LQFRUSRUDUDP D SODWDIRUPD jV VXDV
PiTXLQDV´

1R~OWLPRSDUiJUDIRGDPDWpULDDSDODYUDJLJDQWHVHUiXVDGDQRYDPHQWH
GXDVYH]HVDPEDVSDUDTXDOL¿FDUD0LFURVRIW9HMDPRVDVIRUPXODo}HV

³2 DSHOR GD gigante americana QmR FRPRYH$PDGHX TXH SURPHWH


FRORFDU PDLV SLPHQWD QD GLVFXVVmR   2 VXFHVVR GR VRIWZDUH OLYUH
VyRWHPSRYDLSURYDUPDVDEULJDFRPDgiganteGH%LOO*DWHVVHUi
WUDYDGDQRSUHVHQWH´

(PERUDD0LFURVRIWHVWHMDVHQGRLQVLVWHQWHPHQWHFODVVL¿FDGDFRPR³JLJDQ
WH´ D LPDJHP VHUi D GH XP JLJDQWH HP GHFDGrQFLD TXH HP EUHYH GHYHUi VHU
YHQFLGR9LPRVTXHDV³JLJDQWHVPXQGLDLV´GRKDUGZDUHHGRVRIWZDUH +3H,%0 
MiXVDPRVRIWZDUHOLYUH$SHVDUGHVHUHPGHVFULWDVFRPRJLJDQWHVGDVGXDViUHDV
GR KDUGZDUH H GR VRIWZDUH R OHLWRU XP SRXFR KDELWXDGR DR XVR GH SURGXWRV GH
LQIRUPiWLFD VDEH TXH D HVSHFLDOLGDGH GHVVDV HPSUHVDV KRMH p R KDUGZDUH D
,%0 p PDLV OHPEUDGD SHORV VHXV PLFURFRPSXWDGRUHV H D +3 p PXLWR FRQKHFLGD
QR PHUFDGR GH LPSUHVVRUDV  7HPRV HQWmR R JLJDQWH DPHULFDQR  GR VRIWZDUH
0LFURVRIWSHUGHQGRDH[FOXVLYLGDGHQRXVRGHVHXVSURGXWRVSRUSDUWHGHRXWURV
JLJDQWHV HVWHV³PXQGLDLV´ +3H,%0
 ( QD UHODomR FRP R SUHVLGHQWH GR ,7, D 0LFURVRIW WDPEpP DSDUHFH HP
GHVYDQWDJHP(OD³DSHOD´HHVVDDomRQmRpGLULJLGDDRJRYHUQREUDVLOHLURHQHP
PHVPR j LQVWLWXLomR KLHUDUTXLFDPHQWH DFLPD GR ,7, R 0LQLVWpULR GD &DVD &LYLO D
0LFURVRIW³DSHOD´D$PDGHXHHVWHFRPRXP'DYLGSUHVWHVDYHQFHU*ROLDVQmRVH
³FRPRYH´QmRPRVWUDPLVHULFyUGLD±HPXLWRPHQRVVHVHQWHDPHDoDGRSHORSRGHU
142 • Software livre, cultura hacker e o ecossistema da colaboração

GRJLJDQWH
 $LPDJHPEHOLFRVDGDVDo}HVGH$PDGHXHVWiWDPEpPHPWRGRRWH[WRTXH
DFRPSDQKDHGHVFUHYHVXDIDOD9HMDPRV

³([IXQFLRQiULR GD SUHIHLWXUD SHWLVWD GH 6mR 3DXOR $PDGHX GHFLGLX


comprar uma guerra FRP RV PDLRUHV IDEULFDQWHV GH VLVWHPDV
RSHUDFLRQDLV IHFKDGRV D 0LFURVRIW SULQFLSDOPHQWH 3DUD R SUHVLGHQWH
GR ,7, R PRGHOR GH VRIWZDUH SURSULHWiULR LQYLDELOL]D D LQIRUPDWL]DomR
GR 3DtV GDGD D QHFHVVLGDGH GH SDJDPHQWR GH OLFHQoDV D HPSUHVDV
HVWUDQJHLUDV³8PSDtVSRXFRLQIRUPDWL]DGRFRPRR%UDVLOSDJRX86
ELOKmRHPOLFHQoDVGHVRIWZDUHHP2YDORUVyWHQGHDVXELU´
GL]³eXPDguerraGRSRQWRGHYLVWDWHFQROyJLFR´D¿UPDHQXPHUDQGR
China e Índia como aliados do Brasil QD EDWDOKD SDUD ³OLEHUWDU D
(VSODQDGD GRV 0LQLVWpULRV GD reserva de mercado do software
proprietário´
1D GHIHVD GR VRIWZDUH OLYUH$PDGHX QmR SRXSD FUtWLFDV j 0LFURVRIW
D TXHP DFXVD GH ³SUiWLFD GH WUD¿FDQWH´ SRU RIHUHFHU R VLVWHPD
RSHUDFLRQDO:LQGRZVDDOJXQVJRYHUQRVHSUHIHLWXUDVSDUDDLQVWDODomR
HPSURJUDPDVGHLQFOXVmRGLJLWDO³,VVRpSUHVHQWHGHJUHJRXPDIRUPD
GHDVVHJXUDUPDVVDFUtWLFDSDUDFRQWLQXDUDSULVLRQDQGRR3DtV´´

 $PDGHX³FRPSUDXPDJXHUUD´³DFXVD´³QmRSRXSDFUtWLFDV´HOXWDFRQWUD
³WUD¿FDQWHV´HFRQWUDDHPSUHVDTXHUFRQWLQXDU³DSULVLRQDQGRRSDtV´1HVVDEDWDOKD
HOH HR%UDVLO WHP³DOLDGRV´VHQGRHVWHVGRLVSDtVHVGHJUDQGHH[WHQVmRWHUULWRULDO
EDVWDQWH SRSXORVRV H IUHTXHQWHPHQWH DQXQFLDGRV FRPR HPHUJHQWHV QR FHQiULR
HFRQ{PLFRPXQGLDO&KLQDHËQGLD7DPEpPpLQWHUHVVDQWHDLQYHUVmRTXHHOHID]
GDVDFXVDo}HVDQWHULRUHVGDHPSUHVDGHTXHTXDOTXHUDomRHPIDYRUGRVRIWZDUH
OLYUHVHULD³UHVHUYDGHPHUFDGR´$³UHVHUYDGHPHUFDGRGRVRIWZDUHSURSULHWiULR´
VHJXQGR$PDGHXHVWipVHQGRFRPEDWLGDSHORJRYHUQRHQmRUHVVXVFLWDGD
 (P VHJXLGD j SXEOLFDomR GHVVD UHSRUWDJHP GHXVH D DomR OHJDO GD
0LFURVRIWTXHWHULDUHVSRQGLGRjVDFXVDo}HVGH³SUiWLFDGHWUD¿FDQWH´1RHQWDQWR
HVVDDQDORJLDFRPRWUi¿FRpXPDGDVPDLVIUHTXHQWHV MXQWRFRPDGR3UHVHQWH
GH *UHJR  XVDGDV SHOD FRPXQLGDGH GD 7HFQRORJLD GD ,QIRUPDomR SDUD TXDOL¿FDU
DVGRDo}HVGDHPSUHVD$WpPHVPRRSUHVLGHQWHGD6XQ0LFURV\VWHQVXPDGDV
PDLRUHVHPSUHVDVGHVRIWZDUHGRPXQGR6FRWW0F1HDO\MiDXWLOL]RX$RFRPHQWDU
SDUD D UHYLVWD HVWDGXQLGHQVH Wired D GHSHQGrQFLD GRV XVXiULRV EULWkQLFRV GRV
SURGXWRV0LFURVRIWSDUDDFHVVDUDSiJLQDGRJRYHUQRTXHVyIXQFLRQDYDPFRPR
QDYHJDGRUGDFRPSDQKLD0F1HDO\D¿UPRX³$SULPHLUDGRVHGHKHURtQDpVHPSUH
GHJUDoD´
 $DomRMXGLFLDOIRLORJRLQWHUSUHWDGDSHODFRPXQLGDGHVRIWZDUHOLYUHEUDVLOHLUD
³060RQRSROL]HV8.*RY
W6LWH´LQWiredKWWSZZZZLUHGFRPQHZVEXVLQHVVKWPO
Software livre, cultura hacker e o ecossistema da colaboração • 143

FRPRXPDWHQWDWLYDGHLQWLPLGDomRGRJRYHUQRGDGRTXHDDQDORJLDQmRHUDQRYD
8PDRXWUDKLSyWHVHSDUDDDomRSRGHVHUOHYDQWDGDSHODDQiOLVHTXH¿]HPRVGD
PDWpULD0DLVGRTXHVHUFRPSDUDGDDWUD¿FDQWHVDHPSUHVDIRLUHWUDWDGDFRPRXP
JLJDQWHGHMRHOKRVGLDQWHGHXP'DYLGREVWLQDGRHDWUHYLGR$UHVSRVWDMXGLFLDOQmR
VHGLULJLXjUHYLVWDRXDRUHSyUWHUTXHGHVFUHYHUDPHVVDLPDJHPPDVD$PDGHX
DTXHOHTXH³FRPSURXXPDJXHUUD´HHQXPHUD³VHXVDOLDGRV´
 1DLPSUHQVDD0LFURVRIWHYLWRXFRPHQWDUDDomRMXGLFLDOFRQWUD$PDGHX$
DomRIRLDQXQFLDGDHPGHMXQKRXPSRXFRPHQRVGHGXDVVHPDQDVGHSRLVGD
UHDOL]DomRGR9)yUXP,QWHUQDFLRQDOGH6RIWZDUH/LYUHHP3RUWR$OHJUHSHUtRGRHP
TXHRSUHVLGHQWHGD¿OLDOEUDVLOHLUDGDHPSUHVDIH]FUtWLFDVPDLVJHUDLVeLQWHUHVVDQWH
UHSURGX]LU R WUHFKR GH RXWUD PDWpULD SXEOLFDGD QD LPSUHQVD TXH UHSURGX] HVVDV
FUtWLFDV

³$0LFURVRIWHVWiODQoDQGRXPDRIHQVLYDSROtWLFDQR%UDVLOSDUDWHQWDU
EDUUDURDYDQoRGRVRIWZDUHOLYUH2SUHVLGHQWHGD0LFURVRIW%UDVLO(PtOLR
8PHRNDGHL[RXFODURRWRPGHVVDRIHQVLYDDRGL]HUTXHDGHFLVmRGR
JRYHUQREUDVLOHLURGHDSRLDURVRIWZDUHOLYUHQRVFRPSXWDGRUHVGRVHWRU
S~EOLFRHVWiVHQGR³LQÀXHQFLDGDSHODLGHRORJLD´6HJXQGR8PHRNDD
HVFROKDGRJRYHUQR/XODSRGHOHYDURSDtVSDUDD³GLUHomRHUUDGD´QD
TXHVWmRGRVSURJUDPDVGHFRPSXWDGRU2XVHMDQDGLUHomRFRQWUiULD
DRVLQWHUHVVHVGD0LFURVRIW³6HRSDtVVHIHFKDUGHQRYRFRPRIH]
TXDQGRSURWHJHXRVHWRUGHWHFQRORJLDGDLQIRUPDomR UHIHUrQFLDj/HL
GH,QIRUPiWLFDDGRWDGDSHORJRYHUQREUDVLOHLURQDGpFDGDGHSDUD
SURWHJHUDLQG~VWULDQDFLRQDO GDTXLDDQRVWHUHPRVXPDSRVLomR
GRPLQDQWHHPDOJRLQVLJQL¿FDQWH´DUJXPHQWRXRH[HFXWLYR´

 $QWHVPHVPRGDDomRDHPSUHVDMiDQXQFLDYDTXHRREMHWLYRHUDSROtWLFR
'HIDWRRREMHWLYRpVLOHQFLDUDIDODGDTXHOHVTXHD¿UPDPDH[LVWrQFLDGHXPDGHVL
JXDOGDGH$RGL]HUTXHDSROtWLFDGRJRYHUQRp³LQÀXHQFLDGDSHODLGHRORJLD´HODHVWi
OHPEUDQGRDKLVWyULDVRFLDOLVWDGRSDUWLGRTXHRFXSDRJRYHUQRHSURFXUDGHVOHJLWLPi
ODFRPRXPREMHWLYRTXHQmRFDEHULDjIXQomRGR(VWDGRFRQWHPSRUkQHRTXHSRGH
VHUWDQWRUHJXODUDHFRQRPLDFRPRFRPEDWHULQLPLJRVDVVRFLDGRVDRFDSLWDOLVPRH
DRV(VWDGRV8QLGRV
 &RPRUHSUHViOLDFRQVHTXrQFLDGHVVDDWLWXGHGRJRYHUQRDHPSUHVDDFHQD
FRPHVVHUHWRUQRDRSDVVDGRXVDQGRQRYDPHQWHGDLPDJHPGH³DWUDVR´GHULYDGD
GD SROtWLFD GD UHVHUYD GH PHUFDGR³/HL GH ,QIRUPiWLFD´ $GRWDU R VRIWZDUH OLYUH
VHULD ³IHFKDU´ R SDtV OHYiOR j ³GLUHomR HUUDGD´ ± DTXL VXUJH D LPDJHP GH TXH R
%UDQFR0DUFHOR³0LFURVRIWWHQWDLQWLPLGDUR*RYHUQR%UDVLOHLUR´KWWSSRUWDOVRIWZDUHOLYUHRUJQHZV
$SyVRLQtFLRGDDomRGD0LFURVRIWVXUJLXXPJUDQGHPRYLPHQWRGHDSRLRD$PDGHXRUJDQL]DGRSHODVFRPXQLGDGHV
QDFLRQDOHLQWHUQDFLRQDO$PDGHXQmRUHVSRQGHXDRTXHVWLRQDPHQWRMXGLFLDOHHPSUHVDGHFLGLXQmRGDUSURVVHJXLPHQWR
jDomR
:HLVVKHLPHU0DUFR$XUpOLR³0LFURVRIWODQoDRIHQVLYDSROtWLFDFRQWUDRXVRGHVRIWZDUHOLYUH´Agência Carta Maior
KWWSDJHQFLDFDUWDPDLRUXROFRPEUDJHQFLDDVS"FROXQD UHSRUWDJHQV LG 
144 • Software livre, cultura hacker e o ecossistema da colaboração

GHVHQYROYLPHQWRVHJXHXPDFHUWDOLQKDXPFDPLQKR~QLFRQRTXDORVOtGHUHVHVWmR
jIUHQWH6HU³GRPLQDQWH´QRVRIWZDUHOLYUHVHULDQmR³GRPLQDU´QLQJXpPQmRHVWDUj
IUHQWHGHQLQJXpPSRLVHVVDWHFQRORJLDQmRVHUiXVDGDSRUQHQKXPSDtVUHOHYDQWH

Conclusão

$GLVFXVVmRHPWRUQRGRXVRGRVRIWZDUHOLYUHQRVSDtVHVSHULIpULFRVHP
QDo}HVFXMDGLIHUHQoDGHUHQGDpPDLVDFHQWXDGDHFXMDSRVLomRQRFHQiULRSROtWLFR
HFRQ{PLFRPXQGLDOpPHQRVYDQWDMRVDJDQKDFHUWDVHVSHFL¿FLGDGHV(VVDVFDUDF
WHUtVWLFDV~QLFDVSRGHPVHUYLUGHKLSyWHVHH[SOLFDWLYDSDUDTXHGLIHUHQWHGRUHVWR
GRPXQGRRWHUPRVRIWZDUHOLYUHWHQKDXPHPSUHJRPXLWRPDLRUGRTXHRWHUPR
open source 0DLV GR TXH D LQH[LVWrQFLD GD SRVVtYHO FRQIXVmR HQWUH RV WHUPRV
³IUHH´OLYUHHJUiWLVQRSRUWXJXrVHQRHVSDQKROJDQKDIRUoDFRPRH[SOLFDomRSDUD
D SRSXODUL]DomR GR WHUPR VRIWZDUH OLYUH D rQIDVH TXH HVVH PRYLPHQWR FRORFD QD
OLEHUGDGHGHPRGL¿FDomRDOWHUDomRHGLVWULEXLomRGRFyGLJRHPOXJDUGHDVSHFWRV
TXHVHULDPDSHQDVWpFQLFRV
 (PERUD R XVR GR VRIWZDUH OLYUH RX RSHQ VRXUFH FRPR IHUUDPHQWD SDUD D
GLPLQXLomRGRSRGHUGD0LFURVRIWWDPEpPVHMDXPIDWRULPSRUWDQWHSDUDRPRYLPHQWR
HPHVFDODPXQGLDOQDSHULIHULDLVVRJDQKDRXWURVDVSHFWRVeSRVVtYHOGHVFUHYHUD
VHJXLQWHUHODomR

Software livre Software proprietário


XVXiULRDXW{QRPR SURGXWRU XVXiULR³DSULVLRQDGR´ FRQVXPLGRU
SDtVLQGHSHQGHQWH SURGXWRU SDtVGHSHQGHQWH FRQVXPLGRU

 1HVVHMRJRD¿JXUDGRXVXiULRGHSHQGHQWHGHVROXo}HVSURSULHWiULDVIXQ
FLRQDFRPRPHWiIRUDSDUDDSUySULDLQVHUomRVXERUGLQDGDGRSDtVQDRUGHPHFR
Q{PLFDPXQGLDO2GLVFXUVRHPIDYRUGRVRIWZDUHOLYUHVHWRUQDHQWmRWDPEpPXP
GLVFXUVRHPIDYRUGHXPGHVHQYROYLPHQWRDXW{QRPRGRSDtV2open sourceDR
HQIDWL]DUDSHQDVDVYDQWDJHQVWpFQLFDVVHPGDUUHOHYRjWUDVIRUPDomRGRXVXiULR
HP SURGXWRU GH VHX SUySULR VRIWZDUH DFDED WHQGR PHQRV SHQHWUDomR 1R %UDVLO
HQTXDQWRKiQ~FOHRVGR3URMHWR6RIWZDUH/LYUHHPWRGRVRVHVWDGRVRWHUPRRSHQ
VRXUFHFyGLJRDEHUWRpXWLOL]DGRDSHQDVSHODVHPSUHVDVTXHDWXDPQHVVHPHUFDGR
HDOJXPDVPLVWXUDPDVGXDVH[SUHVV}HV 
 1HVVD UHODomR GH GHSHQGrQFLD H GRPLQDomR LPDJLQDGD QmR FDEH DTXL
GLVFXWLUVHUHDORXQmR D0LFURVRIWIRUWHPHQWHLGHQWL¿FDGDFRPRV(VWDGRV8QLGRV
VHUi R JUDQGH LQLPLJR JDQKDQGR D LPDJHP GH SRWrQFLD GRPLQDGRUD DJUHVVLYD
PRQRSROLVWD
Software livre, cultura hacker e o ecossistema da colaboração • 145

 (PUHVSRVWDDHPSUHVDSURFXUDPRELOL]DUDLPDJHPGR³DWUDVR´WHQWDQGR
PRVWUDU TXH VXDV VROXo}HV VmR DV PDLV XVDGDV SUDWLFDPHQWH ~QLFDV  QR PXQGR
HTXHLVVRFRQWLQXDUiSRUPXLWRWHPSR4XDOTXHUWHQWDWLYDGHFRQVWUXomRGHXPD
DOWHUQDWLYDKiGHIUDFDVVDUSRUVHUXWySLFDHQmRUHVSRQGHUj³UHDOLGDGH´GRPHUFDGR
 1HVVDUHVSRVWDWHPJUDQGHUHOHYkQFLDDLGHLDGH³DWUDVR´XPDSHUVSHFWLYD
HPTXHDLQMXVWLoDVRFLDOQRVSDtVHVGR7HUFHLUR0XQGRVHPLVWXUDFRPDFRQFHSomR
GHTXHDSHULIHULDYLYHHPXPDHVSpFLHGHSDVVDGRHPUHODomRDRVSDtVHVULFRV
(VVDLGHLDQmRHVWiVRPHQWHQRGLVFXUVRGDHPSUHVDPDVWDPEpPVHPRVWUDQR
GLVFXUVRGRVGHIHQVRUHVGRVRIWZDUHOLYUH3DUDHOHVDLQGDVHPLVWXUDPGXDVFRQ
FHSo}HVVREUHRSDSHOGRVRIWZDUHSDUDYHQFHUHVVHDWUDVRXPDD¿UPDRVRIWZDUH
OLYUH FRPR D WHFQRORJLD GR IXWXUR DTXHOD TXH DLQGD QmR p D PDLV XWLOL]DGD PDV
HP TXHVWmR GH WHPSR VHUi D RXWUD D¿UPD D LGHLD GH XP FDPLQKR DOWHUQDWLYR
LPDJLQDQGR TXH SDUD DOFDQoDU R ³GHVHQYROYLPHQWR´ QmR QHFHVVDULDPHQWH VHUi
SUHFLVRSHUFRUUHUXPFDPLQKR~QLFRSRGHQGRVHUFRQVWUXtGRXPGHVHQYROYLPHQWR
jPRGDGDSHULIHULD
 3HQVDQGRDQRomRGHDWUDVRGHXPDPDQHLUDPDLVDPSOLDGD0DUWD0RXUmR
.DQDVKLURHHXQRDUWLJR³&LrQFLD&RPXQLFDomRH6RFLHGDGHQR%UDVLODQDUUDWLYD
GRGp¿FLW´SURFXUDPRVUHÀHWLUDSDUWLUGHWH[WRVGHGLYXOJDomRFLHQWt¿FDHGHGR
FXPHQWRVGHDSRLRDHVVDVLQLFLDWLYDVFRPRDLGHLDGHGp¿FLWGHFRQKHFLPHQWRV
GR S~EOLFR OHLJR SDUD TXHP D GLYXOJDomR FLHQWt¿FD p GLULJLGD VH PLVWXUD FRP D
LGHLDGHTXHRVSDtVHVGDSHULIHULDFRPJUDQGHGLIHUHQoDVRFLDOHVWmRHPGp¿FLW
HP UHODomR DRV SDtVHV ULFRV GR FHQWUR 1RVVD FRQFOXVmR IRL TXH HVVD QRomR GH
Gp¿FLW HQWUH RV SDtVHV UHSRXVDYD HP XP LPDJLQiULR VREUH R DWUDVR HP TXH RV
SDtVHVSREUHVVHULDPWRPDGRVFRPRTXHHVWDQGRQRSDVVDGRHDWHFQRORJLDWHULD
XPSDSHOUHOHYDQWHSDUDXPDHVSpFLHGHDFHOHUDomRPDWHULDOL]DGDQRFRQFHLWRGH
GHVHQYROYLPHQWR7DQWRQDTXHOHWH[WRFRPRQHVWHQmRVHWUDWDGHQHJDURXD¿UPDU
DWHFQRORJLDFRPRFDSD]GHGHVHPSHQKDUHVVHSDSHOPDVGHDQDOLVDUFRPRHVVDV
WHRULDVHVWmRSUHVHQWHV
 1DTXHOHDUWLJRPRVWUDPRVFRPRDOJXQVVHWRUHV QRFDVRDVHPSUHVDVGH
ELRWHFQRORJLD TXHGHIHQGHPDDGRomRGHFHUWRVPRGHORVWHFQROyJLFRVGRVTXDLV
SRVVXHPRVGLUHLWRVGHSURSULHGDGHLQWHOHFWXDOD¿UPDPTXHHVVHVPRGHORVVmRRV
~QLFRVSRVVtYHLVSDUDRGHVHQYROYLPHQWRHVWDQGRDEXVFDGHDOWHUQDWLYDVIDGDGD
DR IUDFDVVR 1DTXHOH FDVR DVVLP FRPR SDUD D GLVFXVVmR HP WRUQR GR VRIWZDUH
OLYUHRIUDFDVVRVLJQL¿FDULDDFRQGHQDomRDR³DWUDVR´
 &RPRSXGHPRVDFRPSDQKDUDLGHLDGH³DWUDVR´WDPEpPHVWiSUHVHQWHDTXL
VHMDQRPHGRGHTXHHOHVHSHUSHWXHRXVHDSURIXQGHVHMDQDFRQFHSomRGHTXH
pSUHFLVRYHQFrOR1HVVHVHQWLGRD0LFURVRIWIXQFLRQDWDQWRFRPRDHPSUHVDTXH
.DQDVKLUR0DUWD0H(YDQJHOLVWD5DIDHO³&LrQFLD&RPXQLFDomRH6RFLHGDGHQR%UDVLODQDUUDWLYDGRGp¿FLW´LQ
JCom  'H]HPEURKWWSMFRPVLVVDLWIRFXVIRFBRUSGI
146 • Software livre, cultura hacker e o ecossistema da colaboração

SHUSHWXDHVVDFRQGLomR³DSULVLRQDQGR´RVXVXiULRVRXR(VWDGRDRVVHXVSDGU}HV
TXDQWRFRPRDHPSUHVDGHTXHPRGLVWDQFLDPHQWRSRGHVLJQL¿FDUR³LVRODPHQWR´RX
D³LQVLJQL¿FkQFLD´FRPRQDVSDODYUDVGRSUHVLGHQWHGD¿OLDOEUDVLOHLUDGDHPSUHVD

Seção IV
Conclusões gerais

$SyVRSHUFXUVRGHDQiOLVHHVWDEHOHFLGRDWpRPRPHQWRDFUHGLWRTXHVHMD
LQWHUHVVDQWHUHIRUPXODUDOJXQVGRVSRQWRVFRORFDGRVSDUDTXHRXWUDVFRQFOXV}HV
SRVVDPVHUHVWDEHOHFLGDV
 $FUHGLWR TXH SHOD DQiOLVH GR WH[WR GDV GXDV OLFHQoDV TXH VmR PDLV
XWLOL]DGDVSHORVVRIWZDUHVOLYUHHSHORVVRIWZDUHVSURSULHWiULRVWHQKDVLGRSRVVtYHO
PDUFDUDFRQWUDSRVLomRH[LVWHQWHHQWUHRFDUiWHUGHFDGDXPDVHQGRD*3/FRPR
VtPERORGDVOLFHQoDV OLYUHVXPDQHJDomR GDVUHVWULo}HVLPSRVWDVSHODVOLFHQoDV
SURSULHWiULDV
 $ FDUDFWHUtVWLFD PDLV LPSRUWDQWH GHVVD FRQWUDSRVLomR SDUHFH VHU R IDWR
GH DV OLFHQoDV OLYUHV SHUPLWLUHP XPD DVVLPLODomR IXQGDPHQWDO HQWUH D ¿JXUD
GR SURSULHWiULR H GR XVXiULR 1R PHUFDGR GH LQIRUPiWLFD Ki RXWUDV OLFHQoDV TXH
SHUPLWHP R XVR FKDPDGD IUHHZDUH  H D UHGLVWULEXLomR QmR FRPHUFLDO FKDPDGD
VKDUHZDUH 1RHQWDQWRQHQKXPDGHODVIRLFDSD]GHJHUDUXPPRYLPHQWRVRFLDO
PXLWRPHQRVFRPDIRUoDGRPRYLPHQWRVRIWZDUHOLYUH$VGXDVSHUPDQHFHPVHQGR
DSHQDVHVWUDWpJLDVGHGLVWULEXLomRHSURPRomRQRPHUFDGRGHVRIWZDUH
 $SDUWLUGRFRQFHLWRGHSROtWLFDTXHDTXLXWLOL]HL±FRPRIRUPXODGRSRU(GX
DUGR*XLPDUmHV±pSRVVtYHOGL]HUTXHDVOLFHQoDVOLYUHVDRSHUPLWLUHPTXHRFy
GLJRVHMDPRGL¿FDGRHUHGLVWULEXtGRSRUTXDOTXHUXVXiULRHVWmRSOHLWHDQGRXPQRYR
RUGHQDPHQWRGHUHODo}HVQDHVIHUDGDWHFQRORJLDGDLQIRUPDomR1HVVDQRYDRUGHP
XVXiULRVHGHVHQYROYHGRUHVSRGHPVHLJXDODU PHVPRTXHLVVRQXQFDDFRQWHoD Mi
TXHDGLVWLQomRHQWUHSURGXWRUHFRQVXPLGRUWRUQDVHFLUFXQVWDQFLDO$RFRQVXPLGRU
SDVVDDVHUIDFXOWDGRRGLUHLWRGHWDPEpPSURGX]LU$RH[LVWLUDOLFHQoDOLYUHD¿UPD
TXH D GHVLJXDOGDGH QmR SUHFLVD H[LVWLU H TXH p SRVVtYHO XP QRYR RUGHQDPHQWR
VRFLDOHPTXHHODQmRH[LVWH
 $RPHVPRWHPSRSRUFRQWUDGL]HUXPDQRUPDWmRIRUWHGDVRFLHGDGHFD
SLWDOLVWD FRPR D SURSULHGDGH SULYDGD GRV PHLRV GH SURGXomR DV OLFHQoDV OLYUHV
SDUHFHPJHUDUXPIRUWHPRYLPHQWRFRQWUDHODV&RPSDUDGDVDSDWRORJLDV ³FkQFHU´
³YtUXV´ HODVVHULDPFRPRHQIHUPLGDGHVDDWLQJLUDVRFLHGDGHTXHpIUHTXHQWHPHQWH
Software livre, cultura hacker e o ecossistema da colaboração • 147

FRPSDUDGD FRP RUJDQLVPRV YLYRV$ GRHQoD DIHWDULD DV IXQo}HV QRUPDLV GR VHU
YLYRGHVRUGHQDQGRVHXVyUJmRVHDIHWDQGRVXDVIXQo}HVYLWDLVSRGHQGRFDXVDU
D PRUWH RX VHMD D GLVVROXomR GDTXHOD RUGHP VRFLDO 2V GHIHQVRUHV GR VRIWZDUH
SURSULHWiULRGHVVDIRUPDSURWHVWDPFRQWUDXPDQRYDRUGHPVRFLDOHPTXHRSDSHO
GHSURGXWRUHVGHL[DULDGHVHUGHVHPSHQKDGRFRPH[FOXVLYLGDGHSRUDOJXQVDTXHOHV
TXHGHWrPRGLUHLWRGHDOWHUDURFyGLJRIRQWH
 0DV FRPR H[SOLFDU HQWmR TXH DOJR WmR VXEYHUVLYR FODVVL¿FDGR QD WHUUD
GRFDSLWDOLVPRFRPR³FRPXQLVWD´SRGHDOFDQoDUWDQWRVXFHVVRLQFOXVLYHGDQGRRUL
JHPDHPSUHVDVGRV(VWDGRV8QLGRVHVHQGRDGRWDGRHLQFHQWLYDGRSRUJUDQGHV
FRUSRUDo}HV"
 3DUDLVVRRPRYLPHQWRVRIWZDUHOLYUHWHYHTXHVHUUHIXQGDGRUHVVLJQL¿FDGR
VREUHRXWUDVEDVHV2RSHQVRXUFHFyGLJRDEHUWRVHPHQIDWL]DUDLQGLVWLQomRHQWUH
SURGXWRUHV H FRQVXPLGRUHVXVXiULRV GHX UHOHYkQFLD D XPD QRYD SUiWLFD GH SUR
GXomRGHVRIWZDUHVySRVVtYHODSDUWLUGRVDQRVFRPDFULDomRGDLQWHUQHW
1HVVDSUiWLFDDUHGHSDVVRXDIXQFLRQDUFRPRXPDPHWiIRUDGRPXQGRQDWXUDOHP
TXH RV FyGLJRV PDLV FRPSHWHQWHVPHOKRU HVFULWRVPDLV LQRYDGRUHV HQFRQWUDYDP
SURJUDPDGRUHVGLVSRVWRVDDSOLFiORVHDPHOKRUiORV$UHODomRPDLVÀH[tYHOFRP
DSURSULHGDGHSDVVRXDVHUMXVWL¿FDGDSHODPHOKRULDWpFQLFDSHODVHOHomRQDWXUDO
HVWDEHOHFLGDQDLQWHUQHW³/LEHUDUFHGROLEHUDUIUHTXHQWHPHQWH´FRPRD¿UPRX(ULF
5D\PRQG WRUQRXVH D UHJUD SDUD JDUDQWLU R PtQLPR GH WHPSR SHUGLGR QR GHVHQ
YROYLPHQWR GH XP VRIWZDUH TXH SURYDYHOPHQWH QmR ³VREUHYLYHULD´ QD VHOYD GR
PHUFDGRHSDUDJDUDQWLUDDGRomRGDVPHOKRUHVVROXo}HVGHGHVHQYROYLPHQWRSUR
SRUFLRQDGDSHODSURIXVmRGHROKRVDOHURFyGLJR$RPHVPRWHPSRDUHGHSDVVRX
DIXQFLRQDUFRPRDH[SHULrQFLDGHYLGDTXHPHOKRUDULDRFyGLJR WRUQDQGRRPDLV
IRUWH 
 $ PHWiIRUD GR PXQGR QDWXUDO HQFRQWURX JUDQGH UHVVRQkQFLD QRV RXYLGRV
GDV HPSUHVDV H QRV SDtVHV FHQWUDLV 3DUD DTXHOHV TXH HVWmR HP FRQGLomR SULYL
OHJLDGD HP WHUPRV VRFLDLV HQWHQGHU VXD FRQGLomR FRPR GHULYDGD GH XPD PDLRU
FDSDFLWDomR LQWHOLJrQFLD RX KDELOLGDGH SDUHFH VHU PXLWR PDLV DGHTXDGR GR TXH
DWULEXLUDGLIHUHQoDDLQMXVWLoDVVRFLDLV2PXQGRQDWXUDOFRPRPHWiIRUDGDRUJD
QL]DomRVRFLDO RVPDLVIRUWHVVREUHYLYHPHSURVSHUDPHQTXDQWRRVPDLVIUDFRV
PRUUHP pDOJREDVWDQWHUHFRUUHQWHQDVRFLHGDGHHVWDGXQLGHQVH
 1R GLVFXUVR open sourceFyGLJR DEHUWR D SHUVLVWrQFLD GD H[LVWrQFLD GD
¿JXUDGRXVXiULRFRQVXPLGRUSRGHVHUYHUL¿FDGD3DUDDVHPSUHVDVLQWHUHVVDGDV
QRQHJyFLRVRIWZDUH VHMDHOHDYHQGDGHFyGLJRDSHUIHLoRDGRRXVHUYLoRV D¿JXUD
GR FRQVXPLGRU SUHFLVD FRQWLQXDU D H[LVWLU$ SRVVLELOLGDGH GH DOWHUDomR GR FyGLJR
WRUQRXVHDOJRQmRHVVHQFLDOHPERUDDLQGDGHVHMiYHO0DLVLPSRUWDQWHTXHDQmR
GLVWLQomRHQWUHSURGXWRUXVXiULRVHUmRRVPLOKDUHVGHROKRVFDSD]HVGHLQVSHFLRQDU
148 • Software livre, cultura hacker e o ecossistema da colaboração

RFyGLJRHID]rORHYROXLUSDUDDOJRPHOKRU(VVHQFLDOPHQWHQDOLFHQoDQDGDPXGD
PDVVXUJHXPDQRYDLQVWLWXLomR D2SHQ6RXUFH,QLWLDWLYH HQRYRVDGYRJDGRVTXH
HQIDWL]DPVXDVYDQWDJHQVWpFQLFDVHQmRDDOWHUDomRQDRUGHPVRFLDO
 -i QD SHULIHULD TXHP HQFRQWURX HFR IRL R GLVFXUVR HP IDYRU GR VRIWZDUH
OLYUH$¿JXUDGRXVXiULRTXHSRGHVHWRUQDUXPSURJUDPDGRUIRLH[SDQGLGDSDUDD
LGHLDGRSDtVTXHSRGHGHL[DUGHRFXSDUXPDSRVLomRVXEDOWHUQDGHFRQVXPLGRUGH
WHFQRORJLDSDUDWRUQDUVHDXW{QRPRHSURGXWRU$GHSHQGrQFLDGHSURGXWRVYLQGRV
GRH[WHULRUHDLQMXVWLoDVRFLDOPLVWXUDGDFRPRIDWRGHVHWUDWDUGHXPDGLVFXVVmR
VREUHWHFQRORJLDVmRHQWHQGLGDVFRPR³DWUDVR´FRPRVHDLQFDSDFLGDGHGHSURGX]LU
DVPHUFDGRULDVYHQGLGDVSHORVSDtVHVFHQWUDLVVLJQL¿FDVVHTXHHVVHVSDtVHVHVWmR
HP XP WHPSR GLIHUHQWH FRPR VH HVWLYHVVHP QR ³SDVVDGR´ 1HVVH VHQWLGR XPD
WHFQRORJLD DEHUWD VHP VHJUHGRV  H GH FXVWR EDL[R VHP FXVWR GH OLFHQFLDPHQWR 
DSDUHFH FRPR XPD SRVVtYHO DOWHUQDWLYD GH GHVHQYROYLPHQWR $OJXPDV YH]HV
HVVD DOWHUQDWLYD VLJQL¿FDUi FRQVWUXLU XP FDPLQKR WRWDOPHQWH QRYR LQGHSHQGHQWH
DXW{QRPR RXWUDVHVVHSRGHVHUXP³DWDOKR´XPDQ~QFLRGRTXHVHUiRIXWXUR
 $R HVWDEHOHFHU HVVH SHUFXUVR GH DQiOLVH HVWH WUDEDOKR SURFXURX PRVWUDU
TXHHPERUDRVSURGXWRVTXHHVWmRHPGHEDWHQDGLVFXVVmRVREUHRVRIWZDUHOLYUH
VHMDPWLGRVFRPRWpFQLFRVDDGRomRGHXPDRXGHRXWUDWHFQRORJLDWHPSURIXQGDV
FRQVHTXrQFLDV VRFLDLV TXH VH UHÀHWHP H VH UHIHUHP DR LPDJLQiULR VREUH XP
RUGHQDPHQWR GR PXQGR SULQFLSDOPHQWH UHODFLRQDGR j GLVWLQomR RX QmRGLVWLQomR
HQWUH TXHP SURGX] H TXHP Vy SRGH FRQVXPLU &RPR YLPRV Ki WDPEpP RXWURV
HOHPHQWRV&RQWXGRDSURSRVLomRGHXPDLJXDOGDGHGHGLUHLWRVSDUDDDOWHUDomRGR
FyGLJRWHPFDUiWHUIXQGDPHQWDOHGHULYDVHHPRXWUDVIRUPDVDTXLGLVFXWLGDV(VVH
LPDJLQiULRVREUHRRUGHQDPHQWRGRPXQGRLQVFUHYHVHHSRGHVHUREVHUYDGRQD
OLQJXDJHPHQRVVHQWLGRV

Epílogo
Compartilhando textos

&DEHPDTXLDOJXPDVREVHUYDo}HVVREUHDGLQkPLFDGHFRPSDUWLOKDPHQWR
GHFyGLJRVLQVWDXUDGDSHORPRYLPHQWRVRIWZDUHOLYUH7HUDOLEHUGDGHSDUDDOWHUDU
R FyGLJR UHFHELGR GH RXWUR VHULD DOJR PXLWR GLItFLO WDOYH] DWp LPSRVVtYHO VH RV
SURJUDPDV GH FRPSXWDGRU TXH VmR FRPSDUWLOKDGRV HVWLYHVVHP DSHQDV HP VXD
IRUPDH[HFXWiYHO
 2TXHVLJQL¿FDLVVR"2SURJUDPDH[HFXWiYHOpDTXHOHTXHMiHVWiSURQWR
Software livre, cultura hacker e o ecossistema da colaboração • 149

SDUD³URGDU´QRFRPSXWDGRU1R:LQGRZVSRUH[HPSORVmRDTXHOHVDUTXLYRVTXH
WHUPLQDPFRPDH[WHQVmR³H[H´/HURFyGLJRGHVVHVSURJUDPDVpLPSRVVtYHOSDUD
XPKXPDQRSRLVHOHHVWiSURQWRSDUDVHUHQWHQGLGRSHODPiTXLQD
 3RU LVVR DR GLVSRQLELOL]DU RV SURJUDPDV SDUD TXH RXWURV SRVVDP DOWHUi
ORDVOLFHQoDVOLYUHVHVWLSXODPTXHMXQWRFRPRSURJUDPDH[HFXWiYHOGHYHHVWDU
GLVSRQtYHO WDPEpP R FyGLJRIRQWH GR SURJUDPD$ *3/ SRU H[HPSOR GL] ³>3DUD
UHGLVWULEXLUYRFrGHYH@,QFOXLURFyGLJRIRQWHFRUUHVSRQGHQWHFRPSOHWRSDVVtYHOGH
OHLWXUDSHODPiTXLQDRTXDOWHUiGHVHUGLVWULEXtGRGHDFRUGRFRPDV&OiXVXODVH
DFLPDHPXPPHLRRXPtGLDKDELWXDOPHQWHXVDGRSDUDLQWHUFkPELRGHVRIWZDUH
 ´
2 FyGLJR IRQWH GH XP SURJUDPD p D OLQJXDJHP XVDGD SHOR SURJUDPDGRU
SDUDHVFUHYHUDTXHOHVRIWZDUHeOiTXHHOHHVWLSXODRTXHRSURJUDPDYDLID]HU
'HSRLVGHGHVFUHYHUHVVDVIXQo}HVHPFHUWDOLQJXDJHPRSURJUDPDGRUDSOLFDXP
FRPSLODGRUVREUHRFyGLJRTXHQDGDPDLVpGRTXHRXWURVRIWZDUHFDSD]GH³WUD
GX]LU´ R FyGLJRIRQWH SDUD D PiTXLQD 2X VHMD R FyGLJRIRQWH p XPD OLQJXDJHP
HP TXH WDQWR R SURJUDPDGRU p FDSD] GH HVFUHYHU H OHU H HOH Or GLUHWDPHQWH Mi
LPDJLQDQGRRTXHRVRIWZDUHIDUi FRPRDPiTXLQD SRUPHLRGHXPVRIWZDUHGH
³WUDGXomR´RFRPSLODGRU pFDSD]GHOHU
 2TXHRPRYLPHQWRVRIWZDUHOLYUHLQVWLWXLIRLHQWmRXPDFRUGRHPTXHWRGRV
RV SURJUDPDGRUHV FRPSURPHWHPVH D HVWDEHOHFHU XPD FRPXQLFDomR LQWHOLJtYHO
HQWUH VL $R LQYpV GH DSHQDV GLVSRQLELOL]DU R SURGXWR GH VHX WUDEDOKR QD IRUPD
GH XPD OLQJXDJHP TXH Vy SRGHULD VHU HQWHQGLGD SHODV PiTXLQDV R PRYLPHQWR
VRIWZDUHOLYUHHVWDEHOHFHXTXHHVVHVWH[WRVHVFULWRVQDVPDLVGLYHUVDVOLQJXDJHQV
GHSURJUDPDomRGHYHULDPSRGHUVHUOLGRVSRUWRGRV
 0DLVRVFyGLJRVIRQWHVGRVSURJUDPDVVmRHPJHUDOFRPHQWDGRV(VVDV
REVHUYDo}HVSRGHPVHUWDQWRGHVFULo}HVGDVIXQo}HVTXHFHUWRVFRPDQGRVSUHWHQ
GHPUHDOL]DUFRPRFRPHQWiULRVVREUHSURGXWRVFRQFRUUHQWHVRXRTXHPDLVRSUR
JUDPDGRUGHVHMDU7DQWRRFyGLJRGRVVRIWZDUHVOLYUHVFRPRRFyGLJRGRVVRIWZDUHV
SURSULHWiULRVWrPFRPHQWiULRVPDVDGLIHUHQoDpTXHRVFRPHQWiULRVGRVFyGLJRV
OLYUHVVmRS~EOLFRVHHVVHQFLDLVSDUDTXHRGHVHQYROYLPHQWRFRQWLQXH 1mRpUDUR
RXYLUGHSURJUDPDGRUHVTXHXPFyGLJR³HVWiVXMR´RXp³EHPHVFULWR´RXDLQGDTXH
³HVWiPDOIRUPDWDGRGHVRUJDQL]DGR´
 3DUDH[SOLFDURTXHVmRRVFyGLJRVIRQWH5LFKDUG6WDOOPDQHVWDEHOHFHXPD
DQDORJLDFRPUHFHLWDVGHFR]LQKD6HJXQGRHOHDVOLFHQoDVSURSULHWiULDVLPS}HP
1RLQtFLRGHIRLQRWLFLDGRTXHSDUWHVGRFyGLJRGR:LQGRZVWHULDPYD]DGRVHQGRGLVSRQLELOL]DGRVQDLQWHUQHW2
WUHFKRGHXPDQRWtFLDVREUHHVVHIDWRDSRQWDTXHRFyGLJRWLQKDFRPHQWiULRVVREUHIDOKDVGRSURGXWRHVREUHVRIWZDUH
GDFRQFRUUrQFLD5RGULJXHV*LRUGDQL³06DGPLWHTXHFyGLJRGR:LQGRZVYD]RXQD:HE´SXEOLFDGDHPKWWSZZZ
DHRQWHFKFRPEUQRWLFLDVBVHJXUDQFDBFRGLJRBZLQGRZVKWPOHP
³(QWUH DV LQIRUPDo}HV PDLV FXULRVDV TXH HOH HQFRQWURX QDV OLQKDV GH SURJUDPDomR HVWmR RV FRPHQWiULRV GRV
SURJUDPDGRUHVHFLWDo}HVDPDUFDVFRQFRUUHQWHVFRPR1HWVFDSHH8QL[7DPEpPIRUDPHQFRQWUDGDVYiULDVUHIHUrQFLDV
DEXJVFRPRDVHJXLQWH³(QVXUHWKHFDOOHUKDVUHDGDFFHVV%8*%8*,VWKLVQHFHVVDU\"´´
150 • Software livre, cultura hacker e o ecossistema da colaboração

UHVWULo}HVTXHVHULDPVHPHOKDQWHVDLPSHGLUTXHXPYL]LQKRSDVVHXPDUHFHLWDGH
XPERORSRUH[HPSORDRXWUR2PRYLPHQWRIXQGDGRSRU6WDOOPDQIH]MXVWDPHQWH
RFRQWUiULRFULRXXPDUHJUDHPTXHSDUDVHFRORFDUXPSURGXWRQDSUDWHOHLUDGH
SURGXWRV ³OLYUHV´ GH XP VXSHUPHUFDGR p SUHFLVR TXH HOH FRQWHQKD DV LQVWUXo}HV
VREUHFRPRID]HUSDUDTXHWRGRVSRVVDPVHWRUQDUFR]LQKHLURV

5HIHUrQFLDV

%$5%522. 5LFKDUG  &$0(521 $QG\ Californian Ideology  'LVSRQtYHO HP KWWSZZZ
DODPXWFRPVXEMLGHRORJLHVSHVVLPLVPFDOLI,GHRB,KWPO

*$'(7 )UDQoRLVH +$. 7RQ\ RUJ  Por uma análise automática do discurso &DPSLQDV (G GD
8QLFDPS

*8,0$5­(6(GXDUGRSemântica do Acontecimento&DPSLQDV3RQWHV

*8529,7=+pOLRLinux.&ROHomR3DUDVDEHUPDLV(G$EULO

081',( &UDLJ 3UHSDUHG 7H[W RI 5HPDUNV E\ &UDLJ 0XQGLH 0LFURVRIW 6HQLRU 9LFH 3UHVLGHQW  7KH
&RPPHUFLDO6RIWZDUH0RGHOHPMicrosoft, site institucional.9LVXDOL]DGRHPKWWSZZZ
PLFURVRIWFRPSUHVVSDVVH[HFFUDLJVKDUHGVRXUFHDVS

.$1$6+,52 0DUWD 0 H (9$1*(/,67$ 5DIDHO ³&LrQFLD &RPXQLFDomR H 6RFLHGDGH QR %UDVLO D
QDUUDWLYDGRGp¿FLW´LQJCom  'H]'LVSRQtYHOHPKWWSMFRPVLVVDLWIRFXVIRFBRUSGI

25/$1',(QLAs Formas do Silêncio&DPSLQDV(GLWRUDGD8QLFDPS

25/$1',(QLInterpretação. Autoria, leitura e efeitos do trabalho simbólico3HWUySROLV9R]HV




25/$1',(QLAnálise de discurso: princípios e procedimentos&DPSLQDV3RQWHV

3Ç&+(8; 0LFKHO 6HPkQWLFD H 'LVFXUVR XPD FUtWLFD j D¿UPDomR GR yEYLR &DPSLQDV (G GD
8QLFDPS

5$<021'(ULFA Catedral e o Bazar7UDGXomR(ULN.RKOHU'LVSRQtYHOHPKWWSZZZJHRFLWLHVFRP


&ROOHJH3DUN8QLRQSWFDWKHGUDOED]DDUKWPO

5,).,1-HUHP\A era do acesso6mR3DXOR0DNURP%RRNV

6g'(5%(5*-RKDQ³&RS\OHIWYV&RS\ULJKWDPDU[LVWFULWLTXH´LQFirst Monday)HY'LVSRQtYHO
HPKWWSZZZ¿UVWPRQGD\RUJLVVXHVLVVXHBVRGHUEHUJ

67$//0$15LFKDUGFree Software, Free Society'LVSRQtYHOHPKWWSZZZQRWDEXJFRPUPV


HVVD\VSGI

:,//,$066DPFree as in Freedom5LFKDUG6WDOOPDQ¶V&UXVDGHIRU)UHH6RIWZDUH(8$PDU
'LVSRQtYHOHPKWWSZZZRUHLOO\FRPRSHQERRNIUHHGRP
Software livre, cultura hacker e o ecossistema da colaboração • 151

A tecnologia na obra de
Álvaro Vieira Pinto e
Paulo Freire
Anderson Fernandes de Alencar

Este trabalho é resultado de pesquisa em nível de mestrado que teve por


REMHWLYRJHUDOUHÀHWLUDFHUFDGHXPDPHWRGRORJLDGHPLJUDomRGRVRIWZDUHSURSULH
WiULRSDUDRVRIWZDUHOLYUHTXHFRQWHPSODVVHHOHPHQWRVGRSHQVDPHQWRGR¿OyVRIR
ÈOYDUR9LHLUD3LQWRHGRHGXFDGRU3DXOR)UHLUHEXVFDQGRDLQGDDSUHVHQWDUHOHPHQ
WRVWHyULFRSUiWLFRVUHOHYDQWHVSDUDDFRQVWLWXLomRGHXPD3HGDJRJLDGD0LJUDomR
1HVVDGLUHomRDSHVTXLVDIRLGHVHQYROYLGDEXVFDQGRFRQWULEXLUSDUDFRPDUHVSRVWD
à pergunta do comoID]HUcomoPLJUDUHQHVWHFDVRPLJUDUSDXWDGRVHPXPD
SHUVSHFWLYDHPDQFLSDGRUDHGLDOyJLFD
 $SHVTXLVDWHYHSRUREMHWRDPLJUDomRSDUDVRIWZDUHOLYUHHPXPDSHUVSHFWLYD
IUHLULDQDHFRPRIXQGDPHQWRVWHyULFRVDVFRQWULEXLo}HVGRVDXWRUHVPHQFLRQDGRV
SRUPHLRGHVXDVUHÀH[}HVDFHUFDGRFRQFHLWRGHWpFQLFDHWHFQRORJLDGDQHFHVViULD
DWLWXGHUHÀH[LYDIUHQWHjWHFQRORJLDGDFUtWLFDDGHSHQGrQFLDWHFQROyJLFDGDDSUH
VHQWDomR GD WHFQRORJLD FRPR SDWULP{QLR GD KXPDQLGDGH QD UHÀH[mR VREUH XPD
³SUi[LV WHFQROyJLFD´ GH XPD WHFQRORJLD D VHUYLoR GDV FDXVDV GH HPDQFLSDomR H
PXGDQoDVRFLDOHQDGHIHVDGHXPDFRQFHSomRGHLQIRLQFOXVmR
 2GHVHQYROYLPHQWRGDGLVVHUWDomRSUHVVXS{VUHÀH[mRWHyULFDDSDUWLUGDV
UHIHUrQFLDVELEOLRJUi¿FDVVREUHRDVVXQWRHWDPEpPXPHVWXGRGHFDVR DH[SH
ULrQFLDGHPLJUDomRGR,QVWLWXWR3DXOR)UHLUH SRUPHLRGRTXDOSUHWHQGHXVHDSUH
VHQWDUVXJHVW}HVSURSRVWDVHLQGLFDo}HVFRQFUHWDVXQLQGRSULQFtSLRVIUHLULDQRVj
VXDDSOLFDomRQDH[SHULrQFLDGHPLJUDomRQR,QVWLWXWR
 'HYLGRjH[WHQVmRGHWRGDVDVDWLYLGDGHVTXHHQYROYHUDPHVWDPLJUDomR
QHVWHDUWLJRIRFDUHPRVQDDSUHVHQWDomRGHXPSODQRJHUDOGDUHÀH[mRWHyULFDTXH
SHUPHRXWRGRRWUDEDOKRGHSHVTXLVDLQLFLDQGRSRUXPDDSUHVHQWDomRGRVDXWRUHV
152 • Software livre, cultura hacker e o ecossistema da colaboração

TXHLUHPRVDERUGDUFRPHVSHFLDOPHQomRDRHGXFDGRU3DXOR)UHLUH2WH[WRHVWi
RUJDQL]DGRGDVHJXLQWHIRUPD
 1D SULPHLUD SDUWH YDPRV GLVFXWLU R SHQVDPHQWR GH ÈOYDUR 9LHLUD 3LQWR
VREUHDWHFQRORJLDSULPHLUDPHQWHSRUPHLRGHVXDVUHÀH[}HVDFHUFDGRFRQFHLWR
GH WpFQLFD H WHFQRORJLD GHSRLV GDV QHFHVViULDV DWLWXGHV IUHQWH j WHFQRORJLD R
HPEDVEDFDPHQWRHRPDUDYLOKDPHQWRHPVHJXLGDSRUPHLRGDFUtWLFDjGLFRWRPLD
KXPDQLVPR[WHFQRORJLDGDGHSHQGrQFLDDXWRQRPLDWHFQROyJLFDGDSHUVRQL¿FDomR
GDWpFQLFDHSRU¿PGDWHFQRORJLDFRPRSDWULP{QLRGDKXPDQLGDGH
 1D VHJXQGD SDUWH DSUHVHQWDPRV XPD FRQFHSomR GH WHFQRORJLD D SDUWLU
GD REUD GH 3DXOR )UHLUH UHÀHWLPRV DFHUFD GH XPD SUi[LV WHFQROyJLFD WUDWDPRV
GDSUHPHQWHQHFHVVLGDGHGHVHUHSHQVDUVREUHTXDOWHPVLGRD¿QDOLGDGHGRXVR
GD WHFQRORJLD QD QRVVD VRFLHGDGH QD HGXFDomR RX HP TXDOTXHU RXWUR HVSDoR
DSUHVHQWDPRVRTXH)UHLUHHQWHQGLDSRUOLPLWHVQRXVRGDVWHFQRORJLDVHDERUGDPRV
DVIDODVHPTXHHOHUHÀHWHHVVHWHPDPRVWUDQGRGHPRGRSUiWLFRRVGLYHUVRVPHLRV
SHORVTXDLVHODSRGHVHUYLUDREHPGDKXPDQLGDGHGDHGXFDomRHGDWUDQVIRUPDomR
VRFLDOSRU¿PGLVFXWLPRVTXHGHVGHGH)UHLUHMiGLVFXWHDGHPRFUDWL]DomRGR
DFHVVRjWHFQRORJLDHWDPEpPDo}HVSUiWLFDVSDUDVXDFRQFUHWL]DomR1DVQRVVDV
FRQVLGHUDo}HV¿QDLVUHÀHWLPRVDFHUFDGDUHODomRHQWUH3DXOR)UHLUHHR0RYLPHQWR
GR6RIWZDUH/LYUH

ÈOYDUR9LHLUD3LQWRXPROKDUUHÀH[LYRHULJRURVR

 $VWHFQRORJLDVVHPSUH¿]HUDPSDUWHGRFRWLGLDQRGDVFLGDGHVSHTXHQDVRX
JUDQGHVGRVSDtVHVGLWRVGHVHQYROYLGRVRXVXEGHVHQYROYLGRVRXDLQGDGHTXDOTXHU
SRYRGHTXHVHWHQKDWLGRFRQKHFLPHQWRQDKLVWyULDGDKXPDQLGDGH1RLQWXLWRGH
WRUQDUHYLGHQWHDQRVVDFRQFHSomRUHIHUHQWHj V WHFQRORJLD V RXWpFQLFD V DQWHV
PHVPRGHQRVUHSRUWDUD3DXOR)UHLUHJRVWDUtDPRVGHDSUHVHQWDUDFRQFHSomRGR
DXWRUHPTXHQRVEDVHDPRVFRPRUHSUHVHQWDQWHGHVWDOLQKD¿ORVy¿FD
 2SRUWXQDPHQWH p ODQoDGR GXUDQWH D SHVTXLVD R OLYUR O Conceito de
Tecnologia, v. 1 e v. 2,GR¿OyVRIRÈOYDUR9LHLUD3LQWRFRPSDQKHLURGH3DXOR)UHLUH
QR ,QVWLWXWR 6XSHULRU GH (VWXGRV %UDVLOHLURV ,6(%  H D TXHP )UHLUH UHSRUWDYDVH
UHVSHLWRVDPHQWH FRPR mestre brasileiro )5(,5(  S   RX meu mestre,
VHJXQGR&pVDU%HQMDPLQQD³1RWDGR(GLWRU´GRSUySULROLYUR
 2 OLYUR IRL GHVFREHUWR SHOD LUPm GR DGYRJDGR UHVSRQViYHO SHORV EHQV GH
ÈOYDURHGHVXDHVSRVDHPIRUPDGHODXGDVGDWLORJUDIDGDVHPPiTXLQDGH
HVFUHYHUHVHUiHVSHFL¿FDPHQWHHVVDREUDHHVVHDXWRUTXHWRPDUHPRVSRUEDVH
SDUDUHÀHWLUDFHUFDGD V WHFQRORJLD V WpFQLFD V  FRPRLQWURGXomR jVSDODYUDVGH
Software livre, cultura hacker e o ecossistema da colaboração • 153

3DXOR)UHLUHVREUHWXGRGHYLGRjVLQÀXrQFLDVVLJQL¿FDWLYDVTXHRSHQVDPHQWRHD
REUDGHÈOYDUR9LHLUD3LQWRWLYHUDPVREUHRHGXFDGRU
 9LHLUD3LQWRUHDOL]DQDH[WHQVmRGHVXDREUDXPDUHÀH[mRULJRURVDHSURIXQGD
VREUHRFRQFHLWRGHWpFQLFDGHWHFQRORJLDVREUHVXDVLPSOLFDo}HVQRWHPSRSUH
VHQWH UHDOL]D LQFLVLYDV FUtWLFDV jV LGpLDV GH HPEDVEDFDPHQWR H PDUDYLOKDPHQWR
GLDQWH GD WHFQRORJLD FULWLFD R GXDOLVPR KXPDQLVPR [ WHFQRORJLD WHFH UHÀH[}HV
VREUHRSDSHOGRVWpFQLFRVGLVFXWHRWHPDGDGHSHQGrQFLDWHFQROyJLFDLQVLVWHQD
FUtWLFD j SHUVRQL¿FDomR GD WpFQLFD DSUHVHQWD D WpFQLFDWHFQRORJLDFRQKHFLPHQWR
FRPRSDWULP{QLRGDKXPDQLGDGHGLVVHUWDVREUHDUHODomRGDWpFQLFDQRKRPHPH
QRVDQLPDLVHSRU¿PUHDOL]DDGLVWLQomRHQWUHWHFQRORJLDPDWHULDOHGDLQWHOLJrQFLD
 2OLYURGLVFXWHDLQGDRXWUDVTXHVW}HVFRPRRSDSHOGDPiTXLQDHGDFLEHU
QpWLFDFRQWXGRHPQRVVDVUHÀH[}HVVREUHDWpFQLFDHWHFQRORJLDQRVOLPLWDUHPRV
DDERUGDUDVWHPiWLFDVDFLPDFLWDGDV

1.1 O conceito de técnica e tecnologia

 9LHLUD3LQWR " HQWHQGHDWpFQLFDQmRVRPHQWHFRPRSURFHVVRFRPR


PRGRGHID]HU modus faciendi PDVFRPRSDUWHLQVHSDUiYHOGRVHUGRFRUSRKXPDQR
$WpFQLFDQDVFHFRPRKRPHPpRPHLRSHORTXDOSURGX]VXDH[LVWrQFLDSRUWDQWR
HVWi HP WRGD DWLYLGDGHDWR KXPDQR (VWHYH VHPSUH SUHVHQWH HP WRGD D KLVWyULD
GRV KRPHQV H PXOKHUHV H FDUDFWHUL]D R VXUJLPHQWR GH DOJR QRYR HVWUHLWDPHQWH
YLQFXODGRFRPDLQYHQomRFRPDSURGXomR2VDUWHIDWRVDVSURGXo}HVPDWHULDLV
FRQVWLWXHPVHQHVVDSHUVSHFWLYDHPXPDFRUSRUL¿FDomRGDWpFQLFD
 $ULVWyWHOHV DSXG 9,(,5$ 3,172 " S   QR OLYUR De Generatione
Animalium SUHFLVD VHX SHQVDPHQWR VREUH D WpFQLFD DR GL]HU ³2 FDORU H R IULR
SRGHPWRUQDURIHUUREUDQGRRXGXURPDVRTXHID]XPDHVSDGDpRPRYLPHQWRGRV
LQVWUXPHQWRVHPSUHJDGRVHHVWHPRYLPHQWRFRQWpPRSULQFtSLRGDDUWH WpFQLFD 
3RLVDWpFQLFDpRSRQWRGHSDUWLGD RXRSULQFtSLRarquê HDIRUPDGRSURGXWR´
9LHLUD 3LQWR UHÀHWLQGR VREUH R FRQFHLWR GH WpFQLFD GLVFXWH HVVD D¿UPDomR TXH
HOH FRQVLGHUD GH ³YDORU VXSUHPR´ DQDOLVDQGR TXH $ULVWyWHOHV ID] XPD GLVWLQomR
FODUD HQWUH R TXH VHMDP HOHPHQWRV GD QDWXUH]D FRPR R IULR H R FDORU H D DomR
SURSULDPHQWH GLWD GR KRPHPPXOKHU e GLDQWH GD LQH[LVWrQFLD QD QDWXUH]D GR
SURGXWRGHTXHQHFHVVLWD±DHVSDGD±GLDQWHGRTXHHOHFKDPDULDGHFRQWUDGLomR
TXHRKRPHPPXOKHUVHS}HDSURGX]LURTXHQHFHVVLWDSDUDDVXDH[LVWrQFLDQR
PXQGR³1HVVHPRYLPHQWRRXVHMDQRDWRKXPDQRUHVLGHRSULQFtSLRGDWpFQLFD´
 $WpFQLFDFRPRMiGLWRID]SDUWHGDH[LVWrQFLDGRKRPHPPXOKHUQRPXQ
GR ([LVWH XPD UHODomR VLPELyWLFD HQWUH R KRPHPPXOKHU H D WpFQLFD HVWHV VmR
LQWHUGHSHQGHQWHV2VSULPHLURVGHSHQGHPGDWpFQLFDSDUDSURGX]LUVXDH[LVWrQFLD
154 • Software livre, cultura hacker e o ecossistema da colaboração

H VXSHUDU DV FRQWUDGLo}HV GD QDWXUH]D H D WpFQLFD VRPHQWH H[LVWH QD SUHVHQoD
DWLYD GR VHU KXPDQR ³$ WpFQLFD HVWi OLJDGD j YLGD QmR HP VHQWLGR LGHDOLVWD H
JHQHUDOL]DGDPHQWH PDV QR VHQWLGR GH GHSHQGHU GD SURGXomR SHOD YLGD GR VHX
SURGXWR PDLV HOHYDGR R FpUHEUR KXPDQR´ 9,(,5$ 3,172 " S   9LHLUD
3LQWRFRQWLQXD

2WHUPRWHPDSOLFDomRMXVWDTXDQGRGHVLJQDDH[HFXomRKXPDQDGH
DWRVGHSURGXomRHGHGHIHVDGDYLGDIHLWRVSRUIRUoDGHXPSURFHVVR
TXDOLWDWLYDPHQWH GLIHUHQWH LPSRVVtYHO GH HQFRQWUDUVH QRV EUXWRV
D VDEHU R FRQGLFLRQDPHQWR GD DomR D ¿QDOLGDGHV FRQVFLHQWHPHQWH
FRQFHELGDV >@ 4XDQGR D SURGXomR GD H[LVWrQFLD VH HIHWXD SRU
HVVH SURFHVVR SRGH FKDPDUVH GH UDFLRQDLV RV DWRV SODQHMDGRV H
FRQVHTHQWHPHQWH WpFQLFRV RV SURFHGLPHQWRV VHJXQGR RV TXDLV VmR
UHYHODGRVjSUiWLFD 9,(,5$3,172"S 

 (WLPRORJLFDPHQWHDSDODYUDWpFQLFDYHPGRJUHJR7(;9,.1HGHVLJQDXP
DGMHWLYR H QmR XP VXEVWDQWLYR DSHVDU GH UHIHULUVH D XP VXEVWDQWLYR D ³WHFQH´
WUDGX]LGDSDUDRODWLPHPVHQWLGRJHUDOSRU³DUV´DUWH6HJXQGR9LHLUD3LQWRDSD
UHFH GH PRGR H[WUHPDPHQWH UDUR D IRUPD HP ODWLP ³WHFKQD´ FRP R VHQWLGR GH
DVW~FLDPDQKD
 2 DXWRU DLQGD FRQFHLWXD WpFQLFD FRPR VHQGR ³XP DOJRULWPR GH DWRV VH
THQFLDLVFRQGX]LQGRDXPD¿QDOLGDGHGHVHMDGD´ 9,(,5$3,172"S H
analisa que

>@ D SUySULD DomR GR KRPHP XWLOL]DQGR QDV IRUPDV KLVWyULFDV


UHODWLYDPHQWHDYDQoDGDVLQVWUXPHQWRVHPpWRGRVUDFLRQDOL]DGRVSDUD
FRUSRUL¿FDUHPDLQGLVSHQViYHOPHGLDomRHQWUHRDJHQWHHD¿QDOLGDGH
FRQVLVWHQRPRGRHVSHFt¿FRGDFDSDFLGDGHUHÀH[LYDGRDQLPDOKXPDQR
GHUHVROYHUDVFRQWUDGLo}HVFRPTXHVHGHSDUDQDUHODomRFRPRPXQGR
QDWXUDO 9,(,5$3,172"S 

 $WpFQLFDSDUDRDXWRUWHPIRUWHUHODomRFRPDFDSDFLGDGHGRVHUKXPDQR
GH SODQHMDU H GH SURGX]LU 2 KRPHPPXOKHU p R ~QLFR VHU FDSD] GH SODQHMDU RX
SURGX]LUDUWHIDWRVHYHQWRVSODQHMDUVHSURGX]LUVH2VDQLPDLVVRPHQWHVHJXHP
¿HOPHQWH R TXH HVWi SODQHMDGR HP VHX FyGLJR JHQpWLFR SRU LVVR QmR SODQHMDP
SURGX]HPRVHXVHURXDUWHIDWRV2FpUHEURKXPDQRWRUQDRKRPHPPXOKHUFDSD]
GH QmR VRPHQWH H[HFXWDU PDV SHQVDU D H[HFXomR SHQVDU VREUH R H[HFXWDGR
SURGX]LUHSHQVDUVREUHRSURGX]LGR$KLVWyULDGDWpFQLFDpQDYHUGDGHDKLVWyULD
GRV KRPHQV H PXOKHUHV FRPR SURGXWRUHV GH DUWHIDWRV PpWRGRV SURFHGLPHQWRV
Software livre, cultura hacker e o ecossistema da colaboração • 155

REMHWRV³$WHFQRORJLDSHUWHQFHDRFRPSRUWDPHQWRQDWXUDOGRVHUTXHVHKXPDQL]RX´
9,(,5$3,172"S 
&RQFOXLQGR9LHLUD3LQWR "S GHVFUHYHDSURWRWpFQLFDHQWHQGLGD
FRPRDPDWUL]GHWRGDVDVWpFQLFDVFRPRR³IXQFLRQDPHQWRPHQWDOSRVVtYHOHP
YLUWXGHGDHVWUXWXUDQHUYRVDVXSHULRUDGTXLULGDQRFXUVRGDHYROXomR´
 8PDRXWUDFRQWULEXLomRUHOHYDQWHGDREUDGHÈOYDURTXHDGYpPGRFRQFHLWR
GHWpFQLFDUHIHUHVHjVVXDVUHÀH[}HVVREUHRVWpFQLFRV3DUDHOHWRGRVHUKXPDQR
pWpFQLFR homo technicus $VXDSUySULDGH¿QLomRGHWpFQLFDMiDSRQWDHVVDD¿U
PDomR³$WpFQLFDGHTXDOTXHUWLSRFRQVWLWXLXPDSURSULHGDGHLQHUHQWHjDomRKX
PDQDVREUHRPXQGRHH[SULPHSRUHVVrQFLDDTXDOLGDGHGRKRPHPFRPRRVHU
YLYR~QLFRHPWRGRRSURFHVVRELROyJLFR´ 9,(,5$3,172"S 
 $SHVDUGDTXDOLGDGHGHWpFQLFRVHUSDVVtYHOGHXVRSDUDTXDOTXHUVHUKX
PDQRRVWpFQLFRVIRUDPFRPSUHHQGLGRVFRPRRVportadores da técnica HOHSRVVXL
DWpFQLFDQHFHVViULDSDUDFRQVHUWDUPHXVDSDUHOKRV RXexecutor de atos técnicos
1RUPDOPHQWH RV WpFQLFRV VmR UHOHJDGRV j ³FRQGLomR JHQpULFD GH WUDEDOKDGRU
PDQXDO HTXLYDOHQWH D VXEYDORUL]DGR RFXSDGR FRP D PHUD H[HFXomR GH DWRV
TXHQmRFRQFHEHXWHQGRDSHQDVVHUFDSDFLWDGRDSUDWLFiORVSHORDSUHQGL]DGR´
9,(,5$3,172"S 
 2VWpFQLFRVSDUDRDXWRUHPJUDQGHSDUWHGDVYH]HVHVWmRUHVWULWRVDRV
DVSHFWRVWpFQLFRVGRVHXWUDEDOKRVmRHVSHFLDOLVWDVQDTXLORTXHID]HP'HYLGRD
LVVRQmRFRQVHJXHPUHÀHWLUVREUHDVXDSUiWLFDHQHPWHRUL]DUFRPSURIXQGLGDGH
VREUHDWpFQLFD$FDEDVHSRUFDLUQDUHODomRGHWpFQLFRVQmRDIHLoRDGRVjWHRULD
HWHyULFRVQmRDIHLoRDGRVjWpFQLFDFDXVDQGRDVVLPXPVpULDUXSWXUDQRVHVWXGRV
UHIHUHQWHVDHVVDiUHD

)DOWDQGRDWpDJRUDDFRQVWLWXLomRGD³WHFQRORJLD´QRVHQWLGRSULPRUGLDO
GD HSLVWHPRORJLD GD WpFQLFD HVWD ¿FD HQWUHJXH DRV WpFQLFRV TXH
FHUWDPHQWH QD PDLRULD GRV FDVRV QmR FKHJDP D WHU FRQVFLrQFLD
GR FDUiWHU GRV MXOJDPHQWRV TXH SURIHUHP 6mR TXDVH VHPSUH DV
SHVVRDV PHQRV LQGLFDGDV SDUD HPLWLU MXt]RV VREUH XPD DWLYLGDGH QD
TXDO GHVHPSHQKDP R SDSHO GH DJHQWHV ,QIHOL]PHQWH SRU GH¿FLrQFLD
GH FRUUHWD IRUPDomR FUtWLFD PRVWUDPVH LQFDSDFLWDGRV SDUD DSUHFLDU
D QDWXUH]D GR WUDEDOKR TXH H[HFXWDP H GH VXD IXQomR QHOH 9,(,5$
3,172"S 

 9LHLUD3LQWRUHDOL]RXXPDVLVWHPDWL]DomRGHTXDWURFRQFHLWRVUHIHUHQWHVj
WHFQRORJLDTXHHQWHQGHPRVDSHVDUGHH[WHQVRVHULPSRUWDQWHUHSURGX]LUDTXL
156 • Software livre, cultura hacker e o ecossistema da colaboração

(a) 'HDFRUGRFRPRSULPHLURVLJQL¿FDGRHWLPROyJLFRD³WHFQRORJLD´WHP
GHVHUDWHRULDDFLrQFLDRHVWXGRDGLVFXVVmRGDWpFQLFDDEUDQJLGDV
QHVWD ~OWLPD QRomR GDV DUWHV DV KDELOLGDGHV GR ID]HU DV SUR¿VV}HV
H JHQHUDOL]DGDPHQWH RV PRGRV GH SURGX]LU DOJXPD FRLVD (VWH p
QHFHVVDULDPHQWH R VHQWLGR SULPRUGLDO FXMD LQWHUSUHWDomR QRV DEULUi D
FRPSUHHQVmRGRVGHPDLV$³WHFQRORJLD´DSDUHFHDTXLFRPRXPYDORU
IXQGDPHQWDOHH[DWRGH³ORJRVGDWpFQLFD´
(b) 1RVHJXQGRVLJQL¿FDGR³WHFQRORJLD´HTXLYDOHSXUDHVLPSOHVPHQWH
D WpFQLFD ,QGLVFXWLYHOPHQWH FRQVWLWXL HVWH R VHQWLGR PDLV IUHTHQWH H
SRSXODUGDSDODYUDRXVDGRQDOLQJXDJHPFRUUHQWHTXDQGRQmRVHH[LJH
SUHFLVmRPDLRU$VGXDVSDODYUDVPRVWUDPVHDVVLPLQWHUFDPELiYHLV
QR GLVFXUVR KDELWXDO FRORTXLDO H VHP ULJRU &RPR VLQ{QLPR DSDUHFH
DLQGD D YDULDQWH DPHULFDQD GH FXUVR JHUDO HQWUH QyV R FKDPDGR
know-how9HUHPRVTXHDFRQIXVmRJHUDGDSRUHVWDHTXLYDOrQFLDGH
VLJQL¿FDGRVGDSDODYUDVHUiIRQWHGHSHULJRVRVHQJDQRVQRMXOJDPHQWR
GH SUREOHPDV VRFLROyJLFRV H ¿ORVy¿FRV VXVFLWDGRV SHOR LQWHQWR GH
FRPSUHHQGHUDWHFQRORJLD
(c) (VWUHLWDPHQWHOLJDGRjVLJQL¿FDomRDQWHULRUHQFRQWUDPRVRFRQFHLWR
GH³WHFQRORJLD´HQWHQGLGRFRPRRFRQMXQWRGHWRGDVDVWpFQLFDVGHTXH
GLVS}HXPDGHWHUPLQDGDVRFLHGDGHHPTXDOTXHUIDVHKLVWyULFDGHVHX
GHVHQYROYLPHQWR(PWDOFDVRDSOLFDVHWDQWRjVFLYLOL]Do}HVGRSDVVDGR
TXDQWRjVFRQGLo}HVYLJHQWHVPRGHUQDPHQWHHPTXDOTXHUJUXSRVRFLDO
$ LPSRUWkQFLD GHVWD DFHSomR UHVLGH HP VHU D HOD TXH VH FRVWXPDYD
ID]HU PHQomR TXDQGR VH SURFXUD UHIHULU RX PHGLU R JUDX GH DYDQoR
GR SURFHVVR GDV IRUoDV SURGXWLYDV GH XPD VRFLHGDGH$ ³WHFQRORJLD´
FRPSUHHQGLGDDVVLPHPVHQWLGRJHQpULFRHJOREDODGTXLUHFRQRWDo}HV
HVSHFLDLVOLJDGDVHPSDUWLFXODUDRTXDUWRVLJQL¿FDGRDVHJXLUGH¿QLGR
PDV DR PHVPR WHPSR SHUGH HP QLWLGH] GH UHSUHVHQWDomR GH VHX
FRQWH~GROyJLFRDTXLORTXHJDQKDHPJHQHUDOLGDGHIRUPDO
(d) 3RU ¿P HQFRQWUDPRV R TXDUWR VHQWLGR GR YRFiEXOR ³WHFQRORJLD´
DTXHOH TXH SDUD QyV LUi WHU LPSRUWkQFLD FDSLWDO D LGHRORJL]DomR GD
WpFQLFD &RQGHQVDGDPHQWH SRGH GL]HUVH TXH QHVWH FDVR D SDODYUD
WHFQRORJLDPHQFLRQDDLGHRORJLDGDWpFQLFD$RTXDUWRVLJQL¿FDGRSRU
PRWLYRV WRUQDGRV WUDQVSDUHQWHV H[SOLFDGRV SHOD tQGROH GR SUHVHQWH
HQVDLRGHGLFDUHPRVPDLRUDWHQomR>@$WHFQRORJLDSRU¿PSRGHULD
VHUHQWHQGLGDFRPRFLrQFLDTXHHVWXGDDWpFQLFD 9,(,5$3,172"
S 

 1RFRWLGLDQRRWHUPRWHFQRORJLDFRVWXPDVHUFRQIXQGLGRFRPRWHUPRWpF
QLFD )DODPRV GH WpFQLFD TXDQGR TXHUHPRV IDODU GH WHFQRORJLD H GH WHFQRORJLD
TXDQGRTXHUHPRVIDODUGHWpFQLFD$SHVDUGRVGRLVWHUPRVSRVVXtUHPVLPLODULGDGHV
HVWHVFDUUHJDPGLIHUHQoDVFODUDVDSDUWLUGRVSUySULRVFRQFHLWRVMiH[SRVWRV9LHLUD
3LQWR  S   DFUHVFHQWD TXH D WHFQRORJLD SRU UD]}HV LGHROyJLFDV
PXLWDVYH]HVpFRQIXQGLGDFRPDWpFQLFDQRVHQWLGRGHknow-how VDEHUFRPR 
UHSUHVHQWDQGR D WpFQLFD HVWUDQJHLUD TXH SDUD PXLWRV MXVWL¿FD WRGR VDFULItFLR GH
VXDFRQTXLVWD
 $WHFQRORJLDHQWHQGLGDFRPRFRQMXQWRGHWpFQLFDVQDVFHHPFDGDVRFLHGDGH
Software livre, cultura hacker e o ecossistema da colaboração • 157

GHYLGRjVSUySULDVH[LJrQFLDVGRJUXSRVRFLDO(VWHJUXSRVRFLDOKRPRJrQHRFRPR
DFUHGLWDYDRDXWRUQmRpHQFRQWUDGRFRPIDFLOLGDGHQRVWHPSRVDWXDLVRTXHWHPRV
KRMHVmRJUXSRVVRFLDLVHVSHFt¿FRVFRPLQWHUHVVHVWDPEpPHVSHFt¿FRVHQmRXPD
PDVVD3DUDÈOYDUR9LHLUD3LQWRDVQRYDVWHFQRORJLDVVyVXUJHPDSDUWLUGHGRLV
SUHVVXSRVWRV

D  SRVVH GRV LQVWUXPHQWRV OyJLFRV H PDWHULDLV LQGLVSHQViYHLV SDUD


FKHJDUjQRYDUHDOL]DomR E H[LJrQFLDGHVWDSRUSDUWHGDVRFLHGDGH
3RULVVRQHQKXPDWHFQRORJLDDQWHFLSDVHjVXDpSRFDRXDXOWUDSDVVD
PDVQDVFHHGHFOLQDFRPHODSRUTXHH[SULPHHVDWLVID]DVFDUrQFLDV
TXH D VRFLHGDGH VHQWLD HP GHWHUPLQDGD IDVH GH H[LVWrQFLD 9,(,5$
3,172"S 

 (OHDSHVDUGHQmRWHUYLYLGRWHPSRVX¿FLHQWHSDUDSUHVHQFLDUDDPSOLDomR
GRXVRHGRVUHFXUVRVGDInternetIRLFDSD]GHUHDOL]DUDLQGDGHPRGRLQFLSLHQWH
DGLVWLQomRHQWUHRTXHKRMHFKDPDUtDPRVGHWHFQRORJLDPDWHULDOHWHFQRORJLDVGD
LQWHOLJrQFLD2DXWRUUHIHUHVHDHVVHWHPDHPGRLVPRPHQWRV

7DOH[SDQVmRGHSRGHULRGHYHVHDQmRWHUDPSOLDGRVXDV
IRUoDVSHODYLDGRDXPHQWRGHSRWHQFLDOPXVFXODUPDVj
LQDXJXUDomRGHXPDQRYDHWDSDGDXWLOL]DomRGHIRUPDGH
HQHUJLDTXHVHXVLVWHPDQHUYRVRIRLFDSD]GHSURGX]LU
D HQHUJLD QHUYRVD GDQGR HP UHVXOWDGR R WUDEDOKR
LQWHOHFWXDO >@ &RP R VXUJLPHQWR GD HUD FLEHUQpWLFD D
RSLQLmR GRV FRPHQWDULVWDV DPSOLRXVH &RPHoDUDP D
YHUQDVPiTXLQDVGHFRQWUROHHFRPSXWDomRDH[WHQVmR
GD LQWHOLJrQFLD j PiTXLQD FRQVLGHUDGD DJRUD FDSD] GH
VXEVWLWXLU R HVIRUoR PHQWDO TXDQGR DQWHV Vy DOLYLDYD R
KRPHPGDODEXWDEUDoDO 9,(,5$3,172"S 

1.2 As diversas atitudes frente à tecnologia

 2DXWRUHPGLYHUVRVPRPHQWRVUHIHUHVHDWUrVWLSRVGHDWLWXGHVIUHQWHj
WHFQRORJLDTXHVmRIUHTHQWHVQDTXHOHVTXHWrPFRQWDWRLQWHQVRFRPRVDSDUDWRV
WHFQROyJLFRV RX PHVPR TXH WrP UHDOL]DGR UHÀH[}HV VREUH R WHPD VmR HODV R
HPEDVEDFDPHQWRHRPDUDYLOKDPHQWRDGLFRWRPL]DomRKXPDQLVPR[WHFQRORJLDH
DSHUVRQL¿FDomRGDWpFQLFD
158 • Software livre, cultura hacker e o ecossistema da colaboração

 9LHLUD3LQWRGHVYHODRDVSHFWRLGHROyJLFRGDWpFQLFDHGDWHFQRORJLDSRUPHLR
GHGXDVFDWHJRULDVTXHFRQVLGHUDPRVIXQGDQWHVQHVWDVXDREUDDLQJHQXLGDGHGR
HPEDVEDFDPHQWRHGRPDUDYLOKDPHQWRDWLWXGHVTXHSRGHPRVWHUGLDQWHGRVQRYRV
LQYHQWRVRXPpWRGRV
 2HPEDVEDFDPHQWRSDUDRDXWRUQRUPDOPHQWHpSURYRFDGRSHODVFODVVHV
GRPLQDQWHVSDUDOXGLEULDUDVFODVVHVRSULPLGDV(VVDVFODVVHVID]HPFRPTXHRV
SDtVHVVRFLHGDGHVGLWRVDWUDVDGRVWHFQRORJLFDPHQWHVLQWDPVHQDPHOKRUGHWRGDV
DVHUDVGDKLVWyULDKXPDQDLQFRPSDUiYHOHPWRGRVRVDVSHFWRVVHPSDUDOHORQD
KLVWyULD&RQWLQXDRDXWRU

$ VRFLHGDGH FDSD] GH FULDU DV HVWXSHQGDV PiTXLQDV H DSDUHOKRV


DWXDOPHQWHH[LVWHQWHVGHVFRQKHFLGRVHMDPDLVVRQKDGRVSHORVKRPHQV
GHRXWURUDQmRSRGHGHL[DUGHVHUFHUWDPHQWHPHOKRUGRTXHTXDOTXHU
RXWUDSUHFHGHQWH$VSRVVLELOLGDGHVDJRUDRIHUHFLGDVDRVSRVVXLGRUHV
GHUHFXUVRVSDUDDFRQVHUYDomRGDYLGDDDTXLVLomRGHFRQIRUWRHGH
PHLRVSDUDDPSOLDUDWRGDVDVRXWUDVHTXDOTXHULQGLYtGXRKRMHH[LVWHQWH
GHYHUGDUJUDoDVDRVFpXVSHODVRUWHGHWHUFKHJDGRjSUHVHQWHIDVH
GDKLVWyULDRQGHWXGRpPHOKRUGRTXHQRVWHPSRVDQWLJRV&RPHVWD
FREHUWXUD PRUDO D FKDPDGD FLYLOL]DomR WpFQLFD UHFHEH XP DFUpVFLPR
GHYDORUUHVSHLWDELOLGDGHHDGPLUDomRTXHQDWXUDOPHQWHUHYHUWHHP
EHQHItFLR GDV FDPDGDV VXSHULRUHV FUHGRUDV GH WRGRV HVVHV VHUYLoRV
SUHVWDGRV j KXPDQLGDGH GiOKHV D VDQWL¿FDomR PRUDO DIDQRVDPHQWH
EXVFDGD TXH QR VHX PRGR GH YHU VH WUDGX] HP PDLRU VHJXUDQoD
9,(,5$3,172"S 

 2DUJXPHQWRFRQWXGRTXHVXVWHQWDDLGpLDGHHUDRXFLYLOL]DomRWHFQROyJLFD
pLQIXQGDGRSRUTXHWRGDVDVHUDVRXFLYLOL]Do}HVIRUDPQHVVDSHUVSHFWLYDWHFQR
OyJLFDV2KRPHPVHPSUHSURMHWRXHSURGX]LXSRUPHLRGHWpFQLFDVDVXDH[LVWrQFLD
2TXHVHSUHWHQGHpDEVROXWL]DURPRGRGHH[LVWrQFLDGRSHUtRGRTXHYLYHPRVH
HOHYiORjFDWHJRULDGHLQFRPSDUiYHOTXDQGRQDKLVWyULDHVVHSURFHVVRVHPSUHVH
IH]SUHVHQWH&DGDHUDSURGX]LXHWHYHDFHVVRjWHFQRORJLDTXHOKHHUDH[HTtYHO
WHURXSURGX]LU³2TXHHVWiDFRQWHFHQGRHPQRVVRVGLDVVHPSUHDFRQWHFHXSRLV
HVWDPRV QRV UHIHULQGR D XP WUDoR HVVHQFLDO FRQFUHWR H SRU LVVR SHUPDQHQWH GD
UHDOLGDGHKXPDQD´ 9,(,5$3,172"S 
 1mR TXHUHPRV FRP HVWDV SDODYUDV QHJDU R DYDQoR TXDOLWDWLYR TXH IRL R
LQYHQWR GD HQHUJLD DW{PLFD GR IRJR RX GR DUFR H ÀHFKD SRVVtYHO GHYLGR D XP
GHWHUPLQDGRDF~PXORGHFRQKHFLPHQWRSDVVDGRGHWHPSRVHPWHPSRVPDVGHV
PLVWL¿FDUTXHDQRVVDHUDp~QLFDQRTXHGL]UHVSHLWRDVHUFDSD]GHUHDOL]DUFULDo}HV
WpFQLFDVJHUDUDUWHIDWRV7RGDVDVRXWUDVWDPEpPIRUDPFDSD]HVGLVVRHR¿]HUDP
(VWDUHÀH[mRWDPEpPVHHVWHQGHDRFRQFHLWRGHH[SORVmRWHFQROyJLFDTXHVHJXH
Software livre, cultura hacker e o ecossistema da colaboração • 159

SHODPHVPDOLQKDGHDEVROXWL]DUDHUDHPTXHYLYHPRV
 9LHLUD3LQWR "S DLQGDFULWLFDRFRQFHLWRGHVRFLHGDGHWHFQRFUiWLFD
TXDQGRGLYHUVRVDXWRUHVD¿UPDPVHUDQRVVDHUDDTXHHVWiPDLVLPHUVDQHOD3DUD
HOHQDYHUGDGHVmRDVVRFLHGDGHVPDLVSULPLWLYDVDVTXHHVWmRPDLVLPHUVDVQD
FKDPDGDVRFLHGDGHWHFQRFUiWLFDTXDQGRSDUDFXPSULUVXDVDWLYLGDGHVGHFDoDH
SHVFDQHFHVVLWDPGDErQomRGRSDMpHQLQJXpPVHDWUHYHULDDLUVHPHOD(VVDVLP
pXPDVRFLHGDGHHVWULWDPHQWHWHFQRFUiWLFDEDVHDGDQRSURFHVVRWpFQLFRFLWDGR$
QRVVDVRFLHGDGHDRFRQWUiULRSRVVXLPDLRUÀH[LELOLGDGHQHVVHDVSHFWR
 $FDWHJRULDPDUDYLOKDPHQWRDSDUHFHQDVXDREUDHPGLYHUVRVPRPHQWRV
SDUDFDUDFWHUL]DUPDLVXPDDomRKXPDQDGLDQWHGRVSRUWHQWRVWHFQROyJLFRV3XGH
PRV VLVWHPDWL]DU HVVD DomRSRVLomR FRPR LQJrQXD RX FRQVFLHQWH H HVWH PDUD
YLOKDPHQWRLQJrQXRFRPRSURYRFDGRRXQDWXUDO
 2PDUDYLOKDPHQWRLQJrQXRQRUPDOPHQWHpSURYRFDGRQDVFODVVHVGRPLQDGDV
SHODVFODVVHVGRPLQDQWHVQRFODURLQWXLWRGHPDQWHURVHXstatus quoWHQGRDWHF
QRORJLDFRPRSRUWDEDQGHLUDSRUPHLRGDTXDOPDQWrPVXDGRPLQDomR³ID]HQGRDV
FUHU TXH WrP D IHOLFLGDGH GH YLYHU QRV PHOKRUHV WHPSRV MDPDLV GHVIUXWDGRV SHOD
KXPDQLGDGH´ 9,(,5$3,172"S 1HVWDPHVPDSHUVSHFWLYDWDPEpPWHFH
FUtWLFDVDRWHUPRDGPLUiYHLVPXQGRVQRYRV S HjIDOVDLGpLDGHDFHVVRSUR
PHWLGDSHODVFODVVHVDEDVWDGDVFRPRVHWRGRVSDUWLFLSiVVHPRVGRPHVPRPRGR
GHVVDHUDWHFQROyJLFD S 

6mRRVSRVVXLGRUHVGRVEHQVGHPDLRUYDORUTXHFDGDpSRFDSURGX]RV
TXH VH DSUHVHQWDP QDWXUDOPHQWH FRPR SRUWDYR]HV GD LGHRORJL]DomR
GR SUHVHQWH SRLV HVWH OKHV p LQWHLUDPHQWH SURStFLR $V FDPDGDV GD
SRSXODomRWUDEDOKDGRUDTXHSHQDPQDVODEXWDVJURVVHLUDVSHVDGDVH
PDOUHWULEXtGDVQmRSRGHPWHUDPHVPDSHUVSHFWLYD6yVHPDUDYLOKDP
DGLVWkQFLDFRPDTXLORTXHQmRSRVVXHPQHPXWLOL]DPFRQWHQWDQGRVH
FRPDVSLUDUjSRVVHGRVREMHWRVMiYXOJDUL]DGRVHPERUDPDUDYLOKRVRV
GHHQJHQKRHFRPSOLFDomRWpFQLFDGHVGHXPVLPSOHVUiGLRWUDQVLVWRU
TXH VH OKHV YmR WRUQDQGR DFHVVtYHLV HP YLUWXGH GR EDUDWHDPHQWR GR
FXVWRJUDoDVjPHOKRUDGRVPpWRGRVSURGXWLYRV3DUDHVVDVFODVVHVD
QDWXUH]DYHUGDGHLUDDLQGDSHUPDQHFHHPJUDQGHPRWLYRGHDGPLUDomR
pDLQGDRPHLRDPELHQWHFRPRTXDOWrPFRQWDWRHQTXDQWRDVDEDVWDGDV
LQWHUS}HPHQWUHHODVHDQDWXUH]DRVIROKHWRVGDVDJrQFLDVGHWXULVPR
9,(,5$3,172"S 

 2DXWRUWDPEpPWHFHFUtWLFDVDHVVHPDUDYLOKDPHQWRLQGHYLGRXVDQGRFRPR
H[HPSORDYLDJHPGRKRPHPjOXD1DSULPHLUDYLDJHPHVSDQWRHPDUDYLOKDPHQWR
'HSRLV GH TXDWUR PHVHV D YLDJHP IRL UHSHWLGD HP FRQGLo}HV WpFQLFDV DWp PDLV
DGPLUiYHLVHVLPSOHVPHQWHKRXYHXPDTXDVHWRWDOLQGLIHUHQoDSRUSDUWHGDVSHV
160 • Software livre, cultura hacker e o ecossistema da colaboração

VRDVTXHDFRPSDQKDUDPRHYHQWR'DPHVPDIRUPDDFRQWHFHFRPDDUWHFRPHQWD
RDXWRUTXHWHPSRUXPDGHVXDV¿QDOLGDGHVJHUDUHVVHPDUDYLOKDPHQWRHpFRP
IUHTrQFLD SRVWD GH ODGR GLDQWH GHVVHV ³DGYHQWRV WHFQROyJLFRV´ 9,(,5$3,172
"S 
 2PDUDYLOKDPHQWRFRQVFLHQWHpIUXWRGHXPDFRPSUHHQVmRDGHTXDGDGD
VRFLHGDGH HP TXH YLYHPRV GH VHX PRPHQWR KLVWyULFR H QmR GH YLVmR LQJrQXD
FRPRDSUHVHQWDGDDQWHULRUPHQWH

1HVWHVHQWLGRDFRQVWDWDomRGHTXHRKRPHPVHPDUDYLOKDDJRUDFRP
VXDVREUDVWHPMXVWL¿FDWLYDSRLVUHYHODRJUDXGHDYDQoRFRQVHJXLGR
QR GRPtQLR VREUH D QDWXUH]D 0DV p SUHFLVR GLVWLQJXLU HQWUH QRomR
FUtWLFDTXHH[SOLFDHHQDOWHFHHVWHFRPSRUWDPHQWRHDDWLWXGHLQJrQXD
TXHSURFHGHQGRFRPRVHPSUHIRUDGRSODQRKLVWyULFRWRUQDDEVROXWRV
RV PRGRV GH H[LVWrQFLD GH FDGD pSRFD DV FULDo}HV KXPDQDV QHOD
SRVVtYHLV(PWDOFDVRFRQYHUWHHPLGHRORJLDDYDORUDomRDH[DOWDomR
GR SUHVHQWH SURFHGLPHQWR PXLWR IDYRUiYHO jV FODVVHV VRFLDLV TXH
GHVIUXWDP GD SRVVH GRV LQVWUXPHQWRV EHQV H REMHWRV GH FRQIRUWR H
GLYHUWLPHQWR TXH D FLrQFLD GR WHPSR OKHV S}H DR GLVSRU$ DWLWXGH GH
PDUDYLOKDUVHFRPDFULDomRKXPDQDQmRpDSHQDVKLVWyULFDPDVWHP
IXQGDPHQWRQDFRQVWLWXLomRGDVRFLHGDGH 9,(,5$3,172"S 

eLPSRUWDQWHUHIRUoDUTXHpSRVVtYHOFRQVLGHUDUH[WUDRUGLQiULDDQRVVDpSR
FD TXDQGR D YHPRV QmR H[FOXtGD GD KLVWyULD PDV QD VXD SUySULD WULOKD TXH OKH
FRQIHUHRULJLQDOLGDGHjVFULDo}HVGHWRGRSUHVHQWH7RGDVHVWDVFULDo}HVSRVVXHP
VHXLQtFLRPDVWDPEpPDVXDGHFDGrQFLD
 $VWpFQLFDVRXDWHFQRORJLDHPGLYHUVRVPRPHQWRVVmRSRVWDVHPFRQ
WUDGLomR FRP R KRPHPPXOKHU FRPR VXD LQLPLJD FRPR GHVWUXLGRUD GRV EHQV
FRQVWLWXtGRV 9LHLUD 3LQWR WDPEpP SHUFHEH HVVD HUU{QHD GLFRWRPLD KXPDQLVPR [
WHFQRORJLDFLWDQGR7R\QEHHHGHIHQGHTXHHPWRGDVDVpSRFDVGDKLVWyULDKRXYH
os seus profetasGHXPDHVSpFLHGHDSRFDOLSVHFDXVDGRSHODWHFQRORJLD1HVVDV
HUDV ³WDPEpP R SURJUHVVR WpFQLFR H DV FRUUHVSRQGHQWHV DOWHUDo}HV GH KiELWRV
H FRVWXPHV FDXVDYDP QDTXHOHV TXH QmR SRGLDP FRPSUHHQGHU R IHQ{PHQR GD
WUDQVIRUPDomRFXOWXUDORPHVPRSDYRUHVFRQMXUDGRFRPFDQGHQWHIXURU´ 9,(,5$
3,172"S 
 (PXPRXWURPRPHQWRGDVXDREUD9LHLUD3LQWRFULWLFDQGRDFRQFHSomRGH
WpFQLFDGHIHQGLGDSRU+HLGHJJHUWRFDQDUHODomRWHFQRORJLDHKXPDQLVPR$SDUWLU
GRFRPHQWiULRGH+HLGHJJHUQDREUDA questão da técnicaHPTXHR¿OyVRIRD¿UPD
FRQVWLWXLUD³Gestell´1XPSHULJRSRUTXHDPHDoDRKRPHPGHSHUGHUDSRVVLELOLGDGH
GRGHVYHODPHQWRRULJLQDOHGHIDODUjYHUGDGHLQLFLDO´9LHLUD3LQWRUHWUXFD+HLGHJJHU
D¿UPDQGRTXH
³,GpLDGHFRLVDVSRVWDVHPFRQMXQWRUHXQLGDVDUFDERXoRGLVSRVLWLYR´ 9,(,5$3,172"S 
Software livre, cultura hacker e o ecossistema da colaboração • 161

0DQLIHVWDVH DTXL DR YLYR R WUDoR GH GHVSUH]R SHOD WpFQLFD H GH
RSRVLomR D WXGR TXDQWR HOD UHSUHVHQWD RX TXH OKH GHYH D H[LVWrQFLD
SRLVDWpFQLFDFRQVWLWXLHPVLPHVPDXPPDOGHTXHRKRPHPGHYH
IXJLU SDUD QmR VXFXPELU j VXD DYDVVDODQWH H DUUDVDGRUD YLWyULD 1mR
VH SUHFLVD GL]HU TXH HVWH FRQFHLWR GD RSRVLomR H KRVWLOLGDGH HQWUH R
³WpFQLFR´ H R ³KXPDQR´ DOpP GH IRWRJUDIDU XP FDVR GH LQJHQXLGDGH
GD FRQVFLrQFLD HP HVWDGR TXDOLWDWLYDPHQWH SXUR LQFOXLVH HQWUH RV
DVSHFWRV GH GHVXPDQLVPR HIHWLYR GR SHQVDPHQWR GR DXWRU 9,(,5$
3,172"S 

 8PRXWURWHPDGHTXHWUDWDUiÈOYDUR9LHLUD3LQWR " QRVHXOLYURUHIHUH


VH j SHUVRQL¿FDomR GD WpFQLFD 3DUD R DXWRU D WpFQLFD QmR p ERD QHP p Pi RV
KRPHQVTXHRVmR S $WpFQLFDpHWLFDPHQWHQHXWUD S $WpFQLFD
DGMHWLYDVHUYHHPGLYHUVRVFRQWH[WRVGHERGHH[SLDWyULRSDUDDVDo}HVKXPDQDV
FRPR³HQWLGDGH´SDUDDTXDORKRPHPPXOKHUSRGHODQoDUDFXOSDGHVHXVDWRV S
 

$ WpFQLFD HP VL PHVPD HWLFDPHQWH QHXWUD MDPDLV SRGHULD


FRQYHUWHUVH HP GHYRUDGRUD GR KRPHP HP DQLTXLODGRUD GD
ULTXH]DHVSLULWXDO6HWDODFRQWHFHQmRVHGHYHDFXViODPDV
H[SOLFDUHVVDREVHUYDomRSHORXVRVRFLDOGHOD2HVPDJDPHQWR
GD SHUVRQDOLGDGH PRWLYR GH WDQWD SUHRFXSDomR SDUD R
SHQVDPHQWR VLPSOyULR GHYH VHU LPSXWDGR DRV JUXSRV TXH VH
DSURYHLWDP GRV LQVWUXPHQWRV GD SURGXomR SDUD YLOLSHQGLDU R
YDORU DXWHQWLFDPHQWH KXPDQR FKDPDGR HVSLULWXDO GD LPHQVD
PDLRULD GRV KRPHQV 1mR VH GLJD TXH D WpFQLFD HVPDJD R
KRPHPHVLPTXHDHVWUXWXUDGDVRFLHGDGHSHUPLWHHMXVWL¿FDD
SHUSHWUDomRGHVWHUHVXOWDGR 9,(,5$3,172"S 

 $ WpFQLFD Vy SRGHULD VHU TXDOL¿FDGD GH ERD RX Pi in genere suo VH RV
DWRVREMHWRV DWLQJHP R ¿P SDUD R TXH IRUDP IHLWRV RX QmR 6H D ERPED DW{PLFD
TXHGHVWUXLX+LURVKLPDH1DJDVDNLDWLQJLXVHXREMHWLYRHODIRLWHFQLFDPHQWHERD
SRLVQmRIDOKRX³1mRWHULDVHQWLGRDWULEXLUDSHUYHUVLGDGHGRVUHVXOWDGRVjWpFQLFD
GRVDWRVTXHDSURGX]LUDPHDODQoDUDPHPOXJDUGHDWULEXtODDRVDJHQWHVTXH
FRQFHEHUDPFRPR¿QDOLGDGHHVVHFULPHHRH[HFXWDUDP´ 9,(,5$3,172"
S 
 8PRXWURPRPHQWRHPTXHDWpFQLFDSRGHULDVHUDGMHWLYDGDFRPRERDRX
PipRVHJXLQWHTXDQGRXVDGDSDUDPHOKRUH[SORUDURPXQGRPDWHULDOWRUQDUVHLD
ERDHTXDQGRVHDSOLFDVVHjH[SORUDomRGRVVHUHVKXPDQRVSRUVHXVVHPHOKDQWHV
WRUQDUVHLDPi&RQWXGR³XQLFDPHQWHQRSODQRGDVUHODo}HVVRFLDLVGHSURGXomR
DWpFQLFDpVXVFHSWtYHOGHUHFHEHUDWULEXWRVpWLFRVPDVLVVRVHGiSRUTXHVHWUDWD
162 • Software livre, cultura hacker e o ecossistema da colaboração

QHVWH FDVR GD VLPSOHV ¿JXUD GH PHWDSODVPR 7DLV DWULEXWRV QmR OKH GL]HP GLUH
WDPHQWHUHVSHLWR´ 9,(,5$3,172"S 
 (Q¿PFDEHGL]HUTXHpRKRPHPPXOKHUTXHGH¿QHRGHVWLQRGDWpFQLFD
WHFQRORJLDTXHID]ERPRXPDXXVRGDVWpFQLFDVTXHFULDHTXHQHQKXPDWpFQLFD
pFDSD]GHGRPLQDURKRPHPVRPHQWH³DVOHLVGDQDWXUH]DHDFLGHQWDOPHQWHRXWUR
KRPHP´ 9,(,5$3,172"S 

1.3 A dependência/autonomia tecnológica e a tecnologia como


patrimônio da humanidade

 $GHSHQGrQFLDDXWRQRPLDWHFQROyJLFDpXPRXWURWHPDTXHFRQVLGHUDPRV
GHVLJQL¿FDWLYDUHOHYkQFLDQDREUDGHÈOYDUR9LHLUD3LQWRHSDUDRQRVVRHVWXGRHP
TXHVWmR$WHFQRORJLDSDUDHOHpXPDIRUWHIHUUDPHQWDGHGRPHVWLFDomRGHFROR
QL]DomRGRVSDtVHVFKDPDGRVSHULIpULFRV
 (VVD UHODomR FRO{QLDPHWUySROH TXH GH PRGR DQiORJR FRQVHUYD DV VXDV
PHVPDVFDUDFWHUtVWLFDVSURtEHDFRO{QLDRXRSDtVGHSHQGHQWHGHWRUQDUVHSURGX
WRUGRVHXVDEHUGDVXDFLrQFLDHWHFQRORJLDVRPHQWHOKHSHUPLWLQGRDIXQomRGH
FRQVXPLGRUGDWHFQRORJLDHVWUDQJHLUDJHUDQGRXPFLFORVHP¿PGHVHUYLGmR

$RV SDtVHV VXEGHVHQYROYLGRV Vy UHVWD R UHFXUVR GH VH LQFRUSRUDUHP


j HUD WHFQROyJLFD QD TXDOLGDGH GH VpTXLWR SDVVLYR HP PDUFKD OHQWD
FRQVXPLGRUHV GDV SURGXo}HV TXH OKHV YrP GR DOWR LPLWDGRUHV
H QR Pi[LPR IDEULFDQWHV GR Mi VDELGR FRP R HPSUHJR GH WpFQLFDV
TXH QmR GHVFREULUDP QHFHVVDULDPHQWH VHPSUH DV HQYHOKHFLGDV DV
XOWUDSDVVDGDV SHODV UHDOL]Do}HV YHUGDGHLUDPHQWH YDQJXDUGLVWDV TXH
QmRWrPRGLUHLWRGHSUHWHQGHUHQJHQGUDU7RUQDPVHDVVLPPHQGLFDQWHV
FRQIHVVDVGDJHQHURVLGDGHWHFQROyJLFDGRVSRGHURVRVHDUYRUDPFRP
LQIDQWLO DOYRURoR R HPEOHPD GD DOLHQDomR QD IDFKDGD GD VXD FXOWXUD
$FUHGLWDP HVWDU LQJUHVVDQGR WDPEpP QD HUD WHFQROyJLFD PHVPR
ID]HQGRRDUUDVWDGDVSRUPmRDOKHLDHQDTXDOLGDGHGHVLPSOHViUHDV
GHFRQVXPRHPIDYRUGRVSDtVHVULFRV'HVVHFRQWHQWDPHQWRFRQVLJR
SUySULDVSHODGHPRQVWUDomRGH³WDPEpPHVWDUHPFUHVFHQGR´SDVVDP
QDWXUDOPHQWHjDWLWXGHGHJUDWLGmRSDUDFRPDVSRWrQFLDVH[SORUDGRUDV
DVIRUoDVTXHSUHFLVDPHQWHLPSHGHPDH[SDQVmRGHVXDFDSDFLGDGH
FULDGRUDQDWLYD 9,(,5$3,172"S 

 'HDFRUGRFRP9LHLUD3LQWR " RSDtVVXEGHVHQYROYLGRDFUHGLWDQGRVH


PHQRVHYROXtGRRXQmRSRVVXLGRUGHWHFQRORJLDDOJXPD S EXVFDFRPWRGDV
DVVXDVIRUoDVD³WHFQRORJLDVDOYDGRUDGRVHXSDtVGHFDGHQWH´ S JHUDQGR
SRUPHLRGHVVHSURFHVVRSDUDVLPDLVGHSHQGrQFLDWROKHQGRDVXDFDSDFLGDGHGH
SHQVDUSRUVLPHVPRVGHSURGX]LU S 7RUQDVHXPSDtVVXEPLVVRHVSROLDGR
Software livre, cultura hacker e o ecossistema da colaboração • 163

FRP XP FUHVFLPHQWR SRU SHUPLVVmR S   VXEVLGLDQGR SRU PHLR UR\DOWLHV XP
PDLRU GHVHQYROYLPHQWR HFRQ{PLFR H WHFQROyJLFR GR SDtV ULFR GD PHWUySROH SRU
PHLRGRVHXSUySULRHPSREUHFLPHQWR S 
 2V SDtVHV ULFRV PDQWrP R SDSHO GH DX[tOLR GH DVVLVWrQFLD WpFQLFD GH
H[SRUWDGRUHV GH QRYDV WpFQLFDV WHFQRORJLDV D PHGLGD TXH VXUMDP PDQWHQGRVH
QmRVRPHQWHFULDGRUHVPDVGRQRVGDVPHVPDVWpFQLFDV 9,(,5$3,172"S
 

2 FRORQL]DGRU DFUHGLWD TXH D WHFQRORJLD ULJRURVDPHQWH PHGLGD H


¿VFDOL]DGDH[SRUWDGDSDUDUHJL}HVPDUJLQDLVVRERVUyWXORVGH³DX[tOLR´
H ³DVVLVWrQFLD WpFQLFD´ DMXGDUi RV SRYRV GHVVDV UHJL}HV D HOHYDUHP
R QtYHO HFRQ{PLFR GH YLGD H SRUWDQWR D FRQVXPLUHP RV SURGXWRV
GD WHFQRORJLD DGLDQWDGD QDWXUDOPHQWH PDLV FDURV H DQWHULRUPHQWH
LQDFHVVtYHLVDHOHV6yH[SRUWDRMiVDELGRRMiXVDGRDTXLORTXHQmR
SRGHPDLVGDUOXFURVHQmRIXQFLRQDQGRQRHVWDGRGHVREUHYLGDSRUWHU
SHUGLGRDUHQWDELOLGDGHSDUDRSURGXWRUFHQWUDO2FHQWURLPSHULDOUHWDUGD
R TXDQWR SRGH D H[SRUWDomR GR IDEULFR GH EHQV HQTXDQWR FRQVHJXH
HQYLDU RV EHQV WHUPLQDGRV UHVWDQGR DR SDtV FRQVXPLGRU R WUDEDOKR
GHHPEDOiORVFRQIRUPHDFRQWHFHFRPDVVXEVWkQFLDVUHFHELGDVSHOD
LQG~VWULD IDUPDFrXWLFD LQVWDODGD QR SDtV VXEGHVHQYROYLGR 9,(,5$
3,172"S 

 &DEHDRVSDtVHVRSULPLGRVYROWDUHPVHFRQWUDHVWHPRGHORGHGHSHQGrQFLD
WHFQROyJLFDQmRHVSHFL¿FDPHQWHFRQWUDRSDtVULFRDPHWUySROHHPXPDDWLWXGH
[HQyIREDPDVFRQWUD XPDVLWXDomRGHGRPLQDomR HVSROLDomR FDEUHVWR HDVVLV
WHQFLDOLVPR³6HQRSDtVGRPLQDQWHDIXQomRGDWHFQRORJLDFRQVLVWHHPFRQVHUYDUD
GRPLQDomRQRSDtVGRPLQDGRFRQVLVWHHPDFDEDUFRPHOD´ 9,(,5$3,172"
S 
 $WpFQLFDWHFQRORJLDSHODVFDUDFWHUtVWLFDVTXHOKHVmRSHFXOLDUHVQmRSHU
WHQFHDQHQKXPLQGLYtGXRLVRODGRPDVpSDWULP{QLRGDKXPDQLGDGHGDHVSpFLH
3DUD9LHLUD3LQWR

&RQVWLWXLXPEHPKXPDQRTXHSRUGH¿QLomRQmRFRQKHFHEDUUHLUDVRX
GLUHLWRVGHSURSULHGDGHSRUTXHR~QLFRSURSULHWiULRGHOHpDKXPDQLGDGH
LQWHLUD$ WpFQLFD LGHQWL¿FDGD j DomR GR KRPHP VREUH R PXQGR QmR
GLVFULPLQDTXDLVLQGLYtGXRVGHODVHGHYHPDSRVVDUFRPH[FOXVmRGRV
RXWURV 6HQGR R PRGR SHOR TXDO VH UHDOL]D H VH PHGH R DYDQoR GR
SURFHVVRGHKRPLQL]DomRGL]UHVSHLWRjWRWDOLGDGHGDHVSpFLH 9,(,5$
3,172"S 
164 • Software livre, cultura hacker e o ecossistema da colaboração

 2VQRYRVLQYHQWRVHWpFQLFDVVyVmRSRVVtYHLVFRPRMiGLVVHPRVDQWHULRU
PHQWHJUDoDVDRVFRQKHFLPHQWRVMiSURGX]LGRVDRDF~PXORGHVDEHUHVREUHWXGR
DR VHX FRPSDUWLOKDPHQWR 3URGX]LU FULDU H RFXOWDU QmR FRQWULEXL PXLWR PHQRV
VHUYH(OHHVWDQFDHPRUUHRXpSULYDWL]DGRSRUJUXSRVTXHGHWHQKDPRSRGHURX
RVUHFXUVRVHFRQ{PLFRVSDUDWDOFRQWLQXLGDGH3DUDRVJUXSRVGRPLQDGRUHV³QmR
WHPVHQWLGRSRUFRQVHJXLQWHLPDJLQDUXPDFRPXQLGDGHXQLYHUVDORQGHWRGRVRV
SRYRV SXGHVVHP JHUDU HP LJXDOGDGH GH FRQGLo}HV DV FULDo}HV GH FLrQFLD H GD
WpFQLFD´ 9,(,5$ 3,172 " S    2 FRQKHFLPHQWR FRPSDUWLOKDGR p
KHUGDGRSHODVQRYDVFLYLOL]Do}HVSRVVLELOLWDQGRQRYDVFULDo}HVHRDSULPRUDPHQWR
GDWHFQRORJLDH[LVWHQWH

3DXOR)UHLUHXPROKDURWLPLVWDFXULRVRHFUtWLFR

 $WHFQRORJLDDSHVDUGHQmRVHUWHPDFHQWUDOGDVGLVFXVV}HVGH3DXOR)UHLUH
IRLXPWHPDTXHVHPSUHRSUHRFXSRXHRLQWHUHVVRX1mRKiXPOLYURVHTXHUGRV
HVWXGDGRVSDUDDUHGDomRGDGLVVHUWDomRHPTXH)UHLUHQmRWHQKDVHGHEUXoDGR
VREUHRWHPDQHPTXHIRVVHSDUDGL]HUDOJXPDVSRXFDVSDODYUDV
 )UHLUH FRPR KRPHP DPDQWH GRV KRPHQV H GDV PXOKHUHV GDV SODQWDV
GDV iJXDV GDV WHUUDV VHPSUH UHDOL]RX HVIRUoRV SDUD DFRPSDQKDU DV LQRYDo}HV
WHFQRyJLFDV GH FDGD WHPSR TXH YLYHX (OH GLVFXWH HP VXDV REUDV VXD SUiWLFD
WHFQROyJLFDRXVRTXHIH]GDVGLYHUVDVWHFQRORJLDVGRSURMHWRUDRfaxSDVVDQGR
SHODWHOHYLVmRHRUiGLRUHÀHWHVREUHDQHFHVVLGDGHGRGHVYHODPHQWRGDVYHUGDGHV
RFXOWDV LGHRORJLD SRUWUiVGDWHFQRORJLDHGHVHXXVRGLVVHUWDVREUHDXUJrQFLD
GH XPD SUi[LV WHFQROyJLFD SDUD R XVR GHVVDV PHVPDV WHFQRORJLDV QD SUiWLFD
FRWLGLDQD H SHGDJyJLFD DSUHVHQWD VXD FRQFHSomR GH WHFQRORJLD SRQGHUD VREUH
DVSRWHQFLDOLGDGHVHRVOLPLWHVGHVVDVWHFQRORJLDVWHFHFRQVLGHUDo}HVDFHUFDGH
SDUDTXDLV¿QVVHID]XVRHDTXHTXHPGHYHVHUYLUDWHFQRORJLDHDLQGDpSRVVtYHO
HOXFLGDUHPVXDREUDDVVXDVLQLFLDWLYDVSDUDDLQIRLQFOXVmR
 3DXOR)UHLUHPHVPRQmRVHFRQVLGHUDQGRFRQWHPSRUkQHRQmR¿FRXDWDGR
DRSDVVDGRPDVFDPLQKRXFRPVHXWHPSR(OHD¿UPDHPDUWLJRSXEOLFDGRQDUHYLV
WD%,76HP³)DoRTXHVWmRHQRUPHGHVHUXPKRPHPGHPHXWHPSRHQmRXP
KRPHPH[LODGRGHOH´ )5(,5(S 
 )UHLUHHQWHQGLDDWHFQRORJLDFRPRXPDGDV³JUDQGHVH[SUHVV}HVGDFULD
WLYLGDGH KXPDQD´  S   H FRPR ³D H[SUHVVmR QDWXUDO GR SURFHVVR FULDGRU
HPTXHRVVHUHVKXPDQRVVHHQJDMDPQRPRPHQWRHPTXHIRUMDPRVHXSULPHLUR
LQVWUXPHQWRFRPTXHPHOKRUWUDQVIRUPDPRPXQGR´ S $WHFQRORJLDID]

(QWHQGLGDDTXLVRPHQWHFRPRRVVHXVOLYURV
Software livre, cultura hacker e o ecossistema da colaboração • 165

³SDUWHGRQDWXUDOGHVHQYROYLPHQWRGRVVHUHVKXPDQRV´ S HpHOHPHQWR


SDUD D D¿UPDomR GH XPD VRFLHGDGH D S   1R DUWLJR FLWDGR HOH DLQGD
D¿UPD³RDYDQoRGDFLrQFLDHGDWHFQRORJLDQmRpWDUHIDGHGHP{QLRVPDVVLPD
H[SUHVVmRGDFULDWLYLGDGHKXPDQD´ S UHLWHUDQGRRD¿UPDGRQRVHXOLYUR
$omR&XOWXUDOSDUDD/LEHUGDGH
 2HGXFDGRUGHIHQGLDTXHDWHFQRORJLDQmRVXUJHGDVXSHUSRVLomRGRQRYR
VREUHRYHOKRPDVRQRYRQDVFHDSDUWLUGRYHOKR )5(,5(S GHVVH
PRGRRQRYRWUD]HPVLHOHPHQWRVGRYHOKR3DUWHVHGHXPDHVWUXWXUDLQIHULRUSDUD
VHDOFDQoDUXPDVXSHULRUHDVVLPSRUGLDQWH
 8PHOHPHQWRUHOHYDQWHQDVUHÀH[}HVGH)UHLUHVREUHDWHFQRORJLD UHIHUH
VH j GLVFXVVmR DFHUFD GD DGMHWLYDomR boa ou má GDGD PXLWDV YH]HV j SUySULD
WHFQRORJLD 2 HGXFDGRU UHIXWD HVVD LGpLD H DFUHGLWD TXH D WHFQRORJLD HQWHQGLGD
QHVVHPRPHQWRFRPRRREMHWRRXRDUWHIDWRUHVXOWDGRGHXPSURFHVVRWpFQLFRQmR
SRGH VHUDGMHWLYDGD SRUVHUXPREMHWR LQDQLPDGR TXHVyWHULD VHQWLGR LGHROyJLFR
H VRFLDO TXDQGR PDQLSXODGR SHOR VHU KXPDQR FULDGRU GR REMHWR H GH LGHRORJLD
$¿UPD)UHLUH

1mR VRX XP VHU QR VXSRUWH PDV XP VHU QR PXQGR FRP R PXQGR H
FRPRVRXWURV XPVHUTXHID]FRLVDV VDEHHLJQRUD IDODWHPHHVH
DYHQWXUDVRQKDHDPDWHPUDLYDHVHHQFDQWD8PVHUTXHVHUHFXVD
DDFHLWDU DFRQGLomR GHPHUR REMHWR TXH QmR EDL[D DFDEHoD GLDQWH
GR LQGLVFXWtYHO SRGHU DFXPXODGR SHOD WHFQRORJLD SRUTXH VDEHQGRD
SURGXomRKXPDQDQmRDFHLWDTXHHODVHMDHPVLPi6RXXPVHUTXH
UHMHLWDSHQViODFRPRVHIRVVHREUDGRGHP{QLRSDUDERWDUDSHUGHUD
REUDGH'HXV )5(,5(S 

)UHLUHQDPHVPDOLQKDFULWLFDDLGpLDGD³YLGDHPVLPHVPD´GDWHFQRORJLD
eFRQWUiULRjTXHODVWHVHVFRQVWUXtGDVQRVHQVRFRPXPTXHPXLWDVYH]HVGmRjV
PiTXLQDV SRGHUHV PiJLFRV FRPR VH HODV SXGHVVHP ³VDLU SRU Dt´ FULDQGR GHV
JUDoDV H RSHUDQGR PLODJUHV QDV YLGDV GDV SHVVRDV $ PiTXLQD QHFHVVLWD GR
KRPHPSDUDVHURSHUDGDSDUDIXQFLRQDU (VVHVHUKXPDQRpQHFHVViULR³QmRVy
SDUDRVHXPDQHMRPDVWDPEpPSDUDRVHXUHSDUR $LQGDPDLVSDUDID]HUQRYDV
PiTXLQDV´ )5(,5(S 

e LPSRUWDQWH DOLiV TXH QRV GHIHQGDPRV GH XPD PHQWDOLGDGH TXH


YHPHPSUHVWDQGRjPiTXLQDHPVLSRGHUHVPiJLFRVeXPDSRVLomR
³LQJrQXD´ TXH QmR FKHJD D SHUFHEHU TXH D PiTXLQD p DSHQDV XPD
SHoD HQWUH RXWUDV GD FLYLOL]DomR WHFQROyJLFD HP TXH YLYHPRV 3DUD
ID]HUJLUDUDVPiTXLQDVFRPH¿FLrQFLDHUHFROKHUGHODVRPi[LPRGH
TXHVmRFDSD]HVVHID]QHFHVViULDDSUHVHQoDGRKRPHPKDELOLWDGR
'RKRPHPSUHSDUDGRSDUDRVHXPDQHMR )5(,5(S 
166 • Software livre, cultura hacker e o ecossistema da colaboração

 8PDRXWUDFDUDFWHUtVWLFDGHVXDFRQFHSomRGHWHFQRORJLDpDSROLWLFLGDGH
$WHFQRORJLDFRPRSUiWLFDKXPDQDpSROtWLFDpSHUPHDGDSHODLGHRORJLD(ODWHP
VHUYLGRD¿QVEHPGHWHUPLQDGRVVHUYHDXPJUXSRGHSHVVRDVHDRVPDLVGLYHUVRV
LQWHUHVVHV 2 XVR TXH VH ID] GD WHFQRORJLD QmR p QHXWUR p LQWHQFLRQDO H QmR VH
SURGX] QHP VH XVD VHP XPD FHUWD YLVmR GH PXQGR GH KRPHP H GH VRFLHGDGH
TXHDIXQGDPHQWH)UHLUHFKHJDDD¿UPDUTXHRSUREOHPDDWXDOQmRpWHFQROyJLFR
PDVSROtWLFR³HVHDFKDYLVFHUDOPHQWHOLJDGRjFRQFHSomRPHVPDTXHVHWHQKDGH
SURGXomR´ )5(,5(S 
 2HGXFDGRUUHFRQKHFHQGRDVH[LJrQFLDVGRVHXWHPSRHDVSRWHQFLDOLGDGHV
GRVUHFXUVRVWHFQROyJLFRVVHPSUHIRLIDYRUiYHODRXVRGHPiTXLQDVWpFQLFDVFRP
ULJRUPHWRGROyJLFRSDUDRVHXXVR(OHFKHJRXDXVDURSURMHWRUGHVOLGHVRUiGLRD
WHOHYLVmRJUDYDGRUHVYLGHRFDVVHWHID[HFRQWHPSORXFXULRVDPHQWHRFRPSXWDGRU
HQWUHRXWURVUHFXUVRVWHFQROyJLFRV
 3DXOR)UHLUHLQFRUSRURXRXVRGHVVDVWHFQRORJLDVQRFDPSRGDHGXFDomRH
HVSHFLDOPHQWHSDUDDDOIDEHWL]DomR&KHJDYDDWpDYLEUDUQDVSDODYUDVGH%DOGXtQR
$$QGUHROD DSXG)5(,5(S QROLYUR3HGDJRJLDGD,QGLJQDomR FRPD
PDUFKDGRVVHPWHUUDTXHDVVLVWLDSHODWHOHYLVmR0RDFLU*DGRWWLUDWL¿FDQGRHVVD
YDORUL]DomRD¿UPDTXH

)RLFRPHVVHHVStULWRTXHHPLPSRUWRXGD3RO{QLDRVPDLVPR
dernos projetores de slides SDUD XWLOL]DU QD DSOLFDomR SUiWLFD GH VHX
IDPRVRPpWRGR(PERUD3DXOR)UHLUHQmRWLYHVVHXVDGRQHPPHVPR
XPDPiTXLQDGHHVFUHYHUSUHIHULQGRHVFUHYHUVHXVWH[WRVjPmRXWLO
L]RXVH WDQWR GR iXGLR GR YtGHR GR UiGLR GD WHOHYLVmR H GH RXWURV
PHLRVHOHWU{QLFRVSDUDGLIXQGLUVXDVLGpLDVHXWRSLDV *$'277,
S 

 eSUHFLVRGL]HUTXH)UHLUHpXPRWLPLVWDHXPFUtWLFRGDWHFQRORJLD3DUD
HOH D WpFQLFD H D WHFQRORJLD VmR IXQGDPHQWDLV SDUD D SUiWLFD HGXFDWLYD H PDLV
VHPSUHH[LVWLXFRPHODVVHPSUHIRLIHLWDFRPHODV1DSHUVSHFWLYDWHyULFR¿ORVy¿FD
FRP D TXDO GHIHQGHPRV R FRQFHLWR GH WpFQLFD H WHFQRORJLD SRGHPRV GL]HU TXH
QXQFDH[LVWLXXPD(GXFDomRTXHVHYLVVHGHVYLQFXODGDGHFHUWDWpFQLFDHGHFHUWD
WHFQRORJLD6HPSUHHPWRGDKLVWyULDGD'LGiWLFDXVDPRVXPD³IRUPDGHID]HUDV
FRLVDV´RXXP³FRQMXQWRGHIRUPDVGHID]HUDVFRLVDV´SDUDHQVLQDUHWDPEpPSDUD
DSUHQGHU 8VDPRV WpFQLFDV H WHFQRORJLDV )UHLUH D¿UPD ³3HQVR TXH D HGXFDomR
QmRpUHGXWtYHOjWpFQLFDPDVQmRVHID]HGXFDomRVHPHOD´ )5(,5(7255(6
S 
 8PRXWURYHLRSHORTXDOVHJXHRSHQVDPHQWRGH)UHLUHUHIHUHVHDUHV
0DLVLQIRUPDo}HVQROLYURSobre Educação (Diálogos)YS
Software livre, cultura hacker e o ecossistema da colaboração • 167

SRQGHUDXPDSHUJXQWDTXHGHVGHDVVXDVSULPHLUDVDQiOLVHVSHUVLVWHDWpVXDV
~OWLPDVREUDVDVHUYLoRGHTXHP"³3DUDPLPDTXHVWmRTXHVHFRORFDpDVHUYLoR
GH TXHP DV PiTXLQDV H D WHFQRORJLD DYDQoDGD HVWmR"´ )5(,5(  S   (
FRQWLQXD

2SUREOHPDpVDEHUDVHUYLoRGHTXHPHOHV RVFRPSXWDGRUHV entram


QDHVFROD6HUiTXHYDLVHFRQWLQXDUGL]HQGRDRVHGXFDQGRVTXH3HGUR
ÈOYDUHV &DEUDO GHVFREULX R %UDVLO" 4XH D UHYROXomR GH  VDOYRX R
SDtV" 6DOYRX GH TXH FRQWUD TXH FRQWUD TXHP" (VWDV FRLVDV p TXH
DFKRTXHVmRIXQGDPHQWDLV )5(,5(S 

 2HGXFDGRUSUHRFXSDVHFRPXPDWHFQRORJLDTXHSRUYH]HVWHPHVWDGR
WmRVRPHQWHDVHUYLoRGDSURGXomRFDSLWDOLVWDSDUDJHUDUVRFLHGDGHVFRQVXPLVWDV
H FRQVHJXLU DWHQGHU VHPSUH FRP PDLRU H[FHOrQFLD DRV iYLGRV FRPSUDGRUHV (OH
D¿UPDTXHpLPSHUDWLYRHXUJHQWHDVVXPLURFRQWUROHVREUHDWHFQRORJLDHS{ODD
VHUYLoRGRVHUKXPDQR HQmRGH³FDXVDVGHPRUWH´FRPRDUPDVTXtPLFDVRXGH
FDXVDVGHVWUXWLYDVFRPRDUPDPHQWRVHHTXLSDPHQWRVSDUDJXHUUDVFRPRDRFRU
ULGDQR$IHJDQLVWmR³1XQFDWDOYH]DIUDVHTXDVHIHLWD±H[HUFHURFRQWUROHVREUHD
WHFQRORJLDHS{ODDVHUYLoRGRVVHUHVKXPDQRV±WHYHWDQWDXUJrQFLDGHYLUDUIDWR
TXDQWRKRMHHPGHIHVDGDOLEHUGDGHPHVPDVHPDTXDORVRQKRGDGHPRFUDFLDVH
HVYDL´ )5(,5(S 
 8PDRXWUDSUHRFXSDomRFRPDWHFQRORJLDHPVXDUHODomRFRPDpWLFDHQ
FRQWUDVHQDV¿QDOLGDGHVSULRULWDULDPHQWHFRPHUFLDLVHOXFUDWLYDVGHPXLWDVHPSUH
VDVTXHSURGX]HPRXJHUDPQRYDVWHFQRORJLDV+RMHVmRUHPpGLRVIDEULFDGRVFRP
DOWD WHFQRORJLD 79V D FDER FRPHUFLDLV GH WHOHYLVmR TXH TXHUHP YHQGHU D WRGR
FXVWRDVVXDVLQRYDo}HVWHFQROyJLFDVQDSUySULD79DFDERH[LVWHPSURJUDPDV
HVSHFt¿FRV SDUD D SURSDJDQGD GH WDLV LQRYDo}HV GHVGH ID]HGRUHV GH VXFR D
FkPHUDV³WUrVHPXP´ ¿OPDWLUDIRWRVHDLQGDpXPDFkPHUDSDUDLQWHUQHW 6mR
SHVVRDV H HPSUHVDV TXH WrP VH HQULTXHFLGR FRP XP SDWULP{QLR TXH SHUWHQFH j
KXPDQLGDGH H TXH GHYHULD VHUYLU SDUD PD[LPL]DU D TXDOLGDGH GD YLGD GH WRGRV
)UHLUHGHIHQGHTXH

$ FRPSUHHQVmR FUtWLFD GD WHFQRORJLD GD TXDO D HGXFDomR GH TXH


SUHFLVDPRV GHYH HVWDU LQIXQGLGD H D TXH Yr QHOD XPD LQWHUYHQomR
FUHVFHQWHPHQWHVR¿VWLFDGDQRPXQGRDVHUQHFHVVDULDPHQWHVXEPHWLGD
D FULYR SROtWLFR H pWLFR 4XDQWR PDLRU YHP VHQGR D LPSRUWkQFLD GD
WHFQRORJLDKRMHWDQWRPDLVVHD¿UPDDQHFHVVLGDGHGHULJRURVDYLJLOkQFLD
pWLFD VREUH HOD 'H XPD pWLFD D VHUYLoR GDV JHQWHV GH VXD YRFDomR
RQWROyJLFDDGRVHUPDLVHQmRGHXPDpWLFDHVWUHLWDHPDOYDGDFRPR
DGROXFURDGRPHUFDGR )5(,5(S 
168 • Software livre, cultura hacker e o ecossistema da colaboração

 3DXOR)UHLUH S D¿UPDTXHRVRSUHVVRUHVWrPVHXWLOL]DGRGDV


WHFQRORJLDV ³FRPR IRUoD LQGLVFXWtYHO GH PDQXWHQomR GD RUGHP RSUHVVRUD FRP D
TXDOPDQLSXODPHHVPDJDP´PDVVL¿FDPHLQFXOFDPLQIRUPDo}HVTXHVLUYDPDRV
VHXVLQWHUHVVHVSDUDUHL¿FiORV2HGXFDGRUDGYRJDTXH³RGHVHQYROYLPHQWRWHFQR
OyJLFRGHYHVHUXPDGDVSUHRFXSDo}HVGRSURMHWRUHYROXFLRQiULR´HTXH

>@VHQRXVRGDFLrQFLDHGDWHFQRORJLDSDUD³UHL¿FDU´Rsine qua desta


DomRpID]HUGRVRSULPLGRVVXDSXUDLQFLGrQFLDMiQmRpRPHVPRR
TXHVHLPS}HQRXVRGDFLrQFLDHGDWHFQRORJLDSDUDDKXPDQL]DomR
$TXL RV RSULPLGRV RX VH WRUQDP VXMHLWRV WDPEpP GR SURFHVVR RX
FRQWLQXDP³UHL¿FDGRV´ )5(,5(S 

 3DUD )UHLUH D WHFQRORJLD DR FRQWUiULR GHYHULD VHUYLU DRV LQWHUHVVHV GRV
RSULPLGRVHPVXDOXWDXVDQGRVHGRPDLVDYDQoDGRSDUDSURPRYHUPXGDQoDVRFLDO
SROtWLFDSURPRYHUFLGDGDQLD)UHLUHFRQFOXLUHLWHUDQGRFRPDYLYDFLGDGHTXHOKHp
SUySULDWXGRDTXLORTXHGLVFXWLPRVDWpDJRUDVREUHDUD]mRGHVHUGDWHFQRORJLD

2SURJUHVVR FLHQWt¿FR HWHFQROyJLFR TXH QmR UHVSRQGH IXQGDPHQWDO


PHQWHDRVLQWHUHVVHVKXPDQRVjVQHFHVVLGDGHVGHQRVVDH[LVWrQFLD
SHUGHPSDUDPLPVXDVLJQL¿FDomR >@1mRVHWUDWDDFUHVFHQWHPRV
GHLQLELU DSHVTXLVD HIUHDU RVDYDQoRV PDVGHS{ORV DVHUYLoR GRV
VHUHVKXPDQRV$DSOLFDomRGHDYDQoRVWHFQROyJLFRVFRPRVDFULItFLR
GHPLOKDUHVGHSHVVRDVpXPH[HPSORDPDLVGHTXDQWRSRGHPRVVHU
WUDQVJUHVVRUHVGDpWLFDXQLYHUVDOGRVHUKXPDQRHRID]HPRVHPIDYRU
GH XPD pWLFD SHTXHQD DGR PHUFDGR DGR OXFUR )5(,5(  S
 

2.1 Por uma práxis tecnológica

 2XVRGDWHFQRORJLDSDUD3DXOR)UHLUHQmRGHYLDVHUUHDOL]DGR³GHTXDO
TXHU PRGR´ RX VHP D GHYLGD SUHSDUDomR 3RGHPRV DWp GL]HU TXH HOH GHOLQHRX
XPD PHWRGRORJLD GH XVR H DQiOLVH SDUD WRGR WLSR GH WHFQRORJLD TXH YHQKD D VHU
LQFRUSRUDGDHXWLOL]DGD)UHLUHGHIHQGLDTXH

>@DFRQVWUXomRRXDSURGXomRGRFRQKHFLPHQWRGRREMHWRLPSOLFDR
H[HUFtFLR GD FXULRVLGDGH VXD FDSDFLGDGH FUtWLFD GH ³WRPDU GLVWkQFLD´
GRREMHWRGHREVHUYiORGHGHOLPLWiORGHFLQGLORGH³FHUFDU´RREMHWR
RXID]HUVXDDSUR[LPDomRPHWyGLFDVXDFDSDFLGDGHGHFRPSDUDUGH
SHUJXQWDU )5(,5(S 
Software livre, cultura hacker e o ecossistema da colaboração • 169

 2 SULPHLUR HOHPHQWR SDUD XPD SUi[LV WHFQROyJLFD UHIHUHVH DR XVR LQWHQ
FLRQDOSROtWLFRGDWHFQRORJLD2VXVRVGDVGLYHUVDVWHFQRORJLDVHVWmRVHPSUHSHU
PHDGRV SHOD LGHRORJLD QmR VH SRGH QHJOLJHQFLDU LVWR &RPR DSDUDWR LGHROyJLFR
GHYHVHUGHVFRQVWUXtGRHUHYLVDGRQDVVXDVHQWUDQKDVeSUHFLVRLGHQWL¿FDURTXH
IXQGDPHQWDSUiWLFDVHXVRVWHFQROyJLFRVSDUDFRPEDWrODVRXPHVPRUHYHUWHUVHX
XVRSDUDDVFDXVDVDTXHVHGHIHQGH(LVVRpYDOLRVRSRUTXHDWpDFRQVWUXomRGH
VRIWZDUHVSiJLQDVGDwebRXDSOLFDWLYRVVmREDVHDGRVHPXPDFHUWDFRQFHSomR
GHPXQGRGHKRPHPRXGHHQVLQRHGHDSUHQGL]DJHP
 8PVHJXQGRHOHPHQWRUHIHUHVHjQHFHVVLGDGHGHVHFRPSUHHQGHUFRQWUR
ODUHDSUHHQGHUDWHFQRORJLD)UHLUH S SDUDIUDVHDQGR+DUU\%UDYHUPDQ
em Labor and Monopoly Capital – The degradation of work in the twentieth century,
GHIHQGLDTXHSDUDVHXVDURVDSDUDWRVWHFQROyJLFRVHUDSUHFLVRFRPSUHHQGHUDVXD
UD]mRGHH[LVWLU2VWUDEDOKDGRUHVQmRSRGHPVHUDOLHQDGRVTXDQWRDRXVRFRPR
VHIRVVHPPiTXLQDVDXWRPDWL]DGDV1mRSRGHPDLQGDVHUPiTXLQDVTXHVRPHQWH
UHDOL]DP PRYLPHQWRV UHSHWLWLYRV VHP D PtQLPD QRomR GR TXH ID]HP RX GR TXH
SURGX]HPWUDEDOKDGRUHVKLSHUHVSHFLDOLVWDV(QWHQGHURSURFHVVRpGHIXQGDPHQWDO
LPSRUWkQFLD SDUD )UHLUH SRUTXH FRQGX] RV KRPHQV j VXD SUySULD KXPDQL]DomR
D GHVORFDUVH GH XPD FRQFHSomR GH PHLR FRPR VXSRUWH SDUD D LGpLD GH PXQGR
SDVVtYHO GH WUDQVIRUPDomR HYLWDQGR DVVLP D ³PDTXLQL]DomR´ RX DQLPDOL]DomR
LQVWLQWLYD GRV VHUHV KXPDQRV (OH D¿UPD TXH ³TXDQGR VH GL] DR HGXFDGRU FRPR
ID]HUWHFQLFDPHQWHXPDPHVDHQmRVHGLVFXWHDVGLPHQV}HVHVWpWLFDVGHFRPR
ID]rOD FDVWUDVH D FDSDFLGDGH GH HOH FRQKHFHU D FXULRVLGDGH HSLVWHPROyJLFD´
)5(,5(3$66(7,S 
 8PWHUFHLURHOHPHQWRDSRQWDGRSRU)UHLUHpDUHDOL]DomRGHXPDQHFHVViULD
³UHGXomR´ )UHLUH  S   DFUHGLWD TXH HP GLYHUVDV FLUFXQVWkQFLDV DV LQR
YDo}HVWHFQROyJLFDVWrPVLGRLPSRVWDVGH³FLPDSDUDEDL[R´RXGH³IRUDSDUDGHQ
WUR´FDUDFWHUL]DQGRXPDYHUGDGHLUDLQYDVmRFXOWXUDO3DUDHOHDWHFQRORJLDDOpP
GHVHUFRPSUHHQGLGDDSUHHQGLGDGHYHVHUFRQWH[WXDOL]DGD±FRQWH[WXDOL]DUDWHF
QRORJLDHPVLSUySULDVXDJrQHVHHXWLOL]DomRGHVYHODQGRRVLQWHUHVVHVHDLGHR
ORJLDLPSOtFLWDRVEHQHItFLRVHDVOLPLWDo}HVGRXVR±HPVHJXLGDLGHQWL¿FiODFRP
R FRQWH[WR ORFDO GLVFXWLQGR VXDV LPSOLFDo}HV QD YLGD GRV ³XVXiULRV DWLYRV´ H D
PHOKRUIRUPDGHLQFRUSRUiODSDUDREHPGDTXHOHJUXSRQDTXHOHFRQWH[WR)UHLUH
GLVFXWLQGRDFHUFDGDVVRFLHGDGHVDOLHQDGDVDFUHGLWDTXH

$VXDJUDQGHSUHRFXSDomRQmRpHPYHUGDGHYHUFULWLFDPHQWHRVHX
FRQWH[WR ,QWHJUDUVH FRP HOH H QHOH 'Dt VH VXSHUSRUHP D HOH FRP
UHFHLWDVWRPDGDVGHHPSUpVWLPR(FRPRVmRUHFHLWDVWUDQVSODQWDGDVTXH
QmRQDVFHPGDDQiOLVHFUtWLFDGRSUySULRFRQWH[WRUHVXOWDPLQRSHUDQWHV
1mRIUXWL¿FDP'HIRUPDPVHQDUHWL¿FDomRTXHOKHVID]DUHDOLGDGH'H
170 • Software livre, cultura hacker e o ecossistema da colaboração

WDQWRLQVLVWLUHPHVVDVVRFLHGDGHVQDVVROXo}HVWUDQVSODQWDGDVVHPD
GHYLGD³UHGXomR´TXHDVDGHTXDULDjVFRQGLo}HVGRPHLRWHUPLQDPDV
VXDVJHUDo}HVPDLVYHOKDVSRUVHHQWUHJDUHPDRGHVkQLPRHDDWLWXGHV
GHLQIHULRULGDGH )5(,5(S 

 &RPUHODomRDHVVDDSURSULDomRQmRUHÀHWLGDGHWpFQLFDVWHFQRORJLDVFR
QKHFLPHQWRVH[SHULrQFLDVRXSUiWLFDV)UHLUHpLQFLVLYRHPD¿UPDUDLQYLDELOLGDGHGH
VHID]HUHPWDLV³UHSURGXo}HV´2HGXFDGRUQRVOHPEUDTXHDSHVDUGHRGRPLQDGRU
VHU R SULPHLUR SHGDJRJR GR GRPLQDGR )5(,5(  S   QmR p SRVVtYHO D
H[SRUWDomRGLUHWDGHSUiWLFDVpQHFHVViULDDVXDUHLQYHQomRH³DUHLQYHQomRH[LJH
DFRPSUHHQVmRKLVWyULFDFXOWXUDOSROtWLFDVRFLDOHHFRQ{PLFDGDSUiWLFDHGDVSUR
SRVWDVDVHUHPUHLQYHQWDGDV´ )5(,5(0$&('2S $FUHVFHQWDDLQGD
TXH PXLWDVYH]HVD HVFRODWHP VHUYLGRFRPRXPD IRUWHGRPHVWLFDGRUDGD PHQWH
GRVHGXFDQGRV6HJXQGR)UHLUH S ³DHVFRODpTXHGHPRGRJHUDOQRV
LQLEHID]HQGRQRVFRSLDUPRGHORVRX VLPSOHVPHQWHGDU FRU D GHVHQKRVTXH QmR
¿]HPRV TXDQGR DR FRQWUiULR QRV GHYLD GHVD¿DU D DUULVFDUQRV HP H[SHULrQFLDV
HVWpWLFDV´&RQFOXLQGRHOHD¿UPD

0DVQmRVHGHYHPID]HUDVPHVPDVFRLVDVTXH¿]HPPLQKDSUiWLFD
(GXFDGRUHVHHGXFDQGRVQmRSUHFLVDPID]HUH[DWDPHQWHDVPHVPDV
FRLVDVTXHHX¿]SDUDTXHWHQKDPDH[SHULrQFLDGHVHUXPVXMHLWR1mR
SRVVRSRUpPHVFUHYHUXPWH[WRFRPSRVWRGHFRQVHOKRVHVXJHVW}HV
XQLYHUVDLV5HFXVRPHDHVFUHYHUHVVHJrQHURGHWH[WRSRUTXHPLQKDV
FRQYLFo}HVSROtWLFDVVmRFRQWUiULDVjLGHRORJLDTXHDOLPHQWDHVVHWLSRGH
GRPHVWLFDomRGDPHQWH )5(,5(0$&('2S 

 8P~OWLPRHOHPHQWRSDUDXPDSRVVtYHOSUi[LVWHFQROyJLFDpDDWLWXGHTXH
VHGHYHDVVXPLUGLDQWHGDWHFQRORJLD)UHLUHGHIHQGHTXHQRVVDDWLWXGHGHYHVHU
FULWLFDPHQWHFXULRVDLQGDJDGRUDYLJLODQWHHTXHGHYHPRVVHPSUHUHÀHWLOD

2TXHPHSDUHFHIXQGDPHQWDOSDUDQyVKRMHPHFkQLFRVRXItVLFRVSH
GDJRJRVRXSHGUHLURVPDUFHQHLURVRXELyORJRVpDDVVXQomRGHXPD
SRVLomRFUtWLFDYLJLODQWHLQGDJDGRUDHPIDFHGDWHFQRORJLD1HPGH
XP ODGR GHPRQRORJL]iOD QHP GH RXWUR GLYLQL]iOD )5(,5( 
S 

 8VDU D WHFQRORJLD H QmR VHU XVDGRV RX PDQLSXODGRV GRFLOPHQWH FRPR


REMHWRVSRUHOD±QmRTXHDWHFQRORJLDWHQKDYLGDSRUVLSUySULDPDVHODSRGHVHU
XVDGDSDUDPDQLSXODU HHVWDUDVHUYLoRGHXPDFRQFHSomRGHPXQGRTXHQmRp
Software livre, cultura hacker e o ecossistema da colaboração • 171

HPDQFLSDGRUD±GDtQmRSRGHUPRVVHUREMHWRVGHFRPXQLFDGRVRXFRQVXPLGRUHV
iYLGRVGHSDFRWHVWHFQROyJLFRV2HGXFDGRUUHIHULQGRVHjWHOHYLVmRLQVLVWHTXH
³GHYHPRVXViODVREUHWXGRGLVFXWtOD´ )5(,5(S 
 3DUDDFODUDUHVVDGLVFXVVmRHQRVVDUHÀH[mRpSRVVtYHOID]HPRVXVRGH
DOJXPDVTXHVW}HVSURSRVWDVSRU)UHLUHQRFRQMXQWRGHVXDREUDHGHPRGRPDLV
RUJDQL]DGRQD3HGDJRJLDGD,QGLJQDomR

>@RH[HUFtFLRGHSHQVDURWHPSRGHSHQVDUDWpFQLFDGHSHQVDUR
FRQKHFLPHQWR HQTXDQWR VH FRQKHFH GH SHQVDU R TXr GDV FRLVDV R
SDUDTXrRFRPRRHPIDYRUGHTXrGHTXHPRFRQWUDTXrRFRQWUD
TXHP VmR H[LJrQFLDV IXQGDPHQWDLV GH XPD HGXFDomR GHPRFUiWLFD j
DOWXUDGRVGHVD¿RVGRQRVVRWHPSR )5(,5(S 

 )UHLUHLQVLVWHQHVWDVTXHVW}HVQRDUWLJRA máquina está a serviço de quem?


MiFLWDGRDFLPD

>@ SDUD PLP D TXHVWmR TXH VH FRORFD p D VHUYLoR GH TXHP DV
PiTXLQDV H D WHFQRORJLD DYDQoDGD HVWmR" 4XHUR VDEHU D IDYRU GH
TXHP RX FRQWUD TXHP DV PiTXLQDV HVWmR VHQGR SRVWDV HP XVR >@
3DUDPLPRVFRPSXWDGRUHVVmRXPQHJyFLRH[WUDRUGLQiULR2SUREOHPD
pVDEHUDVHUYLoRGHTXHPHOHVHQWUDPQDHVFROD )5(,5(S 

 $OGHU-~OLR&DODGRSHVTXLVDGRUGDREUDGH3DXOR)UHLUHGHVWDFDDSUHR
FXSDomRGHOHVREUHDQHFHVVLGDGHGHXPROKDUFXULRVRHFUtWLFRVREUHDWHFQRORJLD

>@ DR DFROKHU SRVLWLYDPHQWH RV DYDQoRV WHFQROyJLFRV >)UHLUH@ QXQFD


DEGLFRXGHID]rORGHPRGRFUtWLFRDH[HPSORGHFRPRVHSRVLFLRQD
IUHQWHjXWLOL]DomRGHQRYDVWHFQRORJLDVQRFDVRHVSHFt¿FRGDSHQH
WUDomRGDLQIRUPiWLFDQDVHVFRODV³-iGLVVHTXHIDoRTXHVWmRGHVHU
XPKRPHPGRPHXWHPSR2SUREOHPDpVDEHUDVHUYLoRGHTXHPHGH
TXrDLQIRUPiWLFDHVWDUiDJRUDPDFLoDPHQWHQDHGXFDomREUDVLOHLUD´
&$/$'2S 

2.2 A tecnologia a serviço de que interesses?

 $WHFQRORJLDRIHUHFHGLYHUVDVSRVVLELOLGDGHVTXHSRGHPVHUYLUDRKRPHP
FRPR FRQWULEXLomR SDUD VXD IHOLFLGDGH RX FRPR FDXVD GH VXD SUySULD GHVWUXLomR
)UHLUH SSESS FULWLFDHQIDWLFDPHQWH
172 • Software livre, cultura hacker e o ecossistema da colaboração

e em diversas passagens de seus livros RGXDOLVPRHQWUHRDWRGH³GLYLQL]DU´HGH


³GLDEROL]DU´ D WHFQRORJLD  S   1mR VH SRGH HQWHQGHU D WHFQRORJLD FRPR
VDOYDGRUDGRVKRPHQVQHPFRPRDSURPRWRUDGHWRGRVRVPDOHVeSUHFLVRVLP
HYLWDURTXHHOHFKDPDYDGH³GHVYLRVPtWLFRV´JHUDGRVSHODWHFQRORJLD
 $WHFQRORJLDQmRpERDQHPPiHPVLSUySULD(ODDGTXLUHDGMHWLYDo}HVjPH
GLGDTXHVHUYHDJUXSRVVRFLDLVTXHSRVVXHPRVPDLVGLYHUVRVLQWHUHVVHVFRPRMi
GLVVHPRVQRVUHIHULQGRD)UHLUH1HVVDSHUVSHFWLYDDWHFQRORJLDPXLWDVYH]HVWHP
VHUYLGRjJHUDomRGHFXOWXUDVH³SHVVRDVPDVVL¿FDGDV´GLVSRVWDVDRFRQVXPLVPR
LPSRVWRSHORPHUFDGRQDyWLFDFDSLWDOLVWDHjFULDomRGHXPDVRFLHGDGHRXFLrQFLD
PLWL¿FDGDLVWRp³HQGHXVDGD´LQDFHVVtYHOLQDWLQJtYHOLPXWiYHOeSUHFLVRGHVPL
WL¿FiODFRORFiODQRVHXGHYLGROXJDUHQmRHQFDUDURFLHQWLVWDLQVWLWXLomRRXTXDO
TXHUSHVVRDFRPR³XPHQYLDGRGRFpXRXSULYLOHJLDGR´)UHLUHD¿UPD

7HQKRDLPSUHVVmRGHTXHXPDFRUUHWDSHUVSHFWLYDSHGDJyJLFDVHULD
DTXHODTXHMDPDLVQHJDQGRDQHFHVVLGDGHGDFLrQFLDHGDWHFQRORJLD
QXQFDSRUpPUHVYDODVVHSDUDXPDSRVLomRGHPLWL¿FDomRGDFLrQFLD
8PD FRUUHWD SUiWLFD HGXFDWLYD GHVPLWL¿FD D FLrQFLD Mi QD SUpHVFROD
)5(,5(*8,0$5­(6S 

8PRXWURULVFRDSRQWDGRSHORHGXFDGRUWHPDYHUFRPRXVRGDWHFQRORJLD
SDUDSUiWLFDVLUUDFLRQDLV2PXQGRIRLWHVWHPXQKDGHGLYHUVRVGHVVHVLUUDFLRQDOLVPRV
FRPRDVJXHUUDVPXQGLDLVRXDGHVWUXLomRTXDVHWRWDOGDVFLGDGHVGH+LURVKLPD
H1DJDVDNLSRUERPEDVGHVHQYROYLGDVFRPDPDLVDYDQoDGDWHFQRORJLDGDpSRFD
DVERPEDVDW{PLFDV5HD¿UPDRHGXFDGRUTXH

>@ VHULD VLPSOLVPR DWULEXLU D UHVSRQVDELOLGDGH SRU HVVHV GHVYLRV j


WHFQRORJLD HP VL PHVPD 6HULD XPD RXWUD HVSpFLH GH LUUDFLRQDOLVPR
R GH FRQFHEHU D WHFQRORJLD FRPR XPD HQWLGDGH GHPRQtDFD DFLPD
GRV VHUHV KXPDQRV 9LVWD FULWLFDPHQWH D WHFQRORJLD QmR p VHQmR D
H[SUHVVmR QDWXUDO GR SURFHVVR FULDGRU HP TXH RV VHUHV KXPDQRV VH
HQJDMDPQRPRPHQWRHPTXHIRUMDPRVHXSULPHLURLQVWUXPHQWRFRP
TXHPHOKRUWUDQVIRUPDPRPXQGR )5(,5(S 

 3RGHPRVDFUHVFHQWDUQDPHVPDOLQKDGHSHULJRVGRXVRGDWHFQRORJLDXP
DOHUWDDWXDOGRHGXFDGRUFRQWLGRQROLYURProfessora sim, Tia nãojSRVVLELOLGDGHGH
FRQWUROHSRUPHLRGRXVRGHFkPHUDVGHYtGHRGDSUiWLFDGHSURIHVVRUHV DV QR
)UHLUHFXULRVDPHQWHFRQFHQWUDSUDWLFDPHQWHWRGRVRVVHXVUHFHLRVTXDQWRjWHFQRORJLDQROLYURAção Cultural para
a Liberdade2SURIHVVRU0RDFLU*DGRWWLMXVWL¿FDHVVHIDWR LQIRUPDomRYHUEDO OHPEUDQGRTXHHVVHHUDRWHPSRTXH
)UHLUHWHYHFRQWDWRFRPDVRFLHGDGHDPHULFDQDHSRGHFRQWHPSODUHYLYHQFLDUGLYHUVRVHYHQWRVUHODFLRQDGRVFRPD
QRVVDWHPiWLFD.
Software livre, cultura hacker e o ecossistema da colaboração • 173

H[HUFtFLRGHVXDSUR¿VVmR$GLUHWRUDWHPRSRGHUGHVDEHURTXHHODV HOHV HVWmR


IDODQGRQD³LQWLPLGDGHGRVHXPXQGR´WRUQDQGRRV³FRUSRVLQWHUGLWDGRVSURLELGRV
GHVHU´ )5(,5(ES 
 3XGHPRV SUHVHQFLDU HVVH VLVWHPD HP DomR QR SURJUDPD ³)DQWiVWLFR´ GD
79 *ORER GR GLD  GH MXQKR GH  FRP D PDWpULD ³%LJ %URWKHU (VFROD´ TXH
DSUHVHQWRXXPDPDWpULDPRVWUDQGRXPDHVFRODTXHSRVVXLHVVHVLVWHPDSDUDYL
JLDURVDOXQRVHFRPFHUWH]DDQDOLVDUDSUiWLFDGHSURIHVVRUHVFULDQGRQtYHLVGH
H[FHOrQFLD HJHUDQGR XPD YHUGDGHLUD FRUULGD SDUD ³PRVWUDU VHUYLoR´ jTXHOHV TXH
RVREVHUYDPHJDUDQWLURXPHOKRUVXVWHQWDUVHXHPSUHJR6DFUL¿FDVHDOLEHUGDGH
FRPRFRQWUROHDDXWRQRPLDFRPDUHSUHVVmR(QWUDPRVHPXPDQRYDGLWDGXUDD
GLWDGXUDGDVREUHYLYrQFLDGDQHFHVVLGDGHTXHXVDFRPRDUPDQmRPDLVIX]LVRX
UHYyOYHUHVPDVDVPDLVPRGHUQDVWHFQRORJLDV
 )UHLUHWHFHWDPEpPXPDFUtWLFDDRH[FHVVLYRHVSHFLDOLVPRKHUGDGRGD5H
YROXomR,QGXVWULDODWHFQRORJLDGDSURGXomRHPVpULHGHVHQYROYLGDSRU+HQU\)RUG
(OHDFUHGLWDTXHHVVHH[FHVVLYRHVSHFLDOLVPRWHPOLPLWDGRDYLVmRGRVVXMHLWRVWHP
GRPHVWLFDGR GHVXPDQL]DGR H WHP PDTXLQL]DGR RV VHUHV KXPDQRV 2 HGXFDGRU
D¿UPDTXH

$RH[LJLUGHOHFRPSRUWDPHQWRPHFDQL]DGRSHODUHSHWLomRGHXPPHVPR
DWRFRPTXHUHDOL]DXPDSDUWHDSHQDVGDWRWDOLGDGHGDREUDGHTXH
VHGHVYLQFXOD³GRPHVWLFDR´1mRH[LVWHDWLWXGHFUtWLFDWRWDOGLDQWHGH
VXD SURGXomR 'HVXPDQL]DR&RUWDOKH RV KRUL]RQWHV FRP HVWUHLWH]D
GD HVSHFLDOL]DomR H[DJHUDGD )D] GHOH XP VHU SDVVLYR 0HGURVR
³,QJrQXR´'LDQWHDVXDJUDQGHFRQWUDGLomRDDPSOLDomRGDVHVIHUDVGH
SDUWLFLSDomRGR QRVVR KRPHPSDUD TXH PDUFKHPRVSURYRFDGDSHOD
LQGXVWULDOL]DomRH R SHULJR GH HVWD DPSOLDomR VRIUHU GLVWRUomR FRP D
OLPLWDomRGDFULWLFLGDGHSHORHVSHFLDOLVPRH[DJHUDGRGDSURGXomRHP
VpULH )5(,5(S 

 8PD~OWLPDFUtWLFDGH)UHLUHjWHFQRORJLDUHFXSHUDGDQRVOLYURVHVWXGDGRV
UHIHUHVHjQHFHVVLGDGHGHVXSHUDomRGDYLVmRGXDOLVWDWHFQRORJLD[KXPDQLVPR2
HGXFDGRUUHSRUWDVHDHVVHGXDOLVPRFRPPDLRUrQIDVHHPTXDWUROLYURVEducação
e MudançaSobre Educação: diálogos (SED), v. 2Alfabetização: leitura do mundo,
leitura da palavra e Educação como Prática da Liberdade. 'HIHQGH)UHLUHTXH³XP
KXPDQLVPRVpULRQmRFRQWUDGL]DFLrQFLDQHPRDYDQoRGDWHFQRORJLD´ )5(,5(
*8,0$5­(6S HFRQWLQXD

2UDRVPHLRVGHFRPXQLFDomRRVLQVWUXPHQWRVWHFQROyJLFRV±FRPR
SRU H[HPSOR D PiTXLQD GH HQVLQDU ± VmR FULDWXUDV QRVVDV VmR
174 • Software livre, cultura hacker e o ecossistema da colaboração

LQYHQo}HVGRVHUKXPDQRDWUDYpVGRSURJUHVVRFLHQWt¿FRGDKLVWyULD
GDFLrQFLD2ULVFRDtVHULDRGHSURPRYrORVHQWmRDTXDVHID]HGRUHV
GHQyVPHVPRV )5(,5(*8,0$5­(6S 

Em Educação e MudançaOLYURDQWHULRUDR6(')UHLUH S FULWLFD


DSRVLomRGHVXSRVWRVKXPDQLVWDVTXHDFUHGLWDPTXHDWHFQRORJLDp³DUD]mRGH
WRGRVRVPDOHVGRKRPHPPRGHUQR´HFULWLFDDTXHOHVTXHRSWDPSHODWpFQLFDHRV
TXHFUrHPTXHD³SHUVSHFWLYDKXPDQLVWDpXPDIRUPDGHUHWDUGDUDVVROXo}HVPDLV
XUJHQWHV´2³KXPDQLVPRHDWHFQRORJLDQmRVHH[FOXHP´GHIHQGHRHGXFDGRU
No livro Alfabetização: leitura do mundo, leitura da palavra 3DXOR )UHLUH
)5(,5( 0$&('2  S   DGYRJD TXH ³RV HGXFDGRUHV MDPDLV GHYHULDP
QHJDU D LPSRUWkQFLD GD WHFQRORJLD PDV QmR GHYHULDP UHGX]LU D DSUHQGL]DJHP D
XPDFRPSUHHQVmRWHFQROyJLFDGRPXQGR´HDFUHGLWDTXHVHULDVLPSOL¿FDURXQHJDU
DWHFQRORJLDDVVRFLiODDXP³SURFHVVRGHVXPDQL]DGRU´
 (Q¿PQROLYUREducação como Prática da Liberdade)UHLUHGHIHQGHDQH
FHVVLGDGHGHXPDYLVmRKDUP{QLFDHQWUHDSHUVSHFWLYDKXPDQLVWDHDWHFQRORJLD2
HGXFDGRUDFUHGLWDTXHHVVDKDUPRQLDGHYHULDLPSOLFDUQD

>@VXSHUDomRGRIDOVRGLOHPDKXPDQLVPRWHFQRORJLDHHPTXHTXDQGR
GD SUHSDUDomR GH WpFQLFRV SDUD DWHQGHU DR QRVVR GHVHQYROYLPHQWR
VHPRTXDOIHQHFHUHPRVQmRIRVVHPHOHVGHL[DGRVHPVXDIRUPDomR
LQJrQXDHDFULWLFDPHQWHSRVWRVGLDQWHGHSUREOHPDVRXWURVTXHQmRRV
GHVXDHVSHFLDOLGDGH´ )5(,5(S 

 3DXOR)UHLUHFRPRXPKRPHPGRVHXWHPSRVRXEHUHFRQKHFHUQmRVyRV
SHULJRVQRXVRGDVGLYHUVDVWHFQRORJLDVFRPRUHFRQKHFHXHPYiULDVSDVVDJHQV
GHVHXVOLYURVVXDLPSRUWkQFLDHDVSRWHQFLDOLGDGHVSDUDDFRQVFLHQWL]DomRHKX
PDQL]DomRGRV³HVIDUUDSDGRVGRPXQGR´
 2 HGXFDGRU SDUD UHWUDWDU XPD GDV SRWHQFLDOLGDGHV GD WHFQRORJLD XWLOL]D
RH[HPSORGHVHXVQHWRVHD¿UPD³QLQJXpPPHOKRUGRTXHPHXVQHWRVHPLQKDV
QHWDVSDUDPHIDODUGHVXDFXULRVLGDGHLQVWLJDGDSHORVFRPSXWDGRUHVFRPRVTXDLV
FRQYLYHP´ )5(,5(S )UHLUHWDPEpPFODVVL¿FDRFRPSXWDGRURUiGLR
DWHOHYLVmRFRPRPHLRVSDUDFRQKHFHURPXQGRSDUDUHÀHWtORUHSHQViORHTXH
VHUYHPWDPEpPFRPRIRQWHGHSHVTXLVD
 2XWUDV SRWHQFLDOLGDGHV GR XVR GD WHFQRORJLD HQFRQWUDPVH GHVFULWDV QR
livro Pedagogia da EsperançaRQGH)UHLUHIDODGHVHXFRPSXWDGRUSHVVRDOHGD
VXDVDXGDGH
Software livre, cultura hacker e o ecossistema da colaboração • 175

$RUHFRUGDUDJRUDWRGRHVWHWUDEDOKRWmRDUWHVDQDODWpFRPVDXGDGH
UHFRQKHoRRTXHWHULDSRXSDGRGHWHPSRHGHHQHUJLDHFUHVFLGRHP
H¿FiFLD VH WLYHVVH FRQWDGR QD RSRUWXQLGDGH FRP XP FRPSXWDGRU
PHVPR KXPLOGH FRPR R GH TXH GLVSRPRV KRMH PLQKD PXOKHU H HX
)5(,5(S 

 2HGXFDGRUUHFRQKHFHTXHDWHFQRORJLDSRVVLELOLWDDPD[LPL]DomRGRWHP
SRGRVHUKXPDQR8PH[HPSORFODURGLVWRpDXWLOL]DomRGDVDWXDLVPiTXLQDVGH
ODYDU-iSHUFHEHXRWHPSRTXHpJDVWRODYDQGRXPDWURX[DGHURXSDV"(VVHSUR
FHVVRGXUDPLQHPXPDPiTXLQDGHODYDUFRLVDTXHVHULDUHDOL]DGDHPDSUR
[LPDGDPHQWHKHPLQ³QDPmR´2WHPSRTXHUHVWDSRGHVHUXWLOL]DGRSDUDXP
JUDQGHQ~PHURGHDWLYLGDGHVFRPRRWUDEDOKRRHVWXGRROD]HUGHQWUHRXWURV
 3RGHPRV QRV SHUJXQWDU SRU TXH 3DXOR )UHLUH VHQGR GHIHQVRU GD ³ERD
WHFQRORJLD´ QmR FKHJRX D XVDU D PiTXLQD GH HVFUHYHU RX R FRPSXWDGRU" 8PD
KLSyWHVH TXH HPHUJH GD QRVVD UHÀH[mR p TXH R VDOWR TXDOLWDWLYR GD PLJUDomR GD
HVFULWDPDQXDOSDUDDPiTXLQDGHHVFUHYHUQmRHUDWmRVLJQL¿FDWLYR$LQGDVHSHU
GLDPDVIROKDVHPFDVRGHHUURQDVEDWLGDVHDSRVVLELOLGDGHGHDOWHUDUWUHFKRV
GRWH[WRH[LJLDPXPDQRYDGDWLORJUDIDomRGHWRGDSiJLQDFRPH[FHomRGDVUDUDV
PiTXLQDVGHHVFUHYHUHOpWULFDVTXHSHUPLWLDPDDOWHUDomRFRPPDLRUIDFLOLGDGH2V
FRPSXWDGRUHVVLPHUDPRVDOWRTXDOLWDWLYR1RVFRPSXWDGRUHVpSRVVtYHOGLJLWDU
VHXPWH[WRDOWHUiORHPTXDOTXHUSDUWHUHRUJDQL]iORWUDQVIHULORFRPIDFLOLGDGH
SDUD PHLRV GH DUPD]HQDPHQWR LPSULPLOR LQ~PHUDV YH]HV DOWHUDU WLSR GH OHWUD
WDPDQKRVUHDOL]DULWiOLFRVQHJULWRVHVXEOLQKDGRVFRPIDFLOLGDGH(VVHHUDXPUHDO
VDOWRTXDOLWDWLYRH)UHLUHQmRS{GHQHJOLJHQFLiOR
 8PRXWURSRVVtYHOIDWRUTXHYHLRDIRUWDOHFHUDVXDQmRXWLOL]DomRGRFRP
SXWDGRUpPXLWRSURYDYHOPHQWHD³PtVWLFD´TXHHQYROYLDSDUD)UHLUHRVHXSURFHVVR
GHHVFULWDRQGHDWpDSUHVHQoDGH(O]DVXDSULPHLUDHVSRVDFKHJDYDD³DWUDSDOKDU´
RVHXPRPHQWRGHSURGXomRHVFULWD

'H PRGR JHUDO WDPEpP WHQKR PXLWD SDFLrQFLD FRPLJR PHVPR ¬V
YH]HVSDVVRWUrVTXDWURKRUDVQRPHXFDQWLQKRVy7HPTXHVHUVy
1mRUHDMREHPQDSUHVHQoDGD(O]D4XDQGRHVFUHYRQHPD(O]DSRGH
HVWDU GHQWUR GR PHX JDELQHWH 1XQFD GLVVH LVVR D HOD PDV WDPEpP
UDUDPHQWHHODHQWUD0DVTXDQGRHQWUDGHL[RGHHVFUHYHUHQWUHPLP
H R SDSHO QmR SRGH LQWHUYLU QLQJXpP ( GH PRGR JHUDO WHQKR PXLWD
SDFLrQFLD3RVVRSDVVDUTXDWURKRUDVHHVFUHYHUXPDSiJLQDjVYH]HV
PDLV 0DV TXDQGR DFDER SRVVR HQWUHJDU GLUHWR D XPD GDWLOyJUDID RX
SDUDDHGLWRUDQmRSUHFLVRUHID]HUSUDWLFDPHQWHQDGDHDPLQKDOHWUDp
EDVWDQWHFODUD )5(,5(*8,0$5­(6S 
176 • Software livre, cultura hacker e o ecossistema da colaboração

 &RPUHODomRDH¿FiFLDGRFRPSXWDGRUSDUDDSURGXomRWH[WXDOpRSRUWXQR
H[SOLFLWDURTXDQWRDOJXQVGRVDWXDLVHGLWRUHVGHWH[WRFRPRR%U2I¿FHRUJ KWWS
ZZZEURI¿FHRUJEr WrPFRQWULEXtGRSDUDDPHOKRUDTXDOLWDWLYDGDSURGXomRHGD
HVFULWDWH[WXDOGHWRGDDKXPDQLGDGH&RPRVSURJUDPDVSDUDFRPSXWDGRUDWXDLV
WHPRVDOLEHUGDGHGHDOpPGHID]HUDVDOWHUDo}HVDFLPDFLWDGDVJHUDUPRVSRQWHV
FRQH[}HVHQWUHWH[WRVLPDJHQVIRWRViXGLRVHYtGHRVYLDKLSHUOLQNVVHUPRVDX[L
OLDGRV SRU XPD FRUUHomR RUWRJUi¿FD H DWp JUDPDWLFDO DPSOLDUPRV D YLVXDOL]DomR
GHXPSDUiJUDIRRXGHXPDSiJLQDFDSLWXODUHRXWUDVSRVVLELOLGDGHVGHFRQH[mR
FRPDweb+RMHFRPRDGYHQWRGHKLSHUWH[WRRXPHOKRUGHXPDHVSpFLHGHWH[WR
³XQLPLGLiWLFRPXOWLPRGDO´XVDQGRDWHUPLQRORJLDGR3LHUUH/pY\ S p
SRVVtYHODJUHJDUHPXPPHVPRWH[WRDLQGDPDQWHQGRRIRUPDWRGHWH[WRiXGLR
YtGHRHLPDJHPFRPPXLWDIDFLOLGDGH8PERPH[HPSORGLVVRVmRDVDSUHVHQWDo}HV
FULDGDVSDUDDH[SRVLomRGHSDOHVWUDVRXWUDEDOKRVTXHDWLQJHPLQWHJUDGDPHQWH
XPD VpULH GH PRGDOLGDGHV VHQVRULDLV )UHLUH WRFDGR SHODV SRVVLELOLGDGHV GDV
WHFQRORJLDVQRXVRSHGDJyJLFRD¿UPD

+RMHFRPDWHFQRORJLDGHTXHGLVSRPRV¿FRDSHQVDUQRTXHSRGH
UtDPRVWHUIHLWRFRPRID[FRPRYtGHRHFRPRVFRPSXWDGRUHVQR
DSURIXQGDPHQWR GR FRQKHFLPHQWR P~WXR GRV FOXEHV H GRV Q~FOHRV
VRFLDLV QR ULWPR GH LQFUtYHO UDSLGH] FRP TXH VH GLVWULEXLULDP DV
LQIRUPDo}HV QDV SRVVLELOLGDGHV GH SHVTXLVD QR HVIRUoR IRUPDGRU
)5(,5(S 

 )UHLUHWDPEpPGHIHQGHRXVRGRUiGLRQRSURFHVVRGHDOIDEHWL]DomR )5(,5(
S RXVRGHPHLRVDJUHJDGRV±WHOHYLVmRHUiGLR )5(,5(S 
H YLVOXPEUD GLYHUVDV SRWHQFLDOLGDGHV SDUD D FDXVD TXH GHIHQGLD 8P GRV YiULRV
HYHQWRVSUiWLFRVGRXVRGDWHFQRORJLDDVHUYLoRGRGLVFXUVRKXPDQLVWDYLYHQFLDGR
SRU)UHLUHRFRUUHQRž6HPLQiULRGH(GXFDomR%UDVLOHLUDHPQRYHPEURGH
DQRTXH)UHLUHDLQGDVHHQFRQWUDYDQRH[tOLRHQmRUHFHEHQGRRSDVVDSRUWHQmR
S{GHDWHQGHUDRFRQYLWHGHYLUDRVHPLQiULR2SURIHVVRU0RDFLU*DGRWWLH[SOLFD
³FRPRHOHQmRSRGHULDYLUSHVVRDOPHQWHGHFHUWDIRUPDHQJDQDPRVDFHQVXUDH
JUDYDPRVSRUWHOHIRQHDVXDPHQVDJHPDRVSDUWLFLSDQWHVGRž6HPLQiULRGH(GX
FDomR%UDVLOHLUD´ )5(,5(*$'277,*8,0$5­(6S 6HJXHXPWUHFKR
GDIDODGH)UHLUHHQIDWL]DQGRRTXHHVWDPRVD¿UPDQGR

eXPDDOHJULDHQRUPHPHVHUYLUGDSRVVLELOLGDGHTXHDWHFQRORJLDPH
FRORFDjGLVSRVLomRKRMHGHJUDYDUGHWmRORQJHGHYRFrVHVVDSDODYUD
TXHQmRSRGHVHURXWUDVHQmRXPDSDODYUDDIHWLYDXPDSDODYUDGHDPRU
XPDSDODYUDGHFDULQKRXPDSDODYUDGHFRQ¿DQoDGHHVSHUDQoDHGH
Software livre, cultura hacker e o ecossistema da colaboração • 177

VDXGDGHV WDPEpP VDXGDGH LPHQVD JUDQGRQD VDXGDGHV GR %UDVLO


GHVVH%UDVLOJRVWRVRGHVVH%UDVLOGHQyVWRGRVGHVVH%UDVLOFKHLURVR
GLVWDQWHGRTXDOHVWDPRVKiFDWRU]HDQRVPDVGLVWDQWHGRTXDOQXQFD
HVWLYHPRVWDPEpP )5(,5(*$'277,*8,0$5­(6S 

 8PRXWURHYHQWRTXHDWHVWDDSHUFHSomRGH)UHLUHTXDQWRDRVEHQHItFLRV
GD WHFQRORJLD GHXVH TXDQGR R HGXFDGRU QmR S{GH GHVWD YH] SRU HVWDU GRHQWH
UHDOL]DU XPD SDOHVWUD SDUD MRYHQV DPHULFDQRV 3DUD UHDOL]DU VXD DSUHVHQWDomR
JUDYRXVXDIDODHPXPYtGHRTXHIRLHQYLDGRDRHQFRQWURRQGHRVMRYHQVSXGHUDP
RXYLUVXDIDODHYHUVXDLPDJHP7UDWDVHKRMHGRYtGHRLQWLWXODGR³3DXOR)UHLUH¶V
0HVVDJH´
 3RU¿PQROLYURÀ sombra desta mangueira~QLFROLYURGDTXHOHVHVWXGDGRV
HPTXH)UHLUHXVDDSDODYUDInternetRHGXFDGRULPSUHVVLRQDGRFRPDPHQVDJHP
TXH³FDLX´QRFRPSXWDGRUGRVHXQHWR$OH[DQGUH'RZERUHFRPDUDSLGH]FRPTXH
HOH HQWURX HP FRQWDWR FRP D SURIHVVRUD DOHPm TXH TXHULD OKH IDODU FRQFOXL UDWL
¿FDQGRPDLVDLQGDDVXDDGPLUDomRSHORVUHFXUVRVWHFQROyJLFRVGHVXDpSRFD

+iSRXFRWHPSRPHXQHWR$OH[DQGUH'RZERUWHOHIRQRXPHSDUDGL]HU
TXH QR VHX FRPSXWDGRU ¿OLDGR D  ,QWHUQHW ³FDLX´ D PHQVDJHP GH
HVWXGLRVD DOHPm VROLFLWDQGR PHX HQGHUHoR 3HGLGR D TXH HOH DWHQ
GHX DFUHVFHQWDQGR R Q~PHUR GH PHX ID[ 4XLQ]H PLQXWRV GHSRLV
HXFRQYHUVDYDFRPDSURIHVVRUDDOHPm*UDoDVj WHFQRORJLD )5(,5(
S 

2.3 Em defesa de uma concepção de infoinclusão

 3DXOR)UHLUHQmRFKHJRXDXVDURWHUPRLQIRLQFOXVmRFRQWXGRHPGLYHUVRV
WUHFKRVGRVVHXVOLYURVDLGpLDDSDUHFHVXEWHQGLGDSHODVLGpLDVGHSURPRomRGR
DFHVVR GHPRFUDWL]DomR GR VDEHU GRV ULFRV 4XDQGR 6HFUHWiULR GD (GXFDomR GD
&LGDGH GH 6mR 3DXOR DFRPSDQKRX D LQVWDODomR HP WRGDV DV HVFRODV GD UHGH
PXQLFLSDOGD&LGDGHGH6mR3DXORGHODERUDWyULRVGHLQIRUPiWLFD
 (OHSUHRFXSDYDVHVREUHFRPRHVVDVWHFQRORJLDVSRGHULDPFKHJDUDRV³H[
FOXtGRV´DRYHURsiteGR,QVWLWXWR3DXOR)UHLUHFRPRQHFHVVLGDGHSDUD³H[SDQGLUD
FDSDFLGDGH FUtWLFD H FULDWLYD´ GRV DOXQRV HQ¿P SDUD ³HPSXUUDU´ DV HVFRODV SDUD
RIXWXURHQmRSDUD³DVVLVWLUDR¿PGDVHVFRODVHGRHQVLQR´3RUWRGDVHVVDVDV
VHUWLYDVHPXLWDVRXWUDVpSRVVtYHOSHUFHEHURTXDQWR3DXOR)UHLUHIRLGHIHQVRUGH
XPD FHUWD FRQFHSomR GH LQIRLQFOXVmR )UHLUH GHIHQGLD D LQIRLQFOXVmR TXDQGR D¿U
PDYD³MiFRORFDPRVRHVVHQFLDOQDVHVFRODVDJRUDSRGHPRVSHQVDUHPFRORFDU
FRPSXWDGRUHV´ )5(,5(7255(6S (FRQWLQXD
178 • Software livre, cultura hacker e o ecossistema da colaboração

O idealHVWiHPTXDQGRRVSUREOHPDVSRSXODUHV±DPLVpULDGDVIDYHODV
GRV FRUWLoRV R GHVHPSUHJR D YLROrQFLD RV Gp¿FLWV GD HGXFDomR D
PRUWDOLGDGH LQIDQWLO HVWHMDP GH WDO PDQHLUD HTXDFLRQDGRV TXH HQWmR
XPDDGPLQLVWUDomRVHSRVVDGDUDROX[RGHID]HU³MDUGLQVDQGDULOKRV´TXH
PXGHPVHPDQDOPHQWHGHEDLUURDEDLUURVHPHVTXHFHURVSRSXODUHV
IRQWHVOXPLQRVDVSDUTXHVGHGLYHUVmRFRPSXWDGRUHVHPFDGDSRQWR
HVWUDWpJLFR GD FLGDGH SURJUDPDGRV SDUD DWHQGHU j FXULRVLGDGH GDV
JHQWHV HP WRUQR GH RQGH ¿FD HVWD RX DTXHOD UXD HVWH RX DTXHOH
HVFULWyULR S~EOLFR FRPR DOFDQoiOR HWF 7XGR LVVR p IXQGDPHQWDO H
LPSRUWDQWHPDVpSUHFLVRTXHDVPDLRULDVWUDEDOKHPFRPDPGXUPDP
VREXPWHWRWHQKDPVD~GHHVHHGXTXHPeSUHFLVRTXHDVPDLRULDV
WHQKDPRGLUHLWRjHVSHUDQoDSDUDTXHRSHUDQGRRSUHVHQWHWHQKDP
IXWXUR )5(,5(DSJULIRQRVVR 

 ¬ SULPHLUD YLVWD )UHLUH DSDUHQWD HVWDU FRQWUD D LQIRLQFOXVmR 0DV QmR p


YHUGDGH (OH HVWi VLP FRQWUD D VXSHUSRVLomR GR SURYLPHQWR GH DFHVVR D FHUWRV
DSDUDWRVWHFQROyJLFRVFRPRRVWHUPLQDLVFLWDGRVRXDRVFRPSXWDGRUHVDRLQYpVGDV
QHFHVVLGDGHVEiVLFDV)UHLUHSHUFHEHTXHDRPHVPRWHPSRHPTXHSHQVDUPRV
HPDPSOLDURDFHVVRDRVFRPSXWDGRUHVRXRXWURVPHLRVWHPRVTXHSHQVDUQHVVDV
QHFHVVLGDGHVTXHFKHJDPDLQYLDELOL]DUWRGRSURFHVVRGHHQVLQRHDSUHQGL]DJHP
4XDOVHUKXPDQRFRPIRPH± IRPHDTXLHQWHQGLGDFRPRRHIHLWRGDFDUrQFLDWRWDO
GH DOLPHQWRV ± FRQVHJXH PLQLPDPHQWH PDQWHU D FRQFHQWUDomR" 0HOKRU GL]HQGR
HOHDWpFRQVHJXHFRQFHQWUDUVHQDVXDIRPH
 (VVDpXPDUHDOLGDGHPXLWRFRPXPQDVQRVVDVHVFRODVS~EOLFDVRQGHJUDQ
GHSDUWHGRVDOXQRVVmRPDQWLGRV³FDWLYRV´jVVXDVFDGHLUDVVDODVHSURIHVVRUDV
SDUDDOFDQoDUHPFRPJUDQGHkQVLDHGHVHMRDIDPLJHUDGDPHUHQGDHVFRODU$OXQRV
LPSDFLHQWHVHVWUHVVDGRVDQVLRVRVSDUDDFRQVXPDomRGRGHVHMRPDQWLGRGHVGH
VXD~OWLPDUHIHLomRDPHUHQGDHVFRODUGRGLDDQWHULRU6mRFRPSXWDGRUHVHFDL[DV
HOHWU{QLFRVTXHHODVTXHUHPRXXPSUDWRGHFRPLGDHPVXDPHVD"
 )UHLUHSHUFHEHHVVDSUREOHPiWLFDVREUHWXGRDSDUWLUGHVHXFRQWDWRFRP
RV(8$TXHVHPSUHFKDPDYDGH³VRFLHGDGHDOWDPHQWHWHFQRORJL]DGD´HSURYD
YHOPHQWH ID]HQGR D OLJDomR FRP D UHDOLGDGH GH H[WUHPD SREUH]D H PLVpULD GD
VRFLHGDGHEUDVLOHLUDDSUHVHQWDGDDFLPD&RPUHODomRjVHVFRODVDVXDVHJXQGD
IDODVHGiQRSHUtRGRHPTXHp6HFUHWiULRGH(GXFDomRGDFLGDGHGH6mR3DXOR
OLGHUDQGR R SURFHVVR GH LQVWDODomR GRV FRPSXWDGRUHV QDV HVFRODV GR PXQLFtSLR
1HVVDpSRFDRHGXFDGRULQVLVWHQDLGpLDGHTXHDVHVFRODVHPVXDJUDQGHPDLR
ULDIRUDPOKHHQWUHJXHVHVWUDJDGDVHPHVWDGRGHSORUiYHOHTXHVHHOHQRWHPSR
GHVHXPDQGDWRFRQVHJXLVVHQRPtQLPRGHL[DUWRGDVDVHVFRODV³HPRUGHP´WHULD
FXPSULGRRVHXSDSHOQD6HFUHWDULD6HQGRDWHQGLGDDVXDSULRULGDGHSDUDDVHV
FRODV DJRUD HOH SRGHULD SHQVDU HP RXWUDV FRLVDV HQWUH HODV QD GHPRFUDWL]DomR
Software livre, cultura hacker e o ecossistema da colaboração • 179

GRDFHVVRDRFRPSXWDGRUGHPRQVWUDQGRPDLVXPDYH]DWDPDQKDFRHUrQFLDTXH
)UHLUHWLQKDGDVXDSUiWLFD³DQWHQDGD´FRPVHXGLVFXUVR
 2HGXFDGRUQmRpFRQWUDRVMDUGLQVDQGDULOKRVDVIRQWHVOXPLQRVDVSDU
TXHVGHGLYHUVmRRXRVWHUPLQDLV(OHDSHQDVQmRDGPLWHTXHHVVDVFRLVDVVHMDP
SULRUL]DGDVDGHVSHLWRGHPLOKDUHVGHSHVVRDVFRPIRPHVHPWHURQGHPRUDUVHP
WUDEDOKRVD~GHRXHGXFDomR(QWHQGHPRVTXHHVVDVFRLVDVFDPLQKDPMXQWDV$
WHFQRORJLDpKRMHIHUUDPHQWDHPHLRSDUDVHOXWDUUHLYLQGLFDUHDWLQJLUDVQHFHVVLGDGHV
EiVLFDVFRQWXGRHVVDSHUVSHFWLYDDLQGDQmRSRGHULDWHUVLGRYLVOXPEUDGDSRU)UHLUH
GHYLGRDRVVHXVFRQGLFLRQDQWHVKLVWyULFRVHjVSUySULDVGLVFXVV}HVWHyULFRSUiWLFDV
QHVVHkPELWR
 &RPUHODomRjQHFHVVLGDGHGHPDQWHUVHHPFRQVRQkQFLDFRPDWHFQRORJLD
GRWHPSRSUHVHQWH)UHLUHpLQVLVWHQWHHPD¿UPDUTXHpXPKRPHP GHKRMH XP
KRPHPGRVHXWHPSR(PPXLWDVGDVVXDVREUDVHOHRD¿UPDFDWHJRULFDPHQWHH
ID]TXHVWmRGHDVVLPVHUFRQVLGHUDGR1mRFRPRDOJXpPTXHQHJDVXDVEDUEDV
H FDEHORV EUDQFRV PDV DOJXpP TXH ID] XP HQpUJLFR HVIRUoR SDUD DFRPSDQKDU
R VHX WHPSR H QmR DSULVLRQDUVH DR SDVVDGR 3URYD GLVVR IRL R XVR GH PRGR
SLRQHLURHPGRSURMHWRU QRYDWHFQRORJLDSDUDDpSRFD HPXPDH[SHULrQFLD
HGXFDWLYD )5(,5(*8,0$5­(6S 6HUXPKRPHPGHVHXWHPSRp
WDPEpPLQFRUSRUDUFULWLFDPHQWHDLQIRUPiWLFDHDVWHFQRORJLDVGDLQIRUPDomRHGD
FRPXQLFDomR

$RFRPSUHHQGHUHUHFXVDUDDOWXUDGRWHPSRHPTXHYRFrVHHQFRQWUD
YRFrVHGHFUHWDXPKRPHPQmRPDLVGHVVHWHPSR$SHVDUGRVPHXV
DQRVPHDFKRKRPHPGHKRMH1DPHGLGDHPTXHHXQmRFRQVLGHUH
RURFNHXWHUPLQRQHJDQGRRID[HRFRPSXWDGRU$tGHVDVWURVDPHQWH
HX SHUFR R WHPSR H UHWURFHGR 9RFr WHP GH HVWDU UHQRYDQGRVH VHP
QHJDURSDVVDGRSRUTXHpHOHTXHWRUQDSRVVtYHODUHQRYDomR9RFr
WHPGHVHWUDQVIRUPDUFRQVWDQWHPHQWHQDWUDQVIRUPDomRGRPXQGRHP
TXHYRFrHVWi)RUDGLVVRQyVQRVSHUGHPRVKLVWRULFDPHQWH )5(,5(
3$66(77,S 

 5HWRPDQGR DV VXDV SUiWLFDV HQTXDQWR JHVWRU S~EOLFR H SHUFHEHQGR D


QHFHVVLGDGHUHDOGHXVRHGRPtQLRVREUHHVVDV³QRYDVWHFQRORJLDV´SDUDDpSRFD
)UHLUHLQVLVWH

(VWRXFRQYHQFLGRGHTXHGHPRVPDLVXPSDVVRQDDGPLQLVWUDomRGD
6HFUHWDULD GH (GXFDomR GD FLGDGH GH 6mR 3DXOR SDUD ¿FDU j DOWXUD
GR QRVVR WHPSR 5H¿URPH DR ODERUDWyULR &HQWUDO GH ,QIRUPiWLFD
(GXFDFLRQDO ± TXH LQDXJXUDPRV HP DJRVWR GHVWH DQR ± H YDL IRUPDU
RVSULPHLURVSURIHVVRUHVTXHDWXDUmRFRPRPRQLWRUHVQDVHVFRODVGDV
180 • Software livre, cultura hacker e o ecossistema da colaboração

FLGDGHVVHOHFLRQDGDVSDUDLQLFLDURSURMHWR*rQHVH1RVVRREMHWLYRDWp
R¿QDOGDJHVWmRpRGHLPSODQWDUFRPSXWDGRUHVHPWRGDVDVHVFRODV
GDUHGHSDUDPHOKRUDURSURFHVVRGHHQVLQRDSUHQGL]DJHP>@$¿QDO
SUHFLVDPRVVXSHUDURDWUDVRFXOWXUDOGR%UDVLOHPUHODomRDR3ULPHLUR
0XQGR )5(,5(7255(6S 

 0HVPRQXQFDWHQGRGLJLWDGRQDPiTXLQDWHUGLULJLGRXPFDUURRXXVDGR
XPFRPSXWDGRU)UHLUHIRLDPLVWRVRTXDQWRDRXVRGHVVHVPHLRVQRFRWLGLDQRGDV
SHVVRDV &RQWXGREHP PDLVTXH VRPHQWHDFRPSDQKDURV DYDQoRVGD FLrQFLDH
WHFQRORJLD XViORV RX GLVFXWLORVSDUD R HGXFDGRU D ³PHOKRU PDQHLUD GH DOJXpP
DVVXPLUVHXWHPSRHDVVXPLUWDPEpPFRPOXFLGH]pHQWHQGHUDKLVWyULDFRPRSRV
VLELOLGDGH´ )5(,5(7255(6S $KLVWyULDQmRpGDGDPDVHODpIHLWDH
UHIHLWDSHORVVHUHVKXPDQRV1mRpLPXWiYHOHLQDWLQJtYHOPDVVXMHLWDDPXGDQoD
(QWHQGHUDFLrQFLDHDWHFQRORJLDQHVVDSHUVSHFWLYDpHQWHQGHUWDPEpPTXHVRPRV
DSUHQGHQWHVHPDLVVRPRVFULDGRUHV&ULDPRVHUHFULDPRVRPXQGRHWXGRRPDLV
TXHKiQRPXQGRLQFOXVLYHDWHFQRORJLD3RULVVRDVVXPLUVHXWHPSRSDUDUHFULDQGR
QHOHWUDQVIRUPDURPXQGRTXHQyVPHVPRVFULDPRV
 3DXOR)UHLUHQDSULPHLUDUHIHUrQFLDDSUHVHQWDGDQRWySLFRHQWHQGHTXHSDUD
WUDQVIRUPDURPXQGRpSUHFLVRHVWDU³HQWUDQKDGR´QHOH$FUHGLWDTXHSRUH[HPSOR
VHSXGHVVHYLYHUSHORPHQRVVHLVPHVHVHP6mR7RPpSRGHULDGDUXPDUHVSRVWD
PDLVH¿FD]DRSRYRSRUTXH³LQFOXLULDDVFRLVDVGHOi´ )5(,5(*8,0$5­(6
S   e FRPSUHHQGHQGR EHP R PXQGR TXH YLYHPRV TXH SRGHPRV PRGL¿FiOR
)UHLUHLQVLVWH

$ TXHVWmR TXH VH FRORFD p FRPR D JHQWH FULD R DPDQKm DWUDYpV GD
WUDQVIRUPDomRGRKRMH(SDUDPLPVyKiXPMHLWRGHWUDQVIRUPDUHVVH
KRMHRXDFXOWXUDpYRFrHQWUDQKDUVHQHODSDUDGHSRLVWrODFRPREMHWR
GHVXDWUDQVIRUPDomR3DUDTXHVXSHUHPRVLVVRWHPRVTXHDVVXPLOD
HDVVXPLUSDUDPLPpXPHVWDGRTXHQHJDQGRDQHJDWLYLGDGHHXDUH
FRQKHoRSDUDSRGHUFULDURXWUDFRLVD )5(,5(3$66(77,S 

 2HGXFDGRUQDOLQKDGDGHPRFUDWL]DomRGRVVDEHUHVIDORXGLYHUVDVYH]HV
HPGHPRFUDWL]DURDFHVVRGRVDOXQRVDRVFRQWH~GRVTXHRVSURIHVVRUHVHVFROKHP
SDUDDDXOD )5(,5(S RXDLQGDHPDSURSULDomRGRFXUUtFXORGRPLQDQWH
SHORV ³DOXQRV VXEDOWHUQRV´ )5(,5( 0$&('2  S   $EDL[R WHPRV XP
GRV SRXFRV PRPHQWRV HP TXH )UHLUH QRV VHXV OLYURV VH UHIHUH GLUHWDPHQWH j
GHPRFUDWL]DomRGRVDEHU
Software livre, cultura hacker e o ecossistema da colaboração • 181

1mR YLHPRV SDUD D 6HFUHWDULD GH (GXFDomR SDUD DVVLVWLU DR ¿P GDV
HVFRODVHGRHQVLQRPDVSDUDHPSXUUiORVSDUDRIXWXUR(VWDPRVSUH
SDUDQGRRWHUFHLURPLOrQLRTXHYDLH[LJLUXPDGLVWkQFLDPHQRUHQWUHR
VDEHUGRVULFRVHRVDEHUGRVSREUHV )5(,5(7255(6S 

 eLPSRUWDQWHSHUFHEHUTXH)UHLUHQmRVHGHWrPWmRVRPHQWHVREUHRVDEHU
GDLQIRUPiWLFDPDVDPSOL¿FDRVDEHUDRIDODUTXHpXPVDEHU³GRVULFRV´0DVTXH
VDEHUpHVVH"([LVWLULDHQWmRXPVDEHUSUySULRGRVULFRVHXPSUySULRGRVSREUHV"
1D YHUGDGH R HGXFDGRU DSRLDQGRVH QD FDWHJRULD PDU[LVWD GH FODVVHV VRFLDLV
DFUHGLWDTXHH[LVWHPFHUWRVVDEHUHVTXHVmRDSURSULDGRVSHODVFODVVHVGRPLQDQWHV
HRXWURVTXHHVWmRVREDSRVVHGRVGRPLQDGRVRSULPLGRV
 1DDWXDOFRQVWLWXLomRGDQRVVDVRFLHGDGHQRVLVWHPDFDSLWDOLVWDVDEHVH
TXHWRGDDSURGXomRGRPHUFDGRpYROWDGDSDUDROXFURRXDLQGDSDUDLQYHVWLPHQWRV
QDJHUDomRGHPDLVOXFURHTXHLVVRDFDEDSRUFULDUXPDELVPRHQWUHRVTXHSRV
VXHP UHQGD H DTXHOHV TXH QmR SRVVXHP 2V GLWRV ULFRV QHVVD SHUVSHFWLYD VmR
RVTXHSRGHPWHUDFHVVRjVPDLVDYDQoDGDVWHFQRORJLDVGHFRPXQLFDomRjVWHF
QRORJLDVGHSRQWDQDiUHDGDPHGLFLQDDRVFRPSXWDGRUHVGH~OWLPDJHUDomRDRV
grandes shows H HYHQWRV FXOWXUDLV )UHLUH HP RXWUDV SDODYUDV LQWHQFLRQD GHPR
FUDWL]DURDFHVVRDWXGRLVVR
 )UHLUH GXUDQWH VXD JHVWmR FRPR 6HFUHWiULR GH (GXFDomR WUDEDOKD QD
SHUVSHFWLYDGHTXHHVVHVVDEHUHVTXHKRMHVmRVy³GRVULFRV´VHMDPWDPEpPGRV
SREUHV TXH HOHV WDPEpP WHQKDP DFHVVR jTXLOR TXH DV FODVVHV DEDVWDGDV WrP
(VWHpPDLVXPPRWLYRSHORTXDORHGXFDGRULQWHQFLRQRXHFRQFUHWL]RXDLQVHUomR
GHFRPSXWDGRUHVQDVHVFRODVIRUPDLQFLSLHQWHGHFRPEDWHjH[FOXVmRGLJLWDO&RP
SXWDGRUHVWHFQRORJLDFRQKHFLPHQWRWRGRVRVVDEHUHV2VDEHUKXPDQRSHUWHQFH
j KXPDQLGDGH VHJXLQGR QD PHVPD OLQKD GR FRQKHFLPHQWR OLYUH GHIHQGLGD SHOD
¿ORVR¿DGRVRIWZDUHOLYUH
 9LVDQGRDGHPRFUDWL]DomRQmRVRPHQWHGRVVDEHUHVPDVWDPEpPGRDFHVVR
DRFRPSXWDGRUjWHFQRORJLDRSURIHVVRU0RDFLU*DGRWWLDPLJRHSHVTXLVDGRUGH
3DXOR)UHLUHID]XPUHODWRGHH[WUHPDUHOHYkQFLDSDUDDWHPiWLFDRUDHPGLVFXVVmR
RTXHYHPVHUPDLVXPDUHIHUrQFLDGLUHWDjTXHVWmRGDLQIRLQFOXVmR

(P  TXDQGR IRL PRVWUDGD D 3DXOR )UHLUH D SiJLQD ZZZ


SDXORIUHLUHRUJ HOH ¿FRX PDUDYLOKDGR FRP DV SRVVLELOLGDGHV GD
,QWHUQHWO site IRLFRQVWUXtGRSDUDR,3) ,QVWLWXWR3DXOR)UHLUH SHOR
VHX QHWR $OH[DQGUH 'RZERU ¿OKR GH )iWLPD )UHLUH 0DUDYLOKDGR H
SUHRFXSDGR DR YHU R$OH[ QDYHJDU FRP WDQWD IDFLOLGDGH SHOD UHGH
REVHUYRX ORJR TXH DV HQRUPHV YDQWDJHQV RIHUHFLGDV SHOD ,QWHUQHW
HVWDYDP UHVWULWDV D SRXFRV H TXH DV QRYDV WHFQRORJLDV DFDEDYDP
FULDQGRXPIRVVRDLQGDPDLRUHQWUHRVPDLVULFRVHRVPDLVSREUHV(
182 • Software livre, cultura hacker e o ecossistema da colaboração

FRQFOXLX³pSUHFLVRSHQVDUFRPRHODVSRGHPFKHJDUDRVH[FOXtGRV´
*$'277,S 

Depois de ver o siteD¿UPDRSURIHVVRU*DGRWWL)UHLUHSHUFHEHXTXHHVVDV


WHFQRORJLDV HVWDYDP UHVWULWDV D SRXFRV H FRQFOXLX TXH HUD SUHFLVR SHQVDU FRPR
ID]HU FKHJDU LVVR DRV H[FOXtGRV ¿FDQGR D VHJXLQWH SHUJXQWD PDV FRPR" &RPR
LQFOXLURVH[FOXtGRVDTXH)UHLUHVHUHIHULD"
 'DTXHOHWHPSRDWpRVGLDVDWXDLVPXLWDFRLVDYHPVHQGRIHLWD0XOWLSOLFDP
VHDVPDLVYDULDGDVH[SHULrQFLDVSURMHWRVGHLQIRLQFOXVmRHPWRGRVRVUHFDQWRVGR
%UDVLO2PXQGRFRPHoDDVHSUHRFXSDUFRPDTXHVWmR$SUySULDFRQIHUrQFLDGH
7~QLVGHGLFRXHVSHFLDODWHQomRDHVVDWHPiWLFD ()( 
 6mRSUHIHLWXUDVH21*VTXHGLVSRQLELOL]DPHVSDoRVFKDPDGRVWHOHFHQWURV
HVSDoRV GH LQIRUPiWLFD HVFRODV GH LQIRUPiWLFD H FLGDGDQLD WRGRV FRP R PHVPR
IRFRYROWDGRSDUDDLQIRLQFOXVmRPDVFRPSURSRVWDVPHWRGROyJLFDVFRQFHSo}HV
SHGDJyJLFDVHFRPSUHHQV}HVGHLQIRLQFOXVmRGLIHUHQWHV
 1DPHVPDOLQKDHVWmRRVJRYHUQRVHOHWU{QLFRVHRVSURMHWRVJRYHUQDPHQWDLV
TXH WrP GLVSRQLELOL]DGR DFHVVR GD SRSXODomR DRV FRPSXWDGRUHV j LQWHUQHW D
VHUYLoRV GH DMXGD DR FLGDGmR GH GHQ~QFLD GH DFRPSDQKDPHQWR GDV Do}HV GRV
JRYHUQDQWHVGDVFRQWDVS~EOLFDVHQWUHRXWUDV
 3RU¿PSRGHPRVGL]HUTXH3DXOR)UHLUHpUHDOPHQWHXPKRPHPGHVHX
WHPSR0DLVTXHXVDUDSDUDWRVWHFQROyJLFRVpSUHFLVRHVWDUFRQVFLHQWHGDVUHOD
o}HVTXHVHGmR³SRUWUiV´GDWHFQRORJLD1mRKiXVRQHXWURGDWHFQRORJLDWRGRXVR
pLQWHQFLRQDOHSRUWDQWRSROtWLFR2FDPSRGDWHFQRORJLDDWXDOPHQWHpXPIHFXQGR
FDPSRGHEDWDOKDHGHGLVSXWDVHQWUHIRUoDVDQWDJ{QLFDVH)UHLUHFRQVHJXLXSHU
FHEHULVVR
 $SHVDUGHQmRKDYHULQWHQVDVGLVFXVV}HVQDpSRFDGH)UHLUHFRPRKRMH
DFRQWHFHWRPDQGRDLQIRLQFOXVmRSRUREMHWRRHGXFDGRUVHDQWHFLSDDRVHXWHPSR
HSUHYrRSRUYLU/DQoRXFRPRSXGHPRVFRQVWDWDUFRPHVWHWH[WRRDOHUWDSDUDTXH
QmRHVTXHoDPRVGRVDFLDPHQWRGDVQHFHVVLGDGHVEiVLFDVTXHLQYLDELOL]DULDPWRGR
HTXDOTXHUSURFHVVRSURMHWRGHLQIRLQFOXVmRWUDWRXGDQHFHVVLGDGHGHTXHKRPHP
HPXOKHUHVWHMDPjDOWXUDGRVHXWHPSRGDXUJrQFLDGHVHGHPRFUDWL]DURVDEHU
GRVULFRVFRPRGLVVH3DXOR)UHLUHHHQ¿PGDQHFHVVLGDGHGHSHQVDUPRVFRPR
SXEOLFL]DUHVVHVFRQKHFLPHQWRV
 3DXOR )UHLUH WHP PXLWR PDLV D FRQWULEXLU SDUD RV SURFHVVRVSURMHWRVH[
SHULrQFLDVGHLQIRLQFOXVmRGDDWXDOLGDGH(VWHWH[WRpVRPHQWHXPDSHTXHQDDPRVWUD
GDVVLJQL¿FDWLYDVFRQWULEXLo}HVTXHRHGXFDGRUWHPDGDUDHVVHPRYLPHQWR(P
)UHLUH SRGHPRV DSURIXQGDU D TXHVWmR GD JHVWmR GHPRFUiWLFD GH WHOHFHQWURV e
7HOHFHQWURpXPHVSDoRS~EOLFRRQGHSHVVRDVSRGHPXWLOL]DUFRPSXWDGRUHVD,QWHUQHWHRXWUDVWHFQRORJLDVGLJLWDLV
Software livre, cultura hacker e o ecossistema da colaboração • 183

HVFRODV GH LQIRUPiWLFD UHÀHWLU DFHUFD GR GLiORJR H GD WUDQVIRUPDomR GR PXQGR
XVDQGRDLQIRUPiWLFDFRPRIHUUDPHQWDDSURIXQGDUDTXHVWmRGDQDWXUH]DIXQomR
HPLVVmRGRHGXFDGRUSURIHVVRURXPRQLWRUTXHPLQLVWUDRVFXUVRVGHIRUPDomR
DSURIXQGDU QD GLUHomR GH UHFRQKHFHU TXDO R FRQWH[WR GD H[SHULrQFLD H TXHP p
HVVHHGXFDQGRRXDOXQRHQ¿PHVWXGDUDVGLYHUVDVFRQWULEXLo}HVGH)UHLUHSDUD
DTXHVWmRGDDOIDEHWL]DomRHSRUH[WHQVmRSDUDDTXHVWmRGDDOIDEHWL]DomRWHF
QROyJLFD HQWHQGHU TXDO D UD]mR GH VHU GDV QRVVDV SUiWLFDV H RV ¿QV GH QRVVDV
H[SHULrQFLDVGHLQIRLQFOXVmR
 eLPSRUWDQWHSHUFHEHUTXHGHVGH)UHLUHMiVHSUHRFXSDFRPHVVD
TXHVWmRPHVPRTXHQmRXVDVVHHVVHWHUPR(VVDSUHRFXSDomRSHUVLVWHDWpRVHX
~OWLPROLYURDPedagogia da Autonomia&RQFOXLQGRHOHD¿UPD

1mR WHQKR G~YLGD QHQKXPD GR HQRUPH SRWHQFLDO GH HVWtPXORV H


GHVD¿RV jFXULRVLGDGH TXHDWHFQRORJLD S}HDVHUYLoR GDVFULDQoDV H
GRVDGROHVFHQWHV GDVFODVVHV VRFLDLV FKDPDGDV IDYRUHFLGDV 1mRIRL
SRU RXWUD UD]mR TXH HQTXDQWR VHFUHWiULR GH HGXFDomR GD FLGDGH GH
6mR 3DXOR ¿] FKHJDU j UHGH GDV HVFRODV PXQLFLSDLV R FRPSXWDGRU
1LQJXpPPHOKRUGRTXHPHXVQHWRVHPLQKDVQHWDVSDUDPHIDODUGH
VXDFXULRVLGDGHLQVWLJDGDSHORVFRPSXWDGRUHVFRPRVTXDLVFRQYLYHP
)5(,5(S 

 3DXOR)UHLUHGHXGLYHUVDVFRQWULEXLo}HVjVUHÀH[}HVGRVHGXFDGRUHV¿OyVR
IRVHWpFQLFRVGHVXDpSRFDGHVXDJHUDomRHFRQWLQXDDGDUWDPEpPjQRVVD2V
WHPSRV VmRRXWURV DV WHFQRORJLDV PXGDUDP IRUDP DSHUIHLoRDGDV HIRLDPSOLDGR
RVHXXVRGHPRGRHVSDQWRVR6mRUDURVRVTXHHVFDSDPGRVFRPSXWDGRUHV2
HGXFDGRUFRQWXGRSUHFLVDVHUUHLQYHQWDGRIRLRTXHHOHPHVPRSHGLXTXHQmRR
UHSHWLVVHP (VWH WUDEDOKR YHP QHVVH VHQWLGR EHEHU QDV LQYHQo}HV GR HGXFDGRU
SDUDSHQVDUSDUDDOpPGH)UHLUHSHQVDURKRMHUHÀHWLURVQRVVRVGHVD¿RVSURSRU
QRYRVFDPLQKRV

&RQVLGHUDo}HV¿QDLV3DXOR)UHLUHHRPRYLPHQWRGRVRIWZDUH
livre

 ÈOYDUR9LHLUD3LQWRH3DXOR)UHLUHWrPPXLWDVFRQWULEXLo}HVDGDUDRHVWDGR
GDDUWHGDWHFQRORJLD'LVFXVV}HVVmRUHD¿UPDGDVRXWUDVUHIXWDGDVSRUDXWRUHVGD
UHOHYkQFLDGRVUHIHUHQFLDGRVQHVWHWH[WR6HMDFRQFRUGDQGRRXGLVFRUGDQGRGHVWHV

TXHSHUPLWHPDHODVFROHWDULQIRUPDo}HVFULDUDSUHQGHUHFRPXQLFDUVHFRPRXWUDVSHVVRDVHQTXDQWRGHVHQYROYHP
KDELOLGDGHVGLJLWDLVHVVHQFLDLVGRVpFXOR'LVSRQtYHOHPKWWSSWZLNLSHGLDRUJZLNL7HOHFHQWUR$FHVVRHPMXO

184 • Software livre, cultura hacker e o ecossistema da colaboração

DXWRUHVpFHUWRGL]HUTXHHOHVWUD]HPFRQWULEXLo}HVtPSDUHVDHVVDiUHDVREUHWXGR
QDpSRFDHPTXHLQLFLDUDPDVVXDVUHÀH[}HV2SUySULR3DXOR)UHLUHIRLSLRQHLURQR
XVRGHWHFQRORJLDVGHLQIRUPDomRHFRPXQLFDomRQDHGXFDomR
 &RPRMiD¿UPDRWtWXORGHVWDVFRQVLGHUDo}HV¿QDLVJRVWDUtDPRVGHFRQFOXLU
HVWH WH[WR DSRQWDQGR TXDLV VmR DV SRVVtYHLV ³LQWHUIDFHV´ HQWUH R HGXFDGRU 3DXOR
)UHLUHHR0RYLPHQWRGR6RIWZDUH/LYUH'HDQWHPmRSRGHPRVGL]HUTXHDVLQWHUIDFHV
VmRPXLWDV+iLQWHUIDFHVTXDQGR)UHLUHIDODHPGLiORJRDXWRQRPLDUHVSHLWRDRV
VDEHUHVGRVHGXFDQGRVHVSHUDQoDGHVFRORQL]DomRGDPHQWHWUDQVIRUPDomRVR
FLDOFRQVFLHQWL]DomRHQWUHRXWUDV1HVWHWH[WRFRQWXGRQmRVHUiSRVVtYHOWUDoDU
DVUHODo}HVHQWUHDVFDWHJRULDVLGHQWL¿FDGDVQDREUDGH3DXOR)UHLUH2EMHWLYDPRV
DRPHQRVWUDoDUDVUHODo}HVHQWUH)UHLUHHR0RYLPHQWRGR6RIWZDUH/LYUHHPGXDV
FDWHJRULDVGLiORJRHUHVSHLWRDRVVDEHUHVGRVHGXFDQGRV
 3DUD)UHLUH³RGLiORJRpRHQFRQWURDPRURVRGRVKRPHQVTXHPHGLDWL]DGRV
SHORPXQGRRµSURQXQFLDP¶LVWRpRWUDQVIRUPDPHWUDQVIRUPDQGRRRKXPDQL]DP
SDUDDKXPDQL]DomRGHWRGRV>@6HUGLDOyJLFRpQmRLQYDGLUpQmRPDQLSXODUpQmR
VORJDQL]DU6HUGLDOyJLFRpHPSHQKDUVHQDWUDQVIRUPDomRFRQVWDQWHGDUHDOLGDGH´
)5(,5(S 
 2 PRYLPHQWR GR VRIWZDUH OLYUH FULRX VHXV HVSDoRV GH GLiORJR 0DV QmR
HVWDPRV IDODQGR DTXL GH TXDOTXHU GLiORJR QHP PXLWR PHQRV R GLiORJR SHOR GLi
ORJR+iXPD¿QDOLGDGHQHVVHGLiORJRTXHFRPR)UHLUHEHPRD¿UPRXpDWUDQV
IRUPDomR GD UHDOLGDGH TXH HVWi SRVWD 4XDQGR D FRPXQLGDGH FULD IHUUDPHQWDV
FRPRIyUXQVFKDWVOLVWDVGHGLVFXVVmRHQWUHRXWURVHVSDoRVHVWiTXHUHQGRVLP
H[SOLFLWDUTXHSHORFDPLQKRGRGLiORJRGDWURFDGDSDUWLOKDSRGHPRVPXGDUDVL
WXDomRHPTXHYLYHPRV'LDORJDUSDUDTXHPDLVSHVVRDVFRPSUHHQGDPDOXWDGR
PRYLPHQWRGRVRIWZDUHOLYUHGLDORJDUSDUDTXHRVTXHHVWmRWHQGRGL¿FXOGDGHVDV
VXSHUHPGLDORJDUSDUDHQFRQWUDUVROXo}HVSDUDSUREOHPDVGRFRWLGLDQRHDTXHOHV
LQHVSHUDGRVGLDORJDUSDUDGDUHOHPHQWRVSDUDXPSURFHVVRGHFRQVFLHQWL]DomRGD
OXWDTXHpWUDYDGDQHVWHFDPSR0XLWRVVmRRVGLiORJRVHPXLWRVVmRRVPHLRVTXH
DFRPXQLGDGHHQFRQWURXSDUDID]rORHQWUHHOHVQRVGHWHUHPRVDRIyUXPREDWH
SDSR FKDW DOLVWDGHGLVFXVVmRHREORJ
 2IyUXPpRHVSDoRSULYLOHJLDGRGHGLiORJRGDFRPXQLGDGH(VSDoRSDUD
R GLiORJR OLYUH VHP TXDOTXHU WLSR GH SUHFRQFHLWR GH UDoD FRU HWQLD 8P HVSDoR
PXOWLFXOWXUDOHPTXHSHVVRDVGRPXQGRLQWHLURLQWHUDJHPHPXPDJUDQGHFLUDQGD
SODQHWiULD GH FRODERUDomR $OpP GR IyUXP RXWURV HVSDoRV GH GLiORJR OLYUH VmR
DV VDODV GH EDWHSDSR HQFRQWURV UHDOL]DGRV FRP IUHTrQFLD WUDWDQGR GDV PDLV
GLYHUVDVWHPiWLFDVUHIHUHQWHVDRVRIWZDUHOLYUH+iVDODVFRPSHVVRDVGLVSRQtYHLV
$VOXWDVVRFLDLVSRSXODUHVVmRWUDYDGDVHPYiULRVFDPSRVGDH[LVWrQFLDKXPDQD$WHFQRORJLDFRPRSDUWHGHVWD
H[LVWrQFLDQmRSRGHULDHVWDUIRUDGHVWDVGLVSXWDV1RFDPSRGRVRIWZDUHSRGHPRVQRVUHIHULUDRLQWHQVRHQIUHQWDPHQWR
GRVRIWZDUHSURSULHWiULRSHORVRIWZDUHOLYUHTXHWUD]HPVHXERMRXPDRXWUDIRUPDGHSHQVDURFRPSDUWLOKDPHQWRGR
VDEHUGDVSURGXo}HVKXPDQDVSRUH[HPSOR
Software livre, cultura hacker e o ecossistema da colaboração • 185

SDUDSUHVWDUVXSRUWHDTXDOTXHUXVXiULRTXHQHFHVVLWHGHDMXGDVHMDHOHTXHPIRU
$V OLVWDV GH GLVFXVVmR VmR XP HVSDoR LQWHQVR GH WURFD GH H[SHULrQFLDV GH DMX
GDP~WXDHPTXHRJUXSRDSUHVHQWDTXHVW}HVHVROXo}HVSDUDRVPDLVGLYHUVRV
SUREOHPDVHSRU¿PRVEORJVTXHFKHJDPHPPXLWRVFDVRVDVHUHPYHUGDGHLURV
FHQWURVGHLQIRUPDomRHGHGHPRFUDWL]DomRGRVDEHUFRPHVSHFLDOPHQomRDTXL
jTXHOHV EORJV GHGLFDGRV D HVFULWD SRVWDJHP  GH VROXo}HV LGHQWL¿FDGDV QR VHX
FRWLGLDQRGHXVRGRVRIWZDUHOLYUHHQRVWXWRUDLVPXLWDVYH]HVSURGX]LGRVSRUHVWHV
JUXSRV
 2UHVSHLWRDRVVDEHUHVGRVHGXFDQGRVpXPGRVSUHVVXSRVWRVGHIHQ
GLGRVSRU3DXOR)UHLUHSDUDXPD3HGDJRJLDGD$XWRQRPLD)UHLUHGHIHQGH

3RUTXHQmRDSURYHLWDUDH[SHULrQFLDTXHWrPRVDOXQRVGHYLYHU
HP iUHDV GD FLGDGH GHVFXLGDGDV SHOR SRGHU S~EOLFR SDUD GLV
FXWLUSRUH[HPSORDSROXLomRGRVULDFKRVHGRVFyUUHJRVHRV
EDL[RVQtYHLVGHEHPHVWDUGDVSRSXODo}HVRVOL[}HVHRVULVFRV
TXHRIHUHFHPjVD~GHGDVJHQWHV>@3RUTXHQmRHVWDEHOHFHU
XPDQHFHVViULD³LQWLPLGDGH´HQWUHRVVDEHUHVFXUULFXODUHVIXQ
GDPHQWDLVDRVDOXQRVHDH[SHULrQFLDVRFLDOTXHHOHVWrPFRPR
LQGLYtGXRV" )5(,5(S 

2 VRIWZDUH OLYUH GHYLGR WHU R VHX FyGLJRIRQWH GLVSRQLELOL]DGR SHUPLWH


D VXD PRGL¿FDomR SRGHQGR VHU PRGHODGR SDUD DGDSWDUVH D TXDOTXHU FRQWH[WR
D TXDOTXHU JUXSR VRFLDO D XPD HVFROD D XP JUXSR GH SURIHVVRUHV D XP JUXSR
GHHGXFDQGRVSRGHQGRDWpPHVPRVHUcustomizadoSRUHFRPHVWHVJUXSRV2V
HGXFDQGRVSRVVXHP VDEHUHV HFRQWULEXLo}HV TXH SRGHP VHU XWLOL]DGDV QD FXVWR
PL]DomRGHVRIWZDUHVOLYUHV(OHVPHVPRFRPDGHYLGRIRUPDomRSRGHUmRID]HU
HVVDV DOWHUDo}HV $ FDGD GLD TXH SDVVD D SURJUDPDomR HVWi WRUQDQGRVH PDLV
DFHVVtYHOYLDVRIWZDUHVTXHQRVSURSRUFLRQDPIRUPDVGHLQWHUDomRFRPRFyGLJR
FRPDOLQJXDJHPGHSURJUDPDomR
 2VRIWZDUHOLYUHpFRQVRQDQWHFRPD3HGDJRJLDGD$XWRQRPLDTXDQGRSRV
VLELOLWDTXHTXDOTXHULQGLYtGXRFRPFRQKHFLPHQWRQDOLQJXDJHPGHSURJUDPDomR
HPTXHRVRIWZDUHIRLFULDGRUHDOL]HDOWHUDo}HVPHOKRUDPHQWRVHDLQGDUHGLVWULEXD
DTXHPTXHUTXHVHMD2VVRIWZDUHVSURSULHWiULRVDRFRQWUiULRYrPIRUPDWDGRVSDUD
DWHQGHUXPD³FOLHQWHOD´HVSHFt¿FD(VWHVVySRGHULDPVHUDOWHUDGRVVHDHPSUHVD
OLEHUDVVHRFyGLJRIRQWHTXHFHUWDPHQWHQmRVHULDRFDVRRXVHRV³FOLHQWHV´SD
JDVVHPSHODFXVWRPL]DomRTXHGHVHMDPSDUDDWHQGHUDVXDGHPDQGDHVSHFt¿FD
6RPHQWH FRP R DWHQGLPHQWR GHVVD GHPDQGD RV HGXFDQGRV SRGHULDP YLU D VHU
UHVSHLWDGRV HP VXD GLYHUVLGDGH FXOWXUDO WHUHP LQFRUSRUDGRV RV FRQKHFLPHQWRV
SUpYLRVTXHSRVVXHPHPD[LPL]DGDDVXDFXULRVLGDGH2VRIWZDUHOLYUHSHUPLWHQRV
OLYUHPHQWHUHDOL]DUHVVDVDOWHUDo}HVWRUQDQGRHVWHVVRIWZDUHVPDLV³IUHLULDQRV´
186 • Software livre, cultura hacker e o ecossistema da colaboração

5HIHUrQFLDV

)5(,5(3DXOR%(772)UHL(VVDHVFRODFKDPDGDYLGD6mR3DXORÈWLFD

)5(,5(3DXOR)$81'(=$QWRQLR3RU XPD SHGDJRJLDGD SHUJXQWD5LR GH -DQHLUR 3D]H7HUUD




)5(,5( 3DXOR *$'277, 0RDFLU *8,0$5­(6 6pUJLR Pedagogia: GLiORJR H FRQÀLWR 6mR 3DXOR
&RUWH]

)5(,5(3DXOR*8,0$5­(66pUJLR$ÈIULFDHQVLQDQGRDJHQWH5LRGH-DQHLUR3D]H7HUUD

)5(,5( 3DXOR *8,0$5­(6 6pUJLR $SUHQGHQGR FRP D SUySULD KLVWyULD 5LR GH -DQHLUR 3D] H
7HUUDSY

)5(,5(3DXOR*8,0$5­(66pUJLR$SUHQGHQGRFRPDSUySULDKLVWyULD6mR3DXOR3D]H7HUUD
Y

)5(,5(3DXOR*8,0$5­(66pUJLR6REUHHGXFDomR 'LiORJRV .5LRGH-DQHLUR3D]H7HUUD


SY

)5(,5(3DXOR*8,0$5­(66pUJLR6REUHHGXFDomR 'LiORJRV 5LRGH-DQHLUR3D]H7HUUD


SY

)5(,5( 3DXOR +25721 0\OHV 2 FDPLQKR VH ID] FDPLQKDQGR FRQYHUVDV VREUH HGXFDomR H
PXGDQoDVRFLDO.3HWUySROLV9R]HV

)5(,5(3DXOR0$&('2'RQDOGR$OIDEHWL]DomROHLWXUDGRPXQGROHLWXUDGDSDODYUD. 5LRGH-DQHLUR
3D]H7HUUD

)5(,5(3DXOR3$66(77,(GVRQ&RQYHUVDomR/LEHUWiULDFRP3DXOR)UHLUH6mR3DXOR,PDJLQiULR


)5(,5( 3DXOR 6+25 ,UD 0HGR H 2XVDGLD R FRWLGLDQR GR SURIHVVRU 5LR GH -DQHLUR 3D] H7HUUD


)5(,5(3DXOR7255(6&DUORV$OEHUWR(GXFDomRQD&LGDGH6mR3DXOR&RUWH]

)5(,5(3DXOR$LPSRUWkQFLDGRDWRGHOHU HPWUrVDUWLJRVTXHVHFRPSOHWDP 3UHIiFLRGH$QWRQLR


-RDTXLP6HYHULQR6mR3DXOR&RUWH]$XWRUHV$VVRFLDGRVS

)5(,5(3DXOR$PiTXLQDHVWiDVHUYLoRGHTXHP"5HYLVWD%,76>6O@SPDL

)5(,5(3DXOR¬VRPEUDGHVWDPDQJXHLUD6mR3DXOR2OKRG¶iJXDS

)5(,5( 3DXOR $omR FXOWXUDO SDUD D OLEHUGDGH H RXWURV HVFULWRV. 7UDGXomR GH &ODXGLD 6FKLOOLQJ
%XHQRV$LUHV7LHUUD1XHYDS

)5(,5(3DXOR&DUWDVD&ULVWLQD5LRGH-DQHLUR3D]H7HUUD

)5(,5(3DXOR&DUWDVD*XLQp%LVVDXUHJLVWURVGHXPDH[SHULrQFLDHPSURFHVVR5LRGH-DQHLUR3D]
H7HUUDS

)5(,5(3DXOR&RQVFLHQWL]DomRWHRULDHSUiWLFDGDOLEHUWDomRXPDLQWURGXomRDRSHQVDPHQWRGH
3DXOR)UHLUH6mR3DXOR&RUWH] 0RUDHVS

)5(,5(3DXOR(GXFDomRFRPRSUiWLFDGDOLEHUGDGH5LRGH-DQHLUR3D]H7HUUDS

)5(,5( 3DXOR (GXFDomR H DWXDOLGDGH EUDVLOHLUD  HG 6mR 3DXOR ,QVWLWXWR 3DXOR )UHLUH&RUWH]


)5(,5(3DXOR(GXFDomRH0XGDQoD5LRGH-DQHLUR3D]H7HUUD
Software livre, cultura hacker e o ecossistema da colaboração • 187

)5(,5(3DXOR([WHQVmRRXFRPXQLFDomR"5LRGH-DQHLUR3D]H7HUUDS

)5(,5(3DXORPedagogia da Autonomia:6DEHUHVQHFHVViULRVjSUiWLFDHGXFDWLYD6mR3DXOR3D]
H7HUUD

)5(,5(3DXOR3HGDJRJLDGD(VSHUDQoDXPUHHQFRQWURFRPDSHGDJRJLDGRRSULPLGR5LRGH-DQHLUR
3D]H7HUUDS

)5(,5(3DXOR3HGDJRJLDGD,QGLJQDomRFDUWDVSHGDJyJLFDVHRXWURVHVFULWRV6mR3DXOR81(63


)5(,5(3DXOR3HGDJRJLDGR2SULPLGR3UHIiFLRGH(UQDQL0DULD)LRUL5LRGH-DQHLUR3D]H7HUUD
S

)5(,5(3DXOR3ROtWLFDH(GXFDomRHQVDLRV6mR3DXOR&RUWH]DS

)5(,5(3DXOR3URIHVVRUDVLPWLDQmRFDUWDVDTXHPRXVDHQVLQDU6mR3DXOR2OKRG¶iJXDE
S

9,(,5$3,172ÈOYDURO conceito de tecnologia5LRGH-DQHLUR&RQWUDSRQWR"Y

9,(,5$3,172ÈOYDUR. O conceito de tecnologia. 5LRGH-DQHLUR&RQWUDSRQWR"Y.


188 • Software livre, cultura hacker e o ecossistema da colaboração
Software livre, cultura hacker e o ecossistema da colaboração • 189

Mobilização colaborativa,
cultura hacker e a teoria da
propriedade imaterial
Sergio Amadeu da Silveira

Uma breve introdução à questão da propriedade e da liberdade

Este texto é um recorte da tese de doutorado que defendi em 2005. Ele visa
trazer os principais pontos lá abordados sobre o problema da formulação de uma
teoria política da propriedade de bens imateriais no contexto de uma sociedade
informacional e em rede. O objeto de análise é a mobilização técnico-social para o
desenvolvimento e uso de software aberto e não-proprietário, conhecido como mo-
YLPHQWRGHVRIWZDUHOLYUHVHXHPEDWHFRPRVEHQH¿FLiULRVGRPRGHORKHJHP{QLFR
de propriedade de software. A unidade de análise foi a rede de comunidades de
VRIWZDUHOLYUHHDEHUWR)RUDPUHFROKLGRVRVVHXVDUJXPHQWRVREVHUYDGDVXDDomR
RUJDQL]DomRHSULQFLSDOPHQWHVHXPRGHORGHSURSULHGDGHGHEHQVQmRPDWHULDLV
 3DUDLQYHVWLJDUFRPPDLVSURIXQGLGDGHDVDo}HVHREMHWLYRVGDUHGHGHVVH
movimento técnico-político, o foco foi colocado na comunidade Debian, que desen-
volve e distribui uma versão do sistema operacional GNU/Linux. Essa opção deu-se
DSyVXPLQWHQVRUDVWUHDPHQWRGRVJUXSRVHFRPXQLGDGHVGHFRODERUDomRVHMDP
de desenvolvimento ou de debates. Para entender bem o modelo colaborativo e
OLYUHGHGHVHQYROYLPHQWRGHVRIWZDUHVFRPREHPLQWDQJtYHOWtSLFRIRLQHFHVViULR
UHFRQVWUXLUDWUDMHWyULDKLVWyULFDGRGHVHQYROYLPHQWRGDVWHFQRORJLDVGDLQIRUPDomR
H REVHUYDU D FRQVWUXomR GR PRGHOR KHJHP{QLFR GH SURSULHGDGH GH VRIWZDUH
EDVHDGRQRVSULQFtSLRVGRVEHQVWDQJtYHLV
A pesquisa partiu de duas hipóteses que nasceram da teoria liberal de
propriedade. Essas hipóteses foram lançadas no terreno das evidências empíricas
HSHUPLWLUDPFRQFHQWUDUDVEXVFDVHDSXUDURVROKDUHVD¿PGHFRQ¿UPiODVDOWHUi
190 • Software livre, cultura hacker e o ecossistema da colaboração

ODVRXGHVFDUWiODVSDUFLDORXLQWHJUDOPHQWH$GHVFULomRDGRWDGDYLVDVXVWHQWDUD
DERUGDJHP WHyULFD UHDOL]DGD RX VHMD R REMHWLYR GR PpWRGR IRL VXVWHQWDU D WHRULD
sobre evidências empiricamente observáveis nos seus contextos históricos.
 $ KLSyWHVH SULQFLSDO IRL FRQVWUXtGD D SDUWLU GD D¿UPDomR PXLWR FDUD jV
LQ~PHUDVFRUUHQWHVGDWHRULDOLEHUDOGHTXHDOLEHUGDGHHDLJXDOGDGHSDUWLFLSDPGH
XPFRQÀLWRLUUHFRQFLOLiYHO1RFHQWURGHVVDTXHVWmRHVWiDSURSULHGDGHVXDMXVWL
¿FDomR H GLVWULEXLomR$ LGHLD GH SURSULHGDGH UHPHWHQRV j LGHLD GH EHQV VHMDP
PDWHULDLVRXLPDWHULDLV$LJXDOGDGHDSHQDVFRPRFRQGLomRGHXPLQGLYtGXRSRVVXLU
GLUHLWRVLJXDLVpKiPXLWRWHPSRSDUWLOKDGDSHODVFRUUHQWHVOLEHUDLV2FRQFHLWRGH
LJXDOGDGHDTXLWUDWDGRpVXEVWDQWLYRHGL]UHVSHLWRjHTXLGDGHGLDQWHGDSURSULHGDGH
GHEHQV2¿OyVRIRLQJOrV-RKQ/RFNHDWULEXtDDRWHUPR³SURSULHGDGH´DLGHLDJHQpULFD
GHSRVVHVREUHDYLGDDOLEHUGDGHHRVEHQV7RGDYLDDLJXDOGDGHHPUHODomRDRV
EHQVWHPVLGRKLVWRULFDPHQWHFRQVLGHUDGDDQWDJ{QLFDjGHIHVDGDOLEHUGDGHVRFLDO
 +D\HNXPGRVSULQFLSDLVFUtWLFRVGDLGHLDGHLJXDOGDGHFRQVLGHUDYDTXHD
fé na justiça social, ou na distribuição equitativa da propriedade dos bens, conduziria
a sociedade a um sistema totalitário. A primeira hipótese desta tese nasceu do
HQIRTXHKD\HNLDQRXPDFUtWLFDOLEHUDOSURIXQGDjLGHLDGDMXVWLoDGLVWULEXWLYD$YLVmR
KD\HNLDQDDGYRJDRDQWDJRQLVPRHQWUHDGHIHVDGDSURSULHGDGH±HQWHQGLGDFRPR
GHIHVDGDOLEHUGDGH±HDGHIHVDGDLJXDOGDGH±HQWHQGLGDFRPRDGLVWULEXLomRMXVWD
de bens.
Assim, a pesquisa partiu da hipótese de que a contraposição entre liberdade
HLJXDOGDGHSRGHVHUVXSHUDGDQRFHQiULRLPDWHULDOGRPLQDGRSRUXPDHFRQRPLDGR
LQWDQJtYHO'DLVREUHVVDLDVHJXQGDKLSyWHVHDRGLVVROYHUVHHVVDFRQWUDSRVLomR
WDPEpP SHUGHULD VHQWLGR R HQTXDGUDPHQWR SROtWLFR HUJXLGR KLVWRULFDPHQWH HP
torno da propriedade material, tornando completamente pálida a força explicativa
da divisão política entre esquerda e direita.
A terceira hipótese pode ser considerada uma rota de explicação das
GXDV SULPHLUDV SRLV DV FDUDFWHUtVWLFDV HFRQ{PLFDV LQHUHQWHV DRV EHQV LPDWHULDLV
e a natureza das redes informacionais destroçaram os fundamentos da teoria
KHJHP{QLFDGDSURSULHGDGHH[LJLQGRVXDVXSHUDomR
 2DUJXPHQWRFHQWUDOTXHOHJLWLPDDSURSULHGDGHGHEHQVLQWDQJtYHLVQDVR
ciedade em rede foi construído sobre a ideia de que somente o modelo de software
SURSULHWiULR SRGH JHUDU GHVHQYROYLPHQWR FULDWLYLGDGH H LQRYDomR 7RGDYLD WDLV
DVVHUWLYDVQmRWrPIXQGDPHQWRHPStULFR2HVWtPXORGDSURSULHGDGHSRGHWHUJHUD
GR LQRYDomR PDV R PRGHOR FRPSDUWLOKDGR WHP JHUDGR FULDo}HV H LQRYDo}HV GH
impacto colossal. Nesse sentido, o desenvolvimento compartilhado de bens intan-
JtYHLVREULJDQRVDUHYHUDWHRULDGDSURSULHGDGHFRQVROLGDGDQRPXQGRLQGXVWULDO
A propriedade das ideias é distinta da propriedade das coisas. A natureza
Software livre, cultura hacker e o ecossistema da colaboração • 191

da rede e dos bens não-escassos nos conduz a discutir os objetivos da autoria e


da propriedade nesse cenário informacional. É preciso compreender que a teoria
GD SURSULHGDGH DWp HQWmR HUJXHXVH VREUH D SDLVDJHP GD HVFDVVH] H GR KRPR
HFRQRPLFXV PROGDGR SHOR GRXWULQD OLEHUDO $ LQWHOLJrQFLD GLVWULEXtGD H R KRPHP
FULDGRU H HP EXVFD GR UHFRQKHFLPHQWR UHFRQ¿JXUDP WRWDOPHQWH QRVVD IRUPD GH
pensar a propriedade das ideias em uma sociedade em rede.
 $DQiOLVHGRPRYLPHQWRGHFRPSDUWLOKDPHQWRWHFQROyJLFRUHDOL]DGDSDUD
DFRQ¿UPDomRGDVKLSyWHVHVSHUPLWLXREVHUYDUTXHDVFRPXQLGDGHVGHVRIWZDUH
OLYUH VmR HPEUL}HV GH QRYDV UHODo}HV GH SURSULHGDGH TXH VH PDQLIHVWDP QD
HPHUJrQFLD GH XPD QRYD HVIHUD S~EOLFD D HVIHUD S~EOLFD LQLFLDOPHQWH KDFNHU
7DPEpPpSRVVtYHOQRWDUTXHQDVRFLHGDGHHPUHGHDWUDQVSDUrQFLDGRVFyGLJRV
SURWRFRORV H VRIWZDUHV p XPD H[LJrQFLD IXQGDPHQWDO SDUD TXH R FLEHUHVSDoR
possa ser considerado uma esfera pública, a partir da perspectiva habermasiana.
8PGRVH[HPSORVPDLVFDWHJyULFRVGDWUDQVSDUrQFLDGRVFyGLJRVTXHYLDELOL]DR
GHVHQYROYLPHQWR FRODERUDWLYR H D JLIW HFRQRP\ p R GD FRPXQLGDGH 'HELDQ 3RU
isso, a comunidade e sua ação são analisadas, permitindo vislumbrar a partir delas
R PRYLPHQWR JHUDO GDV FRPXQLGDGHV GH VRIWZDUH OLYUH TXH VH FKRFDP QD SUiWLFD
FRQWUDRPRGHORGHSURSULHGDGHKHJHP{QLFR
Conclui-se que o movimento de colaboração sócio-técnica do software livre
FRQVWUXLXGHQWURGDHFRQRPLDFDSLWDOLVWDEROV}HVGH³HFRQRPLDGDGRDomR´TXHVH
FKRFDPFRQWUDRSDUDGLJPDWUDGLFLRQDOGDSURSULHGDGHVHQGROHYDGRVDXPQRYR
tipo de politização. A nova política de reivindicar e praticar a liberdade de continuar
FULDQGRHFRPSDUWLOKDQGRRVFyGLJRVFRQWUDRVDWDTXHVGRVUHSUHVHQWDQWHVGRPR
GHORSURSULHWiULRQmRVHUHVXPHjHVTXHUGDHUHFRQ¿JXUDRWHUUHQRSROtWLFRODQoDQ
GRXQLGDGHVHQWUHOLEHUDLVHVRFLDOLVWDV6XSHUDDGH¿QLomRHVTXHUGDGLUHLWDHUHD
UUDQMDRFHQiULRSROtWLFRH[DWDPHQWHSHORIDWRGHRVEHQVLQWDQJtYHLVVHUHPQmR
HVFDVVRVHSRVVLELOLWDUHPDJUHJDUPDLVYDORUDXPVRIWZDUHDEHUWRTXDQWRPDLRUIRU
DFRPXQLGDGHHPWRUQRGHVHXGHVHQYROYLPHQWR8PDHVWUXWXUDHFRQ{PLFRVRFLDO
FUHVFHQWHPHQWHEDVHDGDHPEHQVLQWDQJtYHLVSHUPLWHVXSHUDUDSULQFLSDOREMHomR
KD\HNLDQDjVSUiWLFDVGLVWULEXWLYDV(Q¿PGHIHQGHVHTXHQDVRFLHGDGHHPUHGHR
FRPSDUWLOKDPHQWRGRFRQKHFLPHQWRWHFQROyJLFRSHUPLWHWUDQVIRUPDURWHPDGDMXVWD
distribuição da propriedade em uma questão de liberdade.

O modelo de propriedade de bens tangíveis e o monopólio do


software

1RLQtFLRGRVpFXOR;;,RFKDPDGRPHUFDGRGH7HFQRORJLDGD,QIRUPDomR
192 • Software livre, cultura hacker e o ecossistema da colaboração

H &RPXQLFDomR WRUQRXVH XP GRV VHJPHQWRV HFRQ{PLFRV TXH PDLV FUHVFHP


no planeta, cerca de 10% ao ano (TAIT, 2005). Nele, a indústria de software já
representa entre 1 e 2% do PIB dos países ricos e, em 2001, movimentou no mundo
DOJRHPWRUQRGH86ELOK}HV6HJXQGRD2UJDQL]DomRSDUDD&RRSHUDomRH
'HVHQYROYLPHQWR(FRQ{PLFR 2&'( RPHUFDGRPXQGLDOGHVRIWZDUHPRYLPHQWRX
86  ELOK}HV Mi HP  526(/,12   2V SDtVHV GHQRPLQDGRV ³HP
GHVHQYROYLPHQWR´ WDPEpP DYDQoDP $ SHVTXLVD Slicing the Knowledge-Based
Economy (KBE) in India, China and Brasil: a Tale of Three software Industries,
UHDOL]DGDSHOR0DVVDFKXVVHWV,QVWLWXWHRI7HFKQRORJ\ 0,7 HPLQGLFRXTXHR
%UDVLOWRUQRXVHRVpWLPRPHUFDGRGHVRIWZDUHQRPXQGRFRPYHQGDVGH86
ELOK}HV2PHUFDGRGDËQGLDpHVWLPDGRHP86ELOK}HVHRGD&KLQDHP86
ELOK}HV
Somente a empresa norte-americana de software, Microsoft Corporation,
REWHYHXPIDWXUDPHQWRGH86ELOK}HVQRDQR¿VFDOGH1. No mesmo
SHUtRGR D FRUSRUDomR ORJURX XP OXFUR OtTXLGR GH 86  ELOK}HV1. O lucro
representou pouco mais de 22% do faturamento, percentual muito maior do
que o obtido pela maioria absoluta dos empreendimentos de outros setores da
economia. É importante notar que o lucro líquido da Microsoft foi maior do que o
PHUFDGREUDVLOHLURHRLQGLDQRGHVRIWZDUHHTXDVHDWLQJLXDGLPHQVmRGRFKLQrV
2IDWXUDPHQWRGLYXOJDGRpYH]HVPDLRUTXHRPHUFDGREUDVLOHLURYH]HV
PDLRU TXH R LQGLDQR H  YH]HV PDLRU TXH R FKLQrV 6HJXQGR D 0LFURVRIW VHX
UHVXOWDGR HP  UHSUHVHQWRX XP DXPHQWR GH  HP UHODomR DRV 86 
ELOK}HVDOFDQoDGRVHP$VUD]}HVGHVVHVXFHVVRSRGHPVHUHQFRQWUDGDVQR
PRGHORGHQHJyFLRVTXHDFRUSRUDomRGLVVHPLQRXSHORSODQHWD
Alan Story, especialista em propriedade intelectual da Kent Law School, em
&DQWHUEXU\QD,QJODWHUUDGH¿QLXR75,36 $JUHHPHQWRQ7UDGH5HODWHG$VSHFWVRI
,QWHOOHFWXDO3URSHUW\5LJKWV FRPRXPDWHQWDWLYDGHSURPRYHUD³0LFURVRIWL¿FDWLRQ´
0LFURVRIWLVDomR GRPXQGR 6725< 6WRU\GHVFRUWLQDRHPSHQKRGD
2UJDQL]DomR 0XQGLDO GH &RPpUFLR HP FRQTXLVWDU RV PHUFDGRV PXQGLDLV SDUD R
WLSRGHOLFHQFLDPHQWRGHSURGXWRVTXHLQWHUHVVDjFRUSRUDomRQRUWHDPHULFDQDe
LQHJiYHOTXHRPRGHORGHGHVHQYROYLPHQWRHFRPHUFLDOL]DomRGHVRIWZDUHSUDWLFDGR
SHOD 0LFURVRIW WRUQRXVH KHJHP{QLFR XP SDGUmR UHDO GD LQG~VWULD GH VRIWZDUH
proprietário.
 3HODVXDJUDQGHH[SUHVVmRHFRQ{PLFDHFXOWXUDOXPDYH]TXHRVLVWHPD
RSHUDFLRQDO GD 0LFURVRIW HQFRQWUDVH SUHVHQWH HP XP SRXFR PDLV GH  GRV
FRPSXWDGRUHV SHVVRDLV :,5(' IHY    DQDOLVDUHPRV R SURFHVVR
pelo qual essa empresa tornou-se a maior expressão do modelo de propriedade
'LVSRQtYHOKWWSZZZVFRPEUVFULSWVUHOHDVHDVS"UHOHDVH,G  FOLHQWH,G $FHVVRHP
Software livre, cultura hacker e o ecossistema da colaboração • 193

GH EHQV LQWDQJtYHLV QD VRFLHGDGH GD LQIRUPDomR FXOPLQDQGR QD FRQVWUXomR GH
XP PRQRSyOLR GH DOJRULWPRV 7DPEpP VHUi DQDOLVDGD D SURSULHGDGH GH VRIWZDUH
baseada em licenças proprietárias de uso, tendo como base a licença da Microsoft.
Vamos começar fazendo um breve relato sobre a evolução do hardware
e explicando como determinadas mudanças em sua arquitetura viabilizaram o
PRGHORKHJHP{QLFRSUDWLFDGRSHOD0LFURVRIW2VFRPSXWDGRUHVXWLOL]DYDPYiOYXODV
DWp $V YiOYXODV IRUDP VXEVWLWXtGDV SRU WUDQVLVWRUHV HQWUH  H  2V
FLUFXLWRVLQWHJUDGRVHQWUHHHOHYDUDPDYHORFLGDGHGHSURFHVVDPHQWR
H SHUPLWLUDP XPD JHUDomR GH PiTXLQDV FRP VLVWHPDV RSHUDFLRQDLV DYDQoDGRV
(P*RUGRQ0RRUHHQWmRGLUHWRUGD)DLUFKLOG6HPLFRQGXFWRUFRQVWDWRXTXH
DTXDQWLGDGHGHWUDQVLVWRUHVQRVFKLSVGHVLOtFLRGREUDYDDQXDOPHQWHGHVGH
Com mais tempo de observação, concluiu que a capacidade dos semicondutores
GREUDYD D FDGD  PHVHV VHJXLGD GD TXHGD GH VHXV SUHoRV (VVD FRQVWDWDomR
SDVVRXDVHUFKDPDGDGH³OHLGH0RRUH´ 5$1*(/ 
 $WpRVDQRVRVRIWZDUHHUDGLVWULEXtGRMXQWRFRPRKDUGZDUH$HQWmR
chamada informática ainda estava muito concentrada na máquina. Os softwares
HUDPGHVHQKDGRVRXSURJUDPDGRVSDUDFDGDKDUGZDUH

 ³2V FRPSXWDGRUHV SURJUDPiYHLV FDSD]HV GH UHFHEHU LQVWUXo}HV


H[WHUQDVTXHGHWHUPLQDVVHPVXDOyJLFDGHIXQFLRQDPHQWRSURYRFDUDP
uma distinção clara entre o equipamento (a máquina em si) e o roteiro
GH WDUHIDV TXH HOD GHVHPSHQKD 3DUD LGHQWL¿FDU RV FRPSRQHQWHV
ItVLFRVGRVLVWHPDFRPR¿RVHFRQHFWRUHVDGRWRXVHRWHUPRKDUGZDUH
SDODYUDTXHIRUDGDLQIRUPiWLFDFRVWXPDVHUWUDGX]LGDSRU³IHUUDJHP´ 
TXHLGHQWL¿FDXPPDWHULDO³GXUR´SDOSiYHO(PFRQWUDSRVLomRRWHUPR
VRIWZDUH SDVVRX D LGHQWL¿FDU RV SURJUDPDV R FRPSRQHQWH OyJLFR RX
³PDFLR´ LQWDQJtYHOTXHGHWHUPLQDjPiTXLQDRTXHID]HU3HODSULPHLUD
YH]FULDYDVHXPDIHUUDPHQWDFXMD¿QDOLGDGHQmRHVWDYDGH¿QLGDQHOD
PHVPDPDVHPXPFRQMXQWRGHLQVWUXo}HVDVHUFULDGDDSRVWHULRUL´
5$1*(/ 

$GLIHUHQFLDomRHQWUHKDUGZDUHHVRIWZDUHDOpPGHIDFLOLWDUDSURJUDPDomR
HSHUPLWLUTXHXPSURJUDPDIRVVHXWLOL]DGRHPPDLVGHXPWLSRGHFRPSXWDGRUIRL
IXQGDPHQWDOSDUDRVXUJLPHQWRGRPRGHORGHSURSULHGDGHGHVRIWZDUHTXHVHWRUQRX
KHJHP{QLFRQRVDQRVH2GHSRLPHQWRGH%LOO*DWHVXPGRVIXQGDGRUHVGD
Microsoft, no livro A Estrada do FuturopEDVWDQWHHVFODUHFHGRU

³1D pSRFD R VRIWZDUH DVVLP FRPR R KDUGZDUH WDPEpP HUD FDUR


7LQKD GH VHU HVFULWR HVSHFL¿FDPHQWH SDUD FDGD WLSR GH FRPSXWDGRU
E cada vez que o hardware do computador mudava, o que acontecia
194 • Software livre, cultura hacker e o ecossistema da colaboração

UHJXODUPHQWHRVRIWZDUHSUHFLVDYDVHUTXDVHWRGRUHIHLWR2VIDEULFDQWHV
GH FRPSXWDGRUHV IRUQHFLDP DOJXQV EORFRVSDGUmR GH VRIWZDUH SRU
H[HPSOR ELEOLRWHFDV GH IXQo}HV PDWHPiWLFDV  MXQWR FRP D PiTXLQD
PDV D PDLRU SDUWH GR VRIWZDUH WLQKD GH VHU HVFULWD HVSHFL¿FDPHQWH
para resolver os problemas individuais desta ou daquela empresa.
+DYLDDOJXQVSURJUDPDVJUDWXLWRVHXPDVSRXFDVFRPSDQKLDVYHQGLDP
VRIWZDUH GH XVR JHUDO SRUpP KDYLD PXLWR SRXFRV SDFRWHV TXH VH
SXGHVVHPFRPSUDUQRYDUHMR´ *$7(6 

2VRIWZDUHpXPDOJRULWPRFRPSRVWRSRUURWLQDVHQFDGHDGDVORJLFDPHQWH
8PDOJRULWPRSRGHVHUGHVFULWRFRPR³XPSURFHGLPHQWRDWUDYpVGHXPFRQMXQWRGH
Do}HVHOHPHQWDUHVGHWHUPLQDGDVHFRPXPDGXUDomROLPLWDGDQRWHPSR´ (367(,1
 (QWHQGLGRFRPROLQJXDJHPQmRQDWXUDOEiVLFDGDVRFLHGDGHGDLQIRUPDomR
RDOJRULWPRTXHFRPS}HRVRIWZDUHQmRFRPSRUWDDDPELJXLGDGH6XDVLQVWUXo}HV
GHYHPVHUSUHFLVDVSDUDTXHRFRPSXWDGRUFRQVLJDH[HFXWiODV2VVRIWZDUHVVmR
HVFULWRVHPOLQJXDJHPGHSURJUDPDomRSRUSURJUDPDGRUHV6mRFyGLJRV
 6RIWZDUHVSRVVXHPXPFyGLJRH[HFXWiYHOHXPFyGLJRIRQWH2SULPHLURp
ELQiULRXPFRQMXQWRGHGtJLWRV ]HURHXP SDUDVHUSURFHVVDGRSHORFRPSXWDGRU
2VHJXQGRpRFyGLJRHPTXHRVRIWZDUHIRLGHVHQYROYLGRRXVHMDVmRDVURWLQDVH
LQVWUXo}HVHVFULWDVSHORSURJUDPDGRUHPXPDOLQJXDJHPPDLVOHJtYHODRVKXPDQRV
'HSRLVGH¿QDOL]DGRRFyGLJRIRQWHpFRPSLODGRSDUDVHWRUQDUFyGLJRH[HFXWiYHO
H[DWDPHQWHDTXHOHTXHRFRPSXWDGRULUiHQWHQGHU&RPSLODUpWUDGX]LUDOLQJXDJHP
GH SURJUDPDomR SDUD D OLQJXDJHP ELQiULD D ~QLFD TXH R FRPSXWDGRU SRGH
HQWHQGHU(VVDGLVWLQomRpLPSRUWDQWHSRLVRPRGHORKHJHP{QLFRGHSURSULHGDGH
GHVRIWZDUHpEDVHDGRQRFyGLJRIRQWHIHFKDGRQmRWUDQVSDUHQWHFRPRYHUHPRV
posteriormente.
 4XDQGRXPVRIWZDUHpIHLWRSDUDXPKDUGZDUHHVSHFt¿FRFRPDUTXLWHWXUD
fechada ou proprietária, ele não pode ser utilizado por máquinas de outros
fabricantes, uma vez que estas portam outra arquitetura. Assim, nesse contexto,
o elemento essencial desse processo é o hardware. A empresa que o fabrica tem
controle total sobre tudo que pode rodar nele. Pode decidir se vai ou não permitir
que seu hardware rode softwares de terceiros ou se ela mesma irá desenvolvê-los.
(VVHpXPPRGHORHPTXHDSURSULHGDGHGRKDUGZDUHpHVWUDWpJLFDSRLVDHPSUHVD
que o fabrica e que detém a patente de sua arquitetura e de seus componentes
pode evitar tecnicamente que determinados softwares rodem (funcionem) em sua
plataforma. Mas esse modelo foi sendo superado.

³$Q:DQJLPLJUDQWHFKLQrVWUDQIRUPRXRV/DERUDWyULRV:DQJQRPDLRU
IRUQHFHGRUGHFDOFXODGRUDVHOHWU{QLFDVGRVDQRV1RVDQRVLJQR
Software livre, cultura hacker e o ecossistema da colaboração • 195

rou o conselho de todos que o cercavam e abandonou o mercado de


FDOFXODGRUDVSRXFRDQWHVGDFKHJDGDGHFRQFRUUHQWHVGHEDL[RFXVWR
TXHRWHULDPDUUXLQDGR)RLXPDMRJDGDEULOKDQWH:DQJUHLYHQWRXVXD
empresa, transformando-a na principal fornecedora de máquinas pro-
FHVVDGRUDVGHWH[WR´  ³:DQJHUDXPHQJHQKHLURYLVLRQiULR2PHV
mo tipo de inspiração que o levou a abandonar as calculadoras poderia
tê-lo conduzido ao sucesso na indústria de software para PCs, nos anos
0DV:DQJQmRHQ[HUJRXDFXUYDVHJXLQWH'HVHQYROYHXSURJUDPDV
excelentes, todos, porém, proprietários, só funcionando em seus pro-
cessadores de texto. Sem chance nenhuma de deslanchar, portanto,
GHSRLVTXHVXUJLUDPRVPLFURFRPSXWDGRUHVGHXVRJHUDOFDSD]HVGH
URGDULQ~PHURVSURJUDPDVGHSURFHVVDPHQWRGHWH[WRVFRPR:RUG6WDU
:RUG3HUIHFW H 0XOWL0DWH TXH DOLiV LPLWDYDP R VRIWZDUH GH :DQJ 
6H :DQJ WLYHVVH HQWHQGLGR D LPSRUWkQFLD GH DSOLFDWLYRV FRPSDWtYHLV
WDOYH]QmRKRXYHVVHXPD0LFURVRIW´ *$7(6 

2 UHODWR VREUH :DQJ IHLWR SRU *DWHV SHUPLWH SHUFHEHU TXH D UXSWXUD GR
modelo de vinculação exclusiva entre o software e um determinado hardware
WHYH FRQVHTXrQFLDV PLFURHFRQ{PLFDV LPSRUWDQWHV RX VHMD IUXWR GR DYDQoR GH
HPSUHHQGHGRUHV GH WHFQRORJLD HOD VH GLVVHPLQRX H LPSDFWRX GHFLVLYDPHQWH R
mercado. Pode parecer notável e contraditória esta crítica de Gates ao modelo de
SURJUDPDV ³SURSULHWiULRV´ GH 6U :DQJ e LPSRUWDQWH UHVVDOWDU TXH *DWHV UHIHULD
VH SULQFLSDOPHQWH j IDVH GD LQG~VWULD GH FRPSXWDGRUHV TXH WUDEDOKDYD FRP D
³DUTXLWHWXUDSURSULHWiULD´RX³DUTXLWHWXUDIHFKDGD´SDUDFRQHFWDUWRGRVRVGLVSRVLWLYRV
GR FRPSXWDGRU $ IRUPD FRPR RV FRPSRQHQWHV LQWHUOLJDYDPVH HUD SURSULHGDGH
exclusiva da empresa fabricante, portanto, secreta a todos os demais usuários.
$ YDQWDJHP GHVVH PRGHOR HVWDYD SRU H[HPSOR QR DSULVLRQDPHQWR WRWDO GRV
SURJUDPDVHQRYRVKDUGZDUHVSHODHPSUHVDIDEULFDQWHGRFRPSXWDGRU3RUH[HPSOR
o computador só reconheceria a impressora que fosse do mesmo fabricante. Para
SURJUDPDUQHVVDIDVHWHFQROyJLFDHUDQHFHVViULRTXHRSURJUDPDGRUFRQKHFHVVH
PXLWR EHP RV FRPSRQHQWHV GR KDUGZDUH TXH URGDULD VXD VROXomR (P JHUDO D
OLQJXDJHPGHSURJUDPDomRHUDPXLWRSUy[LPDD³OLQJXDJHPGHPiTXLQD´ELQiULD
XPDYH]TXHRSURJUDPDHUDFULDGRSDUDXPDPiTXLQDHVSHFt¿FD
O avanço dos microprocessadores possibilitou o avanço dos computadores
pessoais e estes permitiram que o modelo de arquitetura fechada do hardware fosse
superado pelo aberto, ao mesmo tempo em que consolidava o modelo fechado e
proprietário do software. O software estava potencialmente livre do aprisionamento
DXP~QLFRWLSRGHPiTXLQD&RPREHPH[SODQRX&DVWHOOV

³RTXHFDUDFWHUL]DDDWXDOUHYROXomRWHFQROyJLFDQmRpDFHQWUDOLGDGHGH
conhecimentos e informação, mas a aplicação desses conhecimentos
196 • Software livre, cultura hacker e o ecossistema da colaboração

HGHVVDLQIRUPDomRSDUDDJHUDomRGHFRQKHFLPHQWRVHGHGLVSRVLWLYRV
de processamento/comunicação da informação, em um ciclo de
UHDOLPHQWDomR FXPXODWLYR HQWUH LQRYDomR H XVR´   ³2 FLFOR GH
UHDOLPHQWDomR HQWUH D LQWURGXomR GH XPD QRYD WHFQRORJLD VHXV XVRV
e seus desenvolvimentos em novos domínios, torna-se muito mais
UiSLGRQRQRYRSDUDGLJPDWHFQROyJLFR&RQVHTXHQWHPHQWHDGLIXVmR
GD WHFQRORJLD DPSOL¿FD VHX SRGHU GH IRUPD LQ¿QLWD j PHGLGD TXH RV
XVXiULRV DSURSULDPVH GHOD H D UHGH¿QHP $V QRYDV WHFQRORJLDV GD
informação não são simplesmente ferramentas a serem aplicadas, mas
SURFHVVRVDVHUHPGHVHQYROYLGRV´ &$67(//6 

$ FUHVFHQWH DXWRQRPLD GR VRIWZDUH OHYRX DR VXUJLPHQWR GH LQ~PHUDV


OLQJXDJHQVGHSURJUDPDomRTXHVHGLVWDQFLDPGD³OLQJXDJHPGHPiTXLQD´4XDQWR
PDLVSUy[LPDVGDFRPSUHHQVmRGRVFRPSXWDGRUHVDVOLQJXDJHQVVmRFKDPDGDV
GH ³EDL[R QtYHO´ TXDQWR PDLV GLVWDQWHV GD PiTXLQD H PDLV SUy[LPDV GDV OtQJXDV
QDWXUDLVFKDPDPRVGHOLQJXDJHPGH³DOWRQtYHO´$OLQJXDJHP$VVHPEO\pDPDLV
próxima da máquina, seu nível de abstração é reduzido e, portanto, é considerada
GH³EDL[RQtYHO´-iDVOLQJXDJHQV&2%2/%$6,&H&SRUH[HPSORVmROLQJXDJHQV
GH ³DOWR QtYHO´ 6HP G~YLGD DOJXPD SHOD VXD SUR[LPLGDGH FRP D KXPDQD DV
OLQJXDJHQVGH³DOWRQtYHO´SHUPLWLUDPGLVVHPLQDUPDLVDPSODPHQWHDSURJUDPDomR
HFRQVHTXHQWHPHQWHDXPHQWDURQ~PHURGHSURJUDPDGRUHV7DPEpPSHUPLWLUDP
desenvolver mais velozmente os softwares e democratizar ainda mais o seu
desenvolvimento.

³2 REMHWLYR GD 0LFURVRIW HUD HVFUHYHU H IRUQHFHU VRIWZDUH SDUD


microcomputadores sem se envolver diretamente na fabricação
ou venda do hardware. A Microsoft licenciava software a preços
H[WUHPDPHQWH EDL[RV $FUHGLWiYDPRV TXH VHULD SRVVtYHO JDQKDU
dinheiro apostando no volume das vendas. Adaptávamos nossas
OLQJXDJHQVGHSURJUDPDomRFRPRSRUH[HPSORQRVVDYHUVmR%$6,&
SDUD FDGD PiTXLQD TXH VXUJLD eUDPRV PXLWR PDOHiYHLV D WRGRV RV
SHGLGRV GRV IDEULFDQWHV GH KDUGZDUH 1mR TXHUtDPRV GDU D QLQJXpP
DOJXPPRWLYRSDUDSURFXUDURXWURIRUQHFHGRU$LQWHQomRHUDID]HUFRP
TXHDRSomR0LFURVRVIWIRVVHDXWRPiWLFD1RVVDHVWUDWpJLDIXQFLRQRX
/LFHQFLDPRV OLQJXDJHQV GH SURJUDPDomR SDUD SUDWLFDPHQWH WRGRV RV
fabricantes de microcomputador. Ainda que o hardware fabricado por
duas empresas fosse diferente, o fato de ambos rodarem o Microsoft
%$6,& VLJQL¿FDYD TXH HUDP GH DOJXPD IRUPD FRPSDWtYHLV´ *$7(6
 

O empenho de Gates em reivindicar a arquitetura de hardware aberta não


era o mesmo na área de software. A abertura do hardware implicava na possibilidade
Software livre, cultura hacker e o ecossistema da colaboração • 197

de outros fabricantes adotarem aquele modelo ou linha de construção. A Apple, de


6WHYH -REV QmR DEULD VXD DUTXLWHWXUD TXH HVWDYD SDWHQWHDGD$ FORQDJHP VHULD
judicialmente barrada. A interoperabilidade entre hardwares era muito difícil sem
TXHH[LVWLVVHDDUTXLWHWXUDDEHUWDRXXPDSDGURQL]DomRVHJXLGDSRUWRGRV
 $$SOOH&RPSXWHU,QFIXQGDGDHPDEULOGHDFUHGLWRXHDODYDQFRXR
VHJPHQWRGHPLFURFRPSXWDGRUHV2$SSOH,,WUD]LDXPPLFURSURFHVVDGRU0RWRUROD
$H[SORVmRGDVYHQGDVGRPLFURFRPSXWDGRUSDUHFLDQHJDUDIDPRVDVHQWHQoD
GH .HQ 2OVHQ IXQGDGRU GD 'LJLWDO (TXLSPHQW ³QmR YHMR SRU TXH DOJXpP KDYHULD
GH WHU XP FRPSXWDGRU HP FDVD´ 5$1*(/    (P  D$SSOH WUD]LD
RSULPHLURVRIWZDUHGHSODQLOKDGHFiOFXOR9LVL&DOFRTXHJHURXXPFUHVFLPHQWR
DLQGDPDLRUQDVYHQGDV(PD,%0FRQKHFLGDFRPR%LJ%OXHSHFHEHXTXH
microcomputadores eram uma realidade e, principalmente, que ela estava fora
desse mercado.

³$,%0TXHULDODQoDUVHXPLFURFRPSXWDGRUQRPHUFDGRHPPHQRVGH
XP DQR 3DUD SRGHU FXPSULU HVVH FURQRJUDPD WHULD TXH DEDQGRQDU
o esquema tradicional, que consistia em fabricar todo o hardware e
software ela mesma. De modo que a IBM decidiu construir seu PC com
componentes já prontos, ao alcance de qualquer um. Isso levou a uma
SODWDIRUPDIXQGDPHQWDOPHQWHDEHUWDIiFLOGHVHUFRSLDGD´  
³(PERUD JHUDOPHQWH FRQVWUXtVVH VHXV SUySULRV PLFURSURFHVVDGRUHV
a IBM decidiu comprar da Intel os microprocessadores para seu PC.
Para a Microsoft, foi importante a IBM ter decidido não criar seu próprio
VRIWZDUHHOLFHQFLDURQRVVRVLVWHPDRSHUDFLRQDO´ *$7(6 

Como bem demonstra o relato de Gates, este é o ponto importante de


LQÀH[mRTXHYDLFRQVROLGDUD0LFURVRIWHRVHXPRGHORGHOLFHQFLDPHQWRSURSULHWiULR
de software. Exatamente no momento em que se aposta na abertura do hardware,
a Microsoft tentava tornar-se um padrão de fato na área de software no crescente
mercado mundial de computadores pessoais. Sem dúvida, quando um padrão,
XPD DUTXLWHWXUD H XP VRIWZDUH VmR DEHUWRV WRGRV WrP DFHVVR j VXD HVWUXWXUD H
ao seu conteúdo. A cópia ou o clone permite expandir o uso do que tiver qualidade
em um ritmo bem mais veloz, além de envolver mais empresas e pessoas no seu
processo de inovação incremental. Essa é uma evidência na área de hardware, mas
WDPEpPQRVHJPHQWRGHVRIWZDUH7RGDYLDDVGHFLV}HVDGRWDGDVSHORJLJDQWHGD
WHFQRORJLDD,%0DOLDGDVjEXVFDGHXPFRQMXQWRGHSHTXHQDVHPpGLDVHPSUHVDV
HPVHWRUQDUHPPRQRSyOLRVGHVHXVVHJPHQWRVEHPFRPRRVLQGtFLRVGHXPDIRUWH
tendência da economia da informação ser essencialmente uma economia de redes,
levaram o modelo de licenciamento de software para o lado proprietário.
198 • Software livre, cultura hacker e o ecossistema da colaboração

³&RPVXDUHSXWDomRDOLDGDjGHFLVmRGHXVDUXPSURMHWRDEHUWRTXH
outras empresas poderiam copiar, a IBM tinha realmente chance de criar
XPSDGUmRQRYRHDEUDQJHQWHGHFRPSXWDGRUSHVVRDO1yVTXHUtDPRV
SDUWLFLSDU $FHLWDPRV SRUWDQWR R GHVD¿R GH HVFUHYHU R VLVWHPD
operacional. Adquirimos um trabalho anterior, desenvolvido numa
HPSUHVDWDPEpPGH6HDWWOHHFRQWUDWDPRVVHXHQJHQKHLURFKHIH7LP
3DWHUVRQ &RP LQ~PHUDV PRGL¿FDo}HV R VLVWHPD WUDQVIRUPRXVH QR
Sistema Operacional de Disco da Microsoft, o MS-DOS. Tim tornou-
se, na verdade, o pai do MS-DOS. A IBM, nosso primeiro licenciado,
EDWL]RXVXDYHUVmRGH3&'26DVOHWUDV3&VmRDVLQLFLDLVGHSHUVRQDO
FRPSXWHUFRPSXWDGRUSHVVRDO´ *$7(6 

A Microsoft fez um contrato em que a IBM deveria usar os seus softwares,


PDVD0LFURVRIWQmRHVWDULDREULJDGDDIRUQHFHUVHXVRIWZDUHH[FOXVLYDPHQWHSDUD
a IBM. Em uma arquitetura aberta ou padronizada de hardware, um software pode
ser desenvolvido para rodar (funcionar) sobre todo e qualquer computador que a
XWLOL]H6HpYHUGDGHTXHXPSURJUDPDQmRURGDVHPXPFRPSXWDGRUGHVVHPRGR
também passou a ser verdade que qualquer computador poderia rodar um mesmo
SURJUDPD

³)L]HPRV XP WUDWR TXH SDUD D ,%0 HUD IDEXORVR XPD WD[D ~QLFD
SHTXHQDFRQFHGLDjHPSUHVDRGLUHLWRGHXVDURVLVWHPDRSHUDFLRQDO
GD0LFURVRIWHPWDQWRVFRPSXWDGRUHVTXDQWRVFRQVHJXLVVHYHQGHU2X
seja, a IBM tinha um incentivo para promover o MS-DOS e vendê-lo a
EDL[R SUHoR´   ³1RVVR REMHWLYR QmR HUD ID]HU GLQKHLUR GLUHWDPHQWH
com as vendas da IBM, e sim licenciar o uso do MS-DOS a outros
fabricantes de computador que quisessem oferecer máquinas mais ou
menos compatíveis com o IBM-PC. A IBM podia usar nosso software
GH JUDoD PDV QmR WLQKD GLUHLWR H[FOXVLYR GH XVR QHP FRQWUROH VREUH
futuros aperfeiçoamentos. Com isso a Microsoft se viu na posição de
OLFHQFLDU XPD SODWDIRUPD GH VRIWZDUH j LQG~VWULD GH FRPSXWDGRUHV´
*$7(6 

Gates deixa claro que o padrão e a arquitetura aberta para o hardware


IRL DFRPSDQKDGR GR PRGHOR GH FyGLJR IHFKDGR SDUD R VRIWZDUH (QTXDQWR
qualquer empresa podia fabricar um computador pessoal, tal qual o modelo IBM,
HYHQGHUHPVHXPHUFDGRUHJLRQDOD0LFURVRIWQmRSHUPLWLDTXHRPHVPRIRVVH
IHLWRFRPVHXVDOJRULWPRV6HXREMHWLYRHUDIHFKDUFRPSOHWDPHQWHRFyGLJRIRQWH
de seu software e levar o seu modelo de licenças de uso para todo o crescente
mercado de microcomputadores. Gates defendia o valor do compartilhamento nos
VHJPHQWRVGDVWHFQRORJLDVGDLQIRUPDomRHFRPXQLFDomRGHVGHTXHQmRIRVVHP
GDiUHDGHVRIWZDUH³2SDGUmR,%0WRUQRXVHDSODWDIRUPDLPLWDGDSRUWRGRV  
Software livre, cultura hacker e o ecossistema da colaboração • 199

7LPLQJHPDUNHWLQJVmRDPERVIDWRUHVIXQGDPHQWDLVSDUDDDFHLWDomRGHSURGXWRV
WHFQROyJLFRV´ *$7(6 
 $ GHVFULomR GD HVWUDWpJLD GH DEHUWXUD QR KDUGZDUH SDUD PRQRSROL]DU
o software é bastante evidente. Gates reconhece que o conhecimento aberto,
portanto acessível a todos, de como construir o hardware PC, foi decisivo para sua
consolidação como o padrão de mercado dos computadores pessoais. Por outro
ODGRRIXQGDGRUGD0LFURVRIWLQWHUSUHWDGHRXWURPRGRHVVHSURFHVVR

³7RUQRXVH PXLWR FRPXP HQWUH GHWHUPLQDGR JUXSR GH KLVWRULDGRUHV


revisionistas, concluir que a IBM cometeu um erro trabalhando com a
,QWHOHD0LFURVRIWSDUDFULDUVHX3&$UJXPHQWDPTXHD,%0GHYHULDWHU
patenteado a arquitetura de seu PC e também que a Intel e a Microsoft
DFDEDUDP OHYDQGR YDQWDJHP VREUH D ,%0 0DV RV UHYLVLRQLVWDV
não entenderam o principal. A IBM transformou-se no carro-chefe
da indústria de PCs justamente porque foi capaz de canalizar uma
TXDQWLGDGHLQFUtYHOGHWDOHQWRVFULDWLYRVHGHHQHUJLDHPSUHHQGHGRUDH
utilizá-los para promover sua arquitetura aberta. A IBM estabeleceu os
SDGU}HV´ *$7(6 

O modelo aberto foi quem propiciou a criativa e maciça adesão dos


IDEULFDQWHV GH KDUGZDUH jTXHOD DUTXLWHWXUD WUDQVIRUPDQGRD HP SDGUmR ,VVR
aconteceu também com os protocolos de rede. Um protocolo pode ser entendido
FRPRD³GHVFULomRIRUPDOGHIRUPDWRVGHPHQVDJHPHDVUHJUDVTXHGXDVRXPDLV
PiTXLQDV GHYHP VHJXLU SDUD LQWHUFDPELDU HVVDV PHQVDJHQV´ &20(5 
   2 7&3,3 TXH p D VXtWH GH SURWRFRORV HVVHQFLDLV GD ,QWHUQHW D¿UPRXVH
SULQFLSDOPHQWHSRUVHUGHVLPSOHVLQVWDODomRFRPSDWtYHOFRPRSULQFtSLRGH³UHGH
GDVUHGHV´HSRUVHUDEHUWRQmRHQYROYHQGRRSDJDPHQWRGHUR\DOWLHVSDUDRVHX
XVR 2 LQWHUHVVDQWH p QRWDU TXH D WiWLFD LQLFLDO GD 0LFURVRIW IRL GHIHQGHU SDGU}HV
DEHUWRVHPTXHHODQmRGRPLQDYDDWHFQRORJLDFRPREHPDSRQWRX%LOO*DWHVDRVH
UHIHULUjFRPSXWDomRJUi¿FDQRSULQFtSLRGRVDQRV

³1D pSRFD KDYLD GRLV FRPSXWDGRUHV SHVVRDLV QR PHUFDGR FRP


FDSDFLGDGH JUi¿FD R ;HUR[ 6WDU H R$SSOH /LVD (UDP DPERV FDURV
de capacidade limitada e construídos com arquitetura proprietária. As
demais empresas de hardware não tinham a concessão dos sistemas
operacionais para fabricar equipamentos compatíveis e nenhum dos
GRLVDWUDLXPXLWDVHPSUHVDVLQWHUHVVDGDVHPGHVHQYROYHUDSOLFDo}HV
$ 0LFURVRIW TXHULD XP SDGUmR DEHUWR H OHYDU D FDSDFLGDGH JUi¿FD D
TXDOTXHUFRPSXWDGRUTXHHVWLYHVVHURGDQGRFRPR06'26´ *$7(6
 
200 • Software livre, cultura hacker e o ecossistema da colaboração

Uma sociedade que utiliza intensamente a informação é centralmente uma


sociedade da hiper-comunicação. Depende de protocolos e softwares que cumprem
RSDSHOGHOLQJXDJHQVHQWUHUHGHVTXHFRQHFWDPPiTXLQDVTXHFRQHFWDPSHVVRDV
(VVDVRFLHGDGHFRQHFWDGDFRQVWLWXLXPDJUDQGHHP~OWLSODUHGH6XDHFRQRPLDGi
VHWDPEpPHPUHGHHRVHIHLWRVHFRQ{PLFRVGHXPSDGUmRYmRVHDODVWUDQGRSHORV
QyVGHVVDPHVPDUHGH%RE0HWFDOIHRFULDGRUGD(WKHUQHWSURS{VTXHRYDORU
HFRQ{PLFRHVRFLDOGHXPDUHGHDXPHQWDH[SRQHQFLDOPHQWHHPUHODomRDRQ~PHUR
GHSHVVRDVFRQHFWDGDV 6+$3,52 9$5,$1 3DGU}HVSHUPLWHPTXH
a rede constitua-se ou comporte-se como querem suas normas. A comunicação
GHSHQGHGHSDGU}HV*DWHVREVHUYRXTXH

³jVYH]HVJRYHUQRVHFRPLVV}HVHVWDEHOHFHPSDGU}HVFRPRREMHWLYR
GHSURPRYHUDFRPSDWLELOLGDGH6mRFKDPDGRVGHSDGU}HV³GHGLUHLWR´
HWrPIRUoDGHOHL&RQWXGRDPDLRULDGRVSDGU}HVEHPVXFHGLGRVVmR
³GHIDWR´´  ´2VSDGU}HVGHIDWRHPJHUDOVHGHVHQYROYHPQRPHUFDGR
DWUDYpVGHXPPHFDQLVPRHFRQ{PLFRPXLWRVHPHOKDQWHDRFRQFHLWRGH
HVSLUDOSRVLWLYDTXHLPSXOVLRQDDVHPSUHVDVEHPVXFHGLGDVRVXFHVVR
reforça o sucesso. Esse conceito, chamado retorno positivo, explica por
TXH RV SDGU}HV GH IDWR HP JHUDO VXUJHP TXDQGR DV SHVVRDV HVWmR
EXVFDQGRFRPSDWLELOLGDGH´ *$7(6 

6KDSLURH9DULDQWUDEDOKDPFRPDQRomRGHIHHGEDFNTXHSRGHVHUSRVLWLYR
RXQHJDWLYR2IHHGEDFNSRVLWLYRpXPSURFHVVRGLQkPLFRTXHID]DHPSUHVDIRUWH
¿FDUPDLVIRUWH2IHHGEDFNQHJDWLYRpRVHXRSRVWRHPSUHVDVIUDFDV¿FDPPDLV
IUDFDV$QRomRGHIHHGEDFNDSUHVHQWDVHPXLWRHYLGHQWHHPSURFHVVRVFKDPDGRV
GHHFRQRPLDGHUHGHHPTXHDTXHVWmRGRVSDGU}HVHGDVFRPXQLFDo}HVHQWUH
produtos e pessoas são vitais.

³1D HFRQRPLD GD LQIRUPDomR R IHHGEDFN SRVLWLYR DSDUHFHX HP XPD


forma nova e mais virulenta baseada no lado da demanda do mercado,
QmRDSHQDVQRODGRGDRIHUWD  (PPDLRGHD0LFURVRIWWLQKD
XPDFDSLWDOL]DomRGHPHUFDGRGHFHUFDGH86ELOK}HV(VVHYDORU
enorme não se baseia em economias de escala no desenvolvimento de
software. Oh, sim, o projeto de software tem economias de escala como
qualquer outro produto da informação. Mas há diversos outros sistemas
operacionais que oferecem desempenho comparável (ou superior) ao
GR:LQGRZVHDRGR:LQGRZV17HRFXVWRGHGHVHQYROYHUVLVWHPDV
operacionais rivais é mínimo em comparação com a capitalização de
mercado da Microsoft. O mesmo vale para aplicativos básicos da
Microsoft. Não, o domínio da Microsoft baseia-se nas economias de
escala do lado da demanda. Os clientes da Microsoft valorizam os
sistemas operacionais dela porque eles são amplamente utilizados,
Software livre, cultura hacker e o ecossistema da colaboração • 201

constituem o padrão de fato do setor. Os sistemas operacionais rivais


QmR SRVVXHP PDVVD FUtWLFD VX¿FLHQWH SDUD FRQVWLWXLU XPD DPHDoD´
6+$3,52 9$5,$1 

7DOYH]DD¿UPDomRPDLVHVFODUHFHGRUDGDLPSRUWkQFLDGRHIHLWRHPUHGHH
GRHQRUPHSHVRGDFRPSDWLELOLGDGHHPXPDUHGHHVWHMDQHVVDSDVVDJHP

³2YDORUGHXPDWHFQRORJLDQHPVHPSUHGHSHQGHGHDPSODDFHLWDomR
8PDIULJLGHLUDPDUDYLOKRVDQmRDGHUHQWHp~WLOPHVPRTXHYRFrVHMD
a única pessoa no mundo a comprá-la. Porém, em se tratando de
FRPXQLFDo}HV H GH RXWURV SURGXWRV HQYROYHQGR FRODERUDomR JUDQGH
parte do valor do produto vem de uma ampla disponibilidade. Podendo
HVFROKHUHQWUHXPDOLQGDFDL[DGHFRUUHLRWRGDIHLWDjPmRPDVFRP
uma fenda por onde só passa um único tamanho de envelope, e uma
caixa velha de papelão onde todo o mundo pode deixar correspondência
e recados de todo tipo e tamanho, você escolheria a de acesso mais
DPSOR9RFrHVFROKHULDFRPSDWLELOLGDGH´ *$7(6S 

&RPRYHUHPRVjIUHQWHHQWHQGHUDQRomRGHFRPSDWLELOLGDGHpHVWUDWpJLFR
para poder manipulá-la a favor de sua ampliação ou pelo seu bloqueio.
 *DWHV VDELD TXH ³VHP R VLVWHPD RSHUDFLRQDO R FRPSXWDGRU QmR VHUYH
para nada. O sistema operacional é a base sobre a qual são construídos todos
RV SURJUDPDV DSOLFDWLYRV´ *$7(6    'RPLQDU R VLVWHPD RSHUDFLRQDO
SHUPLWLULD WHQWDU GRPLQDU RXWURV SURJUDPDV DSOLFDWLYRV 2 VLVWHPD RSHUDFLRQDO GH
um computador poderia impedir que certos aplicativos dos concorrentes rodassem
sobre ele. Os softwares podem ser divididos em básicos e aplicativos. O principal
software básico é o sistema operacional. Uma planilha de cálculo é um aplicativo.
([HPSOL¿FDQGRXPDSODQLOKDTXHURGDVREUHRVLVWHPDRSHUDFLRQDO8QL[SRGHQmR
rodar sobre o Windows. Com o modelo proprietário de software e a partir do acordo
com o modelo de hardware aberto da IBM, a Microsoft viu-se na posição de licenciar
XPDSODWDIRUPDGHVRIWZDUHjLQG~VWULDGHFRPSXWDGRUHV4XDOSODWDIRUPD"$SOD
taforma de seu sistema operacional, que se chamava DOS e posteriormente foi
substituída pelo Windows, apesar de terem convivido durante muito tempo.
 (P TXH VH EDVHLD HVVH OLFHQFLDPHQWR"$ OLFHQoD SURSULHWiULD WHP FDUDF
WHUtVWLFDVFRPXQVTXHVHUmRUHDOoDGDVDSyVDDQiOLVHGDOLFHQoDGHXPDGDVYHUV}HV
GR VLVWHPD RSHUDFLRQDO GD 0LFURVRIW SDUkPHWUR GR PHUFDGR GH VRIWZDUH 1mR
será feita aqui uma análise jurídica das licenças, nem de sua evolução histórica. A
observação se concentrará nos elementos estruturais ou essenciais do licenciamento
de um software proprietário, amplamente utilizado, para posteriormente compará-
202 • Software livre, cultura hacker e o ecossistema da colaboração

los com o modelo de licenciamento aberto e não-proprietário. Antes é importante


HVFODUHFHUTXHDLGHLDGHOLFHQoDGHSURSULHGDGHWHPQDVXDRULJHPREORTXHLRRX
DQHJDomRGHDFHVVRDRVTXHQmRHVWmROLFHQFLDGRV$HPSUHVDTXHOLFHQFLDWHPR
monopólio daquele produto, ou seja, o monopólio do desenvolvimento do mesmo,
LQGHSHQGHQWH GH WLSRV GLIHUHQFLDGRV GH DXWRUL]Do}HV H GH IRUPDV GH SDJDPHQWR
SHORVHXXVRFRPRSRGHPRVREVHUYDUQRH[HPSORVHJXLQWH

³1RV YHOKRV WHPSRV TXDQGR D 0LFURVRIW HQIUHQWDYD FRQFRUUrQFLD QR


mercado de sistemas operacionais, ela licenciou o DOS para fabricantes
GHFORQHVPHGLDQWHRHPSUHJRGHXPDHVFDODSURJUHVVLYDTXHGHSHQGLD
do número de máquinas que o fabricante produzia, estivesse ou não
o DOS instalado nelas. Isso era chamado de licença-por-processador,
SRUTXH RV FOLHQWHV GH 2(0 GD 0LFURVRIW SDJDYDP UR\DOWLHV D HOD
pela licença de uso do DOS com base no número de processadores
PiTXLQDV TXHYHQGHVVHP2EVHUYHTXHD¿[DomRGHSUHoRVEDVHDYD
se na produção de máquinas, não no número de máquinas nas quais
R '26 IRUD LQVWDODGR ,VVR VLJQL¿FDYD TXH TXDQGR RV IDEULFDQWHV
instalavam um sistema operacional na máquina antes de expedi-la, a
HVFROKDQDWXUDOHUDR'26XPDYH]TXHMiKDYLDVLGRSDJRHPYLUWXGH
da política de licenciamento. O DOS teve custo incremental zero de
LQVWDODomRRTXHRWRUQRXPXLWRDWUDHQWHHPUHODomRjFRQFRUUrQFLD2
'HSDUWDPHQWRGH-XVWLoD QRUWHDPHULFDQR TXHVWLRQRXHPHVVD
HVWUXWXUDGH¿[DomRGHSUHoRVHD0LFURVRIWFRQFRUGRXHPDEDQGRQi
OD´ 6+$3,52 9$5,$1 

A licença de uso da versão Microsoft Windows XP Professional, o sistema


RSHUDFLRQDO PDLV LPSRUWDQWH GR LQtFLR GR VpFXOR ;;, VHJXH R SDGUmR KLVWyULFR
GD HPSUHVD GH *DWHV H FKDPDVH JHQHULFDPHQWH GH (8/$ (QG8VHU /LFHQVH
$JUHHPHQW&RQWUDWRGH/LFHQoDGH8VXiULR)LQDO 'XUDQWHXPERPWHPSRR(XOD
QmRHUDLPSUHVVRHQHPSXEOLFDGR,VVRREULJDYDDSHVVRDTXHDGTXLULDRVRIWZDUH
a tomar contato com os termos de seu uso somente na hora da instalação. Caso
QmR FRQFRUGDVVH FRP XP GRV DUWLJRV GD OLFHQoD WHULD XP JUDQGH LQFRQYHQLHQWH
SDUDWHQWDUUHFHEHUGHYROWDRTXHSDJRX
O EULA da versão Microsoft Windows XP Professional, obtida no início de
FHGLDDRXVXiULRGRVRIWZDUHRVVHJXLQWHVGLUHLWRV³GHVGHTXHYRFrFXPSUD
WRGRVRVWHUPRVHFRQGLo}HVGHVWH(8/$

³,167$/$d­2 ( 862 9RFr SRGHUi LQVWDODU XVDU DFHVVDU H[LELU


e executar uma cópia do Produto em um único computador, como
XPD HVWDomR GH WUDEDOKR XP WHUPLQDO RX RXWUR GLVSRVLWLYR ³(VWDomR
GH7UDEDOKR´  2 3URGXWR QmR SRGHUi VHU XVDGR SRU PDLV GH GRLV  
processadores ao mesmo tempo em uma única Estação de Trabalho.
Software livre, cultura hacker e o ecossistema da colaboração • 203

Você poderá permitir um máximo de dez (10) computadores ou outros


GLVSRVLWLYRV HOHWU{QLFRV FDGD XP GHOHV XP ³'LVSRVLWLYR´  SDUD VH
FRQHFWDU j (VWDomR GH 7UDEDOKR SDUD XWLOL]DU RV VHUYLoRV GR 3URGXWR
somente para serviços de Arquivo e Impressão, Serviços de Informação
da Internet e acesso remoto (incluindo o compartilhamento da conexão
HVHUYLoRVGHWHOHIRQLD 2Q~PHURPi[LPRGHGH]FRQH[}HVLQFOXLDV
FRQH[}HV LQGLUHWDV IHLWDV DWUDYpV GH PXOWLSOH[DomR ³PXOWLSOH[LQJ´  RX
RXWUR VRIWZDUH RX KDUGZDUH TXH UH~QH RX DJUHJD FRQH[}HV ([FHWR
TXDQGR SHUPLWLGR SHORV UHFXUVRV 1HW0HHWLQJ $VVLVWrQFLD 5HPRWD H
ÈUHD GH 7UDEDOKR 5HPRWD GHVFULWRV DEDL[R YRFr QmR SRGHUi XVDU R
Produto para permitir que qualquer Dispositivo use, acesse, exiba ou
execute outro software residente na Estação de Trabalho, nem poderá
permitir que qualquer Dispositivo use, acesse, exiba ou execute o
Produto ou a interface de usuário do Produto, a menos que o Dispositivo
WHQKDXPDOLFHQoDVHSDUDGDSDUDR3URGXWR´

Como é possível notar, o uso deste software é limitado por esse conjunto
GHH[LJrQFLDVLPSRVWDVSHORSURSULHWiULRGRFyGLJRIRQWHHPSUHVDTXHGHWpPDVXD
DXWRULD$SHVDUGHSDJDUSHORVRIWZDUHDVSHVVRDVSDJDPQHVVHPRGHORDSHQDVR
GLUHLWRGHXWLOL]iORVREGHWHUPLQDGDVFRQGLo}HVUHODWDGDVQDOLFHQoD2GLUHLWRGHXVR
pH[FOXVLYRSDUDXPD~QLFDPiTXLQDHPHVPRRDFHVVRUHPRWRjPHVPDpOLPLWDGR
j DWLYLGDGH GH DUTXLYDPHQWR LPSUHVVmR H DFHVVR j ,QWHUQHW (VVDV UHVWULo}HV
denominadas direitos, visam claramente impedir o uso amplo e compartilhado dos
recursos do software, mesmo que isso seja tecnicamente possível. No modelo
proprietário, o usuário adquiriu a licença de uso do software para uma máquina, ou
VHMDDOXJRXRVRIWZDUHHPYH]GHDGTXLULOR2PRGHORSURSULHWiULRGHVRIWZDUHp
GLVWLQWRGDSURSULHGDGHGHEHQVWDQJtYHLV4XDQGRFRPSURXPYHtFXORSRVVRXVi
ORQROLPLWHGDWHFQRORJLDHGDVOHLVGHWUkQVLWRSRLVSDJXHLSHODVXDSURSULHGDGH
1RPRGHORSURSULHWiULRKHJHP{QLFRGHVRIWZDUHXPSURJUDPDGHFRPSXWDGRUVHUi
propriedade de seu autor até o prazo que a lei de direitos autorais do país determinar
QRV(VWDGRV8QLGRVDQRV 
 $OpPGHQmRSHUPLWLURXVRGRVRIWZDUHVHPUHVWULo}HVR(8/$GR0LFURVRIW
:LQGRZV;33URIHVVLRQDOH[LJHTXHRXVXiULRFRPXQLTXHVHFRPDHPSUHVDSDUD
informar que aquela cópia foi instalada. O objetivo inicial da Microsoft era ter a
possibilidade de travar o software que não tivesse licença de uso, mas isso se
PRVWURXLQH¿FD]3RURXWURODGRDOLFHQoDFULDREULJDo}HVGRXVXiULRFRPRGHWHQWRU
GDSURSULHGDGHGRVRIWZDUHPHVPRGHSRLVGHWHUVLGROHJDOPHQWHSDJD2EVHUYHR
DUWLJRDVHJXLU

³$7,9$d­2 2%5,*$7Ï5,$ 2V GLUHLWRV GH OLFHQoD FRQFHGLGRV QHVWH


(8/$ VmR OLPLWDGRV DRV SULPHLURV WULQWD   GLDV GHSRLV GH YRFr
204 • Software livre, cultura hacker e o ecossistema da colaboração

WHU LQVWDODGR R 3URGXWR D PHQRV TXH YRFr IRUQHoD DV LQIRUPDo}HV


necessárias para ativar a sua cópia licenciada na forma descrita durante
a etapa de instalação do Produto. Você pode ativar o Produto por meio
GR XVR GD ,QWHUQHW RX WHOHIRQHV WDULIDV SRGHP VHU DSOLFDGDV 9RFr
WDPEpPSUHFLVDUiUHDWLYDUR3URGXWRVHYRFrPRGL¿FDURFRPSXWDGRU
RX DOWHUDU R 3URGXWR +i PHGLGDV WHFQROyJLFDV QR 3URGXWR TXH VmR
FULDGDVSDUDLPSHGLU RXVRLOHJDORXQmROLFHQFLDGRGR3URGXWR9RFr
FRQFRUGDFRPRXVRGHVVDVPHGLGDV´

2 SURSULHWiULR GR VRIWZDUH WDPEpP GHL[D FODUR TXH ³e SURLELGR HIHWXDU D
HQJHQKDULD UHYHUVD GHVFRPSLODomR RX GHVPRQWDJHP GR 3URGXWR H[FHWR H VR
mente na medida em que estas atividades sejam expressamente permitidas pela
OHLDSOLFiYHOQmRREVWDQWHHVWDOLPLWDomR´&RPLVVRHVWiEORTXHDGRRDFHVVRDR
FyGLJRIRQWHGRVRIWZDUH6HPHOHRXVXiULRSRVVXLDSHQDVRVRIWZDUHH[HFXWiYHO
HPOLQJXDJHPELQiULD7DOFRPRRKDUGZDUHSURSULHWiULRPDQWLQKDVXDDUTXLWHWXUD
HPVHJUHGRDOLFHQoDSURSULHWiULDSDGUmRPDQWpPHPVHJUHGRDVOLQKDVGHFyGLJR
GRVRIWZDUHHVFULWDVSHORVVHXVSURJUDPDGRUHVeSUHFLVRUHJLVWUDUSRUWDQWRTXH
um dos elementos mais importantes do software proprietário é a não-transparência
GRVHXFyGLJRIRQWH
 2FyGLJRIRQWHIHFKDGRWHPRFODURREMHWLYRGHHYLWDURFRPSDUWLOKDPHQWR
do conhecimento contido naquele software, uma vez que não impede a pirataria.
&UDLJ0XQGLHYLFHSUHVLGHQWHVHQLRUGD0LFURVRIW&RUSRUDWLRQHPHVFUHYHX

³3DUDLQFHQWLYDURGHVHQYROYLPHQWRGHVRIWZDUHQDSODWDIRUPD1(7D
0LFURVRIW Mi HVWi UH¿QDQGR VHX PRGHOR GH OLFHQFLDPHQWR GH VRIWZDUH
FRPHUFLDO $ )DVH  GD ,QWHUQHW Mi SUHYr D H[SDQVmR GR PRGHOR
GH OLFHQFLDPHQWR GD 0LFURVRIW SDUD TXH VHMD LQFOXtGD VXD )LORVR¿D
GH &RPSDUWLOKDPHQWR GH &yGLJR RX µ6KDUHG 6RXUFH 3KLORVRSK\¶
permitindo que desenvolvedores tenham um acesso mais amplo sobre
RFyGLJRGHEDVHGRVSURGXWRV
6KDUHG 6RXUFH p XPD DERUGDJHP HTXLOLEUDGD TXH SHUPLWH R FRPSDU
WLOKDPHQWRGRFyGLJRIRQWHFRPFOLHQWHVHSDUFHLURVDRPHVPRWHPSR
HP TXH D HPSUHVD PDQWpP RV QtYHLV GH SURWHomR j VXD SURSULHGDGH
LQWHOHFWXDOLPSUHVFLQGtYHLVSDUDJDUDQWLUDFRQWLQXLGDGHGHVHXVQHJy
FLRV 2 6KDUHG 6RXUFH p XP PRGHOR TXH UH~QH HP GRVHV LJXDLV R
YDORU GR QHJyFLR D LQRYDomR WHFQROyJLFD H RV SULQFtSLRV TXH UHJHP
o licenciamento de produtos. Este modelo cobre um bom espectro de
DFHVVLELOLGDGHGHJUDQGHWUDQVSDUrQFLDGHQWURGDJUDQGHYDULHGDGHGH
SURJUDPDVGHOLFHQFLDPHQWRGHFyGLJRVIRQWHRIHUHFLGDSHOD0LFURVRIW
Entretanto, a Microsoft permanece irredutivelmente comprometida com
RPRGHORTXHSURWHJHRVGLUHLWRVGDSURSULHGDGHLQWHOHFWXDO(VVHpR
PRGHOR TXH JDUDQWH D LQFHVVDQWH LUULJDomR GR VHWRU LQGHSHQGHQWH GH
VRIWZDUHFRPHUFLDOUHVSRQViYHOSRUJHUDUDVUHFHLWDVTXHDVVHJXUDP
que o setor continue a investir continuamente em pesquisa e desen-
YROYLPHQWR´ 081',( 
Software livre, cultura hacker e o ecossistema da colaboração • 205

,QWHUHVVDQWHpQRWDUTXH&UDLJ0XQGLHYLQFXODLQRYDomRWHFQROyJLFDjLGHLD
de propriedade, a pesquisa e desenvolvimento ao modelo que denomina comercial,
e a sobrevivência do empreendimento ao modelo de licenciamento proprietário.
Para Mundie, para ser comercial o software tem que ser proprietário. As evidências
HPStULFDV GHPRQVWUDP TXH H[LVWHP VRIWZDUHV DEHUWRV WDLV FRPR /LQX[ 5HG +DW
0DQGULYD ,QVLJQH RX 6XVH HQWUH RXWURV TXH YHQGHP VXSRUWH GHVHQYROYLPHQWR
e treinamento, ou seja, são empreendimentos comerciais. O discurso de Mundie
EXVFDUHGX]LURGHVHQYROYLPHQWRGHVRIWZDUHDRVHXPRGHORGHQHJyFLRVHLQGLFDU
TXHGRSRQWRGHYLVWDHFRQ{PLFRVypSRVVtYHOREWHUJDQKRVFRPRVHXPRGHOR
de licenciamento.
 &RP XPD FODUH]D FRQVWUDQJHGRUD 0XQGLH D¿UPRX TXH ³DOpP GRV LPSUH
YLVtYHLVULVFRVjVHJXUDQoDTXHRPRGHORGHFyGLJRDEHUWRSRGHLPSOLFDUSDLUDVHP
SUHQRDURSHULJRGHDSURSULHGDGHLQWHOHFWXDOFDLUQRGRPtQLRS~EOLFR´ 081',(
  (VWD YLVmR QmR p FRQVHQVXDO QD iUHD GH VHJXUDQoD GLJLWDO$R FRQWUiULR p
FDGD YH] PDLV TXHVWLRQiYHO %UXFH 6FKQHLHU HVSHFLDOLVWD HP VHJXUDQoD GLJLWDO
WHPGHIHQGLGRTXHXPVRIWZDUHIHFKDGRpLQVHJXURSRLVVHRXVXiULRQmRSRGH
FRQKHFHUVHXFyGLJRIRQWHQmRWHPFRPRVDEHUTXDLVDVURWLQDVTXHQHOHIRUDP
HPEXWLGDV$OpPGLVVRRIDWRGHVHUDEHUWRQmRLPSHGHDVHJXUDQoDDRFRQWUiULR
permite a auditabilidade plena do software e a sua avaliação antes e depois de
FRPSLODGRRXVHMDWUDQVIRUPDGRHPFyGLJRELQiULR
 1R WH[WR ³6HFUHF\ 6HFXULW\ DQG 2EVFXULW\´ %UXFH 6FKQHLHU DR WUDWDU GH
XPDGDViUHDVPDLVLPSRUWDQWHVSDUDDVHJXUDQoDHPUHGHDFULSWRJUD¿DHYLGHQFLD
DLPSRUWkQFLDGDWUDQVSDUrQFLD

³8PD UHJUD EiVLFD GD &ULSWRJUD¿D p XVDU DOJRULWPRV H SURWRFRORV


publicados e públicos [no sentido do direito de uso]. Esse princípio
IRL IRUPXODGR LQLFLDOPHQWH SRU $XJXVWH .HUFNKRIIV HP  µQXP
VLVWHPD FULSWRJUi¿FR EHP SURMHWDGR D QHFHVVLGDGH GH VLJLOR SRGH
FRQFHQWUDUVH QDV FKDYHV FULSWRJUi¿FDV QmR SUHFLVD KDYHU VHJUHGR
QR DOJRULWPR¶ &ULSWyJUDIRV PRGHUQRV WrP DEUDoDGR HVVH SULQFtSLR
FRPR UHJUD QRPHDQGR ³VHJXUDQoD SRU REVFXULGDGH´ D VXD DQWtWHVH
4XDOTXHU VLVWHPD TXH SUHWHQGD PDQWHU R DOJRULWPR HP VHJUHGR SRU
PRWLYRGHVHJXUDQoDpYLVWRSHODFRPXQLGDGHFLHQWt¿FDHVSHFLDOL]DGD
FRP GHVFRQ¿DQoD GHVGHQKRVDPHQWH DSHOLGDGR GH VLVWHPD ³GR
KRPHPGDFREUD´RXSLRU(PERUDRSULQFtSLRGH.HUFNKRIIVYDOKDSDUD
DFULSWRJUD¿DDUHODomRJHUDOHQWUHVHJXUDQoDHVLJLORpPDLVFRPSOH[D
do que este indica. (...) Não se deve ler nele uma indicação de que
DOJRULWPRVHSURWRFRORVGHYDPQHFHVVDULDPHQWHVHUSXEOLFDGRVDSHQDV
GHTXHVXDVHJXUDQoDQmRGHYDGHSHQGHUGRVLJLORGRVPHVPRV1RV
GLDVGH.HUFNKRIIVQmRKDYLDXPDJUDQGHFRPXQLGDGHGHHVSHFLDOLVWDV
TXH SXGHVVH DQDOLVDU H FULWLFDU VLVWHPDV FULSWRJUi¿FRV GH VRUWH TXH
QmRKDYHULDEHQHItFLRWDQJtYHOHPSXEOLFiORVPDVKRMHKiFRQVLGHUiYHO
206 • Software livre, cultura hacker e o ecossistema da colaboração

benefício na publicação, e ainda mais em se usar sistemas projetados


por terceiros já publicados e [positivamente] analisados. Mantê-los
VHFUHWRV p RVEFXULGDGH GHVQHFHVViULD R SULQFtSLR GH .HUFNKRIIV GL]
TXHQmRGHYHKDYHUPRWLYRGHVHJXUDQoDDLPSHGLUDSXEOLFDomRHD
PRGHUQDFRPXQLGDGHGHFULSWyJUDIRVUHLWHUDGDPHQWHGHPRQVWUDVHXV
HQRUPHVEHQHItFLRV´ 6&+1(,(5 

2 PRGHOR GH VRIWZDUH SURSULHWiULR EDVHDGR HP UHVWULo}HV GH XVR QD
LPSRVVLELOLGDGH GH DOWHUDo}HV QR RFXOWDPHQWR GR FyGLJR IRQWH JHUD G~YLGDV H
LQFHUWH]DV 8PD GHODV UHFDt VREUH D JDUDQWLD GH SULYDFLGDGH GRV FLGDGmRV TXH
usam um software no qual as pessoas são levadas a concordar com cláusulas
de licenciamento que, por si, denunciam a existência de uma série de rotinas
embutidas no software que possibilitam a invasão não-autorizada ou não pretendida
GRVHXFRPSXWDGRUFRPRSRGHPRVQRWDUQRVHJXLQWHDUWLJRGR(8/$GR0LFURVRIW
:LQGRZV;33URIHVVLRQDO

³$78$/,=$d®(6'(6(*85$1d$3URYHGRUHVGHFRQWH~GRXWLOL]DP
D WHFQRORJLD GH JHUHQFLDPHQWR GH GLUHLWRV GLJLWDLV ³0LFURVRIW '50´ 
FRQWLGDQHVWH3URGXWRSDUDSURWHJHUDLQWHJULGDGHGHVHXVUHVSHFWLYRV
FRQWH~GRV ³&RQWH~GRSURWHJLGR´ D¿PGHTXHQmRKDMDDSURSULDomR
indevida de sua propriedade intelectual - incluindo os direitos autorais
 QHVVHV FRQWH~GRV 2V SURSULHWiULRV GHVVH &RQWH~GR SURWHJLGR
³3URSULHWiULRV GH FRQWH~GR SURWHJLGR´  SRGHUmR RFDVLRQDOPHQWH
VROLFLWDUj0LFURVRIWTXHIRUQHoDDWXDOL]Do}HVUHODFLRQDGDVjVHJXUDQoD
SDUD RV FRPSRQHQWHV GH 0LFURVRIW '50 GR 3URGXWR ³$WXDOL]Do}HV
GHVHJXUDQoD´ TXHSRVVDPDIHWDUVXDFDSDFLGDGHGHFRSLDUH[LELUH
RX H[HFXWDU XP &RQWH~GR SURWHJLGR XWLOL]DQGR VRIWZDUH 0LFURVRIW RX
DSOLFDWLYRVGHWHUFHLURVTXHHPSUHJXHP0LFURVRIW'503RUWDQWRYRFr
concorda que, se você optar por fazer o download da Internet de uma
OLFHQoDTXHSHUPLWDRXVRGHXP&RQWH~GRSURWHJLGRD0LFURVRIWSRGHUi
em conjunto com essa licença, fazer também, em seu computador, o
GRZQORDG GHVVDV $WXDOL]Do}HV GH VHJXUDQoD FXMD GLVWULEXLomR WHQKD
VLGRVROLFLWDGDj0LFURVRIWSRUXP3URSULHWiULRGHFRQWH~GRSURWHJLGR
$ 0LFURVRIW QmR LUi UHFXSHUDU QHQKXPD LQIRUPDomR GH LGHQWL¿FDomR
pessoal, nem nenhuma outra informação, do seu computador através
GRGRZQORDGGHVVDV$WXDOL]Do}HVGHVHJXUDQoD´

A essência do modelo proprietário de licenciamento de software está no con-


trole do conhecimento. Para obtê-lo é necessário excluir todos, inclusive os usuá-
ULRVGRDFHVVRDRFyGLJRIRQWH1HVVHPRGHORVRPHQWHRGHVHQYROYHGRUHVHXV
IXQFLRQiULRVFRQKHFHPRFRQWH~GRGDVOLQKDVTXHFRPS}HPRSURJUDPDRXDVR
OXomR3RULVVRRTXHpYHQGLGRpDOLFHQoDGHXVRGRSURJUDPDHQXQFDRSURJUDPD
Esse continuará sempre sendo propriedade de empresa que o desenvolveu.
Software livre, cultura hacker e o ecossistema da colaboração • 207

 (VVD OyJLFD GH SURSULHGDGH EXVFD HYLWDU VRPHQWH TXH RXWUDV SHVVRDV H
HPSUHVDVWHQKDPDFHVVRjVOLQKDVGHFyGLJRTXHFRPS}HPRVRIWZDUHXPDYH]TXH
RFyGLJRIHFKDGRQmRLPSHGHQHPEORTXHLDDFySLDQmRDXWRUL]DGDSRSXODUPHQWH
GHQRPLQDGDGH³FySLDSLUDWD´$RFRQWUiULRIRLD³SLUDWDULD´GRVRIWZDUHTXHYLDELOL]RX
e popularizou o software da Microsoft, que era vendido com os computadores padrão
3&&RPDDUTXLWHWXUDDEHUWDSHOD,%0QmRHUDFULPHSURGX]LUXPFRPSXWDGRULJXDO
em qualquer país. Muitas empresas passaram a usar e a montar computadores
3& H D FRSLDU LOHJDOPHQWH R VRIWZDUH SURSULHWiULR GD 0LFURVRIW$ MXQomR HQWUH D
arquitetura aberta do hardware e a cópia não-autorizada do software popularizou
em todo o mundo o sistema operacional proprietário.
É o livre acesso ao conhecimento que o modelo proprietário bloqueia. Não
R XVR 2 XVR LOHJDO FKHJD D VHU IXQFLRQDO SDUD D PDQXWHQomR GH VHX PRQRSyOLR
sobre um determinado tipo de aplicação ou solução. A cópia não autorizada é
LPSRUWDQWHSDUDFULDUXPDPDVVDFUtWLFDGHXVXiULRVGHVROXo}HVSURSULHWiULDV(P
JHUDORSUHoRGDVOLFHQoDVpSHQVDGRMiSUHYHQGRRXVRQmRDXWRUL]DGRHTXDVH
TXH YROWDGR SDUD R PXQGR FRUSRUDWLYR HPSUHVDV JRYHUQRV H LQVWLWXLo}HV (VVHV
VmR PDLV IiFHLV GH VH ¿VFDOL]DU H H[LJLU R SDJDPHQWR SHODV OLFHQoDV GH XVR GR
TXHRVXVXiULRVUHVLGHQFLDLV1mRpDFySLDLOHJDOQHPDSURWHomRGDVSRVVtYHLV
IUDJLOLGDGHVGRVRIWZDUHTXHRVFUDFNHUVWmREHPVDEHPH[SORUDUTXHRFyGLJRIRQWH
IHFKDGRJDUDQWHVHXREMHWLYRpLPSHGLUROLYUHÀX[RGRFRQKHFLPHQWRWHFQROyJLFR
SDUD H[WUDLU GHVVH EORTXHLR YDQWDJHQV HFRQ{PLFDV RX VHMD D UHPXQHUDomR GR
modelo.

Cenários do confronto entre forças do compartilhamento e do


bloqueio do conhecimento tecnológico

³$UHGH,QWHUQHWHVWiSURWDJRQL]DQGRXPIHQ{PHQRQRYRVHPSUHFH
dentes na história da nossa civilização, cujas consequências consi-
deramos potencialmente imprevisíveis no momento. Estamos nos
UHIHULQGRjFULDomRFRRSHUDWLYDGHEHQVGHLQIRUPDomRSRUFHQWHQDVjV
vezes milhares de autores que se comunicam através da Internet. Men-
FLRQDPRVGXDVLQVWkQFLDVGHVVHIHQ{PHQRDPEDVTXDVHLQWHLUDPHQWH
FRQWLGDVQRV~OWLPRVGH]DQRVRDGYHQWRGRVLVWHPDRSHUDFLRQDO*18
/LQX[HDFRQVWUXomRGRFRQWH~GRFROHWLYRGD³ZRUOGZLGHZHE´ 3URI
Imre Simon)

-RKQ3HUU\%DUORZXPGRVIXQGDGRUHVGD(OHWURQLF)URQWLHU)RXQGDWLRQ
MiKDYLDDOHUWDGRHPTXHDHUDGDLQIRUPDomRHVWDYDSURSLFLDQGRPXGDQoDV
208 • Software livre, cultura hacker e o ecossistema da colaboração

SURIXQGDV QR FRQFHLWR GH SURSULHGDGH (VFUHYHX QD 5HYLVWD :LUHG  TXH
a economia do futuro será baseada mais em relacionamento do que em posse.
%$5/2: $FRODERUDomRJHUDULDPDLVYDORUGRTXHDVIRUPDVWUDGLFLRQDLV
de apropriação de riqueza alicerçadas sobre a propriedade. Exatamente o processo
cooperativo e relacional, típico do movimento de software livre, vem levantando
XPDVpULHGHG~YLGDVVREUHVXDVFRQVHTXrQFLDVVyFLRHFRQ{PLFDV(PVXDDQiOLVH
GRIHQ{PHQR+pOLR*XURYLW]HVFUHYHXTXHSUHIHUH

³YHU D WXUPD GR /LQX[ QmR FRPR XPD DPHDoD DSHQDV FRQWUD R
PRQRSyOLR GD 0LFURVRIW PDV FRQWUD WRGD D HVWUXWXUD HFRQ{PLFD
GR GHVHQYROYLPHQWR GH VRIWZDUH 3LDGDV H SURYRFDo}HV j SDUWH R
VRIWZDUH/LYUHDSDUHQWHPHQWHDWLQJLXRFDOFDQKDUGHDTXLOHVGRPXQGR
GR VRIWZDUH SURSULHWiULR D LGHLD GH TXH D SURWHomR GD SURSULHGDGH
intelectual é a melhor forma de incentivar o desenvolvimento de
VRIWZDUHGHTXDOLGDGH´ *8529,7= 

O movimento colaborativo de desenvolvimento e uso de software está pre-


sente em todos os Continentes e tem contaminado outras áreas da produção sim-
bólica e cultural. O Creative Commons é um exemplo dessa irradiação contrária ao
DWXDOPRGHORKHJHP{QLFRGHSURSULHGDGHGHEHQVLQWDQJtYHLVTXHLQVSLUDGRSHOR
movimento do software livre, avançou para a produção de outros bens culturais,
tais como a música, a literatura e as artes. Preocupados com a redução do ritmo
GH FUHVFLPHQWR GR GRPtQLR S~EOLFR GHYLGR DR HQULMHFLPHQWR GDV OHJLVODo}HV GH
propriedade intelectual, o movimento jurídico-cultural do Creative Commons quer
JHUDUXPOLFHQFLDPHQWRGHEHQVFXOWXUDLVTXHVHMDPDLVSHUPLVVLYRHDVVHJXUHD
OLEHUGDGHDRFRQKHFLPHQWRHDFLUFXODomRGHLGHLDV0DLVGHXPPLOKmRGHFULDo}HV
principalmente músicas, em janeiro de 2005, já estavam licenciadas no modelo
Creative Commons.
Nos primeiros cinco anos do século XXI, é plenamente constatável a exis-
tência de um amplo movimento mundial que busca superar as barreiras impostas
SHOD SURSULHGDGH GH LGHLDV DR ÀX[R GR FRQKHFLPHQWR H DR PHVPR WHPSR WDP
EpPpQtWLGDDIRUWHUHDomRGRVPDLRUHVEHQH¿FLiULRVGRPRGHORSUHGRPLQDQWHGR
FRS\ULJKWHGRSDWHQWHDPHQWR2FHQiULRGHVVHFRQIURQWRHVWiUHSOHWRGHFRQWHQ
FLRVRV H HQYROYH XP FRQMXQWR GH VHJPHQWRV RFRUUHQGR HP GLYHUVRV QtYHLV 2V
maiores interessados na defesa do modelo proprietário de licenciamento de
VRIWZDUHVmRWDPEpPVHXVPDLRUHVEHQH¿FLDGRVHGHIHQVRUHVRXVHMDDVJUDQGHV
empresas de software proprietário e toda a cadeia de representantes comerciais e
WHFQROyJLFRVORFDLVYLQFXODGDH[FOXVLYDPHQWHDHVVDVJUDQGHVHPSUHVDV$JHQWHV
Software livre, cultura hacker e o ecossistema da colaboração • 209

JRYHUQDPHQWDLV DXWRULGDGHV H IXQFLRQiULRV  ID]HP SDUWH GR VHJXQGR Qy GHVVD


UHGHGHGHIHVDGRPRGHORSURSULHWiULRSRLVRVJRYHUQRVVmRSHoDVHVVHQFLDLVQD
PDQXWHQomRGRPRGHORKHJHP{QLFRVHMDSRUVHXHQRUPHSRGHUGHFRPSUDVHMD
SHODVXDFDSDFLGDGHHFRPSHWrQFLDQRUPDWLYDVHMDSHODVXDLQÀXrQFLDQRFRQMXQWR
GD VRFLHGDGH SULQFLSDOPHQWH SHOD JHVWmR GDV HVFRODV S~EOLFDV 2 WHUFHLUR Qy p
FRVWXUDGR FRP RV LQWHOHFWXDLV FRQVHUYDGRUHV H RV SUR¿VVLRQDLV GD IRUPDomR GD
opinião pública, muitos dos quais fazem a defesa do modelo por remuneração e não
SRUFRQYLFomRLGHROyJLFD2TXDUWRIRUPDVHFRPRVSHVTXLVDGRUHVHDFDGrPLFRV
TXH FRP YHUEDV S~EOLFDV GLPLQXWDV ¿FDP VXEPHWLGRV DR ¿QDQFLDPHQWR GHVVDV
JUDQGHVHPSUHVDVHDRVYtQFXORVGHOHDOGDGHJHUDGRV2TXLQWRSRQWRGDUHGHVmR
DVRUJDQL]Do}HVQmRJRYHUQDPHQWDLVIRUPDGDVSDUDDGHIHVDGHVVHPRGHORHR
VH[WRVmRDOJXPDVLQVWLWXLo}HVLQWHUQDFLRQDLVQDFLRQDLVHORFDLVTXHDWXDPHPXPD
DPSOD JDPD GH DWLYLGDGHV HGXFDWLYDV H VyFLRFXOWXUDLV WRGDV UHDOL]DGDV VREUH D
plataforma proprietária.
O modelo cooperativo possui uma rede que tem nos desenvolvedores de
VRIWZDUH OLYUH SULQFLSDOPHQWH RV KDFNHUV H VXD pWLFD PHULWRFUiWLFD R HOHPHQWR
LUUDGLDGRUGHVROXo}HVTXHDVVHJXUDPRVHXVXFHVVRQmRDSHQDVQRGLVFXUVRPDV
do ponto de vista da qualidade dos softwares, protocolos e sistemas. Pequenas e
PpGLDVHPSUHVDVTXHVREUHYLYHPH[FOXVLYDPHQWHGRFRPSDUWLOKDPHQWRGHFyGLJR
aberto ou de um modelo híbrido já aparecem no cenário como atuantes na defesa
GR QRYR PRGHOR *HVWRUHV S~EOLFRV LQRYDGRUHV H DXWRULGDGHV SROtWLFDV DWHQWDV j
TXHVWmRWHFQROyJLFDFRQVWLWXHPRXWURLPSRUWDQWHQy2VJRYHUQRVFRPRJUDQGHV
FRQVXPLGRUHV GH WHFQRORJLD GD LQIRUPDomR TXDQGR DGHUHP DR PRGHOR DEHUWR
JHUDPXPHIHLWRGHUHGHLQÀXHQFLDQGRWRGDDVRFLHGDGH&LHQWLVWDVDFDGrPLFRVH
SHVTXLVDGRUHVFRQVWLWXHPRQyPDLVDQWLJRGHVVDUHGHSRLVRSUySULRPRYLPHQWR
de software livre nasceu de um pesquisador em um instituto de pesquisa. Mais
recentemente, os movimentos sociais, ambientalistas, feministas, de educação
SRSXODU H DQWLJOREDOL]DomR GHVFREULUDP R GHEDWH GR VRIWZDUH OLYUH H LQLFLDUDP
um processo de adesão que pode ter efeitos concretos na elevação do seu uso e
também efeitos na formação da opinião pública.
 e IXQGDPHQWDO UHJLVWUDU D H[LVWrQFLD GH XPD ¿VVXUD LPSRUWDQWH HQWUH DV
JUDQGHV HPSUHVDV GH WHFQRORJLD GD LQIRUPDomR H FRPXQLFDomR HP UHODomR DR
PRGHOR GH GHVHQYROYLPHQWR FRODERUDWLYR $OJXQV GHVVHV JLJDQWHV GD WHFQRORJLD
captaram a tendência de crescimento do compartilhamento do conhecimento
WHFQROyJLFRHDYDOLDUDPVXDH[SDQVmRFRPRSDVVtYHOGHVHWRUQDUSUHGRPLQDQWH
$VVLPSDVVDUDPDEXVFDURSRUWXQLGDGHVHFRQ{PLFDVQRVVHUYLoRVHQmRVRPHQWH
QDH[SORUDomRGDSURSULHGDGH(QTXDQWRVHPDQWrPQRPRGHORKHJHP{QLFRSDV
VDUDPDVHHQYROYHUQRDSRLRDRGHVHQYROYLPHQWRGHVROXo}HVDEHUWDVMXQWRjFR
210 • Software livre, cultura hacker e o ecossistema da colaboração

PXQLGDGHGHVRIWZDUHOLYUH3UHIHUHPVHGLVWDQFLDUGRGLVFXUVRPDLVLGHROyJLFRGH
5LFKDUG6WDOOPDQHXWLOL]DUDH[SUHVVmR³2SHQ6RXUFH´SDUDVXDVVROXo}HV$OJXPDV
FULDUDPFRQVyUFLRVSDUDGLVSRQLELOL]DUFRPSRQHQWHVGHVRIWZDUHHPFyGLJRDEHUWR
usando o licenciamento mais próximo ao padrão Mozilla e aos da família BSD. Em
VtQWHVH HVWDV HPSUHVDV SDVVDUDP D DSRVWDU HP FyGLJR DEHUWR VHMD FRPR XPD
forma de se reposicionar em um mercado que foi perdido, para reduzir custos de
3 ' RX SDUD DFRPSDQKDU D WHQGrQFLD FUHVFHQWH GH YHQGD GH VHUYLoRV H QmR GH
SURSULHGDGH $V PDLRUHV UHSUHVHQWDQWHV GHVVD WHQGrQFLD VmR ,%0 1RYHO 6XQ
0LFURV\VWHPV+3H&RPSXWHU$VVRFLDWHV
 2FRQVXOWRUGD,%0&H]DU7DXULRQHVFODUHFHDRSomRGHJUDQGHVHPSUHVDV
SRULQLFLDUSURMHWRVGHVRIWZDUHOLYUHRXVLPSOHVPHQWHDEHUWR

³8P VLVWHPD RSHUDFLRQDO FRPR R /LQX[ FDVR IRVVH GHVHQYROYLGR SRU


uma única empresa, nos moldes tradicionais, custaria (completo e com
WRGRV RV VHXV DGLWLYRV  DOJR FRPR FHQWHQDV GH PLOK}HV GH GyODUHV
8PDHPSUHVDWHULDTXHFRQVHJXLUHVFDODGHPHUFDGRDPSODHUiSLGRR
VX¿FLHQWHSDUDVHPDQWHUYLYD2PRGHORGHVRIWZDUHOLYUHGLOXLFXVWRV
pelo trabalho voluntário de dezenas de milhares de colaboradores.
2V FXVWRV ¿[RV GH SHVTXLVD H GHVHQYROYLPHQWR QmR VmR DORFDGRV D
nenhum centro de custo ou a uma empresa. O modelo livre permite a
sobrevivência do produto mesmo quando a escala do mercado não é
VX¿FLHQWH SDUD D VXVWHQWDomR GH XP SURGXWR FRPHUFLDO´ 7$85,21
 

As redes de software proprietário e de software livre não possuem centro


GHFRPDQGRPDVH[LVWHPDo}HVUHDOL]DGDVSRUVHXVLQWHJUDQWHVGHSHVRTXHDFD
EDPGLULJLQGRHFRQGX]LQGRDYDQoRVHUHFXRVGRHVSDoRGHFDGDPRGHOROLYUHH
proprietário. A Microsoft, pelo seu peso internacional e pela sua extensa presença
QRPHUFDGRPXQGLDOFRORFDVHQDSRVLomRGHJXDUGLmGRPRGHORSURSULHWiULRSRLV
RVHXPRQRSyOLRQDiUHDGHGHVNWRSSDUDVHUPDQWLGRGLDQWHGDVSRVVLELOLGDGHV
GRV SURGXWRV OLYUHV H FRPSDUWLOKDGRV H[LJH XP FRQMXQWR GH Do}HV TXH DFDEDP
extrapolando sua mera defesa comercial através das práticas de publicidade e
SURSDJDQGD
 eLGHQWL¿FiYHOXPFRQMXQWRGHDo}HVGD0LFURVRIWQDGHIHVDGRVHXPRQRSyOLR
QD iUHD GH GHVNWRS H QD VXD WHQWDWLYD GH H[SDQVmR SDUD RXWURV VHJPHQWRV GDV
WHFQRORJLDVGDLQIRUPDomRHFRPXQLFDomR6mRHOHVDo}HVVREUHRVJRYHUQRVD
SDUWLUGDIRUPDomRGHOREELHVSUR¿VVLRQDLVHSHUPDQHQWHVDo}HVVREUHSDGU}HV
HVREUHRGHVHQYROYLPHQWRGDVWHFQRORJLDVEXVFDQGRFULDUHGLVVHPLQDUVROXo}HV
TXH ¿GHOL]HP RX DSULVLRQHP RV XVXiULRV j VXD SODWDIRUPD WDPEpP FRQKHFLGDV
FRPRSUiWLFDGR³HPEUDFHH[WHQGDQGH[WLQJXLVK´ H[HPSORRXVRGDOLQJXDJHP
Software livre, cultura hacker e o ecossistema da colaboração • 211

9LVXDO %DVLF SDUD VH HVFUHYHU XP SURJUDPD R YLQFXOD VRPHQWH DR VLVWHPD
RSHUDFLRQDOGD0LFURVRIW Do}HVFRPHUFLDLVVREUHRXWUDVHPSUHVDVGHVRIWZDUHH
hardware. A Microsoft assina acordos com empresas de hardware para que todos
RVFRPSXWDGRUHVVHMDPGLVWULEXtGRVFRPVHXVRIWZDUH7DPEpPID]FRPSHQVDo}HV
WDLVFRPRUHDOL]DURSDJDPHQWRGDSXEOLFLGDGHGDVHPSUHVDVGHKDUGZDUHHPWURFD
GDUHFRPHQGDomRGHVHXVSURGXWRVHWFDo}HVSURSDJDQGtVWLFDHLGHROyJLFDWDO
FRPR D HVWUDWpJLD GR )8' )HDU 8QFHUWDLQW\ DQG 'RXEW  TXH GHVFUHYHUHL PDLV
D IUHQWH  Do}HV MXGLFLDLV SDUD LQLELU R FUHVFLPHQWR GD FRQFRUUrQFLD  FULDomR H
¿QDQFLDPHQWRGHHQWLGDGHVH21*VSDUDGHIHQGHUVXDVSRVLo}HVMXQWRjRSLQLmR
pública local e internacional, para manter a ela vinculadas as iniciativas de inclusão
GLJLWDO SULQFLSDOPHQWH QD iUHD HGXFDFLRQDO 3DUD PDQWHU VXD UHGH GH XVXiULRV
D HPSUHVD GRD OLFHQoDV H DOJXPDV YH]HV UHFXUVRV SDUD HVFRODV H WHOHFHQWURV
YLVDQGR PDQWHU RV MRYHQV DFRVWXPDGRV DRV VHXV SURGXWRV  Do}HV OHJLVODWLYDV
SULQFLSDOPHQWH DSRLDQGR R HQGXUHFLPHQWR GDV OHJLVODo}HV VREUH D SURSULHGDGH
LQWHOHFWXDOHWHQWDQGRQHXWUDOL]DURXLPSHGLURVXUJLPHQWRGHOHLVTXHLQFHQWLYHPR
uso do modelo aberto e livre.
 $HVWUDWpJLDGHQRPLQDGDLGHROyJLFDEXVFDDWLQJLURVIRUPDGRUHVGHRSLQLmR
S~EOLFDHRVWpFQLFRV8PDGDVDo}HVUHDOL]DGDVPDLVDODUGHDGDVIRLDGLYXOJDomR
de estudos sobre o Custo Total de Propriedade (TCO) de um software livre, em
JHUDO R /LQX[ HP FRPSDUDomR FRP R DPELHQWH 0LFURVRIW 2V HVWXGRV SURFXUDP
GHPRQVWUDUTXHRVRIWZDUHSURSULHWiULRpPDLVHFRQ{PLFR(PJHUDOVXDVSUHPLVVDV
VmR EDVWDQWH TXHVWLRQiYHLV DOpP GH GHVFRQVLGHUDU RV FXVWRV GD VHJXUDQoD GRV
DQWLYtUXVHGRWHPSRHPTXHDVPiTXLQDV¿FDPSDUDGDVSRULQ~PHURVSUREOHPDV
HVSHFt¿FRVGHFDGDVLVWHPD GRZQWLPH 2REMHWLYRpFRQWHUDDGHVmRjSODWDIRUPD
OLYUH (VVHV HVWXGRV ID]HP SDUWH GR TXH YHLR D VHU GLYXOJDGR FRPR )8' IHDU
XQFHUWDLQW\DQGGRXEWRXVHMDDLGHLDpGLVVHPLQDU³RPHGRDLQFHUWH]DHDG~YLGD´
VREUHRQRYR$HVWUDWpJLDFKDPDGDGH)8'pDQWLJDQDiUHDGHWHFQRORJLDPDV
IRLYLQFXODGDj0LFURVRIWDSDUWLUGHXPFRQMXQWRGHGRFXPHQWRVLQWHUQRVTXHHVWmR
GLVSRQtYHLV QR VLWH ZZZRSHQVRXUFHRUJKDOORZHHQKDOORZHHQKWPO (OHV IRUDP
WRUQDGRVS~EOLFRVGDIRUPDGHVFULWDSRU+pOLR*XURYLW]

³1R GLD  GH RXWXEUR GH  DOJXQV DUTXLYRV LQWHUQRV DSHOLGDGRV
GH µ'RFXPHQWRV +DOORZHHQ¶ YD]DUDP SHOD ,QWHUQHW GD VHGH GD
0LFURVRIW HP 5HGPRQG QR (VWDGR DPHULFDQR GH :DVKLQJWRQ 2
autor, o funcionário Vinod Valloppillil, não titubeava ao reconhecer as
IRUoDV GR 6RIWZDUH /LYUH VLF  ³2 6RIWZDUH $EHUWR UHSUHVHQWD XPD
DPHDoDGLUHWDjSODWDIRUPDHjVUHFHLWDVGHFXUWRSUD]RGD0LFURVRIW
particularmente no espaço dos servidores. Além disso, o paralelismo
intrínseco e a livre troca de ideias do Software Aberto trazem benefícios
que não são replicáveis com o nosso modelo atual de licenciamento e,
212 • Software livre, cultura hacker e o ecossistema da colaboração

SRUWDQWRUHSUHVHQWDPXPDDPHDoDGHORQJRSUD]RQDSHUFHSomRGRV
GHVHQYROYHGRUHV´(9DOORSSLOOLOLDDOpP³$FDSDFLGDGHGRSURFHVVRGH
Software Aberto de arrebanhar e aproveitar o QI coletivo de milhares de
indivíduos espalhados pela internet é simplesmente inacreditável. Mais
LPSRUWDQWH DLQGD D HYDQJHOL]DomR GR 6RIWZDUH$EHUWR FUHVFH FRP R
tamanho da internet muito mais rápido que os nossos próprios esforços
GHHYDQJHOL]DomRSDUHFHPFUHVFHU´ *8529,7= 

(P GHWHUPLQDGR WUHFKR GR GRFXPHQWR VHX DXWRU D¿UPD ³266 >2SHQ
6RIWZDUH@LVORQJWHUPFUHGLEOH>WKHUHIRUH@)8'WDFWLFVFDQQRWEHXVHGWRFRPEDW
LW´ 2X VHMD R )8' HVWDYD VHQGR HPSUHJDGR SHOD 0LFURVRIW FRPR XPD WHQWDWLYD
GHFRQWHQomRGRPRGHORGHVRIWZDUHOLYUH6HJXQGRR7KH-DUJRQ)LOHGLFLRQiULR
GHWHUPRVXVXDLVQDFRPXQLGDGHGHSURJUDPDGRUHVPDQWLGRDWXDOPHQWHSRU(ULF
5D\PRQG³$H[SUHVVmR)8'IRLGH¿QLGDSRU*HQH$PGDKOGHSRLVGHVDLUGD,%0
HIXQGDUVXDSUySULDFRPSDQKLD

³)8'pRPHGRDLQFHUWH]DHDG~YLGDTXHYHQGHGRUHVGD,%0LQV
tilavam na mente de potenciais clientes inclinados a considerar a opção
de produtos concorrentes. A ideia, óbvia, era a de persuadi-los a se
PDQWHUHPFRPRWUDGLFLRQDOIRUQHFLPHQWRGD,%0DRLQYpVGHPLJUDU
SDUDFRPSHWLGRUHV$FRHUomRLPSOtFLWDHUDDOFDQoDGDYLDGHUHJUDSHOD
promessa de que Coisas Boas aconteceriam a quem se mantivesse
FRP D ,%0 HQTXDQWR 6RPEUDV 1HJUDV SDLUDYDP VREUH R IXWXUR GRV
HTXLSDPHQWRVHVRIWZDUHVGRVFRQFRUUHQWHV'HSRLVGHRWHUPR
)8'SDVVRXDVHUFDGDYH]PDLVDVVRFLDGRj0LFURVRIWUHIHULQGRVH
JHQHULFDPHQWH D TXDOTXHU WLSR GH GHVLQIRUPDomR XVDGD FRPR DUPD
FRPSHWLWLYD´ 5$<021' 

A difusão de boatos assustadores sobre o novo produto concorrente para


GLVVXDGLU RV SRVVtYHLV XVXiULRV p DUWLFXODGR FRP Do}HV SROtWLFDV VREUH JRYHUQRV
e parlamentos. A mais conhecida é a pressão realizada pela Microsoft sobre a
3UHIHLWXUDGH0XQLTXHTXDQGRHVVDGHFLGLXXWLOL]DUVRIWZDUHDEHUWRHPVXDVPLO
HVWDo}HVGHWUDEDOKR0DVDTXHQLWLGDPHQWHFRPELQRXYiULDVDo}HVHPWRUQRGR
)8'RFRUUHXQR3HUXDSDUWLUGH5XEHQV4XHLUR]GH$OPHLGDGD8QLFDPS
UHVXPLXEHPRRFRUULGR

³8OWLPDPHQWH VHPSUH TXH DOJXP JRYHUQR PDQLIHVWD D ¿UPH LQWHQomR


GHDGRWDUVRIWZDUHOLYUHHPODUJDHVFDODµSUHVHQWHV¶DSDUHFHPGRQDGD
0LOK}HVGHGyODUHVHPVRIWZDUHJUDWXLWRSDUDXVRHGXFDFLRQDORXJUDQGHV
GHVFRQWRV VmR RIHUHFLGRV ³JHQHURVDPHQWH´ 2 FDVR PDLV FpOHEUH
discutido amplamente na Internet, foi o projeto de lei apresentado pelo
FRQJUHVVLVWD (GJDU 9LOODQXHYD GR SDUWLGR JRYHUQLVWD ³3HUX 3RVLEOH´
Software livre, cultura hacker e o ecossistema da colaboração • 213

(PVHXSURMHWRGHOHLHUDSURSRVWRRXVR³H[FOXVLYR´GHVRIWZDUHOLYUHQR
kPELWRJRYHUQDPHQWDO$SUHVVmRTXHVHVHJXLXIRLLQWHQVD2JHUHQWH
JHUDOGD0LFURVRIWQR3HUX-XDQ$OEHUWR*RQ]iOH]HVFUHYHXXPDFDUWD
DR FRQJUHVVLVWD DOHUWDQGRR GRV ³SHULJRV´ H GR ³SUHMXt]R´ TXH R 3HUX
iria sofrer com a adoção do software livre. O embaixador americano
em Lima, em carta ao Presidente, expressou sua surpresa que tal lei
pudesse ter sido proposta. Bill Gates pessoalmente, visitou o Peru e
RIHUHFHXVHXSUHVHQWH8HPFRPSXWDGRUHVFRPFRQH[mR
j,QWHUQHW´ $/0(,'$ 

2SURMHWRGH/HLQGHDXWRULDGRGHSXWDGR(GJDU9LOODQXHYDDSUH
VHQWDGRHPGHGH]HPEURGHQRSDUODPHQWRSHUXDQRQmRIRLYRWDGRGHYLGR
jHQRUPHSUHVVmRGD0LFURVRIW$LQLFLDWLYDSHUXDQDIRLXPDGHQWUHLQ~PHUDVSUR
SRVLo}HVOHJLVODWLYDVTXHVXUJLUDPYLVDQGRGLVVHPLQDUSXEOLFDPHQWHDTXHVWmRGR
PRGHOR QmRSURSULHWiULR H DEHUWR GH GHVHQYROYLPHQWR H XVR GR VRIWZDUH -i HP
 R GHSXWDGR IHGHUDO EUDVLOHLUR :DOWHU 3LQKHLUR GR 37 GD %DKLD DSUHVHQWRX
QD&kPDUDGRVGHSXWDGRVRSURMHWRGH/HLQSURSRQGRRXVRSUHIHUHQFLDO
do software livre na administração pública. Também não foi votado até hoje. Na
$UJHQWLQDRSURMHWRGH/HL'3ROtWLFDGHXWLOL]DFLyQGHVRIWZDUHOLEUHSRUHO
(VWDGR1DFLRQDODSUHVHQWDGRQD&kPDUDGRV'HSXWDGRVGR&RQJUHVVR1DFLRQDO
$UJHQWLQR SHORV GHSXWDGRV 0DUFHOR 'UDJDQ (QULTXH %HFHUUD H 5RVDQD $QGUHD
%HUWRQHQRGLDGHPDUoRGHWDPEpPQmRWHYHXPGHVWLQRGLIHUHQWH
 3RURXWURODGRDDGHVmRGHXPDVpULHGHSROtWLFRVjEDQGHLUDGRFyGLJR
DEHUWRHGRFRPSDUWLOKDPHQWRGRFRQKHFLPHQWRWHFQROyJLFRJHURXXPDIRUWHUHDomR
por parte da rede interessada na manutenção do modelo proprietário. Foi criado
um movimento internacional denominado The Initiative for Software Choice. Ele
VXUJH D SDUWLU GH XP GRV QyV DWLYRV GHVVD UHGH TXH VmR DV RUJDQL]Do}HV QmR
JRYHUQDPHQWDLVFRQVWLWXtGDVSHODLQG~VWULDGHWHFQRORJLDGDLQIRUPDomR(VVDVVmR
RUJDQL]Do}HVTXHEXVFDPIDODUSRUWRGRRVHJPHQWRGHVRIWZDUHSDUDWHUOHJLWLPLGDGH
GLDQWHGRVJRYHUQRVHGDRSLQLmRS~EOLFD7RGDYLDHVVDV21*VVmRFRQWURODGDVSRU
HPSUHVDV LQVHULGDV LQWHJUDOPHQWH QR PRGHOR FRPHUFLDO SURSULHWiULR$V SULQFLSDLV
RUJDQL]Do}HV GHVWH WLSR VmR D %XVLQHVV 6RIWZDUH $OLDQFH %6$  H D &RPSXWLQJ
7HFKQRORJ\,QGXVWU\$VVRFLDWLRQ &RPS7,$ 
Com expressão mundial, ambas atuam cada vez mais na defesa do modelo
GHSURSULHGDGHKHJHP{QLFRQDiUHDGHEHQVLPDWHULDLV$%6$DWXDSULQFLSDOPHQWH
em campanhas contra a pirataria de software. A CompTIA atua na contenção do
VRIWZDUH DEHUWR D SDUWLU GD GHIHVD GD GRXWULQD GD QHXWUDOLGDGH WHFQROyJLFD H GD
implantação de um movimento pela livre escolha do software.
A CompTIA possuía, em 2005, 20 mil membros em 102 países. Sua sede
214 • Software livre, cultura hacker e o ecossistema da colaboração

p HP &KLFDJR PDV SRVVXL HVFULWyULRV HP FLGDGHV HVWUDWpJLFDV HVSDOKDGDV SHOR
PXQGR $PVWHUGDP %UX[HODV 'XVVHOGRUI +RQJ .RQJ -RKDQHVEXUJR /RQGUHV
2WDZD 6DR 3DXOR 6LQJDSXUD 6LGQH\ 7RN\R 7RURQWR H :DVKLQJWRQ '& 6XD
missão é

³SURYHUXPDYR]XQL¿FDGDGHGHIHVDHOLGHUDQoDJOREDOSURPRYHQGR
RSURJUHVVRGDLQG~VWULDDWUDYpVGHSDGU}HVFRPSHWrQFLDSUR¿VVLRQDO
HGXFDomR H VROXo}HV GH QHJyFLR 3DUD PHOKRU VHUYLU D LQG~VWULD H
seus membros, a CompTIA desenvolveu iniciativas especializadas
H SURJUDPDV GHGLFDGRV jV SULQFLSDLV iUHDV GD LQG~VWULD GH7, (VVDV
LQFOXHP FRQYHUJrQFLD WHFQROyJLFD FRPpUFLR HOHWU{QLFR WUHLQDPHQWR
HP 7, VHUYLoRV HP VRIWZDUH FHUWL¿FDomR SROtWLFDV S~EOLFDV H
GHVHQYROYLPHQWRGHPmRGHREUD´2

São quatro as principais áreas de atuação da CompTIA diante do que denominam


³*RYHUQPHQWDO ,VVXHV´ DVVXQWRV GH JRYHUQR  3ROtWLFD 3~EOLFD (VFROKD GR
6RIWZDUH 3DWHQWHDPHQWR GR 6RIWZDUH &RQVyUFLR SDUD D &HUWL¿FDomR$ SULPHLUD
iUHDRUJDQL]DR'HSDUWDPHQWRGH3ROtWLFD3~EOLFDGD&RPS7,$TXHEXVFD³SURWHFWV
DQGDGYDQFHVWKHLQWHUHVWVRIWKHWHFKQRORJ\FRPPXQLW\EHIRUHIHGHUDODQGVWDWH
OHJLVODWLYH´$VHJXQGDiUHDFXOPLQRXQRPRYLPHQWRSHODOLYUHHVFROKDGRVRIWZDUH
7DPEpPVmRTXDWURRVDUJXPHQWRVTXHIXQGDPHQWDPDLQLFLDWLYD

³3DUD HVWLPXODU D FRQWtQXD LQRYDomR QD iUHD GH VRIWZDUH H SURPRYHU


DDPSODHVFROKDJRYHUQRVVmRHQFRUDMDGRVDFRQVLGHUDURVVHJXLQWHV
SULQFtSLRVGHQHXWUDOLGDGH/LFLWDUVRIWZDUHEDVHDGRHPPpULWRVQmRHP
SUHIHUrQFLDVFDWHJRULDLV3URPRYHUDDPSODGLVSRQLELOL]DomRGHIXQGRV
GHSHVTXLVD3URPRYHUDLQWHURSHUDELOLGDGHDWUDYpVGHSDGU}HVQHXWURV
HP UHODomR D SODWDIRUPDV 0DQWHU XPD RSomR SRU IRUWHV SURWHo}HV j
SURSULHGDGHLQWHOHFXWDO´

$ SURSRVWD p GLVVHPLQDU D LGHLD RX GRXWULQD GD QHXWUDOLGDGH WHFQROyJLFD


FRPRUHDomRjVWHQWDWLYDVGRVJRYHUQRVHSDUODPHQWRVGHLQFHQWLYDUHPRVRIWZDUH
OLYUHSRUPHLRGHOHLVRXQRUPDVTXHGH¿QDPRPRGHORDEHUWRHFRODERUDWLYRFRPR
exclusivo ou preferencial. O discurso busca um alvo empiricamente observável,
FRPRpSRVVtYHOSHUFHEHUQRWUHFKRVHJXLQWH

Procurar software com base nos seus méritos, e não através de


SUHIHUrQFLDV FDWHJyULFDV 7RGRV RV SURGXWRV GH 6RIWZDUH RIHUHFHP

'LVSRQtYHOKWWSZZZFRPSWLDRUJDERXWGHIDXOWDVS[$FHVVRHP
'LVSRQtYHOKWWSVRIWZDUHFKRLFHRUJ$FHVVRHP
Software livre, cultura hacker e o ecossistema da colaboração • 215

variados benefícios e custos. As entidades públicas devem procurar


R VRIWZDUH TXH PHOKRU FRUUHVSRQGD jV VXDV QHFHVVLGDGHV H GHYHP
HYLWDU TXDLVTXHU SUHIHUrQFLDV FDWHJyULFDV SDUD VRIWZDUH ³RSHQ
VRXUFH´ VRIWZDUH FRPHUFLDO VRIWZDUH OLYUH RX RXWURV PRGHORV GH
desenvolvimento de software. Os Governos são mais bem servidos
quando podem escolher software de uma vasta panóplia de produtos
EDVHDGDHPFRQVLGHUDo}HVFRPRRYDORURFXVWRWRWDOGDWLWXODULGDGHR
FRQMXQWRGHFDUDFWHUtVWLFDVDSHUIRUPDQFHHDVHJXUDQoD2V*RYHUQRV
devem deixar que os mercados continuem a encorajar a inovação
no desenvolvimento de software e devem evitar intervir através de
requisitos de preferências ou de aquisição que irão discriminar um
PRGHORHPIDYRUGHRXWUR´

'RLVDUJXPHQWRVGDGRXWULQDGHYHPVHUGHVWDFDGRVRSULPHLURpTXHHV
FROKHUXPPRGHORGHGHVHQYROYLPHQWRGHVRIWZDUHpYLRODUDQHXWUDOLGDGHVHJXQGR
é que o Estado não deve interferir no mercado, pois isso prejudicaria a inovação.
0DV SRU TXH D QHXWUDOLGDGH HQWUH GRLV PRGHORV VHULD SRVLWLYD" 8P PRGHOR GH
GHVHQYROYLPHQWR SRGH EHQH¿FLDU PDLV RX PHQRV D DXWRQRPLD H FDSDFLGDGH WHF
QROyJLFDGHXPSDtVRXUHJLmRSRGHJHUDUPDLVRXPHQRVHPSUHJRVSRGHHQJHQ
GUDUPDLVRXPHQRVFRQFHQWUDomRGHULTXH]DHQ¿PSRGHVHUPHOKRURXSLRUSDUD
GHWHUPLQDGRVYDORUHVHHVWUDWpJLDV
 $ KLVWyULD GD WHFQRORJLD H SDUWLFXODUPHQWH GD ,QWHUQHW GHPRQVWUD TXH R
(VWDGR WHYH SDSHO IXQGDPHQWDO QmR VRPHQWH QR ¿QDQFLDPHQWR GH SHVTXLVDV GR
VHWRU SULYDGR PDV WDPEpP QD FRQGXomR H GH¿QLomR GH WHQGrQFLDV WHFQROyJLFDV
&$67(//66,/9(,5$ ([DWDPHQWHSRUQmRVHJXLUDOyJLFDGHFXUWR
SUD]RGRVDJHQWHVGRPHUFDGRHQmRVHUSDVVtYHOGHIDOrQFLDR(VWDGRSRGHVH
empenhar em projetos ousados e caminhar em terrenos de sucesso ainda pouco
evidente.
 $GRXWULQDGDQHXWUDOLGDGHWHPRVHXDUJXPHQWRYROWDGRjGHIHVDGRPRGHOR
SURSULHWiULR TXH HTXLYRFDGDPHQWH p DSUHVHQWDGR FRPR VLQ{QLPR GH ³PRGHOR
FRPHUFLDO´ $ WHQWDWLYD p GH FDUDFWHUL]DU R PRGHOR DEHUWR FRPR LQVXVWHQWiYHO
economicamente e sem possibilidades comerciais. A doutrina da CompTIA defende
ainda que

 ³ D SROtWLFD GR *RYHUQR UHFRQKHoD TXH RV VWDQGDUGV µRSHQ¶  TXH VH
encontram disponíveis para todos aqueles que desenvolvem software -
QmRVmRVLQ{QLPRVHQmRH[LJHPVRIWZDUHµRSHQVRXUFH¶VHMDSDUDDVXD
adopção ou utilidade. Aqueles que desenvolvem software comercial
TXH QmR SRGH WLSLFDPHQWH GLYXOJDU R VHX FyGLJRIRQWH FRQWULEXHP
IUHTXHQWHPHQWH SDUD TXH D WHFQRORJLD H D SURSULHGDGH LQWHOHFWXDO
QHFHVVLWHPGHGHVHQYROYHUQRYRVVWDQGDUGV$SROtWLFDJRYHUQDPHQWDO
relativa aos standards sobre software não deve discriminar a favor ou
'LVSRQtYHOKWWSVRIWZDUHFKRLFHRUJ$FHVVRHP
216 • Software livre, cultura hacker e o ecossistema da colaboração

FRQWUDTXDOTXHUPRGHORGHGHVHQYROYLPHQWRGHVRIWZDUHSDUWLFXODU´5

Qualquer software pode ser proprietário ou livre. A escolha é uma opção


do seu autor ou desenvolvedor. Como observamos até aqui, os modelos possuem
diferenças profundas. Boa parte delas deriva da abertura ou do fechamento do
FyGLJRIRQWHGRVRIWZDUH1RPRGHORDEHUWRDFRPSDWLELOLGDGHGHYHUV}HVGHXP
mesmo produto e a interoperabilidade de produtos distintos podem ser melhor
encontradas, dado que o modelo de desenvolvimento não se baseia em criar
LQFRPSDWLELOLGDGHVSDUD¿GHOL]DUFOLHQWHVRXXVXiULRV$&RPS7,$SDUHFHUHFRQKHFHU
TXHDFRPXQLFDELOLGDGHSOHQDLQFOXLQGRDLQWHURSHUDELOLGDGHH[LJHSDGU}HVDEHUWRV
3DGU}HVSRGHPVHUDEHUWRVRXIHFKDGRV$TXLDHQWLGDGHQmRH[LJHQHXWUDOLGDGH
pois isso tornaria inviável a defesa doutrinária do modelo proprietário de software.
 2GHEDWHVREUHDQHXWUDOLGDGHGHPRGHORVDUUDQMRVSURFHVVRVHWHFQRORJLDV
pDQWLJR6XDUDL]SRGHVHUHQFRQWUDGDQDUDFLRQDOL]DomRGDVRFLHGDGHEXUJXHVD2
FDSLWDOLVPRLQGXVWULDOQHFHVVLWDGHHVWUXWXUDVHDo}HVVRFLDLVSOHQDPHQWHDYDOLiYHLV
HTXDQWL¿FiYHLVWDLVFRPRIHQ{PHQRVItVLFRVTXHQmRWrPXPVHQWLGRVXEMHWLYRRX
LQWHUVXEMHWLYRSDUDTXHSRVVDPJHUDUHIHLWRVFDOFXOiYHLV:HEHUYLDDUDFLRQDOL]DomR
FRPRLQVHSDUiYHO GDLQGXVWULDOL]DomR 4XDQGRVHD¿UPDTXHRVJRYHUQRVGHYHP
³SURFXUDUXPVRIWZDUHFRPEDVHQRVVHXVPpULWRVHQmRDWUDYpVGHSUHIHUrQFLDV
FDWHJyULFDV´ HVWiVH D¿UPDQGR TXH p QHFHVViULR GHFLGLU D SDUWLU GH FiOFXORV GRV
PHLRVH¿QVHTXHWDLVFiOFXORVLVHQWRVGHRXWURVYDORUHVGHYHPVHUUHDOL]DGRV
caso a caso.
 0DUFXVHWHyULFRGD(VFRODGH)UDQNIXUWDODUJRXRSHQVDPHQWRZHEHULDQR
sobre a racionalidade com uma particular fusão das ideias marxistas. Enquanto
:HEHU YLD VXUJLU LUUDFLRQDOLGDGHV DGYLQGDV GD SUHVVmR VREUH RV YDORUHV GRV
DWRUHV R TXH HQJHQGUDULD D UHVLWVrQFLD LUUDFLRQDO 0DUFXVH YLD XP FRQÀLWR
HQWUH D UDFLRQDOL]DomR H DV VXDV IRUoDV KLVWyULFDV JHUDGRUDV 3DUD 0DUFXVH R
FDSLWDOLVPR H[LJH XPD VXERUGLQDomR SHUPDQHQWH j SURGXWLYLGDGH LQ¿QLWD H LVVR
DOpPGHRFDVLRQDURGRPtQLRGHVWUXWLYRVREUHDQDWXUH]DOHYDULDjWHFQLFL]DomRGD
GRPLQDomR(VVDSRUVXDYH]GHVHPERFDQDQHFHVVLGDGHGD³FRRUGHQDomRQmR
FRHUFLWLYDGRHVIRUoRVRFLDO´ .(77/(5 FRPRVHIRVVHQHXWUD³QDWXUDO´
o que se torna extremamente difícil em um cenário de dominação de classes.
Na sociedade informacional, baseada em protocolos e softwares como
LQWHUPHGLiULRVGDFRPXQLFDomRKXPDQDDUDFLRQDOLGDGHGDVVROXo}HVLQIRUPDFLRQDLV
pDSUHVHQWDGDFRPRQHXWUDVYLVDQGRDWLQJLURVPHOKRUHV¿QVRXFRQVHTXrQFLDV2V
OLPLWHVLPSRVWRVSHORVFyGLJRVjDomRFRPXQLFDWLYDGRVFLGDGmRVVmRDSUHVHQWDGRV
FRPR LPSRVVLELOLGDGHV WpFQLFDV QXQFD FRPR GHFLV}HV GH VHXV SURJUDPDGRUHV
'LVSRQtYHOKWWSVRIWZDUHFKRLFHRUJ$FHVVRHP
Software livre, cultura hacker e o ecossistema da colaboração • 217

$R DQDOLVDU D REUD GH 0DUFXVH +DEHUPDV Mi KDYLD SHUFHELGR TXH ³D DomR UDFLR
QDO GLULJLGD D ¿QV p VHJXQGR D VXD SUySULD HVWUXWXUD H[HUFtFLR GH FRQWUROHV´
+$%(50$6 $VVLPDVWHFQRORJLDVGHFRPXQLFDomRHLQIRUPDomRSRGHP
ser vistas como exercícios de controles sociais. Em uma sociedade multiclassista,
PXOWLFXOWXUDOHIUDJPHQWDGDHPLQWHUHVVHVGLYHUVRVpYHUL¿FiYHODSDUWLUGDKLVWyULD
GD GHFLVmR GH FDGD VROXomR SURWRFROR H VRIWZDUH PDWHULDOL]DGR HP XP FyGLJR
HQFRQWUDU DV ¿QDOLGDGHV HVSHFt¿FDV TXH JXDUGDP DV YLV}HV GRV SURJUDPDGRUHV
RXGRVHPSUHViULRVTXHD¿]HUDP3RULVVRpFRUUHWRLQWHUSUHWDURHVIRUoRWHyULFR
GH/HVVLJHP&RGHFRPRXPTXHVWLRQDPHQWRGHFRPRGHVFRUWLQDUHVVHPDQWRGH
QHXWUDOLGDGH VREUH DV GHFLV}HV SDUFLDLV H GH ODUJD FRQVHTXrQFLD SROtWLFRVRFLDLV
1D YHUGDGH /HVVLJ TXHU VDEHU FRPR LPSHGLU TXH R ³UHJXODGRU´ GR FLEHUHVSDoR
WUDQVIRUPHVHHPXPGpVSRWDRXHPXPDLQVWkQFLDWRWDOLWiULD
 0DUFXVH Mi KDYLD SHUFHELGR RV ULVFRV GHVVD UDFLRQDOLGDGH TXH VH JHUD D
sensação de neutralidade, uma vez que

³R FRQFHLWR GH UD]mR WpFQLFD p WDOYH] HP VL PHVPR LGHRORJLD  
'HWHUPLQDGRV ¿QV H LQWHUHVVHV GD GRPLQDomR QmR VmR RXWRUJDGRV j
WpFQLFDDSHQDV³SRVWHULRUPHQWH´HDSDUWLUGHIRUDLQVHUHPVHMiQD
SUySULD FRQVWUXomR GR DSDUHOKR WpFQLFR D WpFQLFD p HP FDGD FDVR
XPSURMHWRKLVWyULFRVRFLDOQHOHVHSURMHWDRTXHXPDVRFLHGDGHHRV
interesses nela dominantes pensam fazer com os homens e com as
FRLVDV´ +$%(50$6 

(VWDEHOHFHQGRXPDSRQWHHQWUHRSHQVDPHQWRGH0DUFXVHH/HVVLJDWLQ
JLPRVXPDVLWXDomRWHyULFDTXHSRGHVHUHQWHQGLGDFRPRXPDFRQWUDSRVLomRjWHVH
DGYRJDGDSRU&DVWHOOVGHTXHDVWHFQRORJLDVSRGHPVHUUHFRQ¿JXUDGDV0DVVH
DYDQoDUPRVQDDUWLFXODomRGRVDUJXPHQWRVpFRQVWDWiYHOHPSLULFDPHQWHQRFDVR
da Internet, que a cultura de seus desenvolvedores moldou o meio e foi re-aplicando
IHUUDPHQWDV H SURWRFRORV TXH VXUJLDP SDUD ¿QV GLYHUVRV DOJXQV DWp PHVPR
militares e anti-democráticos. Ou seja, mesmo quando criadas para determinadas
¿QDOLGDGHV VHP XPD LOXVyULD QHXWUDOLGDGH RULJLQDO VHXV XVRV SRGHP DOWHUiODV
&DVWHOOVGHL[DFODURTXHRV³VLVWHPDVWHFQROyJLFRVVmRVRFLDOPHQWHSURGX]LGRV´H
TXHHVVDSURGXomRpHVWUXWXUDGDFXOWXUDOPHQWH'DtDUHLYLQGLFDomRGH/HVVLJID]
todo o sentido.
 /HVVLJEXVFDDGHIHVDVRERSULVPDGHPRFUiWLFRGRPRGHORGHDEHUWXUDGR
FyGLJR$VVLPRPRGHORIHFKDGRQmRpQHXWURGLDQWHGDWUDQVSDUrQFLDGHPRFUiWLFD
QHFHVViULDDDOJRTXHGHOLPLWDFDGDYH]PDLVDYLGDHPVRFLHGDGHHXPDVRFLHGDGH
HPUHGH3DUD/HVVLJVHRFyGLJRGRFLEHUHVSDoRIRUSURSULHWiULRRFLEHUHVSDoR
218 • Software livre, cultura hacker e o ecossistema da colaboração

poderá ser controlado privadamente. Não publicamente. Esse controle privado


WRUQDVHSHULJRVR /(66,* 
 3RURXWURODGRREVHUYDQGRDVFRQVLGHUDo}HVGH0DUJDUHW$UFKHUSRGHPRV
FRQFOXLUTXHDWDUHIDGHGHVFRUWLQDURPDQWRQHXWURVREUHDWHFQRORJLDQmRSDUHFH
WULYLDOGHYLGRSULQFLSDOPHQWHDVHXDVSHFWRLGHROyJLFRTXHFDPLQKDSDUDXPFHUWR
SHQVDPHQWR~QLFR

³RVHVSHUDQoRVRVGDDOWDWHFQRORJLDQXQFDROKDPSDUDDLQYHUVmRGDV
prioridades que Marx via na fábrica, pelas quais os mortos (máquinas)
dominam os vivos (os operários) e que através do computador se
HVWHQGHDWpRFDPSRGRFRQKHFLPHQWR¶ 3RVWHU ´  ³,VVRGHWHUPLQD
a exclusão de outras formas de pensamento e desse modo, sem
RSRVLomR´ $&+(5 

Na sociedade da informação e no contexto do confronto entre dois modelos


GH SURSULHGDGH WHFQROyJLFD p SRVVtYHO UHFRQKHFHU QR PRGHOR KHJHP{QLFR D
QHFHVVLGDGH GH VH SURWHJHU D SDUWLU GD SRVWXUD GD QHXWUDOLGDGH HQTXDQWR R
PRGHOR FRPSDUWLOKDGR SURFXUD DVVHJXUDU VHXV HVSDoRV FRQWHVWDQGR VXD SUySULD
LPSDUFLDOLGDGHSDUDTXHDLPSDUFLDOLGDGHGRRXWURPRGHORWDPEpPSRVVDHPHUJLU
diante dos juízos da sociedade. Esse movimento recupera parte essencial dos
DUJXPHQWRVSUHVHQWHVQDWHRULDFUtWLFDGH0DUFXVHSRLVHODQRVSHUPLWHREVHUYDU
RV IHQ{PHQRV DWXDLV H j ³PHGLGD TXH DXPHQWD D VXD H¿FLrQFLD DSRORJpWLFD D
µUDFLRQDOLGDGH¶ QHXWUDOL]DVH FRPR LQVWUXPHQWR GH FUtWLFD H UHEDL[DVH D PHUR
FRUUHWLYRGHQWURGRVLVWHPDD~QLFDFRLVDTXHDVVLPDLQGDVHSRGHGL]HUpTXHQR
PHOKRUGRVFDVRVDVRFLHGDGHHVWiµPDOSURJUDPDGD¶³ +$%(50$6

Elementos para uma teoria da propriedade de bens não-escassos

³$VFRQFHSo}HVGHDXWRULDJXDUGDPXPDHVWUHLWDUHODomRFRPDIRUPD
GHWHFQRORJLDGDLQIRUPDomRTXHSUHYDOHFHHPXPPRPHQWRGDGRH
quando esta muda ou reparte o seu domínio com outra, também se
PRGL¿FDP SDUD R EHP RX SDUD R PDO DV LQWHUSUHWDo}HV FXOWXUDLV GH
DXWRULD´ *HRUJH3/DQGRZ 

5LFKDUG 6WDOOPDQ HVFUHYHX TXH ³)UHH VRIWZDUH LV D PDWWHU RI OLEHUW\ QRW
SULFH´ 67$//0$1 <RVKDL%HQNOHUREVHUYRXTXHJUXSRVGHLQGLYtGXRV
HVWmRFRODERUDQGRLQGHSHQGHQWHGHUHPXQHUDomR¿QDQFHLUDHPSURMHWRVGHJUDQ
Software livre, cultura hacker e o ecossistema da colaboração • 219

de escala que enviam sinais sociais melhores do que aqueles obtidos pelos sis-
WHPDVGHSUHFL¿FDomRGRVPHUFDGRV3LHUUH/pY\GL]SUHVHQFLDUDGHFDGrQFLDGR
DXWRU QR FLEHUHVSDoR DR PHVPR WHPSR HP TXH Yr VXUJLU R IHUYLOKDU GH FULDo}HV
HHODERUDo}HVFROHWLYDVQRPXQGRYLUWXDO-RKQ3HUU\%DUORZD¿UPRXTXHRIXWXUR
VHULDGHXPDHFRQRPLDEDVHDGDPXLWRPDLVQRUHODFLRQDPHQWRGRTXHQDVUHODo}HV
de propriedade. André Gorz coloca que todo o conhecimento pode ser abstraído do
VHXVXSRUWHPDWHULDOSRGHQGRVHUSURSDJDGRVHPFXVWRGHUHSURGXomRHFRPPXLWR
PDLVJDQKRVRFLDO2TXHWXGRLVVRWHULDHPFRPXP"7RGRVHVWmRVHUHIHULQGRGH
DOJXPDIRUPDjSURGXomRHGLVWULEXLomRGHEHQVLQWDQJtYHLVRXLPDWHULDLV
 e SRVVtYHO QRWDU TXH HQTXDQWR RV EHQV WDQJtYHLV WrP VXD SURSULHGDGH
MXVWL¿FDGDSRUPRWLYRVGLYHUVRVTXHYDULDUDPDGHSHQGHUGHFDGDSHUtRGRKLVWyULFR
DSURSULHGDGHGRVEHQVLQWDQJtYHLVWrPQRLQFHQWLYRjFULDomRVHXDUJXPHQWRPDLV
DPSODPHQWH GLIXQGLGR7RGDYLD HVVH QmR p R ~QLFR DUJXPHQWR SDUD D GHIHVD GD
propriedade das ideias. No site de um dos parceiros da Microsoft podemos encontrar
XPERPH[HPSORGHVVDGHIHVD

³$SURSULHGDGHGRVRIWZDUHpGLIHUHQWHGDSURSULHGDGHGHRXWURVWLSRV
de produtos. Embora o software seja, em sua maioria, distribuído
DWUDYpV GH XPD PtGLD WDQJtYHO FRPR XP &' HOH QmR p H[DWDPHQWH
uma commodity. O software é considerado propriedade intelectual. A
propriedade de tal bem é controlada por acordos de licenciamento. As
OLFHQoDVGHVRIWZDUHVmRGRFXPHQWRVOHJDLVTXHGHVFUHYHPDFRUUHWD
utilização e distribuição deste software, de acordo com as normas do
fabricante. As licenças fornecem ao fabricante deste software a receita
necessária para continuar produzindo o produto, oferecendo os serviços
HRVXSRUWHQHFHVViULRVSDUDRVXVXiULRVOHJtWLPRV´

3DUHFH H[LVWLU XPD JUDQGH FRQFRUGkQFLD FRP D LGHLD GH TXH D SURSULH
GDGHGRVRIWZDUHHDGHWRGRVRVEHQVGDPHVPDFDWHJRULDLPDWHULDOpGLVWLQWD
da propriedade de outros tipos de produtos, ou seja, dos bens materiais. Talvez
HVVD GLVWLQomR OHYH D 0LFURVRIW QR PHVPR WH[WR D LQGLFDU TXH VHX QHJyFLR p FR
mercializar licenças e não produtos. As características que fazem a diferença dos
EHQV LQWDQJtYHLV IRUDP HVWXGDGDV SULQFLSDOPHQWH SHOD HFRQRPLD H WrP QR HFR
QRPLVWD .HQQHWK$UURZ XP GRV VHXV SULQFLSDLV WHyULFRV$QWHV GH SDVVDUPRV jV
FDUDFWHUtVWLFDVGRVLPDWHULDLVDSDUWLUGDYLVmRGH$UURZpLPSRUWDQWHGH¿QLUFRP
maior precisão o que eles efetivamente são.
Bens materiais são aqueles que têm corpo físico e, portanto, estão
VXEPHWLGRV D XPD VpULH GH OLPLWHV FXMR JUDX GH HVFDVVH] H GH GHVJDVWH p R
PDLVLPSRUWDQWHGRSRQWRGHYLVWDHFRQ{PLFR%HQVLPDWHULDLVRXLQWDQJtYHLVQmR
'LVSRQtYHOKWWSZZZLQIUDWHFQRORJLDFRPEUVROXFRHVOLFHQFLDPHQWRKWPO$FHVVRHP
220 • Software livre, cultura hacker e o ecossistema da colaboração

SRVVXHP FRUSR ItVLFR DSHVDU GH H[LJLUHP XP VXSRUWH SDUD VHUHP UHDOL]DGRV RX
PHOKRUYLVXDOL]DGRVHWUDQVSRUWDGRV(PJHUDOEHQVLPDWHULDLVVmREHQVVLPEyOLFRV
H FRPR WDO SRGHP DGTXLULU XP IRUPDWR GLJLWDO RX VHMD VHU WUDQVIRUPDGRV HP XP
FRQMXQWRGHGtJLWRV&RPRHOHPHQWRVGLJLWDLVWrPGXUDomRQmR¿QLWDVHQGRDSHQDV
¿QLWRRVXSRUWHTXHRVDUPD]HQDDUTXLYDRVRXRVJXDUGD
 3RGH VHU HQTXDGUDGD FRPR EHP LQWDQJtYHO WRGD D SURGXomR FXOWXUDO QR
VHQWLGR DPSOR H DUWtVWLFR GHVSUHHQGLGD GH VXSRUWH ItVLFR 8P ¿OPH XPD P~VLFD
XPVRIWZDUHXPDLGHLDXPDLQIRUPDomR$LQIRUPDomRpGH¿QLGDSHOD7HRULD0D
temática da Comunicação como a probabilidade de ocorrer um evento, dado um
FRQMXQWRGHSRVVLELOLGDGHVRXVHMDDLQIRUPDomRp³XPSURFHVVRGHUHPRomRGH
LQFHUWH]DV´ 'DQWDV    $VVLP D LQIRUPDomR SRGH VHU HQWHQGLGD FRPR
XPDXQLGDGHEiVLFDQDTXDOWRGRVRVEHQVLQWDQJtYHLVSRGHPVHUH[SUHVVRV8PD
SDUWLWXUDGH0R]DUWFRQWpPXPDVpULHGHLQIRUPDo}HVTXHSRGHPVHUWUDQVIHULGDV
e, independente do seu primeiro suporte de papel, inseridas em um CD em outra
IROKDRXVLPSOHVPHQWHPHPRUL]DGDVSRUXPDSHVVRD8P¿OPHpLQGHSHQGHQWHGD
¿WDTXHRKRVSHGD6HXFRQMXQWRGHTXDGURVSRGHVHUGLJLWDOL]DGRHGHVSUHQGLGRGR
VHXVXSRUWHHFRPRLQIRUPDomRVHUDORFDGRHPXPFRPSXWDGRUVHUYLGRUHPDOJXP
provedor de conteúdos da rede mundial de computadores. Do mesmo modo, um
software distribuído em um CD é um conjunto de bits que traduzem para a máquina
XPDVpULHGHLQVWUXo}HVHVFULWDVSRUSURJUDPDGRUHV(VVDVLQVWUXo}HVHVWmRHPXP
FyGLJRIRQWHHVmRWUDQVIRUPDGDVHPXPDOLQJXDJHPELQiULD VHV SDUDTXHRV
FRPSXWDGRUHVSRVVDPH[HFXWiOD(VWHFyGLJRH[HFXWiYHOVmRLQIRUPDo}HVTXHWrP
DXWRQRPLDGR&'TXHDVSRUWD6RIWZDUHVVmRLQIRUPDo}HV)yUPXODVFLHQWt¿FDV
DOJRULWPRVHHVWyULDVWDPEpPVmRLQIRUPDo}HV
Assim, as características básicas e essenciais da informação são as carac-
WHUtVWLFDV GRV EHQV LQWDQJtYHLV RX LPDWHULDLV 7DPEpP p LQWHUHVVDQWH LQGLFDU TXH
a informação, como sinal do mercado, é um elemento fundamental para a teoria
HFRQ{PLFD$ WHRULD GR HTXLOtEULR GDV IRUoDV GH PHUFDGR EDVHLDVH QR OLYUH ÀX[R
GH VLQDLV VREUH RV SUHoRV SUDWLFDGRV SHORV DJHQWHV HFRQ{PLFRV 3RU RXWUR ODGR
D DVVLPHWULD GDV LQIRUPDo}HV RX VHMD DV SURIXQGDV GLIHUHQoDV HQWUH RV DJHQWHV
HFRQ{PLFRVVHMDGRODGRGDRIHUWDRXGDGHPDQGDWHPVLGRHQWHQGLGDFRPRXPD
das fontes explicativas de crises, instabilidade e desarranjos da economia de mer-
FDGR$LQIRUPDomRWDPEpPSRGHVHUHQWHQGLGDFRPRUHJLVWURGHVLQDLVGHIDWRV
,QIRUPDo}HV SRGHP VH DSUHVHQWDU FRPR XQLGDGH GH VLQDLV GH SURGXo}HV VLP
EyOLFDVGHLGHLDVHGHFRQKHFLPHQWR,VVRVLJQL¿FDTXHRFRQKHFLPHQWRGHDOJR
TXDQGRpGHDOJXPDIRUPDUHJLVWUDGRRXFRGL¿FDGRWUDQVIRUPDVHHPXPFRQMXQWR
GHLQIRUPDo}HV
Arrow analisou as características ou propriedades da informação do
Software livre, cultura hacker e o ecossistema da colaboração • 221

SRQWRGHYLVWDHFRQ{PLFRHHVWDEHOHFHXXPDVpULHGHFDUDFWHUtVWLFDV$SULPHLUD
característica é que a informação é indivisível em seu uso. O uso de parte da mesma
não implica em sua efetiva divisão. Ela continuará existindo também de modo
FRPSOHWR6HJXQGDDLQIRUPDomRSRUQmRGHSHQGHUGHXPFRUSRItVLFRHSHODVXD
LQWDQJLELOLGDGHpGHGLItFLODSURSULDELOLGDGHRXDSURSULDomR7HUFHLUDDH[LVWrQFLDGH
XPSDUDGR[RIXQGDPHQWDOSDUDGH¿QLURYDORUGDLQIRUPDomR,VVRRFRUUHSRUTXH
SDUD DOJXpP DGTXLULU XPD LQIRUPDomR QHFHVVLWDULD FRQKHFrOD SDUD SRGHU YDORUi
OD3RURXWURODGRDRFRQKHFHUDLQIRUPDomRQmRVHULDPDLVQHFHVViULRSDJDUSRU
HOD4XDUWDRSURFHVVRGHLQYHQomRRXGHJHUDomRGHLQIRUPDo}HVQmRSRGHVHU
previsto de modo perfeito a partir de seus insumos. A atividade de produção de
LQIRUPDo}HVpH[WUHPDPHQWHVXMHLWDDLQFHUWH]DV4XLQWDRLQVXPRGDLQIRUPDomRp
a própria informação. Albuquerque alerta que essa característica amplia os possíveis
SUREOHPDVGHULYDGRVGDVGXDVFDUDFWHUtVWLFDVDQWHULRUHV³DGH¿QLomRGRVHXYDORU
HDLQFHUWH]DTXDQWRDRUHVXOWDGRGHVHXSURFHVVRGHSURGXomR´ $/%848(548(
 $VH[WDFDUDFWHUtVWLFDpTXHRXVRGDLQIRUPDomRQmRDGHVJDVWDSRUWDQWR
não há nenhum sentido em aplicar recursos para criar uma mesma informação
SHOD VHJXQGD YH] %DVWD XVDU D LQIRUPDomR Mi SURGX]LGD 8PD YH] SURGX]LGD D
LQIRUPDomRSRGHVHUUHSURGX]LGDGHPRGRLQ¿QLWR
 7DLVFDUDFWHUtVWLFDVOHYDUDP$UURZDFODVVL¿FDUDLQIRUPDomRFRPRXPEHP
HFRQ{PLFR HVSHFLDO GLIHUHQWH GRV GHPDLV $UURZ FRQFOXLX TXH D LQIRUPDomR H R
conhecimento não se tornam facilmente apropriáveis de modo privado como os
EHQVWDQJtYHLV3RUH[HPSORDLQIRUPDomRFRPRXPUHODWRGHSUHoRVGRVYiULRV
FRQFRUUHQWHV DR VHU SULYDWL]DGD H YHQGLGD JHUD XP LPSRUWDQWH SUREOHPD SDUD R
SHQVDPHQWRHFRQ{PLFREDVHDGRQRHTXLOtEULRDXWRPiWLFRGDVIRUoDVGHPHUFDGR
$OEXTXHUTXHD¿UPDTXH$UURZ

³HQWUH RXWURV DUJXPHQWRV FRPHQWD TXH TXDQGR D LQIRUPDomR SDVVD


a ser uma mercadoria, a capacidade dos sistemas de preços de
WUDQVPLWLUWRGDVDVLQIRUPDo}HVQHFHVViULDVDRVDJHQWHV jOD+D\HN 
¿FDFRPSURPHWLGDSRLVKiXPSUREOHPDOyJLFRHPWHUPRVGDGH¿QLomR
GR SUHoR GD LQIRUPDomR HP VL -XVWL¿FDGR WHRULFDPHQWH R VWDWXV GD
informação como mercadoria especial, Arrow discute o processo de
LQYHQomR FRPR XP SURFHVVR GH SURGXomR GH QRYDV LQIRUPDo}HV´
$/%848(548( 

A informação para ser apropriada, isto é, para tornar-se propriedade privada,


H[LJHDSUHVHQoDGR(VWDGR'LIHUHQWHPHQWHGRTXHVHDSUHJRDQRGHEDWHVREUH
a naturalidade da propriedade material, sobre sua condição de direito inerente
ao homem, o bem imaterial sempre terá uma autoria, mas nem sempre terá uma
222 • Software livre, cultura hacker e o ecossistema da colaboração

apropriação. Ou seja, a informação como sinal coletado, como ideia ou conhecimento


SURGX]LGRQXQFDVHUiQDWXUDOVHPSUHVHUiDUWL¿FLDOeIUXWRGDFRQGLomRKXPDQDH
produto de sua inventividade e capacidade cultural.
A propriedade da informação foi uma invenção no interior do Estado. Sua
QHFHVVLGDGHLQLFLDOWHPRULJHPQRFRQWUROHHQDFHQVXUDGHFySLDVDSDUWLUGDUHSUR
GXWLELOLGDGHSHUPLWLGDSHODPiTXLQDLPSUHVVRUDGHWLSRVPyYHLVGH*XWHQEHUJ'H
SRLVIRLXPDIRUPDGHJDUDQWLUJDQKRVDRVHGLWRUHV-iDLGHLDGHSDWHQWHWLQKDQR
VHX QDVFLPHQWR R REMHWLYR GH DVVHJXUDU j VRFLHGDGH TXH R FRQKHFLPHQWR VREUH
XPHQJHQKRQmRSRGHULDPRUUHUFRPDPRUWHGHVHXLQYHQWRU$VVLPR(VWDGRSUR
SXQKDDRFULDGRUDJDUDQWLDGRPRQRSyOLROHJDOGDH[SORUDomRGHVXDREUDSRUXP
determinado período de tempo em troca da socialização do conhecimento. O fun-
GDPHQWRVRFLDO SUHVHUYDURFRQKHFLPHQWR SUHFHGLDRPLFURHFRQ{PLFR PRQRSyOLR
de exploração privada do invento).
Se a ideia de propriedade material pode ser defendida como posse antes do
Estado, as características da informação inviabilizam essa condição, principalmente
se considerarmos que uma informação pode ser multiplicada, copiada e retransmitida
DSDUWLUGHYiULRVVXSRUWHV,PSRVVtYHOSURLELUTXHDOJXpPOHYHQDPHPyULDDOJRTXH
viu. Improvável que essa pessoa seja impedida de atualizar, ou seja, desvirtualizar
e inserir em uma mídia qualquer a informação sobre aquilo que vira.
 2VOLPLWHVGDSURSULHGDGHVREUHLQIRUPDo}HVQmRVmRItVLFRVPDVWHPSRUDLV
HGHYDOLGDGHMXUtGLFROHJDO$GLVWkQFLDGHXPWLURGHFDQKmRTXH.DQWYLVOXPEURX
como a extensão dos limites para a propriedade material, aqui poderia ser muito
mal comparada com a capacidade do Estado de atuar sobre camelos e invadir
a residência de jovens que usam cópias de software não-autorizadas. O tempo
GHYDOLGDGHGHXPDSDWHQWHRXGRGLUHLWRGHH[SORUDomRHFRQ{PLFDGHXPDREUD
SURWHJLGDSHORGLUHLWRDXWRUDOSRGHVHUHQWHQGLGRFRPRXPGRVOLPLWHVGDSURSULHGDGH
informacional.
A comparação é fundamental. A extensão da propriedade material é um
GRVWHPDVIXQGDPHQWDLVSDUDDGLVFXVVmRVREUHVXDOHJLWLPLGDGH/RFNHSURSXQKD
que o trabalho fosse a medida do direito para a aquisição e que o desperdício
IRVVHHYLWDGRD¿PGHJDUDQWLURXVXIUXWRGRVEHQVGDQDWXUH]DSDUDRVGHPDLV
2WUDEDOKRSRGHVHUFRQVLGHUDGRDIRQWHGHOHJLWLPLGDGHGRGLUHLWRGHDTXLVLomRRX
GH DSURSULDomR GD LQIRUPDomR 3RU RXWUR ODGR XPD VpULH GH DUJXPHQWRV VREUH D
RULJHPVRFLDORXFROHWLYDGDVLGHLDVHGRFRQKHFLPHQWRSRGHPLQDUHVVDGHIHVD
0DVSRUTXDQWRWHPSRVHULDOHJtWLPRGDUDSURSULHGDGHGHXPDLGHLDDXPDSHVVRD
RXHPSUHVD"
 1R FDVR GRV EHQV PDWHULDLV /RFNH GHIHQGLD D SDUFLP{QLD QR XVR GRV
EHQV0DFSKHUVRQDSRQWRXTXHHVVDLGHLDORFNHDQDYLVDYDUHVSHLWDURLJXDOGLUHLWR
Software livre, cultura hacker e o ecossistema da colaboração • 223

DOKHLR0DVWDPEpPREVHUYDYDTXHRVOLPLWHVGDDFXPXODomRHUDPDODUJDGRVFRP
o advento da economia monetária ou intermediada pela moeda, como expressão
da riqueza, pois ela permitia superar o desperdício e conservar a riqueza em bens
QmRSHUHFtYHLV

³4XHPDFXPXOHEHQVSHUHFtYHLVQmRVyFDXVDXPGDQRjKXPDQLGDGH
por subtrair de circulação, inutilmente, bens necessários, mas ainda
comete uma tolice. É possível, no entanto, acumular o equivalente a
bens de qualquer natureza sem retirá-los do mercado. Esse equivalente,
a moeda, é o mesmo instrumento inventado pelos homens para facilitar
a troca. Materiais duráveis, como o ouro e a prata, são normalmente
XVDGRVOHPEUD/RFNHSDUDHVVDIXQomRGHUHSUHVHQWDUDVPHUFDGRULDV
&RPDPRHGDVXUJLXDOJRGXUDGRXURTXHDVSHVVRDVSRGHULDPUHWHU
VHPHVWUDJDUHTXHSHORP~WXRFRQVHQWLPHQWRRVKRPHQVDFHLWDULDP
HP WURFD GRV YHUGDGHLURV PDV SHUHFtYHLV VXVWHQWRV GD YLGD †  
Sendo não só um meio de troca, mas também reserva de valor, a
moeda resolve o problema da acumulação, permitindo uma nova forma
GH H[SDQVmR GD SURSULHGDGH 2V KRPHQV GLOLJHQWHV ¿pLV DR SUHFHLWR
divino de ocupar a terra e transformá-la, para dela extrair o máximo
EHQH¿FLRSRGHPDVVLPGLIHUHQFLDUVHGRVGHPDLVHQULTXHFHQGRVHP
YLRODURVOLPLWHVGRGLUHLWRQDWXUDO´ .817= 

$SHVDU GH /RFNH QmR SURSRU TXDOTXHU LPSHGLPHQWR j GHVLJXDOGDGH HFR


Q{PLFD QDVFLGD GD SURSULHGDGH HVWDYD SUHRFXSDGR HP UHVWULQJLU D DSURSULDomR
H D DFXPXODomR GHYLGR j QHFHVVLGDGH GH JDUDQWLU TXH EHQHItFLRV SULYDGRV QmR
LQYLDELOL]DVVHP EHQHItFLRV VRFLDLV R TXH H[LJLD D FLUFXODomR GHVVHV EHQV QR
mercado. Qualquer restrição ao acúmulo da riqueza auferida pela propriedade
das ideias não pode ter como fundamento a escassez ou o desperdício, uma vez
TXHDVLGHLDVFRPRLQIRUPDo}HVVmRGHXVRXEtTXRVHPGHVJDVWHVHPOLPLWHV
GH UHSURGXomR H VHP HVFDVVH] 4XDO VHULD R REMHWLYR GH UHVWULQJLU R DF~PXOR GH
ULTXH]D"1RFRQWH[WRGRDUJXPHQWRORFNHDQRQmRWHULDVHQWLGRTXDOTXHUUHVWULomR
DR GLUHLWR GH SURSULHGDGH GDV LGHLDV H[FHWR SHOR IDWR GD RULJHP GD SURSULHGDGH
de ideias não se encontrar na natureza, mas na cultura, que é produção coletiva e
criação social. O que levaria ao questionamento sobre a correção moral de tornar
exclusivamente privada uma obra cuja maior parte dependeu de um conhecimento
realizado e transmitido coletivamente.
 $VVLP YROWDPRV j TXHVWmR TXDQWR WHPSR VHULD FRUUHWR SDUD HQWUHJDU D
XPHQWHSULYDGRRGLUHLWRH[FOXVLYRGHH[SORUDomRGHXPDREUDRXLQYHQWR"(VVD
resposta, para ser dada, dependerá do objetivo da instituição estatal para com o
GLUHLWRGHSURSULHGDGHVREUHDVLGHLDV6HRREMHWLYRIRUDVVHJXUDURFRPSDUWLOKDPHQWR
GRFRQKHFLPHQWRFRQWUDRVHJUHGRRVSUD]RVGHYHUmRVHUSHQVDGRVQHVVDSHUV
224 • Software livre, cultura hacker e o ecossistema da colaboração

SHFWLYD 0DV VH R REMHWLYR IRU SULQFLSDOPHQWH DVVHJXUDU XP JDQKR VX¿FLHQWH DR
FULDGRURVSUD]RVGHSHQGHUmRGRTXHDVRFLHGDGHFRQVLGHUHXPJDQKRMXVWR'H
RXWUDIRUPDVHRREMHWLYRIRUXPPL[HQWUHJDQKRVRFLDOHLQGLYLGXDORVSUD]RVDLQGD
GHSHQGHUmRGHMXt]RVYDORUDWLYRV3DUHFHHYLGHQWHTXHORQJRVSUD]RVGHSURWHomR
SRGHPDFDEDUJHUDQGRXPHIHLWRFRQWUiULRDTXDOTXHUEHQHItFLRVRFLDOHVHUYLQGR
apenas ao interesse particular. Podem acabar, sim, desperdiçando o tempo social
em que uma criação em domínio público pudesse fomentar novas ideias ou novos
inventos, já que o maior insumo da informação é a própria informação.
A contenção do acúmulo anti-social da riqueza, auferida com os limites da
SURWHomR GRV GLUHLWRV GH DSURSULDomR SULYDGD GH LQIRUPDo}HV RX LGHLDV WHP VLGR
uma preocupação menor no início do seculo XXI. O debate tem sido conduzido pelo
GRJPDGHTXHVHPOLPLWHVH[WHQVRVHDomRULJRURVDGRV(VWDGRVSDUDDGHIHVD
das empresas detentoras da propriedade de ideias, o ritmo de criação e inovação
HVWDULDP JUDYHPHQWH FRPSURPHWLGRV $ LQG~VWULD QRUWHDPHLFDQD GH VRIWZDUH
IHUWLOL]DQWHVELRWHFQRORJLDHHQWUHWHQLPHQWRWHPXVDGRRJUDQGHSRGHUGHVHX(V
tado para envolver o mundo com seus prazos e limites de proteção, e seus ar-
JXPHQWRVWDPEpPVHDVVHQWDPQRVHQRUPHVFXVWRVSDUDVHSURGX]LUDVLGHLDVHQD
DXVrQFLDGHFXVWRVPDUJLQDLVSDUDDVXDUHSURGXomR$SHVDUGDVSDWHQWHVHOHWUR
HOHWU{QLFDVSHUGHUHPRVHQWLGRGDSURWHomRHPSRXFRPHQRVGHFLQFRDQRVGHYLGR
jREVROHVFrQFLDUHDOGHVHXFRQWH~GRR75,36H[LJHTXHWRGDVDVOHJLVODo}HVGR
PXQGRGRV(VWDGRV8QLGRVDR$IJDQLVWmRWUDEDOKHPFRPDQRVGHSURWHomR
$V LQG~VWULDV TXH GHWrP HVVDV SDWHQWHV VmR REULJDGDV D SDJDU XPD WD[D DQXDO
SDUDDVVHJXUDUVXDYDOLGDGH(PJHUDOQDPDLRULDGRVFDVRVGHL[DPGHSDJiODQR
quinto ano. Isso quer dizer que ela perdeu o sentido até mesmo do ponto de vista
GHTXHPDUHJLVWURX ,167,7872'((678'2662&,2(&21Ð0,&26 
Sem dúvida, os custos de produção da informação são bem maiores do
TXH RV FXVWRV GH UHSURGXomR 6HJXQGR R HFRQRPLVWD &KDUOHV -RQHV FDVR XPD
HPSUHVD¿[HRSUHoRGHXPVRIWZDUHFRPRVHQGRLJXDODRFXVWRPDUJLQDOGHVXD
SURGXomRHODWHULDOXFURVQHJDWLYRVXPDYH]TXHRVUHWRUQRVFUHVFHQWHVHPHVFDOD
OHYDP R FXVWR PpGLR D VHU VHPSUH PDLRU TXH R FXVWR PDUJLQDO GD SURGXomR GR
VRIWZDUH 2X VHMD QLQJXpP HQWUDULD QR PHUFDGR SDUD GHVHQYROYHU R VRIWZDUH D
XPFXVWR¿[RVHQmRSXGHVVHHVWDEHOHFHUVHXSUHoRDFLPDGRFXVWRGDSURGXomR
GHFDGDXQLGDGHDGLFLRQDO1HVVHVHQWLGR5RPHUGHVWDFRXTXHDQHFHVVLGDGHGH
se auferir lucros impele a produção das ideias para um mercado de concorrência
LPSHUIHLWD2REMHWLYRpSHUPLWLUTXHRHPSUHViULRUHFXSHUHRFXVWR¿[RGDFULDomR
GREHP$FULDomRGHQRYDVLGHLDVSDUDVHFULDUQRYRVEHQVHVHUYLoRVH[LJHQHVVD
perspectiva, o monopólio.
 $TXHVWmRGRSUHoRGDLGHLDRXLQIRUPDomRUHPHWHQRVjVSRVVLELOLGDGHVGH
Software livre, cultura hacker e o ecossistema da colaboração • 225

H[HUFHUHIHWLYDPHQWHDVXDFREUDQoD,QIRUPDo}HVSRUVHUHPLQWDQJtYHLVVmREHQV
QmRULYDLVRXVHMDRVHXXVRSRUXPDSHVVRDQmRH[LJHDH[FOXVmRVLPXOWkQHDGH
uso por outra pessoa. Uma música pode ser ouvida ou cantada ao mesmo tempo
SRUPLOK}HVGHSHVVRDV-iXPSDUGHVDSDWRVVySRGHVHUXVDGRSRUXPD~QLFD
SHVVRD GH FDGD YH] %HQV HFRQ{PLFRV ULYDLV H QmRULYDLV SRVVXHP GLIHUHQWHV
JUDXVGHH[FOXVLELOLGDGHTXHpXPDQRomRUHODWLYDDRJUDXHPTXHXPSURSULHWiULR
FRQVHJXHFREUDUSHORXVRGHVHXEHP7HOHYLVRUHVHGLVTXHWHVWrPXPDOWRJUDXGH
H[FOXVLELOLGDGH-iDVP~VLFDVHRVVRIWZDUHVVmRSRXFRH[FOXtYHLV3DUD5RPHU
SDWHQWHVHGLUHLWRVDXWRUDLVDVVHJXUDPDRVFULDGRUHVHLQYHQWRUHVRGLUHLWRGHFR
EUDQoDSHORXVRGHVXDVLGHLDVEHQVQmRULYDLVHDOWDPHQWHH[FOXtYHLV -21(6
2000)
 2FyGLJRFULSWRJUDIDGRGH'9'QmRSDVVDGHXPFRQMXQWRGHDOJRULWPRV
VHQGRXPEHPQmRULYDO7RGDYLDVHXJUDXGHH[FOXVLELOLGDGHpDOWRGHYLGRjHQRUPH
GL¿FXOGDGH GH GHFLIUiOR RX GHFRGL¿FiOR 3RU RXWUR ODGR RV HFRQRPLVWDV HP
JHUDOFRQVLGHUDPDSHVTXLVDEiVLFDDDWLYLGDGHGHGHIHVDQDFLRQDOHRVFiOFXORV
PDWHPiWLFRVFRPREHQVFRPEDL[RJUDXGHH[FOXVLELOLGDGH-RQHVOHPEUDTXHRV
bens não-rivais essencialmente não-excluíveis são chamados de bens públicos. Um
exemplo tradicional é a iluminação das cidades ou a defesa das fronteiras nacionais.
&RPR DV OkPSDGDV GDV UXDV QmR SRGHP VH DFHQGHU DSHQDV SDUD DTXHOHV TXH
HVWHMDPHPGLDFRPVHXSDJDPHQWRHVHDSDJDUTXDQGRLQDGLPSOHQWHVHVWLYHUHP
passando, é um bem cujo vazamento praticamente não permite diferir compradores
de não-compradores.
 %HQV H[FOXtYHLV HYLWDP ³WUDQVERUGDPHQWRV´ RX H[WHUQDOLGDGHV 8PD
LQYHQomR WUDQVIRUPDGD HP XP EHP TXH JHUH PXLWRV EHQHItFLRV D TXHP QmR
HVWi GLVSRVWR D SDJDU SRU HOH GHVHVWLPXOD HQRUPHPHQWH DTXHOHV TXH HVWDULDP
LQWHUHVVDGRV HP FRPSUiOR $V H[WHUQDOLGDGHV EHQp¿FDV GH XPD LGHLD VmR
FRQVWDWiYHLVSHODREVHUYDomRGDTXHOHVTXHQmRDFULDUDPQHPJDVWDUDPWHPSR
em sua pesquisa e produção. Pessoas que não tiveram nenhum custo para produzir
XPDGHWHUPLQDGDVROXomRSRGHPUHSURGX]LODDRFXVWRPDUJLQDOLJXDOD]HUR1D
UHDOLGDGHRFXVWRPDUJLQDOGDFySLDVRPHQWHQmRVHULDLJXDOD]HURGHYLGRDRFXVWR
do suporte da ideia ser um bem não-rival.
 (PRSRVLomRDGRXWULQDKHJHP{QLFDGRVGLUHLWRVGHSURSULHGDGHLQWHOHFWXDO
DGYRJD TXH R HOHYDGR FXVWR ¿[R GD LGHLD H R GLPLQXWR FXVWR GH UHSOLFDomR
consolidariam uma enorme barreira para o processo de criação e inovação, um
baixo incentivo para a produção de ideias. Para remunerar o inventor e permitir
TXH HOH UHVJDWH VHXV HVIRUoRV H VHX FDSLWDO LQYHVWLGR HP 3 ' 3HVTXLVD H
Desenvolvimento) é que se defende o direito de monopólio temporário ao inventor.
&RPHVVHPRQRSyOLRRLQYHQWRUFRQVHJXLULDRVEHQHItFLRVHFRQ{PLFRVQHFHVViULRV
226 • Software livre, cultura hacker e o ecossistema da colaboração

SDUDUHPXQHUDUVHXVJDVWRVGHFULDomRHGHVHQYROYLPHQWR(VWDpDLGHLDEiVLFD
que fundamenta economicamente os direitos de propriedade intelectual. Nela, a
LQRYDomRUHTXHURPRQRSyOLRGDVLGHLDV$TXLQRYDPHQWHYHPRVHUJXHUVHGHRXWUR
PRGRRIXQGDPHQWRGHTXHVHPRVGLUHLWRVGHSURSULHGDGHJDUDQWLGRVSHOR(VWDGR
a criatividade e a inovação estariam comprometidas e até mesmo deixariam de
H[LVWLU,VVRQRVUHPHWHjTXHVWmRGDVUDt]HVRXGDPRWLYDomRGDLQYHQomRGDFULD
omRGHLGHLDVTXHQHVVDGRXWULQDpHPLQHQWHPHQWHHFRQ{PLFDHFDSLWDOLVWD(VVD
questão será tratada no próximo capítulo. Ainda é preciso problematizar a reivin-
dicação do monopólio necessário.
 8PDIDOKDQDOLYUHFRQFRUUrQFLDOHYDULDDHFRQRPLDGHPHUFDGRDH[LJLUD
RUJDQL]DomRGHXPFRQMXQWRGHUHVWULo}HVjSUySULDFRQFRUUrQFLDXPIUDFDVVRDR
OLGDUFRPDVLGHLDV1RWHUUHQRGDHFRQRPLDQHRFOiVVLFDRPDUNHWIDLOXUHMXVWL¿FD
SOHQDPHQWH D LQWHUYHQomR GR (VWDGR SDUD D JDUDQWLD H D H[HFXomR GRV GLUHLWRV
de propriedade intelectual. O alto custo do desenvolvimento e o baixo custo da
FySLDWRUQDPRPHUFDGRLQVX¿FLHQWHSDUDDVVHJXUDURÀX[RGHLQYHVWLPHQWRQDLQR
YDomR$V PDUJHQV GH UHWRUQR GH XP LQYHVWLGRU VHULDP UHGX]LGDV GUDVWLFDPHQWH
pela cópia de seu invento feita pela concorrência. Nesse caso, o não-investimento
seria premiado e o desenvolvimento da inovação penalizado. Essa imperfeição do
mercado desfavoreceria a continuidade do investimento em inovação.
 2V GLUHLWRV GH SURSULHGDGH LQWHOHFWXDO SDWHQWHV FRS\ULJKW H PDUFDV  UH
presentariam então uma intervenção estatal corretiva. Uma patente é um mono-
SyOLRWHPSRUiULRDVVHJXUDGRSHOR(VWDGRFRPRREMHWLYRGHJDUDQWLURUHWRUQRGRV
investimentos realizados, impedindo que sejam erodidos pela cópia dos concor-
rentes. A ideia de exclusividade temporária é decisiva. O Estado interfere na relação
HQWUHDVIRUoDVGDRIHUWDHSURFXUDSRUPHLRGDFRQFHVVmRGHSDWHQWHSDUDFRUULJLU
RPDUNHWIDLOXUH$SyVRHQFHUUDPHQWRGDLQWHUYHQomRHVWDWDOFRPR¿PGRSUD]R
GD SDWHQWH R PHUFDGR YROWDULD D UHHTXLOLEUDU RV ÀX[RV HFRQ{PLFRV H DR PHVPR
WHPSRRLQYHVWLPHQWRGHORQJRSUD]RHVWDULDSUHVHUYDGRSHORPHFDQLVPRMXUtGLFR
GH UHVWULomR DUWL¿FLDO j FRQFRUUrQFLD$ SHUVSHFWLYD GH OXFUR p HQWHQGLGD FRPR R
incentivo indispensável e insubstituível para a criação de novas ideias.
Caso o inventor ou criador de ideias não veja possibilidade de auferir lucros,
SRGHULDPDQWHUVHXLQYHQWRHPVHJUHGRDWUDVDQGRRGHVHQYROYLPHQWRHEORTXHDQGR
RDYDQoRWHFQROyJLFR&RPDSDWHQWHDVRFLHGDGHJDQKDULDDSRVVLELOLGDGHGHXWLOL]DU
DLQYHQomRPHVPRTXHSDJDQGRSRUHODQRSHUtRGRHPTXHYLJRUDUDSDWHQWH(VVH
seria o lado socialmente positivo do monopólio temporário.
 (QWUHWDQWR R PRQRSyOLR SRGH FDXVDU LQH¿FLrQFLDV 8PD HVWi UHODFLRQDGD
ao volume adequado de produção que poderá ser inferior ao socialmente ótimo,
GHYLGR j LQH[LVWrQFLD GH FRQFRUUrQFLD SDUD EDOL]DU DV TXDQWLGDGHV 2XWUD HVWi
Software livre, cultura hacker e o ecossistema da colaboração • 227

UHODFLRQDGDGLUHWDPHQWHjLQRYDomR$V¿UPDVGHWHQWRUDVGRPRQRSyOLRWHPSRUiULR
podem acabar retardando a inovação com o intuito de extrair o lucro máximo com o
último invento. Como não há concorrência, esse comportamento não implicaria em
SHUGDGHPHUFDGR8PDDERUGDJHPHVFODUHFHGRUDIRLIHLWDSRU5HQDWR)RQVHFD

³eLQWHUHVVDQWHQRWDURSDUDGR[RDTXLDSUHVHQWDGR3DUDLQFHQWLYDUD
LQRYDomRRJRYHUQRGHYHSDWURFLQDUDFULDomRGRGLUHLWRGHSURSULHGDGH
VREUHDVLQYHQo}HVRXVHMDDFULDomRGHPRQRSyOLRV1RHQWDQWRRV
monopólios tendem a produzir menos ideias do que o ótimo e precisam
então de subsídios e de políticas que incentivem a competição, que
GHL[HP YLYR R WHPRU GH SHUGHU R PHUFDGR 2 VHJUHGR GR VXFHVVR p
VDEHUFDOLEUDUWDLVSROtWLFDVGHPRGRDSURPRYHUXPDPELHQWHIpUWLOj
FULDomRHjGLIXVmRGHLGHLDV´ )216(&$ 

Garantir direitos de propriedade sobre as ideias seria a forma de estimular


DVXDSURGXomRSHORVHWRUSULYDGRH[LJLQGRDDomRGR(VWDGRHRPRQRSyOLROHJDO
VREUHDFULDomRFRQVLGHUDGRLQGLVSHQViYHOSDUDRSURJUHVVRWHFQROyJLFR2XVHMD
o mainstream HFRQ{PLFR QmR Yr D LQRYDomR IRUD GR PRQRSyOLR SRU RXWUR ODGR
PXLWRVDGYRJDPTXHVHPFRPSHWLomRDYHORFLGDGHGHLQRYDomRVHUHGX]
No processo que o Departamento de Estado norte-americano moveu contra
D 0LFURVRIW RV HFRQRPLVWDV -RVHSK 6WLJOLW] H -DVRQ )XUPDQ DSUHVHQWDUDP XPD
GHFODUDomR D SDUWLU GH XP HVWXGR TXH OKHV IRUD HQFRPHQGDGR SHOD &RPSXWHU 
&RPPXQLFDWLRQV ,QGXVWU\$VVRFLDWLRQ QR ¿QDO GH  e LPSRUWDQWH QRWDU TXH
GRSRQWRGHYLVWDGDWHRULDHFRQ{PLFDQmRH[LVWHFRQVHQVRVREUHRVLPSDFWRVGR
monopólio sobre a propriedade intelectual, como é possível notar na declaração a
VHJXLU

³$LQG~VWULDGDWHFQRORJLDGDLQIRUPDomRpFDUDFWHUL]DGDSHODUDSLGH]
GDV PXGDQoDV WHFQROyJLFDV &RPR D PRGHUQD WHRULD GD FRPSHWLomR
e monopólios enfatiza, é importante focar não apenas aquilo que
afeta o consumidor hoje, mas também como a mistura de monopólio,
FRPSHWLomR H UHJLPH GH SURSULHGDGH LQWHOHFWXDO DIHWD R ULWPR H D
direção do processo de inovação. Schumpeter acreditava que o receio
de perda das rendas do monopólio levava os monopolistas a continuar
LQRYDQGRXVDQGRRVOXFURVSDUD¿QDQFLDUDVLQRYDo}HV(QWUHWDQWRR
ULWPRFRPTXHDVLQRYDo}HVVmRLQWURGX]LGDVSRGHULDVHUPDLVUiSLGR
se o poder dos monopólios fosse podado. O monopólio diminui o passo
GDV LQRYDo}HV GH TXDWUR PDQHLUDV 3ULPHLUD LQRYDo}HV SUHFHGHQWHV
VmR RV SULQFLSDLV LQVXPRV GH LQRYDo}HV VXEVHTXHQWHV 2 SRGHU
monopolista aumenta o custo de se buscar inovação. E, quando se
aumenta o custo de um insumo numa atividade, o nível dessa atividade
FDL 6HJXQGD FRP PDLV EDUUHLUDV j HQWUDGD QXP QHJyFLR D DPHDoD
228 • Software livre, cultura hacker e o ecossistema da colaboração

de competição schumpeteriana e, portanto, os incentivos para inovar


GLPLQXHP 1XP FDVR H[WUHPR VH XP PRQRSyOLR VH DVVHJXUDU GH
TXH QmR Ki DPHDoD GH FRPSHWLomR HOH QmR LQYHVWLUi HP LQRYDo}HV
7HUFHLUDDSUySULDLQRYDomRSRGHVHUPDOGLUHFLRQDGDD¿PGHJDUDQWLU
o aumento tanto das barreiras de entrada quanto dos custos dos rivais.
(PVLVWHPDVRSHUDFLRQDLVRGHVHQYROYLPHQWRGHSDGU}HVSURSULHWiULRV
alternativos e a construção de middleware não-interoperável são
H[HPSORV GH LQRYDo}HV TXH SRGHP SRWHQFLDOPHQWH UHIRUoDU R SRGHU
monopolista. Quarta, os incentivos de um monopólio para inovar são
limitados. Como o monopolista produz menos que o socialmente ótimo,
as economias com uma redução no custo de produção são menores
do que num mercado competitivo. Também os incentivos para um
monopolista patrocinar pesquisas não as levarão ao nível socialmente
H¿FLHQWH3UHIHUHQFLDOPHQWHVXDSUHRFXSDomRpLQRYDUDSHQDVQRULWPR
necessário para afastar a competição, um ritmo marcadamente menor
que o socialmente ótimo. Em resumo, monopolização não ameaça os
consumidores apenas pelo aumento dos preços e pela redução da
SURGXomRPDVWDPEpPUHGX]DLQRYDomRQRORQJRSUD]R´ 67,*/,7=
-$621 

Todo o esforço teórico-doutrinário para defender o monopólio sobre a


FULDomR FRPR IXQGDPHQWR GR LQFHQWLYR j FULDomR DOpP GRV ULVFRV DSRQWDGRV SRU
6WLJOLW] H -DVRQ HUJXHVH VREUH XPD DUJXPHQWDomR HFRQ{PLFD HPSLULFDPHQWH
IUDJLOL]DGD SRLV GHVFRQVLGHUD R TXH <RVKDL %HQNOHU GHQRPLQRX GH ³FRPPRQV
EDVHG SHHUSURGXFWLRQ´ (PSLULFDPHQWH FRQVWDWDPRV D HYROXomR FRQVWDQWH GR
GHVHQYROYLPHQWR FRPSDUWLOKDGR GH VRIWZDUH H DJRUD FRP R PRYLPHQWR &UHDWLYH
&RPPRQV WDPEpP GH P~VLFDV H RXWUDV FULDo}HV FXOWXUDLV 3RGHPRV REVHUYDU R
PRGHOR GH GHVHQYROYLPHQWR ³ED]DU´ TXH HVWi VHQGR DSOLFDGR HP LQ~PHURV SUR
jetos internacionais de software, e atualmente envolve aproximadamente 150 mil
SURJUDPDGRUHV QD FRQVWUXomR H FRUUHomR GH FDGD QRYD YHUVmR GR *18/LQX[
O que cada colaborador dessa rede de desenvolvimento cede ao produto é bem
PHQRVGRTXHRJDQKRTXHSRGHREWHUSRVWHULRUPHQWHFRPRXVRGHVVHSURJUDPD
FRODERUDWLYR(VWHSURFHVVRWDPEpPIRLGHQRPLQDGRGHJLIWHFRQRP\RXHFRQRPLD
da doação.
 %HQNOHUQRDUWLJR&RDVHV3HQTXLQRU/LQX[DQG7KH1DWXUHRIWKH)LUP
SXEOLFDGRHPQR7KH<DOH/DZ-RXUQDOGHIHQGHXTXHD,QWHUQHWHVWiYLDELOL]DQGR
a produção colaborativa entre pares (common-based peer-production), um conjunto
de novas formas cooperativas de produção de informação, conhecimento e cultura
em oposição aos mecanismos habituais de propriedade, hierarquia e mercados.
(OHVHVWDULDPEDVHDGRVQDWURFDHFRPSDUWLOKDPHQWRYROXQWiULRGHWUDEDOKR
Software livre, cultura hacker e o ecossistema da colaboração • 229

³2 SDSHO GDV QRUPDV R SDSHO GD WHFQRORJLD H D LQWHUDomR HQWUH


YROXQWDULVPR H JDQKR HFRQ{PLFR QD IRUPDomR GD PRWLYDomR H
RUJDQL]DomR GH XPD SURGXomR FRODERUDWLYD VmR WDPEpP iUHDV
de pesquisa importantes, particularmente o estudo de como as
FRPXQLGDGHV GH FRODERUDGRUHV VH DJOXWLQDP HP WRUQR GH SURMHWRV
(VWXGRV TXDOLWDWLYRV H TXDQWLWDWLYRV GD LPSRUWkQFLD GD SURGXomR
FRODERUDWLYD >SHHU SURGXFWLRQ@ QD HFRQRPLD LQIRUPDFLRQDO JHUDO HP
particular na economia informacional baseada na Internet, forneceriam
uma melhor compreensão sobre quão periférico ou central é esse
IHQ{PHQR 3DUD ¿UPDV D HPHUJrQFLD GD SURGXomR FRODERUDWLYD
SRGH UHTXHUHU XP GHVORFDPHQWR PDLV DJUHVVLYR D SDUWLU GH PRGHORV
QHJRFLDLVEDVHDGRVHPSURGXWRVLQIRUPiWLFRVHPGLUHomRDPRGHORV
QHJRFLDLVEDVHDGRVHPVHUYLoRV´ %(1./(5 

3URMHWRVLQRYDGRUHVHVWmRVHQGRUHDOL]DGRVIRUDGRPRGHORKHJHP{QLFRGH
GLUHLWRV GH SURSULHGDGH H WrP JHUDGR JDQKRV HFRQRPLFDPHQWH GLVWULEXtGRV HQWUH
RV GHVHQYROYHGRUHV GHVVHV SURMHWRV TXH QmR VH IRUPDUDP D SDUWLU GD H[LJrQFLD
dos direitos exclusivos sobre a propriedade daquelas ideias. Essa constatação en-
IUDTXHFH SURIXQGDPHQWH R SDUDGLJPD GD H[LJrQFLD GR PRQRSyOLR HFRQ{PLFR GD
H[SORUDomRGDREUDRXLQYHQWRFRPRHOHPHQWRHVVHQFLDOSDUDDREWHQomRGHJDQKR
HFRQ{PLFRHSDUDLQFHQWLYRjFULDWLYLGDGHHjLQRYDomR
Além disso, Albuquerque relatou um estudo de Narin, Hamilton e Olivastrop,
UHDOL]DGRHPHPTXHDDQiOLVHGDVSDWHQWHVUHJLVWUDGDVQRV(VWDGRV8QLGRV
HQWUHHHYLGHQFLRXRHVWUHLWDPHQWRGRVODoRVHQWUHDFLrQFLDS~EOLFD
H D LQG~VWULD SULYDGD 3RU H[HPSOR QDV SDWHQWHV UHJLVWUDGDV SHOD ,%0 VRPHQWH
 GRV DUWLJRV FLWDGRV VmR GH IRQWHV LQWHUQDV GD HPSUHVD $ GLVWULEXLomR GDV
FLWDo}HVUHYHODRVÀX[RVLQIRUPDFLRQDLVTXHVXVWHQWDPDLQRYDomRGRWRWDO
GHFLWDo}HVVmRGHXQLYHUVLGDGHVQRUWHDPHULFDQDVVmRGHXQLYHUVLGDGHV
HVWUDQJHLUDVRULJLQDUDPVHHPHPSUHVDVHVWUDQJHLUDVHHPRXWUDV
HPSUHVDVDPHULFDQDV $/%848(548( 
 ,VVRQRVID]UHWRPDUjTXHVWmRGDOHJLWLPLGDGHGDSURSULHGDGHSULYDGDVREUH
o conhecimento. Conhecimentos públicos sustentam os inventos patenteados. Por
RXWUR ODGR p QtWLGR TXH R HQGXUHFLPHQWR GD OHJLVODomR GH SDWHQWHV SRGH OHYDU D
excessos absurdos que acabem bloqueando a própria inovação e impedindo
D UHGXomR GDV GHVLJXDOGDGHV HQWUH DV QDo}HV ULFDV H DV SREUHV 1R H[HPSOR
DFLPD¿FDHYLGHQWHTXHTXHPSRVVXLXPJUXSRGHSDWHQWHVSRGHWHQWDUFHUFHDU
R GHVHQYROYLPHQWR GH XP UDPR WHFQROyJLFR HP XP VLVWHPD GH SURWHomR IRUWH
/DQJLQLHU H 0RVFKLQL GR 'HSDUWDPHQWR GH (FRQRPLD GD 8QLYHUVLGDGH GH ,RZD
FRQVLGHUDP TXH D WHQVmR HQWUH RV SDGU}HV GH FRPSRUWDPHQWR GH XPD FLrQFLD
aberta e a privatização de conhecimento inovador é imediatamente aparente. O
230 • Software livre, cultura hacker e o ecossistema da colaboração

enrijecimento dos mecanismos de propriedade intelectual pode corroer o domínio de


informação pública e inviabilizar o acesso a fontes fundamentais de pesquisa com
FRQVHTXrQFLDV H[WUHPDPHQWH VpULDV SDUD D YLWDOLGDGH GD FRPXQLGDGH FLHQWt¿FD
$/%848(548( 
Uma proteção fraca da propriedade intelectual pode ser indispensável
SDUD D LQRYDomR HP PXLWRV VHJPHQWRV HFRQ{PLFRV$ LQG~VWULD GH VRIWZDUH WHP
XPDEDUUHLUDGHHQWUDGDPXLWREDL[D7UDWDVHGHXPGRVVHWRUHVPDLVGLQkPLFRV
e inovadores da economia. A principal hipótese que explica a velocidade elevada
do desenvolvimento dessa indústria é sua diminuta barreira de entrada. Com uma
OHJLVODomRGHSDWHQWHVGHVRIWZDUHH[WUHPDPHQWHIRUWHpSURYiYHOTXHVHDXPHQWHP
RVUHFXUVRVQHFHVViULRVDXPLQRYDGRUVHMDFRPRSDJDPHQWRGHOLFHQoDVRXFRP
RV FXVWRV GH WUDQVDomR RULJLQDGRV HP OLWtJLRV MXGLFLDLV $OpP GLVVR VROXo}HV GH
software não-proprietárias, além de aumentar a possibilidade de modernização
HFRQ{PLFD GH XP FRQMXQWR GH SHTXHQDV HPSUHVDV HVWmR JHUDQGR XP ULWPR GH
LQRYDo}HVLQFUHPHQWDLVWmRRXPDLVYHOR]HVGRTXHRGRVVRIWZDUHVSURSULHWiULRV
FRPRSRGHPRVQRWDUQDHYROXomRGRVVRIWZDUHVSUHVHQWHVQR6RXUFH)RUJH.
Esse cenário de complexidade divide até mesmo os chamados libertarians
(ultra-liberais no contexto político norte-americano) a respeito dos impactos e da
OHJLWLPLGDGHGDSURSULHGDGHVREUHDVLGHLDV(QTXDQWR+HUEHUW6SHQFHU/\VDQGHU
6SRRQHU H$\Q 5DQG WrP VLGR DUGRURVRV GHIHQVRUHV GRV GLUHLWRV GH SURSULHGDGH
LQWHOHFWXDO7KRPDV-HIIHUVRQWHPXPDSRVLomRDPEtJXDVREUHRWHPD-i%HQMDPLQ
7XFNHU H 7RP 3DOPHU UHMHLWDUDP FDWHJRULFDPHQWH D SURSULHGDGH VREUH LGHLDV 2
DUJXPHQWR FHQWUDO GRV libertarians defensores da propriedade intelectual centra-
se na defesa do direito ao produto do trabalho, os contrários veem essa forma de
SURSULHGDGHFRPRXPLQDFHLWiYHOSULYLOpJLRJDUDQWLGRSHOR(VWDGR /21* 
 $WHRULDGDSURSULHGDGHGHEHQVWDQJtYHLVQmRVHDSOLFDFRQIRUWDYHOPHQWH
DXPDVRFLHGDGHEDVHDGDQDLQIRUPDomRGHYLGRjVFDUDFWHUtVWLFDVSDUWLFXODUHVH
GLVWLQWDVGRVEHQVLQWDQJtYHLV1HVVHVHQWLGRH[LVWHDQHFHVVLGDGHGHGHVHQYROYHU
XPDWHRULDGDSURSULHGDGHGRLPDWHULDO(VVDWHRULDGHYHFRQVLGHUDUDVVHJXLQWHV
FRQVWDWDo}HV HPSLULFDPHQWH FRPSURYiYHLV SDUD WHU YDOLGDGH DUJXPHQWDWLYD  D
LQIRUPDomRFRPREHPLQWDQJtYHOpH[SRQHQFLDOPHQWHUHSURGXWtYHOVHPGHVJDVWH
VHP SHUGDV  R DXWRU GH XPD LGHLD VHPSUH WHUi DVVHJXUDGD D VXD DXWRULD VRE
SHQD GH YLRODU D YHUGDGH KLVWyULFD  D PDWpULDSULPD RX LQVXPR SDUD D FULDomR
de ideias são também ideias. Assim, o conhecimento privado tem como base o
conhecimento socialmente produzido, portanto, a propriedade sobre ideias deve
ser sempre relativizada, pois o trabalho intelectual individual e privado não pode ter
SUHVFLQGLGRGRFRQKHFLPHQWRFROHWLYR±DVRFLHGDGHHPUHGHDFHOHUDRVSURFHVVRV
'LVSRQtYHOKWWSVRXUFHIRUJHQHW$FHVVRHP
Software livre, cultura hacker e o ecossistema da colaboração • 231

de troca e compartilhamento. Quanto mais se compartilha o conhecimento, mais


HVVHFRQKHFLPHQWRFUHVFHRH[HPSORPDUFDQWHpRGDVFRPXQLGDGHVGHVRIWZDUH
OLYUH 2X VHMD RV FyGLJRV JDQKDP PXLWR YDORU QXP FRQWH[WR GH JLIW HFRQRP\ RX
economia da doação.
 $WHQGrQFLDGHXPDVRFLHGDGHEDVHDGDHPÀX[RVGHLQIRUPDomRpFDGD
vez mais desmaterializar e desprivatizar a propriedade das ideias, permitindo a
distribuição dos seus benefícios. A reação a essa tendência só pode ocorrer com
RHQULMHFLPHQWRGDSURSULHGDGHVREUHRVEHQVLQWDQJtYHLV(VVHHQULMHFLPHQWRQmR
pode ser executado sem o Estado e sua ação jurídico-repressiva. Tal possibilidade
QmRSRGHVHUUHDOL]DGDVHPEORTXHDUROLYUHÀX[RGRFRQKHFLPHQWRWHFQROyJLFRR
TXHSRGHUiIUHDURULWPRGDLQRYDomR$VVLPRFRPSDUWLOKDPHQWRDOpPGHDVVHJXUDU
DFULDomRHVWiHPFRQVRQkQFLDFRPDHVVrQFLDGDFRPXQLFDomRHPUHGHTXHpD
WURFDGHLQIRUPDo}HV$VUHVWULo}HVHVWDWDLVjWURFDGHLQIRUPDo}HV LQFOXVLYHFRPR
FRQKHFLPHQWRVFRGL¿FDGRV H[LJHPXPDDomRHVWDWDOGXUDTXHSRGHWDPEpPDFDEDU
ferindo a liberdade de expressão, de troca e de criação. O texto do movimento GNU
pH[WUHPDPHQWHHVFODUHFHGRUGRLGHiULRGRFRPSDUWLOKDPHQWR

³3RUTXHR6RIWZDUH1mR'HYHULD7HU'RQRV
2VLVWHPDGHGLUHLWRDXWRUDO FRS\ULJKW VHGHVHQYROYHXFRPDLPSUHQVD
HVFULWDXPDWHFQRORJLDSDUDFRSLDUHPODUJDHVFDOD2GLUHLWRDXWRUDO
FRPELQDYDEHPFRPHVVDWHFQRORJLDSRUTXHHOHUHVWULQJLDDSHQDVRV
JUDQGHV SURGXWRUHV GH FySLDV 1mR WLUDYD OLEHUGDGH GRV OHLWRUHV GH
livros. Um leitor comum, que não possuísse uma máquina impressora,
podia copiar livros apenas com caneta e tinta, e poucos leitores foram
HQTXDGUDGRVSRULVVR$WHFQRORJLDGLJLWDOpPDLVÀH[tYHOTXHDLPSUHQVD
TXDQGRDLQIRUPDomRHVWiQDIRUPDGLJLWDOYRFrSRGHIDFLOPHQWHFRSLi
ODHFRPSDUWLOKiOKDFRPRVRXWURVHHVVDJUDQGHÀH[LELOLGDGHQmRVH
encaixa bem num sistema como o de direito autoral. Essa é a razão de
ser dessas medidas cada vez mais severas e lamentáveis postas em
prática para aplicar o direito autoral de software. Consideremos essas
quatro práticas da Associação dos Produtores de software (software
3XEOLVKHUV$VVRFLDWLRQ63$ DPHULFDQD3URSDJDQGDPDVVLYDGL]HQGR
TXHpHUUDGRGHVREHGHFHUDRVGRQRVSDUDDMXGDUXPDPLJR3HGLGRV
D DOFDJXHWHV SDUD TXH GHQXQFLHP VHXV FROHJDV GH WUDEDOKR %DWLGDV
FRP DMXGD SROLFLDO  HP HVFULWyULRV H HVFRODV QDV TXDLV VH H[LJH GDV
SHVVRDV TXH SURYHP TXH VmR LQRFHQWHV GH FySLD LOHJDO 3HUVHJXLomR
SHOR JRYHUQR DPHULFDQR D SHGLGR GD 63$  D SHVVRDV FRPR 'DYLG
LaMacchia, do MIT, não por copiar software (não o acusam de copiar
nada), mas simplesmente por deixar recursos de cópia disponíveis
RXPDOJXDUGDGRVRXSRUQmRFHQVXUDUVHXXVR7RGDVHVVDVTXDWUR
SUiWLFDVOHPEUDPDTXHODVXVDGDVQDDQWLJD8QLmR6RYLpWLFDRQGHFDGD
PiTXLQDFRSLDGRUDWLQKDXPJXDUGDSDUDSUHYHQLUFySLDVSURLELGDVH
os indivíduos tinham que copiar informação secretamente e passá-la de
PmRHPPmRFRPR³VDPL]GDW´+iFODURXPDGLIHUHQoDRPRWLYRSHOR
TXDOVHFRQWURODYDDLQIRUPDomRQD8QLmR6RYLpWLFDHUDSROtWLFRDJRUDR
232 • Software livre, cultura hacker e o ecossistema da colaboração

PRWLYRpHFRQ{PLFR0DVVmRDVDo}HVTXHQRVDIHWDPQmRRPRWLYR
4XDOTXHU WHQWDWLYD GH EORTXHDU D WURFD GH LQIRUPDo}HV QmR LPSRUWD
TXDOOHYDDRVPHVPRVPpWRGRVHjPHVPDWUXFXOrQFLD´8

O formato capitalista de apropriação das ideias pode estar ferindo a liber-


GDGH2SULQFtSLRGDOLEHUGDGHIRLDEDVHGDOHJLWLPLGDGHFDSLWDOLVWD1DVRFLHGDGH
GD LQIRUPDomR DV UHODo}HV KHJHP{QLFRWUDGLFLRQDLV GH SURSULHGDGH FDSLWDOLVWD
chocam-se com a liberdade para poder existir e manter-se.

Comunidades tecnológicas, movimentos sócio-técnicos e


esfera pública

³5HODo}HVGHVDEHUHSURGXomRGHVDEHUDSRQWDPDVDtGDSDUDHVFDSDU
jVUHODo}HVPHUFDQWLVHjVRFLHGDGHGDPHUFDGRULDGHVGHTXHSRVVDP
VHGHVHQYROYHUOLYUHPHQWHVHPRFRQVWUDQJLPHQWRGDYDORUL]DomR2V
que desenvolvem software livre e a rede livre vivenciam a possibilidade
concreta dessa saída, e encontram ao mesmo tempo os limites que os
SRGHUHV GRPLQDQWHV WrPVH HVIRUoDGR SDUD LPSRU j VXD DWLYLGDGH e
uma luta no interesse de toda a sociedade. Nessa luta, os participantes
do movimento do software livre sempre se posicionam com um pé no
FDPSRGRVDGYHUViULRV´ $QGUp*RU] 

 +DEHUPDV LQGLFRX TXH XPD HVIHUD S~EOLFD EXUJXHVD FRQVWLWXLXVH FRPR


um espaço de manifestação e de expressão de pessoas privadas reunidas em um
OXJDUS~EOLFRSDUDGLVFXWLUHLQÀXLUVREUHDVGHFLV}HVGR(VWDGRLQGHSHQGHQWHPHQWH
GHVWH$HVIHUDS~EOLFDEXUJXHVDQRVVpFXORV;9,,H;9,,,HYROXLXGHXPDHVIHUD
pública literária, que por sua vez desenvolveu-se no ambiente dos cafés, saloons e
FRPXQLGDGHVFRPHQVDLV(VVHVWLYHUDPJUDQGHLPSRUWkQFLDSDUDRHVSUDLDPHQWR
GDLPSUHQVDLQVWUXPHQWRHVVHQFLDOGDRSLQLmRS~EOLFD6RPHQWHQD3DULVGH
H[LVWLDPPDLVGHMRUQDLV6HJXQGR+DEHUPDVQRSHUtRGRDQWHULRUGHD
 RV FDIpV H RV VDORRQV WRUQDUDPVH FHQWURV GD FUtWLFD TXH HUD LQLFLDOPHQWH
literária e que depois assumiu também uma dimensão política. A esfera pública
literária teve papel relevante, mesmo em uma sociedade em que predominava o
DQDOIDEHWLVPRSRLVHUDRHVSDoRGHDUWLFXODomRGRVEXUJXHVHVTXHGRPLQDYDPD
QRUPDFXOWDDOtQJXDGRVDULVWRFUDWDV2VEXUJXHVHVEXVFDYDPDVVLPLJXDODUHP
VHjDULVWRFUDFLDHGLVVHPLQDUVHXVYDORUHVHLGHDLV
 $SOLFDQGRDYLVmRGH+DEHUPDVQRFHQiULRGHH[SDQVmRGDVUHGHVGLJLWDLV

'LVSRQtYHOKWWSZZZJQXRUJ"SKLORVRSK\ZK\IUHHSWKWPO$FHVVRHP
Software livre, cultura hacker e o ecossistema da colaboração • 233

tentarei demonstrar a hipótese de que um movimento sócio-técnico que domina a


OLQJXDJHPHVVHQFLDOGDVRFLHGDGHHPUHGHVRIWZDUHVSURWRFRORVGHUHGHHSD
GU}HVFRQWUiULRjVXDSULYDWL]DomRHDRREVFXUDQWLVPRGHVXDHVVrQFLDUH~QHVH
HP FRPXQLGDGHV FLEHUHVSDFLDLV GH FRPSDUWLOKDPHQWR TXH GHVHQYROYHP Do}HV H
XPGLVFXUVRFUtWLFRFRQWUDDSURSULHGDGHLQWHOHFWXDO'DGDDLPSRUWkQFLDYLWDOSDUD
RFDSLWDOLVPRLQIRUPDFLRQDOGRVLVWHPDGHSURSULHGDGHKHJHP{QLFRHGDGRTXHD
SURSULHGDGH LQWHOHFWXDO QmR SRGH H[LVWLU VHP D OHJLVODomR H R DSDUDWR MXUtGLFRUH
SUHVVLYRGR(VWDGRDVDo}HVHLGHLDVGRPRYLPHQWRGHVRIWZDUHOLYUHFKRFDPVH
contra o status quo e tornam-se assim um movimento cultural planetário de novo
tipo, essencialmente político, por questionar os fundamentos teóricos, culturais e
HFRQ{PLFRVGDSURSULHGDGHGHLGHLDV
Tal como nos cafés descritos por Habermas, uma nova esfera pública
conforma-se, não literária, mas uma esfera pública tecno-social, uma esfera pública
GH KRPHQV OLYUHV TXH QmR VH FRQFHQWUDP PDLV HP EXUJRV PDV FRQHFWDPVH
no ciberespaço, em listas e fóruns próprios que se constituem como uma esfera
S~EOLFD LQLFLDOPHQWH KDFNHU 'D SUiWLFD KDFNHU GH FRPSDUWLOKDPHQWR GH FyGLJRV
IRQWHGHVRIWZDUHVDFRPXQLGDGHGHVRIWZDUHOLYUHLQVSLURXRVXUJLPHQWRGHXPD
ação similar em outras áreas, tais como na música, com o Creative Commons, e
QDFRQVROLGDomRGHUHSRVLWyULRVS~EOLFRVGHFRQKHFLPHQWRFRPRD:LNLSpGLDHQWUH
RXWURVWDQWRVH[HPSORV2VRUJDQL]DGRUHVGR)yUXP6RFLDO0XQGLDOUHDOL]DGRQD
ËQGLDHPXWLOL]DUDPSHODSULPHLUDYH]RVSURJUDPDVGHFRPSXWDGRUOLYUHVSRU
FRQVWDWDUHP TXH RV PRYLPHQWRV VRFLDLV DQWLJOREDOL]DomR HVWDYDP DSULVLRQDGRV
SHODVOLQJXDJHQVLQIRUPDFLRQDLVFRQWURODGDVSHODVFRUSRUDo}HVFRQFHQWUDGRUDVGH
ULTXH]DHSRGHUHTXHHUDSRUWDQWRQHFHVViULRURPSHUFRPRPRGHORGHWHFQRORJLDV
proprietárias.
 2VKDFNHUVDUWLFXODPVHHPFRPXQLGDGHVYLUWXDLV³RVQRYRVFDIpVHVDORRQV´
SDUD HVFUHYHU FyGLJRV H GLVSRQLELOL]iORV SHOR SODQHWD 'HVVD SUiWLFD VXUJHP HQ
FRQWURV OLVWDV GH GLVFXVVmR IXQGDo}HV DVVRFLDo}HV YLUWXDLV H SUHVHQFLDLV FRP
XPD¿ORVR¿DDQWLSURSULHWiULDHGHFUtWLFDDRIHFKDPHQWRHDREORTXHLRGHFyGLJRV
&RPRWRGRJUDQGHPRYLPHQWRDKHWHURJHQHLGDGHpXPDGHVXDVSULQFLSDLVFDUDF
WHUtVWLFDVSRULVVRLQWHUHVVDQRVGHVWDFDUDTXLDFRPXQLGDGHTXHWUD]FRQVLJRRV
HOHPHQWRVPDLVFRPSOHWRVGD¿ORVR¿DHpWLFDKDFNHUDFRPXQLGDGH'HELDQ(VVD
FRPXQLGDGHpXPGRV³QyV´GDHVIHUDS~EOLFDLQLFLDOPHQWHKDFNHUHGDSROLWL]DomR
do movimento sócio-técnico.
 (PJHUDODGLVFXVVmRGDUHODomRHQWUHWHFQRORJLDHVRFLHGDGHSDVVDQH
cessariamente pelo posicionamento diante da teoria crítica debatida pela Escola
GH )UDQNIXUW $QWKRQ\ *LGGHQV DR GLVFXWLU R SHQVDPHQWR FUtWLFR GH 0DUFXVH
D¿UPRX TXH ³R SRGHU VXEYHUVLYR GD UD]mR WLQKD VLGR VXEYHUWLGR QR µSHQVDPHQWR
234 • Software livre, cultura hacker e o ecossistema da colaboração

XQLGLPHQVLRQDO¶GDUDFLRQDOLGDGHWHFQROyJLFD´ *,''(16 0DVpH[D


WDPHQWHGDUD]mRLQVWUXPHQWDOQRLQWHULRUGHVHXFRUSRPDLVWHFQROyJLFRTXHDWXDO
PHQWH HPHUJH XP GRV PDLV FRQWXQGHQWHV GLVFXUVRV GH OLEHUGDGH 'D EXVFD GD
PHOKRUIRUPDGHGHVHQYROYHUFyGLJRVSDUDFRPSXWDGRUHVpTXHDLGHLDOLEHUWiULDGH
5LFKDUG6WDOOPDQFRQVROLGRXVHHPXPPpWRGRGHFULDomRHPDQXWHQomRFROHWLYD
GHVRIWZDUHFKDPDGRSRU(ULF5D\PRQGGH³ED]DU´FRQWUDDULJLGH]HPSREUHFHGRUD
GRPpWRGRKLHUDUTXL]DGRGHQRPLQDGR³FDWHGUDO´$LGHLDGHXPGHEDWHGHSHVVRDV
DXW{QRPDV TXH H[HUFHP VXDV FRPSHWrQFLDV FRPXQLFDWLYDV JDQKD QD UHGH XPD
dimensão mundial e, na confecção compartilhada de softwares, a redemocratização
GD OLQJXDJHP EiVLFD GD VRFLHGDGH HP UHGH SURSRQGR VXD GHVSULYDWL]DomR H
devolução ao campo da produção coletiva do conhecimento humano.
 $UD]mRSXUDPHQWHLQVWUXPHQWDOHPWHUPRVGH¿QVHPHLRVpUDGLFDOL]DGD
QR FRQWH[WR GRV EHQV LQWDQJtYHLV H DFDED UHGHVFREULQGR TXH R GLiORJR H R FRP
SDUWLOKDPHQWR GR FRQKHFLPHQWR p D PHOKRU IRUPD GH VH HQFRQWUDU ERDV VROXo}HV
HPWHFQRORJLDGDLQIRUPDomR6HMDFRPRGL]LD/LQXV7RUYDOGV³¿]WXGRDSHQDVSRU
GLYHUVmR´ RX FRPR GL]LD 6WDOOPDQ ³DMXGDU DV RXWUDV SHVVRDV p D EDVH GD VRFLH
GDGH´1, o movimento de compartilhamento vai se construindo principalmente a partir
da licença virótica baseada no copyleft, que contamina os softwares e os impede
GH DSURSULDomR SULYDGD$ UHGH DFDED YLDELOL]DQGR FRPXQLGDGHV GH KDFNHUV TXH
WURFDP LQIRUPDo}HV LGHLDV FyGLJRVIRQWH H RSLQL}HV WpFQLFDV ¿ORVy¿FDV H WDP
EpPSROtWLFDVWDLVFRPRFRQWUDRSDWHQWHDPHQWRGHVRIWZDUHQD(XURSDHRHQGX
UHFLPHQWRGDVOHJLVODo}HVGHSURSULHGDGHLQWHOHFWXDOQRPXQGRFRQWUDR'0&$
SHOD OLEHUGDGH GR MRYHP QRUXHJXrV -RQ -RKDQVHQ RX VLPSOHVPHQWH -RQ '9' 
LQYHQWRUGDIHUUDPHQWD'H&66TXHTXHEUDYDRFyGLJRSDUDTXHRV¿OPHVURGDVVHP
em qualquer leitor de DVD -- e tantas outras campanhas.
André Gorz considera existir uma

³RSRVLomR HQIiWLFD DR GHVPRQWH GD FROHWLYLGDGH j PRGHUQL]DomR


FDWDVWUy¿FDGRVSDtVHVHPGHVHQYROYLPHQWRjSULYDWL]DomRGRVDEHU
da produção do conhecimento e do bem comum. Entre seus vários
ativistas destacam-se, por sua natureza bombástica particularmente
H¿FD] R PRYLPHQWR GR VRIWZDUH OLYUH H R ³KDFNHU´ 6XD RSRVLomR p
DWLYD QD HVIHUD PDLV LPSRUWDQWH GR FDSLWDO D HVIHUD GD SURGXomR GD
GLVVHPLQDomRGDVRFLDOL]DomRHGDRUJDQL]DomRGRVDEHU(OHVVmRRV
³GLVVLGHQWHVGRFDSLWDOLVPRGLJLWDO´  $VXSHULRULGDGHGRVVRIWZDUHV
que eles produzem comprova que a maior criatividade possível entre
RV KRPHQV p DWLQJLGD TXDQGR OLYUHV GD REULJDomR GH WLUDU SURYHLWR H
da disputa com a concorrência, eles podem desenvolver seus saberes
H VXDV FDSDFLGDGHV GH PRGR OLYUH H FRRSHUDWLYR 1D ³SUi[LV´ GHVVHV
GLVVLGHQWHV GLVWLQJXHPVH RV SUHVVXSRVWRV GH DFRUGR FRP RV TXDLV
DV UHODo}HV VRFLDLV GR FRQKHFLPHQWR SRGHULDP VHU R IXQGDPHQWR GH
Software livre, cultura hacker e o ecossistema da colaboração • 235

XPDYHUGDGHLUDVRFLHGDGHGRVDEHU(PFRQWUDVWHFRPDVFRQFHSo}HV
correntes, o saber aí não aparece como um saber objetivado, composto
GHFRQKHFLPHQWRVHLQIRUPDo}HVPDVVLPFRPRDWLYLGDGHVRFLDOTXH
FRQVWUyL UHODo}HV FRPXQLFDWLYDV QmR VXEPHWLGDV D XP FRPDQGR´
*RU] 

3DUDPHOKRUGH¿QLURTXHYHPDVHUHVVDPRELOL]DomRWpFQLFRVRFLDOSHOR
software livre, será preciso avançar nos conceitos de comunidade, movimento e
HVIHUDS~EOLFD7HUHPRVTXHGHVFUHYHUFRPRXPDPRELOL]DomRLQLFLDOPHQWHKDFNHU
extrapolou as fronteiras da especialidade técnica, ou seja, do mundo estrito do
VLVWHPDHDYDQoRXSDUDH[LJLUDOLEHUGDGHVREUHRFRQWUROHGDLQWHOLJrQFLDFRQWLGD
QDV OLQJXDJHQV EiVLFDV GD VRFLHGDGH HP UHGH RV SURWRFRORV RV SDGU}HV H RV
softwares.
 (VVDPRELOL]DomRSHODOLEHUGDGHGRFRQKHFLPHQWRWHFQROyJLFRWURX[HSDUDR
FDPSRGDWHFQRORJLDDSUiWLFDWtSLFDGDFLrQFLD$FLrQFLDWUDEDOKDVREUHXPPpWRGR
TXH FRQVLGHUD R VDEHU FLHQWt¿FR FRPR HOHPHQWR FXPXODWLYR RX VHMD HVVH VDEHU
VHJXH DYDQoDQGR VREUH R VDEHU DQWHULRU $ PRELOL]DomR SHOR VRIWZDUH OLYUH SUD
WLFDDLGHLDGHTXHFyGLJRVERQVQmRVHGHVSHUGLoDPGHYHPVHUFRPSDUWLOKDGRV
apoiados e melhorados por uma comunidade. Assim, a comunidade de software
OLYUHYrRVDEHUWHFQROyJLFRWDPEpPFRPRFXPXODWLYR2VVRIWZDUHVPHVPRTXDQ
do lançados individualmente, são elementos vitais na formação das comunidades
de desenvolvedores e apoiadores de software livre. Comunidade é um termo
SROLVVrPLFR3RGHVHUHQWHQGLGDQRVHQWLGRPHQRVDEUDQJHQWH+DFNHUVLQWHJUDQ
WHV GDV DQWLJDV %%6V EHP FRPR GHVHQYROYHGRUHV GH GHWHUPLQDGRV VRIWZDUHV
consideram-se membros de comunidades.
O conceito de comunidade não é consensual em ciências sociais. Muitas são
VXDVGH¿QLo}HVHFODVVL¿FDo}HVHQWUHWDQWRERDSDUWHGHODVYLQFXODPDFRPXQLGDGH
DXPWHUULWyULRHVSHFL¿FDPHQWHOLPLWDGRHjSUR[LPLGDGHGHVHXVPHPEURV(PJHUDO
VRFLyORJRV HPSUHJDP HVVH WHUPR SDUD JUXSRV GH SHVVRDV TXH FRQYLYHP QXPD
DVVRFLDomRIDFHDIDFHHPXPHVSDoRJHRJUi¿FRSRXFRH[WHQVR$VLQJXODULGDGH
e a identidade distintas diante dos outros são também frequentemente apontadas
FRPRFDUDFWHUtVWLFDVGHXPDFRPXQLGDGH2EYLDPHQWHDDFHSomRYLQFXODGDjLGHLD
GHHVSDoRHGHSUHVHQoDItVLFDpPXLWROLPLWDGDSDUDHQTXDGUDURIHQ{PHQRGDV
FRPXQLGDGHVGLVWDQWHVHOLJDGDVDSDUWLUGDFRPXQLFDomRPHGLDGDSRUFRPSXWDGRU
 2 VRFLyORJR DOHPmR )HUGLQDQG 7|QQLHV FRQWUDSXQKD GXDV FDWHJRULDV LP
SRUWDQWHVHPVXDDQiOLVHVRFLROyJLFD*HPHLQVFKDIWIUHTXHQWHPHQWHWUDGX]LGDSRU
FRPXQLGDGH H *HVHOOVFKDIW JHUDOPHQWH WUDGX]LGD SRU VRFLHGDGH$ FRPXQLGDGH
VHULDRDJUXSDPHQWRKXPDQRHPTXHSUHGRPLQDULDDHFRQRPLDGRPpVWLFDDGLYLVmR
236 • Software livre, cultura hacker e o ecossistema da colaboração

GRWUDEDOKRSRXFRFRPSOH[DHDVRFLDELOLGDGHEDVHDGDQDVUHODo}HVGHSUHVWtJLR
H SDUHQWHVFR -i D VRFLHGDGH VHULD FRPSRVWD GH UHODo}HV VHFXQGiULDV RX VHMD
PHGLDWL]DGDSHORVFRQWUDWRVHSRUXPDFRPSOH[DGLYLVmRGRWUDEDOKR2HPSUHJR
DTXLUHDOL]DGRQmRVHJXHHVWDSURSRVLomRGH7|QQLHVSRLVHVWiPDLVUHODFLRQDGR
FRPXPDRUJDQL]DomRYROXQWiULDGHQWURGDVRFLHGDGHFRPSOH[D
 7KRPDV.XKQHP(VWUXWXUDGDV5HYROXo}HV&LHQWt¿FDVWUDEDOKRXDQRomR
GHFRPXQLGDGHPDLVSUy[LPDjTXHDTXLpHPSUHJDGD3DUDHOHDFLrQFLDQRUPDO
DJOXWLQDXPDFRPXQLGDGHSUR¿VVLRQDOGHFLHQWLVWDV2XVHMDDSDODYUDFRPXQLGDGH
pHPSUHJDGDSDUDWUDWDUGHXPDJUXSDPHQWRQmRWHUULWRULDOGHSHVVRDVTXHYLYHP
GRGHVHQYROYLPHQWRRXGDSURGXomRFLHQWt¿FD.XKQFRQVLGHUDTXHDFRPXQLGDGH
FLHQWt¿FD p LPHQVDPHQWH H¿FLHQWH SDUD UHVROYHU SUREOHPDV RX TXHEUDFDEHoDV
GH¿QLGRV GHQWUR GH XP SDUDGLJPD FLHQWt¿FR (P JHUDO DV UHYROXo}HV FLHQWt¿FDV
VmR HSLVyGLRV GH GHVHQYROYLPHQWR QmRFXPXODWLYR HP TXH R SDUDGLJPD DQWLJR p
substituído por um novo, parcialmente ou totalmente incompatível com o anterior.
3DUDTXHRQRYRSDUDGLJPDVHLQVWDOH.XKQYrDQHFHVVLGDGHGHVXEGLYLVmRQD
FRPXQLGDGH FLHQWt¿FD 3DUWH GHOD GHYH DGHULU DR QRYR SDUDGLJPD H GHSRLV SDUD
que ele se consolide, é necessário que a comunidade majoritariamente o encampe.
3RGHPRVHQWHQGHUSDUDGLJPDFRPRXPPRGHORRXSDGUmRDFHLWRHSUDWLFDGRSHOD
FRPXQLGDGHFLHQWt¿FD$LGHLDGHFRPXQLGDGHpIXQGDPHQWDOSDUDDH[SODQDomRGH
Kuhn.
A diferença mais importante da noção de comunidade aqui utilizada
SDUD D HPSUHJDGD SRU .XKQ UHVLGH SULQFLSDOPHQWH QR IDWR GH D FRPXQLGDGH GH
VRIWZDUHOLYUHQmRVHUXPDJUXSDPHQWRSUR¿VVLRQDO7UDWDVHGHXPDJUXSDPHQWR
voluntário de pessoas que defendem determinada conduta diante da propriedade
GR FRQKHFLPHQWR H TXH VHJXHP FRPSRUWDPHQWRV EDVHDGRV HP PDLRU RX PHQRU
JUDX HP XPD pWLFD KDFNHU 6HP G~YLGD DOJXPD QDVFHX HVWULWDPHQWH FRPR XPD
FRPXQLGDGHGHKDFNHUV)RUPRXVHFRPRXPDFRPXQLGDGHQmRSUHVHQFLDOTXHVH
UH~QHPDLVHPFRQH[}HVQRFLEHUHVSDoRGRTXHQRFRQWH[WRIDFHDIDFH6XDRUL
JHPHVWiQDVSULPHLUDVOLVWDVGHGLVFXVVmRGHWHFQRORJLDTXHVHIRUPDUDPQRVDQRV
$SULPHLUDLQLFLDWLYDQDVFHXFRP6WDOOPDQHPTXHDSDUWLUGHXPDGDV
inúmeras listas de discussão virtuais, convocou todos a apoiarem a mobilização
pelo desenvolvimento de softwares não-proprietários.
 $OJXQVDWLYLVWDVFRPR+RZDUG5KHLQJROGFODVVL¿FDUDPDFRPXQLGDGHYLU
tual como o encontro de pessoas no ciberespaço em torno de provedores de acesso
jFRPXQLFDomRPHGLDGDSRUFRPSXWDGRU5KHLQJROGDSRQWRXTXH³DSULQFtSLRSD
receu-me fria a ideia de uma comunidade apenas acessível através de um ecran
GH FRPSXWDGRU PDV GHSUHVVD FRQVWDWHL D HPRomR TXH R FRUUHLR HOHWU{QLFR H DV
WHOHFRQIHUrQFLDVSRGHPFDXVDU´ 5+(,1*2/' 'H¿QLXDVFRPXQLGDGHV
Software livre, cultura hacker e o ecossistema da colaboração • 237

YLUWXDLVFRPR³RVDJUHJDGRVVRFLDLVVXUJLGRVQD5HGHTXDQGRRVLQWHUYHQLHQWHVGH
XPGHEDWHOHYDPQRSRUGLDQWHHPQ~PHURHVHQWLPHQWRVX¿FLHQWHVSDUDIRUPDUHP
XPDWHLDGHUHODo}HVSHVVRDLVQRFLEHUHVSDoR´ 5+(,1*2/' 
A comunidade de software livre é uma comunidade virtual. Ela é composta
GHLQ~PHUDVSHTXHQDVHJUDQGHVFRPXQLGDGHVGHKDFNHUVHGXFDGRUHVHGLVVHPL
nadores da cultura do compartilhamento de software. As principais comunidades de
VRIWZDUHOLYUHVmRDTXHODVTXHVHDJOXWLQDPHPWRUQRGRGHVHQYROYLPHQWRGHXP
VRIWZDUHHVSHFt¿FRWDOFRPRDFRPXQLGDGH'HELDQRXDFRPXQLGDGH6ODFNDUHRX
ainda, a comunidade Gnome, entre outras milhares.
 $ PRELOL]DomR WpFQLFD GH KDFNHUV SDUD GHVHQYROYHU VRIWZDUHV GH PRGR
FRODERUDWLYR JHURX PLOKDUHV GH FRPXQLGDGHV YLUWXDLV TXH XQLGDV FRQIRUPDP D
JUDQGHFRPXQLGDGHGRVTXHGHIHQGHPXVDPHGHVHQYROYHPVRIWZDUHOLYUH(VWDV
cibercomunidades distribuídas por quase todos os países são comunidades trans-
QDFLRQDLVHFRQVWLWXHPXPPRYLPHQWRSROtWLFRFXOWXUDOFRQWUDRPRGHORKHJHP{QLFR
de propriedade das ideias ou dos bens imateriais. Como comunidades, os laços que
OLJDP VHXV LQWHJUDQWHV QmR VH YLQFXODP j LPDJHP GH XPD IUDWHUQLGDGH QDFLRQDO
*XVWDYR /LQV 5LEHLUR GHIHQGHX TXH ³R WUDQVQDFLRQDOLVPR WLSLFDPHQWH PDQLIHVWD
se através de uma articulação diferente do espaço real e da criação de um novo
domínio de contestação política e ambiência cultural que não são equivalentes ao
HVSDoR TXH QRUPDOPHQWH H[SHULPHQWDPRV RV DVVLP FKDPDGRV FLEHUHVSDoR H
FLEHUFXOWXUD´ 5,%(,52 E  5LEHLUR FRQVLGHUD TXH D ,QWHUQHW p D EDVH WHFQR
VLPEyOLFDSDUDDHPHUJrQFLDGDFRPXQLGDGHWUDQVQDFLRQDOLPDJLQDGDYLUWXDO
 1D EDVH GD DUJXPHQWDomR GH 5LEHLUR HVWi R SHQVDPHQWR GH %HQHGLFW
$QGHUVRQVREUHDH[LVWrQFLDGHFRPXQLGDGHVLPDJLQDGDV$QGHUVRQGHVHQYROYHX
essa noção de comunidade para lidar com, e buscar entender o que vem a ser
RIHQ{PHQRQDFLRQDO$QGHUVRQHVFUHYHXTXH³WRGDVDVFRPXQLGDGHVPDLRUHVGR
que as aldeias primordiais onde havia contato cara a cara (e talvez mesmo estas)
VmRLPDJLQDGDV$VFRPXQLGDGHVGHYHUmRVHUGLVWLQJXLGDVQmRSHORFDUiWHUIDOVR
JHQXtQRPDVSHORPRGRFRPRVmRLPDJLQDGDV´ $1'(5621 $QGHUVRQ
observa ainda que

³DQDomRpLPDJLQDGDFRPRXPDFRPXQLGDGHSRUTXHLQGHSHQGHQWHPHQWH
GDGHVLJXDOGDGHHGDH[SORUDomRUHDLVTXHSRVVDPSUHYDOHFHUHPFDGD
XPDGDVQDo}HVpVHPSUHFRQFHELGDFRPRXPDDJUHPLDomRKRUL]RQWDO
e profunda. Em última análise, é essa fraternidade que torna possível
TXH QRV ~OWLPRV GRLV VpFXORV WDQWRV PLOK}HV GH SHVVRDV QmR WDQWR
PDWDVVHP PDV TXLVHVVHP PRUUHU SRU LPDJLQiULRV WmR OLPLWDGRV´
$1'(5621 
238 • Software livre, cultura hacker e o ecossistema da colaboração

$SHVDU GH 5LEHLUR GLIHUHQFLDU D FRPXQLGDGH LPDJLQDGD GD YLUWXDO HVVD


GLIHUHQFLDomR DTXL p SRXFR LPSRUWDQWH SRLV D FODVVL¿FDomR GDV PLOKDUHV GH FR
PXQLGDGHV GH GHVHQYROYHGRUHV GH VRIWZDUH OLYUH FRPR FRPXQLGDGHV LPDJLQDGDV
FXMRSHUWHQFLPHQWRpFXOWXUDOPHQWHFRQVWUXtGR HPXPDJUDQGHFRPXQLGDGHHP
seus fóruns, sites e em listas de debates comuns é que interessa nesse contexto.
Elas formam uma mobilização cultural de caráter transnacional, por tratar de temas
SROtWLFRVHJOREDOSRULQWHUIHULUQDHVIHUDHFRQ{PLFDFRPRGLVWULEXLGRUDVGHULTXH]D
HGHYDORUHVFRQWLGRVHPVHXVFyGLJRV3RULVVRSUH¿URFRQVLGHUDUXPDPRELOL]DomR
GHFDUiWHUPXQGLDORXSODQHWiULDSRUVHXP~OWLSORFDUiWHUFXOWXUDOVRFLDOWHFQROyJLFR
SROtWLFRHHFRQ{PLFR
 5LEHLUR UHWRPRX D WHVH GH 6WRQH GH TXH DV WHFQRORJLDV GH FRPXQLFDomR
VmR WDPEpP WHFQRORJLDV GH FULDomR GH FRPXQLGDGHV 6721(   
([HPSOL¿FDQGR FRPXQLGDGHV GH UDGLRDPDGRUHV H GH RXYLQWHV GH UiGLRV H GH
RQGDVFXUWDVVmRDQWLJDVHWDPEpPHVSUDLDGDVSHORSODQHWD(QWUHWDQWRQHQKXPD
FRPXQLGDGHYLUWXDOHLPDJLQDGDDWpHQWmRWLQKDXPSURMHWRSUiWLFRHFRQWHVWDWyULR
FRP R SRWHQFLDO SROLWLFR DQWLKHJHP{QLFR FRPR R HQFRQWUDGR QDV FRPXQLGDGHV
GH VRIWZDUH OLYUH e SRVVtYHO GH¿QLU D FRPXQLGDGH GH VRIWZDUH OLYUH FRPR XP
DJUXSDPHQWR YROXQWiULR LPDJLQDGR H YLUWXDO HP JHUDO PXQGLDO TXH GHVHQYROYH
PDQWpPHGLVVHPLQDFyGLJRVGHPRGRFRODERUDWLYRHGHIHQGHDOLEHUGDGHSDUDR
FRPSDUWLOKDPHQWRGRFRQKHFLPHQWRWHFQROyJLFRFRPRSULQFtSLRFRQGXWRU
 -i R GHQRPLQDGR PRYLPHQWR GH VRIWZDUH OLYUH p FRPSRVWR SRU LQ~PHUDV
FRPXQLGDGHVTXHVHLGHQWL¿FDPSHODGLVWLQWDIRUPDGHSURGX]LUVRIWZDUHVSHODWUDQV
SDUrQFLDGRVVHXVFyGLJRVIRQWHHSULQFLSDOPHQWHSHODGLIHUHQoDHFRQWUDSRVLomRDR
PRGHORGHQHJyFLRVEDVHDGRQDDSURSULDomRSULYDGDGRFRQKHFLPHQWR$VOLVWDVGH
discussão dessas comunidades, os repositórios comuns de software compartilhado,
os sites para download e informação sobre os softwares, os sistemas de controle
GHYHUV}HVDFDEDPSRUVHWRUQDUHPHVSDoRVS~EOLFRVRXFROHWLYRVTXHUHWLUDPGR
terreno privado e estritamente mercantil o debate sobre esses intermediários da
LQWHOLJrQFLDKXPDQDQDHUDGDLQIRUPDomR$FDEDPSRUVHFRQVWLWXLUHPHPQRYRV
espaços da sociedade civil contra a apropriação e o bloqueio do conhecimento
WHFQROyJLFRSURPRYLGRSRU(VWDGRVHPDSRLRjVH[LJrQFLDVGRVPRQRSyOLRVHP
SUHVDULDLVGHDOJRULWPRVRXVHMDDVPHJDFRUSRUDo}HVGHVRIWZDUH
O conceito habermasiano de espaço público, no sentido de uma quase-
HVIHUDS~EOLFDSRGHVHUDTXLHPSUHJDGRHPERUDQmRVHPXPDFHUWDGL¿FXOGDGH
$ HVIHUD S~EOLFD LQWHJUD R PXQGR GD YLGD RX VHMD HVVH FRQFHLWR KDEHUPDVLDQR
FRORFDGHWHUPLQDGRVOLPLWHVHPVHXXVR3RGHPRVHQWHQGHUDLPSRUWkQFLDGHVXD
DSOLFDomRQHVVHFRQWH[WRHDRPHVPRWHPSRDVGL¿FXOGDGHVGHVHXXVRFRPHVWD
SDVVDJHPHVFULWDSRU$UDWRH&RKHQTXHFRORFDDH[LVWrQFLDGHYiULDVGLPHQV}HV
GLVWLQWDVQRPXQGRGDYLGD
Software livre, cultura hacker e o ecossistema da colaboração • 239

³HOHVHUHIHUHDXPUHVHUYDWyULRGHWUDGLo}HVLPSOLFLWDPHQWHFRQKH
FLGDVHGHSUHVVXSRVWRVDXWRPiWLFRVTXHHVWmRLPHUVRVQDOLQJXDJHP
e na cultura e são utilizados pelos indivíduos na sua vida cotidiana.
Por outro lado, o mundo da vida, de acordo com Habermas, contém
WUrVFRPSRQHQWHVHVWUXWXUDLVGLVWLQWRVDFXOWXUDDVRFLHGDGHHDSHU
sonalidade. Na medida em que os atores se entendem mutuamente e
concordam sobre sua condição, eles partilham uma tradição cultural.
1DPHGLGDHPTXHFRRUGHQDPVXDVDo}HVSRULQWHUPpGLRGHQRUPDV
LQWHUVXEMHWLYDPHQWH UHFRQKHFLGDV HOHV DJHP HQTXDQWR PHPEURV GH
XP JUXSR VRFLDO VROLGiULR 2V LQGLYtGXRV TXH FUHVFHP QR LQWHULRU GH
XPD WUDGLomR FXOWXUDO H SDUWLFLSDP GD YLGD GH XP JUXSR LQWHUQDOL]DP
RULHQWDo}HVYDORUDWLYDVDGTXLUHPFRPSHWrQFLDSDUDDJLUHGHVHQYROYHP
LGHQWLGDGHVLQGLYLGXDLVHVRFLDLV$UHSURGXomRGHDPEDVDVGLPHQV}HV
do mundo da vida envolve processos comunicativos de transmissão
GDFXOWXUDGHLQWHJUDomRVRFLDOHGHVRFLDOL]DomR´ $5$72H&2+(1
 

2PXQGRGDYLGDpGLIHUHQWHGRVLVWHPDHFRQ{PLFRHGRVLVWHPDHVWDWDO
,QWHJUD D VRFLHGDGH FLYLO H p FRPSRVWR SRU YiULRV HOHPHQWRV LQFOXVLYH SRU RUJD
QLVPRVGHPHGLDomRHQWUH(VWDGRHPHUFDGR1RPXQGRGDYLGDpSRVVtYHOVXUJLU
a reivindicação de novos direitos e de novas formas de comportar-se diante das
LQVWLWXLo}HVGHSRGHU2PRYLPHQWRGRVRIWZDUHOLYUHpFRPSRVWRWDPEpPSRUSHV
soas e empresas que buscam lucros no mercado, mas como movimento (no sentido
GHPRELOL]DomRVyFLRWpFQLFDTXHWHPFRPRREMHWLYRRGHVHQYROYLPHQWRGHVROXo}HV
WHFQROyJLFDVQmRSURSULHWiULDV FRORFDVHFRPRSRUWDGRUGHXPDQRYDFRQGXWDSDUD
desenvolver e usar software no dia-a-dia e choca-se contra o pensamento e as prá-
WLFDVKHJHP{QLFDVGHSURSULHGDGH2PRYLPHQWRGRVRIWZDUHOLYUHUH~QHFROHWLYRV
DXWRRUJDQL]DGRV FXMD H[LVWrQFLD H GLVWULEXLomR SHOD UHGH GH FRPSDUWLOKDPHQWR
DOpP GH LPSDFWDU R VLVWHPD HFRQ{PLFR HP XPD OyJLFD GD JLIW HFRQRP\ WDPEpP
impacta o sistema político ao contrapor-se ao monopólio privado do conhecimento.
Todavia, o conceito habermasiano de esfera pública precisa ser problema-
WL]DGRQDVRFLHGDGHHPUHGH,VVRpQHFHVViULRSULQFLSDOPHQWHSHODH[LJrQFLDGH
+DEHUPDVSUHVHQWHQDLGHLDGHPXQGRGDYLGDGRXVRGDOLQJXDJHPVLPSOHVHGR
PLQDGDSRUWRGRV1HVVHVHQWLGRWUrVFRQVWDWDo}HVHQIUDTXHFHPDDSOLFDomRGR
FRQFHLWRKDEHUPDVLDQRQDHUDLQIRUPDFLRQDO DVRFLHGDGHHPUHGHpXPDVRFLHGDGH
HPTXHDVOLQJXDJHQVHVSHFLDOL]DGDVQmRQDWXUDLVYmRDGTXLULQGRDFRQGLomRGH
OLQJXDJHQVEiVLFDVGRXVRFRWLGLDQRRXVHMDSDVVDPDVHULQWHUPHGLiULRVGDUD]mR
FRPXQLFDWLYDHGDLQWHOLJrQFLDKXPDQDFRQIRUPHPRVWUDPRVQD3DUWH, DVLQ
WHUDo}HVVLPSOHVHDFRPSUHHQVLELOLGDGHJHUDOIXQGDPHQWDLVSDUDRH[HUFtFLRGD
competência comunicativa dos membros de uma sociedade, estão sendo afetadas
SHOD HODERUDomR HVSHFLDOL]DGD GH SDGU}HV SURWRFRORV H VRIWZDUHV VHP RV TXDLV
240 • Software livre, cultura hacker e o ecossistema da colaboração

ERD SDUWH GDV FRPXQLFDo}HV HQWUH SHVVRDV FRPXQV QmR SRGHP VHU UHDOL]DGDV
 $HVIHUDS~EOLFDVyWHPVHQWLGRSROtWLFRVHQHODDV³SHVVRDVSULYDGDVUHXQLGDV
HP S~EOLFRV´ IRUHP FDSD]HV GH RSLQDU H GH VH SRVLFLRQDUHP D SDUWLU GR XVR GD
UD]mRVREUHDVVXQWRVTXHPRYHPRVLVWHPDSROtWLFRRXVREUHIDWRVHDo}HVTXH
DIHWDP VXDV YLGDV (QWUHWDQWR FRPR DGYRJRX /DZUHQFH /HVVLJ QR FLEHUHVSDoR
³RVFyGLJRVVmRDOHL´$VSHVVRDVPDOVDEHPTXHRVFyGLJRVGH¿QHPVHXJUDXGH
OLEHUGDGHQDLQWHUDomRHOHWU{QLFD9DPRVjGHPRQVWUDomR
 2TXH+DEHUPDVGH¿QHFRPRHVIHUDS~EOLFD"³$HVIHUDS~EOLFDSRGHVHU
descrita como uma rede adequada para a comunicação de conteúdos, tomada de
SRVLomRHRSLQL}HVQHODRVÀX[RVFRPXQLFDFLRQDLVVmR¿OWUDGRVHVLQWHWL]DGRVD
SRQWRGHVHFRQGHQVDUHPHPRSLQL}HVS~EOLFDVHQIHL[DGDVHPWHPDVHVSHFt¿FRV´
+$%(50$6 
 4XDODOLQJXDJHPXVDGDQDHVIHUDS~EOLFDKDEHUPDVLDQD"³'RPHVPRPRGR
TXHRPXQGRGDYLGDWRPDGRJOREDOPHQWHDHVIHUDS~EOLFDVHUHSURGX]DWUDYpVGR
DJLU FRPXQLFDWLYR LPSOLFDQGR DSHQDV QR GRPtQLR GD OLQJXDJHP QDWXUDO HOD HVWi
HP VLQWRQLD FRP D FRPSUHHQVLELOLDGH JHUDO GD SUiWLFD FRPXQLFDWLYD FRWLGLDQD´
+$%(50$6 
 3DUD+DEHUPDVRPXQGRGDYLGDVyFRPSRUWDDVLQWHUDo}HVVLPSOHV"

³'HVFREULPRVTXHRPXQGRGDYLGDpXPUHVHUYDWyULRSDUDLQWHUDo}HV
VLPSOHVHRVVLVWHPDVGHDomRHVDEHUHVSHFLDOL]DGRVTXHVHIRUPDP
QRLQWHULRUGRPXQGRGDYLGDFRQWLQXDPYLQFXODGRVDHOH(OHVVHOLJDP
DIXQo}HVJHUDLVGHUHSURGXomRGRPXQGRGDYLGD FRPRpRFDVRGD
UHOLJLmRGDHVFRODHGDIDPtOLD RXDGLIHUHQWHVDVSHFWRVGDYDOLGDGH
GRVDEHUFRPXQLFDGRDWUDYpVGDOLQJXDJHPFRPXP FRPRpRFDVRGD
FLrQFLDGDPRUDOGDDUWH ´ +$%(50$6 

$HVIHUDS~EOLFDQmRVHHVSHFLDOL]DQXQFD"³7RGDYLDDHVIHUDS~EOLFDQmR
VHHVSHFLDOL]DHPQHQKXPDGHVWDVGLUHo}HVSRULVVRTXDQGRDEUDQJHTXHVW}HV
SROLWLFDPHQWH UHOHYDQWHV HOD GHL[D D FDUJR GR VLVWHPD SROtWLFR D HODERUDomR
HVSHFLDOL]DGD´ +$%(50$6 3DUD+DEHUPDVWRGDHODERUDomRHVSHFLD
OL]DGDIRJHGRFDPSRGHDomRGDHVIHUDS~EOLFD
 2DJLURULHQWDGRSHORHQWHQGLPHQWRQDFRPXQLFDomRPHGLDGDSHORFRPSX
WDGRU SRGH VHU OLPLWDGR SHORV SURWRFRORV GH UHGH H SRU XPD VpULH GH SURLELo}HV
RXOLPLWDo}HVVREUHRTXHIDODUTXDLVFRQWH~GRVHQYLDUHPTXHIRUPDWRVDVSHV
VRDV REULJDWRULDPHQWH GHYHP VH FRPXQLFDU HQWUH RXWUDV YiULDV LPSRVLo}HV SROt
ticas apresentadas como necessidades técnicas para o bom funcionamento do
VLVWHPD (VVDV H[LJrQFLDV SRGHP LQWHUIHULU QR OLYUH XVR GD UD]mR FRPXQLFDWLYD H
Software livre, cultura hacker e o ecossistema da colaboração • 241

QRVFRQWH~GRVGDVPHQVDJHQVTXHVHTXHUGLVVHPLQDU
Os softwares (sem os quais os computadores são inúteis) são um con-
MXQWRLQLQWHOLJtYHOGHOLQKDVGHFyGLJRVSDUDDPDLRULDGDVSHVVRDV3RURXWURODGR
essas mesmas pessoas utilizam-nos como elemento essencial de seu dia-a-dia
VHQGR H[SRVWDV jV VXDV GHWHUPLQDo}HV RX PHOKRU jV GHWHUPLQDo}HV HPEXWLGDV
SHORV HVSHFLDOLVWDV SHORV SURJUDPDGRUHV TXH GHVHQYROYHUDP DTXHOH SURJUDPD
computacional. A própria privacidade, a identidade e a autonomia podem ser
PDQLSXODGDVGHVFREHUWDVDSDJDGDVSHORVVRIWZDUHVHPSUHJDGRVFRPRLQWHUPH
GLiULRVHVVHQFLDLVGDYLGDFRWLGLDQDQHVVHXQLYHUVRGLJLWDO
 3DUDDXPHQWDUDVHJXUDQoDGDFRPXQLFDomRHPUHGHWHPFUHVFLGRRXVR
GH WHFQRORJLDV TXH WDPEpP VH WRUQDP LQWHUPHGLiULRV LQGLVSHQViYHLV GD YLGD QR
FLEHUHVSDoR $ FULSWRJUD¿D DVVLPpWULFD p XPD GHVVDV QRYDV H[LJrQFLDV GD YLGD
GLJLWDO 1R FLEHUHVSDoR DPELHQWH GH LQFHUWH]D RQGH QmR VDEHPRV HIHWLYDPHQWH
FRPTXHPHVWDPRVQRVFRPXQLFDQGRRXVRGDFULSWRJUD¿DDVVLPpWULFDWRUQRXVH
fundamental.
 2TXHYHPDVHUDFULSWRJUD¿DVLPpWULFD"(PGRLVPDWHPiWLFRVFRQ
VHJXLUDP SURYDU TXH VHULD SRVVtYHO XWLOL]DU XPD FKDYH SDUD FLIUDU H RXWUD FKDYH
SDUD GHFLIUDU XPD PHQVDJHP$VVLP IRL FRQVWDWDGR TXH HUD SRVVtYHO VXSHUDU D
GLItFLOPLVVmRGHGLVWULEXLUDVFKDYHVGHGHFLIUDJHPVRPHQWHSDUDRVGHVWLQDWiULRV
FRUUHWRV6HJXLQGRDOyJLFDGHXPDOJRULWPRGHFULSWRJUD¿DDVVLPpWULFDXPVRIWZDUH
JHURXXPSDUGHFKDYHVFULSWRJUi¿FDVSDUDUHDOL]DUIXQo}HVLQYHUVDV6HXPDFKDYH
cifrou, somente a outra chave do par seria capaz de decifrar.
 $VVLP HUD SRVVtYHO JHUDU XPD FKDYH VHFUHWD H JXDUGiOD HP XP VPDUW
FDUG RX HP XP WRNHQ H GLVWULEXLU R VHX SDU SHOD ,QWHUQHW FKDPDQGRD GH FKDYH
S~EOLFD7RGDYH]TXHXPDPHQVDJHPIRUGHFLIUDGDFRPHVVDFKDYHS~EOLFDHODVy
pode ter sido escrita pelo seu par, ou seja, pela chave privada. Esse é o princípio
TXHYLDELOL]RXDDVVLQDWXUDHOHWU{QLFD4XDQGRXPD$XWRULGDGH&HUWL¿FDGRUD $& 
D¿UPDU TXH R SDU GH FKDYHV TXH XWLOL]R SDUD DVVLQDU DV PHQVDJHQV RX SDUD PH
autenticar no meu banco pertence de fato a minha pessoa, tenho minha assinatura
GLJLWDOFHUWL¿FDGDRXPHOKRUWHQKRXPFHUWL¿FDGRGLJLWDO
Na comunicação mediada por computador, em uma sociedade em rede,
XPGRVREMHWLYRVGRXVRGHDVVLQDWXUDVHFHUWL¿FDGRVGLJLWDLVpREWHUDFHUWH]DGH
DXWHQWLFLGDGH H LQWHJULGDGH GDV PHQVDJHQV 3DUD LVVR XWLOL]DVH XP UDPR PXLWR
HVSHFLDOL]DGRGDPDWHPiWLFDDFULSWRJUD¿D8PDGDVFDUDFWHUtVWLFDVGDFULSWRJUD¿D
DVVLPpWULFDpRGHQRPLQDGRQmRUHS~GLR6HPLVVRQmRWHULDVHQWLGRDOJXpPXVDU
DFULSWRJUD¿DFRPREDVHGDFRPXQLFDomRVHJXUD2QmRUHS~GLRVLJQL¿FDTXHXPD
PHQVDJHPGHFLIUDGDFRPXPDGHWHUPLQDGDFKDYHS~EOLFDVySRGHWHUVLGRFLIUDGD
por seu par privado. Assim, uma pessoa que usou sua chave privada para acessar
242 • Software livre, cultura hacker e o ecossistema da colaboração

XP VLWH JRYHUQDPHQWDO RX FRPHUFLDO QmR SRGHUi D¿UPDU TXH QmR UHDOL]RX HVVD
DomRH[FHWRVHHODIRUFDSD]GHSURYDUTXHKRXYHXPDIDOKDQRDOJRULWPRJHUDGRU
RXTXHEUDGDFKDYH&RPRpPXLWRGLItFLOSDUDXPDSHVVRDFRPXPFRQVHJXLUWHU
FRQKHFLPHQWRVH[WUHPDPHQWHVR¿VWLFDGRVTXHOKHSHUPLWDPFRQWHVWDUXPFULSWRV
VLVWHPD WHPRV Dt XPD GDV PXLWDV VLWXDo}HV HP TXH VH H[LJH R DSRLR GH XP
especialista.
 3RULVVRDTXLPDLVXPDYH]YDOHRDUJXPHQWRGH/DZUHQFH/HVVLJGHTXH
QD VRFLHGDGH GD LQIRUPDomR FDGD YH] PDLV ³R FyGLJR p D OHL´ 3DUD D VRFLHGDGH
defender-se, ela precisa ter consciência de que a sociedade em rede é uma sociedade
WHFQRGHSHQGHQWHHHIHWLYDGDSRUPHLRGHLQWHUPHGLiULRVGDLQWHOLJrQFLDKXPDQDH
GDUD]mRFRPXQLFDWLYD3RULVVRRVSURJUDPDVDOJRULWPRVSURWRFRORVHSDGU}HV
precisam ser abertos, transparentes e plenamente auditáveis. Cidadãos comuns
QmRVmRFDSD]HVGHGLVFXWLUGHWDOKHVWHFQROyJLFRVTXHFRPS}HPVHXVLQVWUXPHQWRV
H VXDV OLQJXDJHQV LQIRUPDFLRQDLV EiVLFDV PDV SRGHP GH¿QLU FRPR TXHUHP TXH
HVVHVFyGLJRVLQWHUPHGLiULRVHOLQJXDJHQVVHMDPVRFLDOPHQWHFRQWURODGRV
Um exemplo sobre como lidar com elementos extremamente especializados,
mas que envolvem e impactam o cotidiano da sociedade ocorreu nos Estados
8QLGRV :DUZLFN )RUG H 0LFKDHO %DXP FRP EDVH HP XPD GHFLVmR GD &RUWH
6XSUHPD VREUH R FDVR 'DXEHUW YHUVXV 0HUUHO 'RZ 3KDUPDFHXWLFDOV D¿UPRX
TXHXPDPHWRGRORJLDRXDUJXPHQWRGHHVSHFLDOLVWDVGDFLrQFLDGHYHVHUDFHLWD
TXDQGRFRQFRUGDUFRPTXDWURIDWRUHV DPHWRGRORJLDSRGHVHUHIRLWHVWDGD 
D PHWRGRORJLD IRL VXEPHWLGD j UHYLVmR H j SXEOLFDomR   D SRUFHQWDJHP GH HUUR
QD PHWRGRORJLD p EHP FRQKHFLGD   D PHWRGRORJLD UHFHEHX DFHLWDomR GHQWUR GD
FRPXQLGDGHFLHQWt¿FD )25' %$80 (PUHVXPRQDVRFLHGDGH
HP UHGH D JDUDQWLD GRV GLUHLWRV GRV FLGDGmRV H[LJH HVSHFLDOLVWDV GH XP ODGR H
FyGLJRVHSURFHVVRVDEHUWRVHWUDQVSDUHQWHVGHRXWUR
 2 FRQFHLWR GH HVIHUD S~EOLFD LQLFLDOPHQWH KDFNHU TXH HYROXL SDUD XPD
HVIHUDS~EOLFDWUDQVQDFLRQDOFRPRGHIHQGH*XVWDYR/LQV5LEHLURHQYROYHQGROHL
JRV LQLFLDGRV QDV OLQJXDJHQV EiVLFDV GD LQIRUPiWLFD FRPSHWrQFLD FRPXQLFDWLYD
SDUD XVDU VRIWZDUHV  SRGH VHU HPSUHJDGR VH WLYHUPRV FRQVFLrQFLD GH TXH HVVD
esfera se assentaria sobre um conjunto de protocolos e softwares limitadores do
SURFHVVR GH LQWHUDomR H GH XVR GD FRPXQLFDomR 8PD GDV Do}HV FRPXQLFDWLYDV
QHVVDHVIHUDpDOHUWDUDWRGRVRVVHXVLQWHJUDQWHVGHTXHRHVSDoRYLUWXDOH[LJH
especialistas que permanentemente devem defendê-lo como espaço livre e aberto
FRQWUDDVOLPLWDo}HVEORTXHLRVFHQVXUDVHYLRODo}HVTXHSRGHPVHULPSRVWRVDQWL
GHPRFUDWLFDPHQWHHVXEUHSWLFLDPHQWHSRU(VWDGRVRXFRUSRUDo}HV
 7DOFRPRQRSULQFtSLRIRLQHFHVViULRDRVEXUJXHVHVGHIHQGHUHPDOLEHUGDGH
GD LPSUHQVD FRQWUD D FHQVXUD GR (VWDGR DJRUD p QHFHVViULR GHIHQGHU D WUDQV
Software livre, cultura hacker e o ecossistema da colaboração • 243

SDUrQFLDGRVSURWRFRORVSDGU}HVHVRIWZDUHVSDUDTXHRHVSDoRYLUWXDOSRVVDVHU
FRQVLGHUDGRXPHVSDoRS~EOLFRYLUWXDOHVVHQFLDOjVXDFRQVROLGDomRFRPRHVIHUD
pública. Nesse sentido, um dos principais processos de consolidação da Internet,
SULQFLSDODJUHJDGRUGDFRPXQLFDomRPHGLDGDSRUFRPSXWDGRUFRPRHVIHUDS~EOLFD
está nas comunidades de software livre. Tal como na esfera pública inicialmente
literária dos séculos XVII e XVIII, podemos observá-las como uma esfera pública
LQLFLDOPHQWHKDFNHUGRVpFXOR;;,
Habermas escreveu que

³D HVIHUD S~EOLFD UHWLUD VHXV LPSXOVRV GD DVVLPLODomR SULYDGD GH
SUREOHPDV VRFLDLV TXH UHSHUFXWHP QDV ELRJUD¿DV SDUWLFXODUHV 1HVVH
contexto particular é sintomático constatar que, nas sociedades
européias do século XVII e XVIII, tenha se formado uma esfera pública
EXUJXHVD PRGHUQD FRPR ³HVIHUD GDV SHVVRDV SULYDGDV UHXQLGDV
H IRUPDQGR XP S~EOLFR´ 'R SRQWR GH YLVWD KLVWyULFR R QH[R HQWUH
esfera pública e privada começou a aparecer na forma de reunião e
GH RUJDQL]DomR GH XP S~EOLFR OHLWRU FRPSRVWR GH SHVVRDV SULYDGDV
EXUJXHVDV TXH VH DJOXWLQDYDP HP WRUQR GH MRUQDLV H SHULyGLFRV´
+$%(50$6 

Para utilizar o ciberespaço também como esfera pública, as pessoas pri-


vadas conectadas precisarão assimilar que, ao contrário da sociedade industrial,
a sociedade em rede apresenta problemas complexos de comunicação, que exi-
JHP GH XP ODGR HVSHFLDOLVWDV H GH RXWUR D WUDQVSDUrQFLD FRPSOHWD GRV FyGLJRV
que intermediam a comunicação humana. A questão da liberdade para conhecer
SURIXQGDPHQWHRVFyGLJRVTXHVmRVRFLDOPHQWHXVDGRVFKRFDVHFRPRPRGHORKH
JHP{QLFRGHSURSULHGDGHGDVLGHLDV2VKDFNHUVIRUDPRVSULPHLURVDGHPRQVWUDU
TXHDRSDFLGDGHGRVFyGLJRVUHDOL]DVHFRQWUDDOLEHUGDGHGDVRFLHGDGH
O questionamento da propriedade intelectual é um questionamento de or-
GHPFXOWXUDO2PRGHORGHGHVHQYROYLPHQWRFRPSDUWLOKDGRQDVFHGDFXOWXUDKDFNHU
e clama pela solidariedade e pela capacidade como qualidades de um compor-
tamento que substitui a ideia de propriedade privada pela construção coletiva de
uma relação que Lévy captou como obra aberta. O movimento do software livre
FRORFDVHHPFRQÀLWRFRPRPRQRSyOLRPXQGLDOGHVRIWZDUHHFRPVXDDomRGHEOR
TXHLRGRFRQKHFLPHQWRWHFQROyJLFR
 2PRYLPHQWRGHGHVHQYROYLPHQWRHGLVVHPLQDomRGHSURJUDPDVGHFRP
putador abertos e não-proprietários é um movimento colaborativo que assumiu
SURSRUo}HV FXOWXUDO H VRFLDOPHQWH UHOHYDQWHV DOpP GH HVSDOKDUVH SRU WRGRV RV
continentes e por quase todos os países do planeta. O movimento do software
244 • Software livre, cultura hacker e o ecossistema da colaboração

livre tornou-se um dos novos movimentos mundiais mais críticos a um dos pilares
EiVLFRVGRSURFHVVRGHUHSURGXomRFDSLWDOLVWDVHXPRGHORHVXDWHRULDKHJHP{QLFD
da propriedade intelectual. É um movimento socio-técnico formado por diversas
comunidades.
As comunidades de desenvolvedores de software são a base principal
GHVVDJUDQGHUHGHTXHHVWDPRVGHQRPLQDQGRPRYLPHQWRGHVRIWZDUHOLYUH7DLV
FRPXQLGDGHVWrPWDPDQKRYDULDGRHSRGHPDWLQJLUPLOKDUHVGHLQWHJUDQWHVFRPR
a do GNU/Linux. Por outro lado, vários jovens desenvolvedores lançam projetos
GH VRIWZDUH H HP VHJXLGD SHGHP DSRLR QDV OLVWDV GH KDFNHUV H QDV GLYHUVDV
comunidades. Milhares desses projetos não atraem muitos outros apoiadores e
acabam permanecendo com dois ou três desenvolvedores. Apesar disso, essas
PLFURFRPXQLGDGHV OLJDPVH j JUDQGH UHGH GD PDFURFRPXQLGDGH GRV TXH
GHVHQYROYHPFyGLJRVGHPRGRDEHUWRHFRPSDUWLOKDGR
Castells já havia apontado que

³DFXOWXUDGD,QWHUQHWpXPDFXOWXUDIHLWDGHXPDFUHQoDWHFQRFUiWLFD
QRSURJUHVVRGRVVHUHVKXPDQRVDWUDYpVGDWHFQRORJLDOHYDGRDFDER
SRUFRPXQLGDGHVGHKDFNHUVTXHSURVSHUDPQDFULDWLYLGDGHWHFQROyJLFD
livre e aberta, incrustada em redes virtuais que pretendem reinventar
a sociedade, e materializada por empresários movidos a dinheiro nas
HQJUHQDJHQVGDQRYDHFRQRPLD´ &$67(//6

0DVRTXHVHULDHVWDFXOWXUDKDFNHU"&DVWHOOVYrDFXOWXUDFRPRXPDFRQV
trução coletiva, acima das preferências individuais, composta de valores e crenças
TXH FRQGX]HP FRPSRUWDPHQWRV 1HVVH VHQWLGR D FXOWXUD KDFNHU p XPD FXOWXUD
meritocrática baseada no conhecimento e na capacidade de realizar e de com-
SDUWLOKDU FyGLJRV 2 UHVSHLWR DR SRGHU GR FRQKHFLPHQWR p YLVtYHO EHP FRPR DR
YDORUGDVROLGDULHGDGHTXHHVWiLQVHULGDQRSURFHVVRGHFRODERUDomR8PKDFNHUp
RVHXPpULWRHHVWHGHYHVHUUHFRQKHFLGRSHODVXDFRPXQLGDGHGHLJXDLV$FXOWXUD
KDFNHUFRQVWUyLVHVREUHDFXOWXUDWHFQRPHULWRFUiWLFD6HJXQGR&DVWHOOVHVWD~OWLPD
QDVFHXGDELJVFLHQFHHGRPXQGRDFDGrPLFR
O comportamento cultural no contexto de uma comunidade meritocrática
QmR VHULD SRVVtYHO VHP D FRQVWUXomR GH XPD pWLFD SUySULD 2 ¿OyVRIR QRUXHJXrV
3HNND+LPDQHQDRHVWXGDUDpWLFDKDFNHUSHUFHEHXTXHRVKDFNHUVQmRRUJDQL]DP
VXDVYLGDVHPURWLQDVHFRPDOyJLFDGDRWLPL]DomRGRGLDGHWUDEDOKR&RQVWDWRX
TXHVXDRUJDQL]DomRVHJXHXPFHUWRÀX[RGHWUDEDOKRFULDWLYRPLVWXUDGRDRXWUDV
SDL[}HV2WUDEDOKRGHXPKDFNHUpFRPSRVWRGHSDL[mRHOLEHUGDGH1mRVHEXVFD
WtWXORV JUDGXDo}HV KLHUDUTXLDV H RUJDQL]DomR EXURFUiWLFD$ UHODomR GHVVD pWLFD
FRPRGLQKHLURpH[WUHPDPHQWHGLVWLQWDFRPRUHODWD+LPDQHQ
Software livre, cultura hacker e o ecossistema da colaboração • 245

³1DpWLFDKDFNHU  RHOHPHQWRGHGHVWDTXHUHODWLYRDGLQKHLURpTXH


PXLWRVDLQGDVHJXHPRKDFNHULVPRRULJLQDOQRTXDOQmRYrHPRGLQKHLUR
FRPR YDORU HP VL VHQGR VXDV Do}HV PRWLYDGDV SHOD PHWD GR PpULWR
VRFLDO H GR FRPSDUWLOKDPHQWR (VVHV KDFNHUV GHVHMDP UHDOL]DU VXDV
SDL[}HVHPFRQMXQWRGHVHMDPFULDUDOJRGHYDORUSDUDDFRPXQLGDGH
e serem reconhecidos por isso pelos seus pares. Eles permitem que o
fruto do seu trabalho seja usado, desenvolvido e testado por qualquer
um, de sorte que todos possam aprender uns com os outros. Embora
D PDLRU SDUWH GR GHVHQYROYLPHQWR WHFQROyJLFR QD HUD GD LQIRUPDomR
WHQKD RFRUULGR GHQWUR GH WUDGLFLRQDLV UHODo}HV FDSLWDOLVWDV H SURMHWRV
JRYHUQDPHQWDLVXPDSDUWHVLJQL¿FDWLYD±LQFOXLQGRVtPERORVGRQRVVR
WHPSRFRPRD,QWHUQHWHRFRPSXWDGRUSHVVRDO±QmRH[LVWLULDPVHP
KDFNHUV TXH FRPSDUWLOKDUDP VXDV FULDo}HV FRP RXWURV´ +LPDQHQ
 

A liberdade, como valor superior ao dinheiro, e a colaboração, como meio


de ajudar e ao mesmo tempo de ser reconhecido, pode explicar o fundamento que
HVWi QR FHQWUR GH JUDYLGDGH GR PRYLPHQWR GH VRIWZDUH OLYUH 2X VHMD FRQWULEXLU
FRPRFRQKHFLPHQWRFROHWLYRpDIRUPDGHUHDOL]DUVHFRPRVHUTXHLQWHJUDDTXHOD
comunidade. Apoiar e resolver problemas que estão sendo enfrentados pelos
outros é essencial para demonstrar competência e capacidade que, por sua vez,
SDUDVHUHPVRFLDOPHQWHRXFRPXQLWDULDPHQWHUHFRQKHFLGRVH[LJHPHIHWLYDomRHP
FRQWULEXLo}HVUHDLV$VVLPRMRYHPSDUDQDHQVH0DUFHOR7RVVDWLWRUQRXVHRPDQ
WHQHGRUGR.HUQHOGR/LQX[1mRIRLVXDWLWXODomRDFDGrPLFDQHPXPDLQGLFDomR
IDPLOLDURXLQÀXrQFLDSROtWLFDTXHROHYRXDRWRSRGHXPDFRPXQLGDGHGHPDLVGH
150 mil desenvolvedores espalhados pelo planeta. Seu intenso trabalho de revi-
são e de solução de problemas do sistema operacional Linux, sua presença no
WUDEDOKRFROHWLYRGHPHOKRULDGRFyGLJRHVXDFRPSHWrQFLDDRHVFUHYHUDVOLQKDV
GHSURJUDPDomRpTXHRWRUQDUDPDRVDQRVXPDVXPLGDGHQRPXQGRGDWHF
QRORJLDGDLQIRUPDomR0DUFHOR7RVVDWLQmRUHDOL]RXFXUVRVXSHULRUDRPHQRVDWpR
momento da conclusão deste texto.
Eduardo Maçan não se tornou um dos primeiros (talvez o primeiro, ele
mesmo tem dúvida sobre isso) desenvolvedores brasileiros aceitos na comunidade
'HELDQTXHGLVWULEXLXPDGDVYHUV}HVGR*18/LQX[SRUVHUHVWXGDQWHGD&LrQFLD
GD&RPSXWDomRPDVSHODTXDOLGDGHHLQWHQVLGDGHGHVXDVFRQWULEXLo}HV3RXFR
YDOH WHU GRXWRUDGR H QmR FRQVHJXLU UHVROYHU XP SUREOHPD HVSHFt¿FR 3RXFR YDOH
saber muito se o indivíduo não tiver o ímpeto de ajudar as pessoas da comunidade
D HQFRQWUDU VROXo}HV (VVH HVStULWR GH FRPSHWrQFLD FRODERUDWLYD TXH H[HFXWD D
LQWHOLJrQFLD FROHWLYD GH XPD FRPXQLGDGH IRL R TXH OHYRX R HQJHQKHLUR GR &HQWUR
GH&RPSXWDomRGD8QLFDPS5XEHQV4XHLUR]DFULDUR5DX7XXPDIHUUDPHQWD
FRODERUDWLYDGHSHUJXQWDVHUHVSRVWDV25DX7XSHUPLWHTXHFRODERUDGRUHVUHVSRQ
246 • Software livre, cultura hacker e o ecossistema da colaboração

GDPSHUJXQWDVIRUPXODGDVSRUYLVLWDQWHV2XVRpOLYUHHJUDWXLWRHRVLVWHPDSRGH
ser obtido (baixado) do próprio site e usado nos termos da licença GPL (General
Public Licence). O interessante é que esse sistema passou a ser uma ferramenta
GHWUDEDOKRHPDOJXQVGRVGHSDUWDPHQWRVGD8QLFDPS4XDQGRDOJXpPWHPXPD
G~YLGDHODpSRVWDGDQR5DX7XHDUHVSRVWDpREWLGDPXLWDVYH]HVHPPLQXWRV
2VLVWHPDSRVVXLXPUDQNLQJGHFRODERUDGRUHVHPFDGDXPDGDViUHDVWDPEpP
FKDPDGDV GH FRPXQLGDGHV TXH R FRPS}HP R TXH WHP SRVVLELOLWDGR XPD FHUWD
GLVSXWDHQWUHXPJUXSRGHVWDFDGRGHFRODERUDGRUHVSDUDYHUTXHPPDLVUHVSRQGH
as dúvidas em menor tempo. O reconhecimento pela qualidade da resposta e
SHODSDUWLFLSDomRDWLYDQDFRODERUDomRHPUHGHSDUHFHDEVRUYHUDTXLORTXH3HNND
+LPDQHQGHQRPLQRXGHpWLFDKDFNHUHTXHWHPVLGRHOHPHQWRYLWDOGDFRPXQLGDGH
de software livre.
 -iDFRPXQLGDGH'HELDQpXPDJUXSDPHQWRGHYROXQWiULRVVHPVHGHItVLFD
GLVSHUVRSHORPXQGRFRPLQWHJUDQWHVGHGH]HQDVGHSDtVHVTXHEXVFDGLVWULEXLU
uma versão do Linux estável e completamente dentro do espírito do copyleft. Pelas
VXDV FDUDFWHUtVWLFDV ¿ORVy¿FDV H SRU VXD IRUPD GH RUJDQL]DomR D REVHUYDomR
da comunidade Debian pode melhor permitir a compreensão dos motivos pelos
TXDLV R PRYLPHQWR GR VRIWZDUH OLYUH SRUWDGRU GH XPD pWLFD KDFNHU FHQWUDGD QD
colaboração interativa e no compartilhamento do conhecimento, tornou-se um
LPSRUWDQWHPRYLPHQWRSROtWLFRJOREDOHQmRSDUWLGiULR
 $FRPXQLGDGH'HELDQTXHFRQWDDSUR[LPDGDPHQWHFRPLQWHJUDQWHV
em seus diversos níveis, expressa o modelo de desenvolvimento compartilhado
FRPXPSURFHVVRGHFLVyULRFRPSOH[RSDUDDVVHJXUDUDVXDGHPRFUDFLDLQWHUQD6HX
cotidiano permite vislumbrar que uma rede sem centro físico, com seus servidores
LQVWDODGRV HP  SDtVHV p FDSD] GH SURGX]LU VROXo}HV WHFQROyJLFDV FRPSOH[DV
mantendo-se democrática e coerente com seus princípios fundadores.
 (GXDUGR 0DoDQ D¿UPD TXH XPD SHVVRD SDUD LQJUHVVDU QD FRPXQLGDGH
'HELDQQHFHVVLWDGHPRQVWUDUTXH³VDEHID]HUHTXHID]´2XWURHOHPHQWRHVVHQFLDO
é a necessidade de conhecer e de ser capaz de defender o Contrato Social do
Debian e concordar com a Constituição da comunidade. Para ser desenvolvedor
'HELDQRKDFNHUGHYHFRQFRUGDUFRPR³&RQWUDWR´TXHpXPDFDUWDGHSULQFtSLRV
da comunidade e que a vincula com os ideais primeiros do software livre, nascidos
do movimento GNU e da Free software Fondation.
 2&RQWUDWR6RFLDO'HELDQYHUVmRUDWL¿FDGRHPGHMXOKRGHp
XPDSHoDYROWDGDDRVVHXVLQWHJUDQWHVPDVpXPFRPSURPLVVRGLDQWHGDVGHPDLV
FRPXQLGDGHVGHVRIWZDUHOLYUHFRPRSRGHPRVREVHUYDU
Software livre, cultura hacker e o ecossistema da colaboração • 247

³&2175$72 62&,$/ '(%,$1 3(5$17( $ &2081,'$'( '(


VRIWZDUH/,95(
O Debian permanecerá 100% livre. Nós prometemos manter a
GLVWULEXLomR 'HELDQ *18/LQX[ FRQVWLWXtGD LQWHJUDOPHQWH GH VRIWZDUH
OLYUH&RPRKiPXLWDVGH¿QLo}HVGHVRIWZDUHOLYUHLQFOXtPRVDVGH¿QLo}HV
TXH XVDPRV SDUD D LGHQWL¿FDomR GH VRIWZDUH ³OLYUH´ DEDL[R ,UHPRV
apoiar nossos usuários que desenvolvem e executam software não livre
sobre o Debian, mas nunca faremos o sistema depender de um item de
VRIWZDUHTXHQmRVHMDOLYUH9DPRVUHWULEXLUjFRPXQLGDGHGRVRIWZDUH
livre. Quando escrevermos novos componentes do Sistema Debian,
nós o licenciaremos como software livre. Iremos fazer o melhor sistema
que pudermos, de modo que software livre seja amplamente distribuído
H XVDGR ,UHPRV IRUQHFHU DRV DXWRUHV RULJLQDLV GRV FRPSRQHQWHV
XVDGRV SRU QRVVR VLVWHPD DV FRUUHo}HV GH EXJV DSHUIHLoRDPHQWRV
pedidos de usuários, etc. Nós não esconderemos problemas. Iremos
PDQWHU QRVVR EDQFR GH GDGRV GH UHODWyULR GH IDOKDV QRVVR EXJWUDT 
DEHUWR SDUD D YLVXDOL]DomR S~EOLFD WRGR R WHPSR 5HODWyULRV TXH RV
XVXiULRV SUHHQFKHP RQOLQH ¿FDUmR LPHGLDWDPHQWH YLVtYHLV SDUD WRGRV
os outros. Nossas prioridades são nossos usuários e o software livre.
1yVVHUHPRVJXLDGRVSHODVQHFHVVLGDGHVGHQRVVRVXVXiULRVHSHOD
comunidade de software livre, colocando seus interesses em primeiro
OXJDUHPQRVVDVSULRULGDGHV$SRLDUHPRVDVQHFHVVLGDGHVGHQRVVRV
usuários para operação em muitos tipos diferentes de ambiente
computacional. Não iremos fazer objeção a software proprietário que
deva rodar em sistemas Debian, e permitiremos a outros criarem
GLVWULEXLo}HV FRP YDORU DJUHJDGR FRQWHQGR WDQWR R 'HELDQ FRPR
software comercial, não sendo nenhuma taxa por nós cobrada. Para
apoiar estes objetivos forneceremos um sistema operacional de alta
TXDOLGDGHOLYUHVHPUHVWULo}HVOHJDLVTXHSRVVDPLPSHGLUHVVHV
WLSRVGHXVR3URJUDPDVTXHQmRDWHQGHPQRVVRVSDGU}HVGHVRIWZDUH
OLYUH1yVUHFRQKHFHPRVTXHDOJXQVGHQRVVRVXVXiULRVSUHFLVDPXVDU
SURJUDPDV TXH QmR DWHQGHP D 'H¿QLomR 'HELDQ GH VRIWZDUH /LYUH
&ULDPRVDViUHDV³FRQWULE´H³QRQIUHH´GHQWURGHQRVVRVUHSRVLWyULRV
de FTP para estes softwares. Os softwares contidos nestes diretórios
QmRVmRSDUWHGR'HELDQHPERUDHVWHMDPFRQ¿JXUDGRVSDUDXVRFRP
o sistema Debian. Nós encorajamos fornecedores de CDs a ler as
licenças de pacotes de software nestes diretórios e determinarem se
podem ser distribuídos em seus CDs. Desta forma, embora software
não livre não seja parte do Debian, nós apoiamos seus usuários e
IRUQHFHPRVLQIUDHVWUXWXUD FRPRQRVVRVLVWHPDGHFRQWUROHGHEXJVH
OLVWDVGHGLVFXVVmR SDUDXVXiULRVGHVRIWZDUHQmROLYUH´

2HVIRUoRSULQFLSDOGDFRPXQLGDGH'HELDQQmRpHFRQ{PLFRSRLVVHXFRQWUDWR
deixa isso muito claro. O objetivo é desenvolver software de modo colaborativo,
cujo resultado seja de excelente qualidade, mas que não esconda suas falhas e
SUREOHPDVHTXHVHMDWRWDOPHQWHOLYUHRXVHMDQmRSURSULHWiULRHFRPVHXFyGLJR
IRQWHDEHUWR8VDQGRROLFHQFLDPHQWR*3/RHIHLWRYLUyWLFRpDVVHJXUDGRRXVHMD

'LVSRQtYHOKWWSZZZGHELDQRUJ$FHVVRHP
248 • Software livre, cultura hacker e o ecossistema da colaboração

WRGRVDTXHOHVTXHXVDPFyGLJRVGR'HELDQQmRSRGHPWRUQiORIHFKDGRQHPVH
apropriarem do mesmo, tal como fariam com obras disponíveis em domínio público.
$SRVWXUDGRGHVHQYROYHGRU'HELDQpXPDSRVWXUDLGHROyJLFDFXMRFRPSURPLVVRp
a liberdade de conhecimento.
 -iD&RQVWLWXLomR'HELDQpRFRQMXQWRGHQRUPDVTXHUHJHPDJRYHUQDQoD
GD FRPXQLGDGH H GH¿QHP FRPR VH Gi R SURFHVVR GH GHFLVmR DV DWULEXLo}HV GH
FDGDJUXSRGHWUDEDOKRFRPVHXVGLUHLWRVHGHYHUHV&DGDGHFLVmRQDFRPXQLGDGH
'HELDQpDGRWDGDVHJXLQGRDVHJXLQWHKLHUDUTXLDGHFLVyULD9RWDomRGRVGHVHQ
YROYHGRUHVpDLQVWkQFLDPi[LPD/tGHUGRSURMHWR&RPLWr7pFQLFRHRXVHXOtGHU
 GHVHQYROYHGRU SDUWLFXODU H[HFXWDQGR XPD WDUHID HVSHFt¿FD  GHOHJDGRV DSRQ
WDGRVSHOR/tGHUGRSURMHWRSDUDUHDOL]DUWDUHIDVHVSHFt¿FDV6HFUHWiULRGRSURMHWR
O Líder do projeto é eleito anualmente pelos desenvolvedores. Somente ele
pode falar pelo projeto Debian. O Líder também é quem indica o Comitê Técnico que
é convocado para enfrentar problemas que não tiveram uma solução consensual
HQWUHXPRXPDLVGHVHQYROYHGRUHV&DGDKDFNHUSRGHIDODUHPVHXQRPHSUySULR
mas não poderá falar em nome do projeto Debian sem ser destacado pelo Líder
eleito. Os candidatos a Líder apresentam suas propostas e as debatem nas listas de
discussão da comunidade. Sua eleição é realizada pela votação em rede, utilizando
DV FKDYHV FULSWRJUi¿FDV GH FDGD PHPEUR GD FRPXQLGDGH R TXH Gi VHJXUDQoD
DR SURFHVVR XPD YH] TXH D DVVLQDWXUD GLJLWDO  WpFQLFD EDVHDGD QD FULSWRJUD¿D
DVVLPpWULFDSHUPLWHJDUDQWLUDDXWRULDHDLQWHJULGDGHGHTXHPDXWLOL]RX
 2PpWRGRGHPRFUiWLFRGDFRPXQLGDGH'HELDQpH[WUHPDPHQWHVR¿VWLFDGR
H WUDQVSDUHQWH 6XDV YRWDo}HV VmR HIHWXDGDV SRU XP VLVWHPD GH JHUHQFLDPHQWR
GH YRWDo}HV FKDPDGR '(ELDQ 9R7H (QJLQ(>GHYRWHH@ 2 VLVWHPD SHUPLWH VDEHU
R HVWDGR JHUDO GDV YRWDo}HV QR PRPHQWR HP TXH VH DFHVVD H R UHVXOWDGR GDV
YRWDo}HV DQWHULRUHV 2 HVWDGR GDV 5HVROXo}HV *HUDLV HP WUkQVLWR SRGHP DLQGD
H[SRUDVSURSRVWDVTXHHVWmRHPGLVSXWDLQFOXLQGRDVVHJXLQWHVIDVHV³3URSRVWD
$JXDUGDQGRSRUDSRLR'LVFXVVmR3HUtRGRSDUDGLVFXVV}HVGHQRPtQLPRGXDV
semanas. Votação - O processo de votação está ocorrendo. Fechado - A votação
DFDERX´
A transparência e a auditabilidade plena são características relevantes do
SURFHVVRXPDYH]TXHRUHVXOWDGRGDVYRWDo}HVpDEHUWREHPFRPRDOLVWDFRPR
QRPHGHTXHPYRWRXHTXDLVIRUDPVHXVYRWRVLQFOXVLYHRWH[WRGHFDGDYRWR(VWD
OLVWDJHPVyQmRpGLVSRQtYHOTXDQGRDFRPXQLGDGHGHFLGHUHDOL]DUGHWHUPLQDGDV
YRWDo}HV GH PRGR VHFUHWR SDUD HYLWDU TXDLVTXHU FRQVWUDQJLPHQWRV$ HVFROKD GR
Líder do projeto Debian é feita pelo método Condorcet.
 $LGHLDSUHVHQWHQD&RQVWLWXLomRGRSURMHWR'HELDQpFKHJDUDXPDGHFLVmR
o mais próxima possível do que é aceito por todos. O voto de cada membro do
Software livre, cultura hacker e o ecossistema da colaboração • 249

SURMHWRSRVVXLXPDJUDGDomRTXHKLHUDUTXL]DVXDVSUHIHUrQFLDV(VVDSUiWLFDWHP
VLGREHPVXFHGLGDHWHPJHUDGRXPSURFHVVRGHFLVyULRGHHVFROKDGHOLGHUDQoDV
FXMRUHVXOWDGRHIHWLYRIRLDSURGXomRGHSURJUDPDVGHFRPSXWDGRUGLIHUHQWHV
até junho de 2005. A democracia participativa, baseada no debate efetuado nas listas
GHGLVFXVVmRQDpWLFDPHULWRFUiWLFDGRVKDFNHUVHHPVHXHVStULWRFRODERUDWLYRH
VROLGiULRWHPJHUDGRVRIWZDUHVOLYUHVTXHQmRSRGHPVHUDSURSULDGRVSULYDGDPHQWH
$DomRFRQFUHWDGDFRPXQLGDGHGRFyGLJROLYUHIXOPLQDRSDUDGLJPDSURSULHWiULRGH
produção e distribuição de software, que só pode ser mantido pela ação jurídico-
repressiva do Estado.
 $FRPXQLGDGH'HELDQpXPGRV³QyV´FRQHFWDGRVDHVVDJUDQGHUHGHTXH
FRQIRUPDXPDHVIHUDS~EOLFDLQLFLDOPHQWHKDFNHUHTXHVHHVSDOKDSHODVGHPDLV
iUHDVGDSURGXomRVLPEyOLFDGDKXPDQLGDGH :LNLSHGLD&UHDWLYH&RPPRQVHWF 
(VVH HVStULWR RX eWLFD 'HELDQ IRL REVHUYDGR D SDUWLU GD DQiOLVH HWQRJUi¿FD UHD
OL]DGD SRU *DEULHOD &ROHPDQ GD 8QLYHUVLGDGH GH &KLFDJR H SRU %HQMDPLQ +LOO
desenvolvedor do projeto Debian. Eles descreveram o modelo Debian centrado na
LQGHSHQGrQFLDQRWUDEDOKRYROXQWiULRHQDFRQVWLWXLomRGHUHGHVGHFRQ¿DQoDHSHU
FHEHUDPDFRQIRUPDomRGHXPDHVIHUDS~EOLFD

³(QTXDQWR RV KDFNHUV GR VRIWZDUH OLYUH H GH FyGLJR DEHUWR VmR PDLV
IDFLOPHQWHDVVRFLDGRVDDOJXPSURMHWRFRPRSRUH[HPSORR'HELDQ
HOHVWDPEpPSDUWLFLSDPGHXPDµKDFNHUVIHUD¶TXHVHUYHSDUDVXEVWDQFLDU
D OLEHUGDGH FRPR FRQFHLWR GH UHOHYkQFLD PRUDO VXSHULRU D TXHVW}HV
técnicas. Essa esfera pública ocorre através de uma variededade de
canais on-line e off-line que proveem, com consistência, um espaço de
DUJXPHQWDomRHGHGLVFXVVmRUDFLRQDODFHUFDGHXPDJDPDGHDVVXQWRV
GH QDWXUH]D SROtWLFD H MXUtGLFD (VVH HVSDoR DEULJD FRP IUHTXrQFLD
GLVFXVV}HV OHYDQWDGDV SRU QRYRV DUWLJRV FDVRV MXGLFLDLV HGLWRULDLV
H FRPHQWiULRV SURGX]LGRV QD FRPXQLGDGH$ RULJHP GHVVD QDVFHQWH
esfera pública pode ser rastreada ao início dos anos 80 (nos sistemas
GHEROHWLQVHOHWU{QLFRV±%%6 DRFHQiULRGDVFRQIHUrQFLDVGHKDFNHUV
JUXSRV GD 8VHQHW H OLVWDV HOHWU{QLFDV GH GLVFXVVmR´   ³1HVVHV
IRUXPV GLVFXVV}HV VREUH FHQVXUD SROtWLFD WHFQRORJLD SURSULHGDGH
intelectual e mídia contribuiram para marcar certas tendências como
LPSRUWDQWHVSDUDRVKDFNHUVHSDUDWUD]HUFHUWDVSUHRFXSDo}HVVRFLDLV
DRPXQGRGHOHV´ &2/(0$1+,// 

As várias comunidades de software livre conformam uma rede de solidarie-


GDGH WHFQROyJLFD H LGHROyJLFD GH FUHQoD QD OLEHUGDGH H QR FRPSDUWLOKDPHQWR GR
conhecimento que se torna crescentemente política quanto mais avança o uso pela
VRFLHGDGHHSHORPHUFDGRGDVVROXo}HVFRPSDUWLOKDGDV,VVRRFRUUHSRUTXHSDUD
FRQWLQXDUH[LVWLQGRRPRYLPHQWRSUHFLVDPDQWHUXPJUDXGHOLEHUGDGHGHFULDomR
250 • Software livre, cultura hacker e o ecossistema da colaboração

incompatível com o endurecimento das leis de propriedade intelectual e a ação es-


WDWDOFRQWUiULDjH[SDQVmRGDVFRPXQLGDGHVGHFyGLJRDEHUWR
 &RPREHPGLVVH6WDOOPDQ³VRIWZDUHOLYUHpXPDTXHVWmRGHOLEHUGDGHHQmR
GHSUHoR´2VLGHDLVGRPRYLPHQWRGHVRIWZDUHOLYUHQmRVmRVLPSOHVPHQWHWpFQLFRV
RX HFRQ{PLFRV VmR SROtWLFRFXOWXUDLV 3UHJDP D VROLGDULHGDGH H EDVHLDPVH HP
uma ética em que compartilhar é o modo pelo qual se obtém o reconhecimento co-
PXQLWiULR$FRPXQLGDGH'HELDQpXPH[HPSORGHXPDWHLDGHQWURGDJLJDQWHVFD
UHGH GR FLEHUHVSDoR GH XPD QRYD HVIHUD S~EOLFD D HVIHUD S~EOLFD LQLFLDOPHQWH
KDFNHUFXMDpWLFDPHULWRFUiWLFDH[LJHRWUDEDOKRYROXQWiULRDFRODERUDomRDWLYDH
R FRPSDUWLOKDPHQWR GR FRQKHFLPHQWR PDV WDPEpP H[LJH XPD SRVWXUD FUtWLFD H
YLJLODQWHFRQWUDREORTXHLRHRDSULVLRQDPHQWRGRFRQKHFLPHQWR$RPHVPRWHPSR
é o movimento dessas milhares de comunidades de software livre, também um mo-
YLPHQWRSHODWUDQVSDUrQFLDGRVFyGLJRVSURWRFRORVHSDGU}HVXWLOL]DGRVQDVRFLH
GDGHHPUHGHTXHSRGHDVVHJXUDUTXHRFLEHUHVSDoRSRVVDVHUWDPEpPXPDHVIHUD
S~EOLFDHPTXHDVSHVVRDVSULYDGDVVHPFRQVWUDQJLPHQWRVSRVVDPH[HUFHURXVR
de sua razão comunicativa.

Política pós-capitalista dos bens anti-rivais?

³7HFKQRORJ\LVQRWQHXWUDO:H¶UHLQVLGHRIZKDWZHPDNHDQG
LW LQVLGH RI XV :H¶UH OLYLQJ LQ D ZRUOG RI FRQQHFWLRQV ± DQG LW
PDWWHUVZKLFKRQHVJHWPDGHDQGXQPDGH´ 'RQQD+DUDZD\ 

$RGHIHQGHURFRPSDUWLOKDPHQWRHVHXPRGRGHSURGX]LUFyGLJRVRPR
vimento do software livre chocou-se contra o sistema de propriedade de bens in-
WDQJtYHLVKHJHP{QLFRVQRFDSLWDOLVPRJOREDO'DGRTXHDSURSULHGDGHLQWHOHFWXDO
QmRSRGHH[LVWLUVHPDOHJLVODomRHRDSDUDWRMXUtGLFRUHSUHVVLYRGR(VWDGRRPR
YLPHQWRGRVRIWZDUHOLYUHGHXPDHVIHUDLQLFLDOPHQWHKDFNHUIRLFDPLQKDQGRpara
D FRQVWLWXLomR GH XPD JUDQGH UHGH GH FRPXQLFDomR FUtWLFD VREUH D SURSULHGDGH
GHLGHLDV(VWDUHGHFRPELQRXDSURGXomRGHFyGLJRVFRPDSURGXomRGHLGHLDV
FRQWUiULDVDREORTXHLRGRFRQKHFLPHQWRWHFQROyJLFRHSDVVRXDDUWLFXODUFDPSDQKDV
políticas pela liberdade do compartilhamento do saber.
Essa mobilização política não se deu nos moldes nem na chave de en-
TXDGUDPHQWR SROtWLFR WUDGLFLRQDO TXH FRQWUDSXQKD DV IRUoDV GH HVTXHUGD jV GH
direita. Nesta pesquisa, foi possível constatar a correção da hipótese de que o
movimento de software livre superou essa dicotomia por lidar com a propriedade de
Software livre, cultura hacker e o ecossistema da colaboração • 251

EHQVLQWDQJtYHLVRXLPDWHULDLVRTXHSHUPLWLXFRORFDURWHPDGDMXVWDGLVWULEXLomR
da propriedade como uma questão de liberdade e assim reunir na defesa do com-
SDUWLOKDPHQWR GH FyGLJRV LQWHJUDQWHV GDV DQWLJDV IRUoDV OLEHUDLV H GD HVTXHUGD
GHPRFUiWLFDHVRFLDOLVWD8PDHVWUXWXUDHFRQ{PLFRVRFLDOFUHVFHQWHPHQWHEDVHDGD
HP EHQV LQWDQJtYHLV SHUPLWH VXSHUDU D SULQFLSDO REMHomR KD\HNLDQD jV SUiWLFDV
distributivas. Os motivos eram distintos, mas a causa foi a mesma. Os liberais e os
anarco-capitalistas mais radicais defenderam o software livre pela superioridade
HFRQ{PLFD GR PRGHOR GH FRPSDUWLOKDPHQWR ,VVR SRUTXH R GHVHQYROYLPHQWR FR
laborativo aproveita as possibilidades interativas disponíveis nas redes de alta
velocidade e processamento, bem como aposta na redução dos custos de tran-
VDomRHQDVXSHULRULGDGHGRPRGHOR³ED]DU´SDUDDPDQXWHQomRHDWXDOL]DomRGH
SURJUDPDVGHFRPSXWDGRU
O compartilhamento do conhecimento maximiza o desenvolvimento de bens
por aproximar-se o máximo possível da exploração das potencialidades da rede
HGDVFDUDFWHUtVWLFDVLQHUHQWHVDRVEHQVLQIRUPDFLRQDLV$SHVDUGHQmRJRVWDUHP
GH DODUGHDU H SROLWL]DU VXD DomR HVVHV GHVHQYROYHGRUHV GH RULJHP QHROLEHUDO H
capitalista, reunidos em torno da defesa do chamado Open Source, consideraram
TXH R PRGHOR KHJHP{QLFR GH SURSULHGDGH LQWHOHFWXDO FHQWUDGR QR EORTXHLR GH
DFHVVRDRFyGLJRIRQWHJHUDYDVRIWZDUHVGHTXDOLGDGHLQIHULRU$SUHJRDPTXH³R
IXWXURpDEHUWR´HGHIHQGHPTXHDWHQGrQFLDGDWHFQRORJLDpVXEVWLWXLUDUHPXQHUDomR
baseada na propriedade pela receita baseada nos serviços.
 (ULF5D\PRQGPHPEURGD$VVRFLDomR1DFLRQDOGR5LÀH (8$ HXPGRV
mais destacados líderes do movimento de Open Source escreveu que

³WDOYH] QR ¿QDO D FXOWXUD GH FyGLJR DEHUWR LUi WULXQIDU QmR SRUTXH D
FRRSHUDomR p PRUDOPHQWH FRUUHWD RX  D µSURWHomR¶ GR VRIWZDUH p PR
ralmente errada (assumindo que você acredita na última, o que não faz
tanto o Linus como eu), mas simplesmente porque o mundo do software
GHFyGLJRIHFKDGRQmRSRGHYHQFHUXPDFRUULGDHYROXFLRQiULDFRPDV
FRPXQLGDGHV GH FyGLJR DEHUWR TXH SRGHP FRORFDU PDLV WHPSR KiELO
RUGHQVGHPDJQLWXGHDFLPDHPXPSUREOHPD´ 5$<021' 

-i RV GHVHQYROYHGRUHV H LQWHJUDQWHV GR PRYLPHQWR GH VRIWZDUH OLYUH GH
orientação social-liberal, anarquistas e socialistas de diversas matizes, acreditam
TXHRVRIWZDUHOLYUHSRGHJHUDUPDLVLJXDOGDGHSRLVDOLEHUGDGHGHFRPSDUWLOKDUR
FyGLJRpXPDGHFLVmRLQGLYLGXDOLQVSLUDGDSHODVROLGDULHGDGHYDORUGHJUDQGHGL
PHQVmRFROHWLYD$DGHVmRDRFRPSDUWLOKDPHQWRpSHVVRDOPDVVHJXHDLGHLDGH
que a liberdade é a fonte da criação e da melhoria da produção humana. O pres-
suposto é que a liberdade de trocar ideias está na base do conhecimento e que
este é uma produção coletiva, humana. Não deveria ser apropriado privadamente.
252 • Software livre, cultura hacker e o ecossistema da colaboração

,VWRpSULYDUDOJXpPGRFRQKHFLPHQWRpEORTXHDUDOLEHUGDGHeUHGX]LURULWPRGH
crescimento do conhecimento, pois nessa acepção, quanto mais se compartilha o
conhecimento mais ele cresce.
 0DV FRPR VHULD SRVVtYHO FRPELQDU OLEHUGDGH H LJXDOGDGH" (VVD SRVVLEL
lidade existe exatamente porque o elemento primordial da sociedade em rede é
a informação, em todos os seus formatos, inclusive a informação processada e
YHUWLGDHPFRQKHFLPHQWR6XDFDUDFWHUtVWLFDIXQGDPHQWDOpDLQWDQJLELOLGDGHHDLPD
WHULDOLGDGH6HXXVRQmRDGHVJDVWDVXDFySLDGLJLWDOQmRSRVVXLGLIHUHQoDDOJXPD
GD RULJLQDO H VXD PXOWLSOLFDomR SHUPLWH TXH YiULDV SHVVRDV D XWLOL]HP DR PHVPR
WHPSR6XDTXDOL¿FDomRHFRQ{PLFDpDGHXPEHPQmRULYDO(VVDVTXDOLGDGHVGD
informação transformam-na em um bem completamente distinto dos bens físicos.
2 PDWHULDO GHVJDVWDVH FRP R XVR H QmR SHUPLWH UHSURGXomR LOLPLWDGD GHYLGR D
sua escassez. O imaterial não conhece a escassez. Toda a teoria da propriedade
KHJHP{QLFDHDWHRULDGRYDORUXWLOLGDGHSRVVXHPXPDUHODomRLQWUtQVHFDFRPDLGHLD
de escassez. A era da informação e seus bens imateriais desconhecem a escassez
LQHUHQWHjSURSULHGDGHPDWHULDOXPDYH]TXHHVWmRVXEPHWLGDVjDEXQGkQFLDGD
FySLDGLJLWDO
Como o conhecimento é chave da economia da sociedade em rede, o seu
FRPSDUWLOKDPHQWRSRGHVHUFRQVLGHUDGRWDQWRGRSRQWRGHYLVWDHFRQ{PLFRTXDQWR
GRSRQWRGHYLVWDVRFLDOHFXOWXUDO2FRPSDUWLOKDPHQWRGRFRQKHFLPHQWRSRGHJHUDU
GLVWULEXLomR GH RSRUWXQLGDGHV HFRQ{PLFDV EHP FRPR SRGH VHU HQWHQGLGR FRPR
YLWDODRDFHVVRjSURGXomRFRPXPGDKXPDQLGDGH$RSDFLGDGHGRFyGLJRIRQWH
de um software pode ser vista como a exclusão do direito de todos conhecerem
DOJRTXHIRLFRQVWLWXtGRVREUHXPDF~PXORFLHQWt¿FRGHPXLWRPDLRUYDORUHTXHIRL
FRPXPDWRGRVFRPROLYUHDFHVVRJDUDQWLGR
 $OpPGLVVRRVRIWZDUHFRPRLQWHUPHGLiULRGDLQWHOLJrQFLDKXPDQDQDVRFLH
GDGHHPUHGHDGTXLUHRVWDWXVGHOLQJXDJHPEiVLFDGRFRQYtYLRHQWUHDVSHVVRDV
$V UHODo}HV VRFLDLV UHDOL]DPVH FUHVFHQWHPHQWH SHOD FRPXQLFDomR PHGLDGD SRU
FRPSXWDGRURXSRUDSDUHOKRVTXHSURFHVVDPLQIRUPDo}HV$VOLQJXDJHQVIHFKDGDV
VmRRSDFDVHHVFRQGHPGHFLV}HVQmRSHUPLWHPRVHXFRQWUROHS~EOLFRHDFDEDP
JHUDQGROLPLWHVGH¿QLGRVSULYDGDPHQWHSRUFRUSRUDo}HVPRQRSROLVWDV(VVDRSD
cidade inviabiliza a construção no ciberespaço de uma esfera pública mundial. O
movimento FLOSS (Free Libre Open Source Software), a reunião dos defensores
GD DERUGDJHP OLYUH H GD DERUGDJHP DEHUWD XQHVH QD GHIHVD GD WUDQVSDUrQFLD
GHVVD OLQJXDJHP EiVLFD GD VRFLHGDGH HP UHGH 2X VHMD D GHIHVD GD OLQJXDJHP
EiVLFDDFLPDGHFRQWUROHVSULYDGRVLPSOLFDHPGL]HUTXHHVVDVOLQJXDJHQVGHYHP
HVWDUVRERFRQWUROHS~EOLFR'LWRGHRXWURPRGRTXHGL¿FLOPHQWHDOJXpPSRGHUiVHU
OLYUHXWLOL]DQGRSDGU}HVHLQWHUPHGLiULRVGDLQWHOLJrQFLDHGDFRPXQLFDomRKXPDQDV
Software livre, cultura hacker e o ecossistema da colaboração • 253

que são propriedade de uma corporação privada.


 $ OLEHUGDGH GD LQIRUPDomR H GR DFHVVR j LQIRUPDomR QXPD HFRQRPLD GH
EHQV LQWDQJtYHLV HQFRQWUDVH HP FRQÀLWR FRP D SURSULHGDGH SDUWLFXODU 6WDOOPDQ
D¿UPRX³VRIWZDUHOLYUHQmRpTXHVWmRGHSUHoRPDVGHOLEHUGDGH´H[DWDPHQWHSRU
que defende que o conhecimento é uma produção coletiva e social. Além disso,
QRWH[WR3RUTXHR6RIWZDUH1mR'HYHULD7HU'RQRVH[LVWHXPDSDVVDJHPHPTXH
6WDOOPDQ FRPEDWH R DUJXPHQWR GH TXH KDYHULD XP GLUHLWR QDWXUDO UHODFLRQDGR j
SURSULHGDGHGDVLGHLDV

³8PD UD]mR p D IRUoDGD DQDORJLD FRP REMHWRV PDWHULDLV 4XDQGR HX


IDoR VSDJKHWWL UHDOPHQWH HX IDoR REMHomR VH DOJXpP TXHU FRPr
lo, porque aí não poderei mais comê-lo eu mesmo. A ação dele me
DWLQJHH[DWDPHQWHQDPHVPDPHGLGDHPTXHREHQH¿FLDDSHQDVXP
GH QyV SRGH FRPHU R VSDJKHWWL HQWmR D TXHVWmR p TXHP"$ PHQRU
GLVWLQomRHQWUHQyVpVX¿FLHQWHSDUDID]HUSHQGHUDEDODQoDpWLFD0DV
VHYRFrH[HFXWDRXPRGL¿FDXPSURJUDPDTXHHXHVFUHYLLVVRDIHWD
a você diretamente e a mim, apenas indiretamente. Se você dá uma
FySLDDRVHXDPLJRLVVRDIHWDDYRFrHDRVHXDPLJRPXLWRPDLVGR
que me afeta. Eu não devo ter o poder de dizer a você para não fazer
LVVR1LQJXpPGHYH$VHJXQGDUD]mRpTXHVHGL]jVSHVVRDVTXHRV
direitos naturais dos autores são uma tradição aceita e inquestionável
da nossa sociedade. Historicamente, a verdade é o oposto. A ideia de
direitos naturais dos autores foi proposta e decisivamente rejeitada
TXDQGRD&RQVWLWXLomRGRV(VWDGRV8QLGRVIRLUHGLJLGDeSRULVVRTXH
a Constituição apenas permite um sistema de direitos autorais e não
R UHTXHU p SRU LVVR TXH HOD HVWDEHOHFH TXH GLUHLWR DXWRUDO WHP TXH
ser temporário. A Constituição também estabelece que o propósito do
GLUHLWRDXWRUDOpSURPRYHURSURJUHVVRQmRUHFRPSHQVDURDXWRU'H
DOJXPDPDQHLUDRVGLUHLWRVDXWRUDLVUHFRPSHQVDPRVDXWRUHVHPDLV
ainda os editores, mas isso foi pensado como uma maneira de mudar
VXDDWLWXGH´10

A liberdade de compartilhar o conhecimento e a liberdade de acessá-lo não


SRGHVHUEDUUDGDGHPRGROHJtWLPRFRPEDVHHPDOHJDomRTXHHYRTXHTXDOTXHU
GLUHLWRQDWXUDORXTXDOTXHUUHODomRLQHUHQWHjFULDomRTXHH[LMDVXDDSURSULDomRH[
clusiva por um autor. Esse é outro ponto que permite constatar que, na sociedade
informacional, a defesa da liberdade para o conhecimento tem reunido em um
QRYRFDPSRSROtWLFRIRUoDVSROtWLFDVjHVTXHUGDHjGLUHLWDPHVPRWUDWDQGRVHGH
um tema relacionado ao núcleo duro do tradicional pensamento da direita política
IXQGDGR QD GHIHVD LQWUDQVLJHQWH GD SURSULHGDGH &RPR Mi KDYLD HVFULWR QD VR
FLHGDGH LQIRUPDFLRQDO DV UHODo}HV KHJHP{QLFRWUDGLFLRQDLV GH SURSULHGDGH FDSL
talista chocam-se com a liberdade para poderem existir e se manter.
'LVSRQtYHOKWWSZZZJQXRUJSKLORVRSK\ZK\IUHHSWKWPO$FHVVRHP
254 • Software livre, cultura hacker e o ecossistema da colaboração

 4XDQGR D OLEHUGDGH GH DJLU H FRPSDUWLOKDU DFDED YLDELOL]DQGR FXVWRV GH


WUDQVDomRPHQRUHVSDUDYiULRVVHJPHQWRVHFRQ{PLFRVEHPFRPRTXDQGRDFROD
ERUDomR D SDUWLU GD GRDomR GH FyGLJRV WRUQDVH XP PRGR PXLWR PDLV H¿FLHQWH
GH SURGXomR GH ULTXH]D LQWDQJtYHO HVWD DWUDL HP VXD GHIHVD IRUoDV SROtWLFDV GR
espectro da chamada livre iniciativa, liberais, libertários e neoliberais.
Ocorre que a prática livre do compartilhamento e da colaboração baseada
no conhecimento aberto e transparente viabiliza o caminho da equalização real, da
LJXDOGDGHGHRSRUWXQLGDGHVHGDUHGLVWULEXLomRGHULTXH]DV$OLEHUGDGHQRFRQWH[WR
GRVEHQVLQWDQJtYHLVYLDELOL]DDLJXDOGDGH$PDUW\D6HQKDYLDFRQFHELGRRGHVHQ
YROYLPHQWRWHUPRSUySULRGRWHUUHQRHFRQ{PLFRFRPROLEHUGDGHWHUPRDGHTXDGR
ao campo político. Sua preocupação com as capacidades humanas pode ser aqui
UHVJDWDGDSDUDGHPRQVWUDUTXHDOLEHUGDGHGHFRPSDUWLOKDUXPEHPQmRULYDOJHUD
um desenvolvimento mais equitativo. Sen retoma Adam Smith para defender as
SRVVLELOLGDGHVHTXDOL]DGRUDVGDFDSDFLWDomR

³$IpGH6PLWKQRSRGHUGDHGXFDomRHGRDSUHQGL]DGRHUDVLQJXODUPHQWH
IRUWH 1R GHEDWH DLQGD KRMH HP YRJD VREUH RV SDSpLV UHVSHFWLYRV GR
³LQDWR´ H GR ³DGTXLULGR´ 6PLWK S{VVH LQÀH[LYHOPHQWH  H DWp PHVPR
GRJPDWLFDPHQWHGRODGRGR³DGTXLULGR´&RPHIHLWRLVVRFRQGL]SHUIHL
WDPHQWH FRP VXD LPHQVD FRQ¿DQoD QD SRVVLELOLGDGH GH PHOKRUDU DV
FDSDFLGDGHVKXPDQDV
A disparidade de talentos naturais em homens diferentes é, na realidade,
EHPPHQRUGRTXHQRVGDPRVFRQWDHRWDOHQWRPXLWRGLYHUVRTXHSD
UHFHGLVWLQJXLURVKRPHQVGHGLIHUHQWHVSUR¿VV}HVTXDQGRDWLQJHPD
PDWXULGDGH FRP JUDQGH IUHTXrQFLD QmR p WDQWR D FDXVD PDV R HIHL
to da divisão do trabalho. A diferença entre os caracteres mais desse-
PHOKDQWHV HQWUH XP ¿OyVRIR H XP FDUUHJDGRU SRU H[HPSOR SDUHFH
HPHUJLUQmRWDQWRGDQDWXUH]DTXDQWRGRKiELWRFRVWXPHHHGXFDomR
Quando vêm ao mundo, e durante os primeiros seis ou oito anos de
sua vida, eles terão sido, talvez, muito parecidos, e nem seus pais nem
VHXVFROHJDVGHEULQFDGHLUDVFRQVHJXLULDPSHUFHEHUDOJXPDGLIHUHQoD
notável.
Não é meu propósito aqui examinar se são corretas as ideias de Smith
HQIDWLFDPHQWH IDYRUiYHLV j LQÀXrQFLD GD FULDomR PDV p ~WLO SHUFHEHU
RTXDQWRHOHDVVRFLDDVKDELOLGDGHVSURGXWLYDVHRVHVWLORVGHYLGDj
HGXFDomRHjTXDOL¿FDomRSUR¿VVLRQDOHFRPRHOHVXS}HDSRVVLELOLGDGH
de melhora de cada um desses elementos. Essa relação é essencial
SDUDDDEUDQJrQFLDGDSHUVSHFWLYDGDFDSDFLGDGH´
6(1 

&RPR D LQWHOLJrQFLD KXPDQD WHQGH D VHU PHGLDQDPHQWH GLVWULEXtGD SHOR


planeta, o controle e o bloqueio ao conhecimento é hoje importante para evitar o
GHVHQYROYLPHQWRGDVFDSDFLGDGHVHGDLQWHOLJrQFLDGLVWULEXtGDRXVHMDSDUDHYLWDU
Software livre, cultura hacker e o ecossistema da colaboração • 255

que muitos possam ser não somente consumidores, mas também desenvolvedores
GHEHQVLQWDQJtYHLV1HVVHVHQWLGRHPXPFHQiULRHPTXHDLQIRUPDomRpRHOH
mento constitutivo dos bens imateriais, seria possível pensar que a escassez resi-
GLULDH[DWDPHQWHQDFULDomRGDLQIRUPDomR$VVLPFDVRDLQWHOLJrQFLDFULDWLYDIRVVH
escassa, ela poderia viabilizar o modelo de propriedade tradicional sobre a mesma,
tal como no cenário de bens materiais. Por outro lado, é exatamente o fato de
D LQWHOLJrQFLD FULDWLYD VHU GLVWULEXtGD GH PRGR HTXLWDWLYR HQWUH RV SRYRV TXH WHP
DOJXP VHQWLGR QR EORTXHLR GR FyGLJR IRQWH GRV VRIWZDUHV 6y WHP VHQWLGR UHWLUDU
D WUDQVSDUrQFLD VREUH R FRQKHFLPHQWR GRV FyGLJRV H H[FOXLU DV SHVVRDV GR VHX
DFHVVRVHDLQWHOLJrQFLDFULDWLYDQmRIRUHVFDVVDVHDVSHVVRDVFRPEDVHQDTXHOHV
FyGLJRV IRQWH SXGHUHP UHFULiORV H QmR VLPSOHVPHQWH FRSLiORV 3DUD FRSLDU XP
VRIWZDUHQmRpQHFHVViULRSRVVXLUVHXFyGLJRIRQWH$GHQRPLQDGD³SLUDWDULD´GiVH
UHSURGX]LQGRDSHQDVRFyGLJRH[HFXWiYHO
 3DUD DV FRPXQLGDGHV GH VRIWZDUH OLYUH H DEHUWR D LQWHOLJrQFLD FULDWLYD p
VHPSUHXPDLQWHOLJrQFLD UHFULDWLYDSRLVDFULDomRHVWiIXQGDGDQRFRQKHFLPHQWR
socialmente acumulado. Como a recriação e o impulso ao novo necessita do acú-
mulo e do estoque de conhecimento, distribuir o próprio conhecimento abre caminho
para que se redistribuam as possibilidades de criar e, portanto, também para que se
UHGLVWULEXDPRVJDQKRVGDFULDomR$VVLPRVPLOLWDQWHVGDWUDGLomRVRFLDOLVWDHGD
tradição democrática acabam podendo se aproximar da defesa da liberdade como
valor prioritário, pois na era informacional é também da liberdade que podemos
GHULYDUDMXVWDUHGLVWULEXLomR GRVEHQHItFLRVGDFULDomRGHDOJRULWPRVSURWRFRORV
sistemas e softwares.
Nesse sentido, temos um novo tipo de situação que necessita de uma nova
FODVVL¿FDomRGDVIRUoDVSROtWLFDVHPUHODomRjSURSULHGDGHGRVEHQVLQWDQJtYHLV$
sociedade da informação afeta um dos principais elementos da doutrina política das
forças da direita e da esquerda, ou seja, o posicionamento sobre a propriedade e
sobre a liberdade. A alteração profunda do tipo de propriedade de bens materiais para
RWLSRGHSURSULHGDGHGHLGHLDVFRQKHFLPHQWRVHLQIRUPDo}HVFRORFDQRVGLDQWHGD
QHFHVVLGDGHGHXOWUDSDVVDJHPGRVPRGHORVH[SOLFDWLYRVFDOFDGRVQDDQWLJDGLYLVmR
GRHVSHFWURSROtWLFRTXHGH¿QLDDGLUHLWDFRPRGHIHQVRUDGDSURSULHGDGHSULYDGDHD
esquerda como defensora da distribuição equitativa da propriedade sobre a riqueza
socialmente produzida.
Temos um cenário de superação da divisão política tradicional. O contraponto
GDHVTXHUGDFRPRGHIHQVRUDGDLJXDOGDGHGDVROLGDULHGDGHHGDFRRSHUDomRFRQWUD
XPD GLUHLWD TXH VH FRORFDULD ¿HO DRV SULQFtSLRV GD OLEHUGDGH H GD OLYUH LQLFLDWLYD
como melhor maneira de maximizar a produção social parece dissolver-se diante da
H¿FLrQFLDGRPRGHORFRODERUDWLYRSDUDDSURGXomRGHEHQVLQWDQJtYHLVFRPSOH[RV
256 • Software livre, cultura hacker e o ecossistema da colaboração

cuja característica não rival pode ser explorada ao extremo.


A sociedade em rede e a comunicação mediada por computador viabilizaram,
por meio da liberdade de sujeitos dispostos a partilhar sua iniciativa, um modelo
HFRQ{PLFRHFXOWXUDOTXHH[LJHRPi[LPRGHOLEHUGDGHVREUHRFRQKHFLPHQWRWHF
QROyJLFRSDUDFRQWLQXDUH[LVWLQGR4XDOTXHUUHVWULomRDRFRPSDUWLOKDPHQWRGRFyGLJR
IRQWH GRV VRIWZDUHV p H[WUHPDPHQWH SUHMXGLFLDO j H¿FLrQFLD GR GHVHQYROYLPHQWR
GH SURGXWRV GH PHOKRU TXDOLGDGH H DR PHVPR WHPSR WDPEpP p SUHMXGLFLDO j
redistribuição mais equitativa da riqueza, uma vez que a distribuição dos fontes
SHUPLWHTXHRJDQKRFRPDYHQGDGHGHVHQYROYLPHQWRVGRSURGXWRWDPEpPVHMD
distribuída.
 3RUHVVDVUD]}HVRVRIWZDUHHTXDOTXHUSURGXWRLQWDQJtYHOFRPSOH[RWHUmR
maior valor se tiverem uma comunidade de desenvolvedores e mantenedores nu-
PHURVD 4XDQWR PDLV XP GHWHUPLQDGR FyGLJR IRQWH IRU GLVWULEXtGR PDLRU VHUi D
possibilidade de atrair o interesse de pessoas para mantê-lo e melhorá-lo. Assim,
PDLRUSRGHUiVHUVXDTXDOLGDGHVHJXUDQoDHVWDELOLGDGHHFRQWLQXLGDGH3RULVVR
é possível falar que o software e os protocolos são anti-rivais (na concepção de
:HEHU  2 IHFKDPHQWR GH VHX FyGLJR IRQWH H R GHVHQYROYLPHQWR KLHUDUTXL]DGR H
PDQWLGRGHQWURGHXPDHPSUHVDSDUHFHQmRJHUDUPDLVDJUHJDomRGHYDORUGRTXH
o desenvolvimento em rede e baseado na colaboração crescente.
André Gorz escreveu que

³RFDSLWDOLVPRGRVDEHUJHUDHPVLHSDUDDOpPGHVLDSHUVSHFWLYDGHVXD
SRVVtYHOVXSUHVVmR(PVHXkPDJRJHUPLQDXPDVHPHQWHFRPXQLVWD
QDVSDODYUDVGH5LFKDUG%DUEURRNXPDµHFRQRPLDGHGRDomRDQDUFR
FRPXQLVWD¶ TXH GLVSXWD FRP R FDSLWDO D HVIHUD HVWUDWHJLFDPHQWH
sensível de transmissão e acessibilidade do saber. Não se trata de uma
mera visão. Trata-se de uma práxis que, no mais alto nível técnico, foi
desenvolvida por homens, sem cujo comunismo criativo o capitalismo
QmRSRGHULDPDLVDYDQoDU´ *25= 

$SHVDUGHHPSUHJDUDWHUPLQRORJLDHDIRUPDGHFODVVL¿FDomRGDHVTXHUGD
WUDGLFLRQDOSRGHPRVQRWDUTXHDDQiOLVHGH*RU]H%DUEURRNUHFRQKHFHTXHRPRGHOR
colaborativo é incorporado como elemento importante para a própria reprodução do
FDSLWDO3RULVVRSHUVRQDJHQVHIRUoDVSROtWLFDVWUDGLFLRQDOPHQWHOLJDGDVjGLUHLWD
SDVVDPDDGRWDURPRGHORGHFyGLJRDEHUWRHDFRODERUDomRHPUHGHFRPRIRUPD
PDLVH¿FD]SDUDVHREWHUVXDV¿QDOLGDGHV
 4XHVWLRQDGRHPVHRVRIWZDUHOLYUHHVWDULDPXGDQGRRUHODFLRQDPHQWR
HQWUHDGLUHLWDHDHVTXHUGD5LFKDUG6WDOOPDQD¿UPRX³3HUWHQFHQGRjHVTXHUGD
HXJRVWDULDGHGL]HUTXHDLGHLDpGDHVTXHUGDPDVQRV(8$DPDLRULDGDTXHOHV
Software livre, cultura hacker e o ecossistema da colaboração • 257

TXHHVWmRLQWHUHVVDGRVHPVRIWZDUHOLYUHHVWmRQDGLUHLWDHVmROLEHUDLV´ *60%2;
 $ FKDYH GHVVD FRQMXQWXUD SyVSROtWLFD WUDGLFLRQDO HVWi QD FRPSUHHQVmR GH
TXHDSUySULDHYROXomRGRFDSLWDOLVPRHDGHVPDWHULDOL]DomRGRVSURGXWRVGHJUDQ
GH LPSRUWkQFLD VRFLDO JHUDUDP D FRQWUDGLomR R PRGHOR GH SURSULHGDGH GH EHQV
WDQJtYHLVQRPXQGRLPDWHULDOVySRGHVHUH[HFXWDGRSHODH[FOXVmRGRDFHVVRDR
FRQKHFLPHQWR2FRUUHTXHREORTXHLRDROLYUHÀX[RGHFRQKHFLPHQWRpSHUFHELGR
FRPRJHUDGRUGHXPDDORFDomRLQH¿FLHQWHGHUHFXUVRV2OLEHUDOGHVFREUHTXHR
FRPSDUWLOKDPHQWRHPHUJHFRPRXPPRGRGHSURGXomRH[WUHPDPHQWHYHOR]HH¿
FLHQWHGHVHGHVHQYROYHUEHQVLQWDQJtYHLV
 &KULVWRSKHU0D\DRDQDOLVDUDMXVWL¿FDWLYDGDSURSULHGDGHGHEHQVPDWHULDLV
REVHUYRXTXHRVDUJXPHQWRVDSRQWDYDPSDUDDHPHUJrQFLDGDSURSULHGDGHFRPR
XPVXSRUWHSDUDDRSHUDomRH¿FLHQWHGRVPHUFDGRVRXVHMDDSURSULHGDGHHVWDYD
GLUHWDPHQWH UHODFLRQDGD FRP D DORFDomR H¿FLHQWH GH UHFXUVRV HVFDVVRV 1D
VRFLHGDGHGLJLWDODDORFDomRH¿FLHQWHGHXPUHFXUVRQmRHVFDVVRRFRQKHFLPHQWR
FRGL¿FDGRHPLQIRUPDo}HVSDVVDSHODVXSHUDomRGRPRGHORSURSULHWiULR2FRP
SDUWLOKDPHQWRWHPJHUDGRHSRGHJHUDUFULDo}HVHLQRYDo}HVFRPPHQRUFXVWRH
mais velocidade.
 2FRPSDUWLOKDPHQWRGRFRQKHFLPHQWRWHFQROyJLFRHRPpWRGRFRODERUDWLYR
unem os adeptos do movimento de software livre e os adeptos do movimento de
FyGLJRDEHUWR0DVSDUDRVDGHSWRVGD26, 2SHQ6RXUFH,QLFLDWLYH DOLEHUGDGH
de escolher está acima da liberdade como concepção, ou seja, as pessoas devem
ser livres para escolher se querem manter livre sua produção, por isso, as licenças
%6'QmRLPSHGHPTXHVROXo}HVGHVHQYROYLGDVDSDUWLUGHODVSRVVDPVHUIHFKDGDV
HSULYDGDPHQWHDSURSULDGDV'HVFRQVLGHUDPDLPSRUWkQFLDGRDUJXPHQWRVREUHD
preservação do conhecimento coletivo. Efetivamente, para as correntes do Open
6RXUFHDOLEHUGDGHGHWRUQDUSDUWLFXODUDOJRTXHVRPHQWHSRGHULDVHUIHLWRFRPEDVH
no conhecimento de muitos não é considerado um problema. Todavia, a liberdade
pYLVWDFRPRRPRGRPDLVH¿FLHQWHGHFRQVWUXLUVROXo}HVGHDOWDTXDOLGDGH³/LEHUH
FHGROLEHUHIUHTXHQWHPHQWH´ RFyGLJRIRQWH pROHPDTXH5D\PRQGD¿UPDVHUR
TXHPHOKRUUHVXOWDGRJHUDHPUHODomRDRGHVHQYROYLPHQWRGHVRIWZDUHV
Seja pensando a liberdade do indivíduo acima da liberdade do coletivo em
SUHVHUYDUOLEHUGDGHGHVXDVFULDo}HVVHMDFRORFDQGRDGHIHVDGDREUDOLYUHFRPR
condição essencial, os defensores do Open Source e do software Livre contribuem
FRP XP QRYR WLSR GH VROLGDULHGDGH H VH XQHP FRQWUD R IRUPDWR KHJHP{QLFR GD
propriedade de ideias no capitalismo da era informacional. Assim, a liberdade do
FRQKHFLPHQWR WRUQDVH QD VRFLHGDGH HP UHGH GRV EHQV LQWDQJtYHLV XPD DomR
redistributiva.
Os movimentos de colaboração sócio-técnica, na era informacional, cons-
258 • Software livre, cultura hacker e o ecossistema da colaboração

WUXtUDPGHQWURGDHFRQRPLDFDSLWDOLVWDEROV}HVGHHFRQRPLDGDGRDomRHSRUVH
FKRFDUHPFRPRSDUDGLJPDGDSURSULHGDGHWUDGLFLRQDOVmROHYDGRVDXPQRYRWLSR
de politização. A nova política de reivindicar direitos de continuar desenvolvendo
e compartilhando seu desenvolvimento contra os ataques dos representantes do
PRGHORSURSULHWiULRQmRVHUHVXPHjHVTXHUGDPDVUHFRQ¿JXUDRWHUUHQRSROtWLFR
lançando a unidade entre certos liberais e determinados socialistas. Em síntese, o
PRYLPHQWRGRVRIWZDUHOLYUHUHRUJDQL]DDVVROLGDULHGDGHVSROtWLFDVSRLVQDVFHQR
contexto liberal e anarquista e avança para o contexto solidário, anti-proprietário,
típico dos movimentos comunitaristas e socialistas, mas os supera.
 ([LVWLULD XP QRYR UHFRUWH SROtWLFR D SDUWLU GH XPD UHFRQ¿JXUDomR GDV IRU
oDV VyFLRHFRQ{PLFDV TXH VH IRUPRX FRPR FRQGXWRU GHVVH SURFHVVR GH FRP
SDUWLOKDPHQWRHGHIHVDGDOLEHUGDGHGRFRQKHFLPHQWRWHFQROyJLFR"&RPRQmRVmR
mais as forças políticas de esquerda que conduzem esse processo de transformação,
TXHPVHULDPVHXVFRQGXWRUHV"8PDQRYDFODVVHYLUWXDO"2XRVRSRQHQWHVGHVWD
QRYDFODVVH"
 $WHRULDGDFODVVHYLUWXDOFRPRPRVWUD*XVWDYR/LQV5LEHLURVXUJLXFRPR
FLHQWLVWDSROtWLFRFDQDGHQVH$UWKXU.URNHUHFRPVHXSDUFHLUR0LFKDHO$:HLQVWHLQ
H SRGH HQVHMDU XPD FDWHJRULD ~WLO j FRPSUHHQVmR GR IHQ{PHQR DTXL DERUGDGR
3RGHUtDPRVYLVXDOL]DUDFODVVHYLUWXDOFRPRXPDWHQWDWLYDGHVHJPHQWRVGRPLQDQWHV
GRFDSLWDOLVPRLQGXVWULDOGHDVVHJXUDUVHXHQRUPHSRGHUHFRQ{PLFRHPXPDIDVH
GH GHVPDWHULDOL]DomR GR FDSLWDO H GH SURIXQGDV WUDQVIRUPDo}HV QR YDORU FRPR
YHUHPRVPDLVjIUHQWH$SDVVDJHPDVHJXLUpH[WUHPDPHQWHHOXFLGDWLYD

³.URNHU H :HLQVWHLQ VmR iFLGRV GHPROLGRUHV GR FLEHUDXWRULWDULVPR H


da histeria criada pela tecnotopia, em prol dos controladores da Inter-
QHW HVSDoR SULYLOHJLDGR GR H[HUFtFLR GH SRGHU GD FODVVH YLUWXDO D
YHUVmR GD FODVVH GRPLQDQWH QD HUD HOHWU{QLFRLQIRUPiWLFD )RUPDGD
SRU ³FDSLWDOLVWDV SXURV´ PDLV ³FDSLWDOLVWDV YLVLRQiULRV HVSHFLDOLVWDV HP
FRPSXWDGRUHV´ H EDVHDGD QD LQG~VWULD GH FRPXQLFDomR HVWD FODVVH
SURFXUDXPDYH]LQVWDODGDDIRUoDGRPRYLPHQWRGDIURQWHLUDHOHWU{QLFD
HPH[SDQVmRORWHDURFLEHUHVSDoRSDUD¿QVGHDFXPXODomRFDSLWDOLVWD
HFRQWUROHSROtWLFR2TXHHVWiHPMRJRpXPDFRPSHWLomRSRUGLUHLWRV
de propriedade intelectual. As possibilidades democráticas da Internet
VmR D VHGXomR LQLFLDO SDUD D FRQVWUXomR GD VXSHUKLJKZD\ GLJLWDO R
³SULYLOHJLDGR PRQRSyOLR GD FRPXQLFDomR JOREDO GH GDGRV´  H SDUD D
VXERUGLQDomRGDUHGHDRV³LQWHUHVVHVFRPHUFLDLVSUHGDWyULRV´GDFODVVH
YLUWXDO´ 5,%(,52E 

$ FDWHJRULD GH FODVVH YLUWXDO SRGH VHU ~WLO SDUD LGHQWL¿FDUPRV RV PDLRUHV
RSRQHQWHV GR PRYLPHQWR SHOR FRPSDUWLOKDPHQWR GR FRQKHFLPHQWR WHFQROyJLFR
Software livre, cultura hacker e o ecossistema da colaboração • 259

3ULPHLUR p SUHFLVR GH¿QLOD FRP PDLRU SUHFLVmR ,QWHJUDP D FODVVH YLUWXDO DOJXQV
VHJPHQWRVGRFDSLWDOLVPRDTXHOHVHQYROYLGRVQDH[WUDomRGHUHQGDSHORFRQWUROH
GDSURSULHGDGHVREUHDVLGHLDVSULQFLSDOPHQWHRVGLULJHQWHVGHPHJDFRUSRUDo}HV
GH VRIWZDUH SURSULHWiULR DOpP GRV FDSLWDOLVWDV GD LQG~VWULD GH ELRWHFQRORJLD H
HQWUHWHQLPHQWR 2 TXH SUHWHQGHP HVVHV FDSLWDOLVWDV" 3UDWLFDU R FDSLWDOLVPR GH
exclusão. Exclusão sobre ideias e conhecimento. Ou seja, querem evitar que o
conhecimento continue livre para poderem lucrar com o acesso a ele. Como não é
SRVVtYHOWRUQDULQIRUPDo}HVHFRQKHFLPHQWRDOJRHVFDVVREXVFDPFULDUDUWLItFLRV
SDUD QHJDU DFHVVR D TXHP QmR SDJDU SHOR VHX XVR 8P GRV REMHWLYRV PDLV
QtWLGRV GHVVD FODVVH YLUWXDO p FRQGX]LU D FLrQFLD SDUD R FDPLQKR GDV WHFQRORJLDV
SURSULHWiULDV$VVLPFDGDYH]PDLVDPDWHPiWLFDDItVLFDHDELRORJLDSDVVDULDP
a ter seus teoremas, modelos teóricos, teorias e descobertas patenteados. O uso
acadêmico seria e já está sendo afetado.
 3RURXWURODGRRXWURVVHJPHQWRVFDSLWDOLVWDVDFDEDPYHQGRTXHRSURFHVVR
colaborativo e a liberdade do conhecimento constituem um caminho para que possam
sobreviver e crescer sem serem destroçados pelo ritmo concentrador de riqueza e
SRGHU WtSLFRV GD HUD LQGXVWULDO DJRUD SUHWHQGLGRV SHOD FODVVH YLUWXDO 0LOKDUHV GH
SHVVRDVGHFODVVHPpGLDDUWLFXODPVHHP2UJDQL]Do}HV1mR*RYHUQDPHQWDLVSDUD
GHIHQGHUHP GLUHLWRV MXVWLoD GHVHQYROYLPHQWR VXVWHQWiYHO YmR JUDGDWLYDPHQWH
DGHULQGR j LGHLD GH TXH R FRPSDUWLOKDPHQWR GR FRQKHFLPHQWR WHFQROyJLFR p R
FDPLQKRSDUDXPDVRFLHGDGHPHOKRU LQGHSHQGHQWHGHVHGH¿QLURJUDXGHPHOKRULD
HODVLJQL¿FDLUHPGLUHomRDXPDVRFLHGDGHPDLVHTXLWDWLYD 2XWURVWDQWRVOLJDPVH
GLUHWDPHQWHjVFRPXQLGDGHVGHGHVHQYROYLPHQWRHGLVVHPLQDomRGHVRIWZDUHOLYUH
HDFDEDPSRUFRQVWLWXLUXPDIRUoDSROtWLFDHVRFLDOFRQWUDD³FODVVHYLUWXDO´HVHXV
representantes políticos dentro das forças tradicionais de esquerda e de direita.
Assim, podemos observar que, se uma teoria da classe virtual pode permitir
H[SOLFLWDURVPDLRUHVGHIHQVRUHVGDSURSULHGDGHLQWHOHFWXDOHGDH[FOXVmRJHUDODR
FRQKHFLPHQWRFRPRXPWLSRHVSHFt¿FRGHFDSLWDOLVWDVQmRHVFODUHFHSHODREVHU
vação dos seus opositores, se existe uma base estrutural para aqueles, por exem-
plo, que se vinculam ao movimento do software livre, ao Creative Commons, aos
WUDEDOKRVFRODERUDWLYRV FRPRR:LNLSHGLDjVUHGHVGHFRPXQLFDomR YLUDLVHQWUH
outros exemplos.
 2TXHRVGHIHQVRUHVGRFRPSDUWLOKDPHQWRWrPHPFRPXP"8PDRULJHPGH
FODVVH"8PDWUDGLomRSROtWLFDRXFXOWXUDOHVSHFt¿FD"1DSHVTXLVDTXHRULJLQRXHVWH
trabalho não foi constatada nenhuma correlação estrutural de base classista e muito
PHQRVGHUHODo}HVSROtWLFDVWUDGLFLRQDLVRULXQGDVGRGHEDWHHQWUHHVTXHUGDHGLUHLWD
3RGHPRVVLPHQFRQWUDUDGHIHVDLQWUDQVLJHQWHGD³OLEHUGDGHFRPRYDORUFHQWUDO´
o elemento articulador dessa luta que une vários ativistas do compartilhamento do
260 • Software livre, cultura hacker e o ecossistema da colaboração

FRQKHFLPHQWRWHFQROyJLFRHGRVEHQVFXOWXUDLVHPJHUDO
 e LPSRUWDQWH UHVVDOWDU TXH QmR VHULD FRUUHWR FRQWUDSRU j ³FODVVH YLUWXDO´
DOJRSDUHFLGRDXPQRYR³SUROHWDULDGRYLUWXDO´3ULPHLURSRUTXHH[LVWHPPXGDQoDV
HFRQ{PLFDV H[WUHPDPHQWH UHOHYDQWHV TXH HQIUDTXHFHP R SHVR GD PDLVYDOLD QD
WHRULDGRYDORUHPXPFDSLWDOLVPRLQIRUPDFLRQDOHSRUFRQVHJXLQWHUHGX]GUDVWL
FDPHQWHRSHVRGHXPSUROHWDULDGRQRSURFHVVRSURGXWLYR6HJXQGRRPXQGRYLYH
XP JLJDQWHVFR SURFHVVR GH H[FOXVmR GLJLWDO R TXH OHYD D PDLRULD GR YHOKR SUR
letariado, e quase a totalidade das camadas pauperizadas do planeta, a estarem
DSDUWDGDV GR XVR GR FRPSXWDGRU H GDV UHGHV LQIRUPDFLRQDLV 6,/9(,5$  
3RUWDQWRRVKDFNHUVHRVDFDGrPLFRVTXHFRQVWLWXtUDPDVSULPHLUDVFRPXQLGDGHV
GHVRIWZDUHOLYUHTXHIRPHQWDUDPDHVIHUDS~EOLFDLQLFLDOPHQWHKDFNHUSHUWHQFLDP
HPJHUDOjVFDPDGDVPpGLDVGHVHXVSDtVHV7HUFHLURD¿UPDUTXHDVFDPDGDV
médias constituem o locus onde se recrutam os desenvolvedores da cultura e da
WHFQRORJLDFRPSDUWLOKDGDVEHPFRPRRVDWLYLVWDVGDOLEHUGDGHGRFRQKHFLPHQWR
QmRDVVHJXUDQDVRFLHGDGHGDLQIRUPDomRXPYtQFXORGHDGHVmRGHVHXVLQWHJUDQ
WHVjVLGHLDVDQWLSURSULHWiULDVQHPUHGX]DVSRVVLELOLGDGHVGHPHPEURVGHRXWUDV
FODVVHVHFDPDGDVVRFLDLVSRGHUHPDGHULUjVHOXWDUSHODVLGHLDVGHVXSHUDomRGR
PRGHORKHJHP{QLFRGHSURSULHGDGH4XDUWRTXDQWRPDLVDV21*VHRV(VWDGRV
DEUDP HVSDoR SDUD D LQFOXVmR GLJLWDO GDV FODVVHV SDXSHUL]DGDV QD VRFLHGDGH
LQIRUPDFLRQDOPDLVDWLYLVWDVGHVVHVVHJPHQWRVSRGHUmRLQWHJUDUVHDRPRYLPHQWR
pelo compartilhamento do conhecimento.
 3RUWDQWRpSRVVtYHOFRQFOXLUTXHRHOHPHQWRFRQGXWRUGDVWUDQVIRUPDo}HV
SURIXQGDVTXHSRGHPVXUJLUGDVXSHUDomRGRPRGHORKHJHP{QLFRGHSURSULHGDGH
GDV LGHLDV VmR DV RUJDQL]Do}HV SULQFLSDOPHQWH DV 21*V H DV FRPXQLGDGHV
colaborativas, em que se destaca o movimento de software livre) e os indivíduos
TXHGHIHQGHPDOLEHUGDGHFRPRRHOHPHQWRFKDYHSDUDDFULDomRHPJHUDOSDUDD
GHIHVDGHGLUHLWRVSDUDDJHUDomRGHYDORUHSDUDRGHVHQYROYLPHQWRHFRQ{PLFR
A liberdade do conhecimento viabiliza tanto a formação de uma esfera
pública no ciberespaço quanto a distribuição mais equitativa da riqueza dela
RULJLQiULD3RGHPRVFRQFOXLUTXHRPRGHORKHJHP{QLFRGDSURSULHGDGHGDVLGHLDV
p LQH¿FLHQWH H SRU HVVH PRWLYR GL¿FLOPHQWH SRGHUi VXVWHQWDUVH D ORQJR SUD]R
H[FHWR SHOR HQULMHFLPHQWR GDV Do}HV GR (VWDGR FRQWUD DV SUiWLFDV FRODERUDWLYDV
7RGDYLD HVVHV DUWL¿FLDOLVPRV DOpP GH DWHQWDUHP FRQWUD D OLEHUGDGH Vy SRGHP
DGLDURDYDQoRGRFRPSDUWLOKDPHQWRSRLVHVWHpLQHUHQWHjFRPXQLFDomRPHGLDGD
por computador.
A liberdade do conhecimento tende a crescer politicamente, fundamental-
PHQWH SRUTXH p PDLV H¿FLHQWH TXH VXD SULYDWL]DomR$PDUW\D 6HQ WHP XPD SDV
VDJHPHOXFLGDWLYDHPXPDQRWDGHURGDSpGHVHXOLYUR6REUHeWLFDH(FRQRPLD
Software livre, cultura hacker e o ecossistema da colaboração • 261

³DVGXDVSULQFLSDLVGH¿QLo}HVGHH¿FLrQFLDHPSUHJDGDVHPHFRQRPLD
VmR UHVSHFWLYDPHQWH   ³H¿FLrQFLD WpFQLFD´ VHJXQGR D TXDO QmR p
SRVVtYHO JHUDU PDLV GH XP GHWHUPLQDGR SURGXWR VHP SURGX]LU PHQRV
GH DOJXP RXWUR FRQVLGHUDQGR RV LQVXPRV FRPR SURGXWRV QHJDWLYRV 
 ³H¿FLrQFLDHFRQ{PLFD´LGHQWL¿FDGDFRPD³RWLPDOLGDGHGH3DUHWR´
>3DUHWR RSWLPDOLW\@ FRQGLomR QD TXDO QLQJXpP SRGH PHOKRUDU VHX
HVWDGRVHPSLRUDURGHDOJXPDRXWUDSHVVRD´ 6(1 

&RQIRUPHVHEXVFRXGHPRQVWUDUDRORQJRGHVWHWH[WRXPDHFRQRPLDFHQ
WUDGD HP EHQV LPDWHULDLV RX LQWDQJtYHLV p XPD HFRQRPLD GH SURGXWRV VLPEyOLFRV
FXMD FDUDFWHUtVWLFD SULQFLSDO EDVHLDVH QD SRVVLELOLGDGH GH UHSURGXomR LQ¿QLWD SRU
QmR VRIUHU R IHQ{PHQR GD HVFDVVH] VHJXLQGR HP XPD GLUHomR FRQWUiULD j GD
GRXWULQDWUDGLFLRQDOGHSURSULHGDGH&RPSDUWLOKDQGRRVFyGLJRVGHXPVRIWZDUHp
possível criar uma comunidade de desenvolvedores que doam um pouco do seu
HVIRUoR H JDQKDP XP SURGXWR TXH FRQFHQWUD RV HVIRUoRV GH XPD FRPXQLGDGH
de desenvolvedores. Assim, pode-se obter muito mais valor e mais qualidade na
GLVVHPLQDomRGRVFyGLJRVIRQWHGRTXHQRPRGHORIHFKDGRHWtSLFRGDSURSULHGDGH
sobre bens escassos.
 $SULQFLSDOGHIHVDGRPRGHORWUDGLFLRQDOGHSURSULHGDGHGHEHQVWDQJtYHLV
HGHVXDWUDQVSRVLomRSDUDXPDHFRQRPLDGHEHQVLQWDQJtYHLVHVWDULDQDFUHQoDGD
VXDPDLRUH¿FLrQFLDHFRQ{PLFD$RWLPDOLGDGHGH3DUHWRIUDFDVVDDROLGDUFRPEHQV
LQWDQJtYHLV&RPEHQVLPDWHULDLVpSRVVtYHOPHOKRUDURHVWDGRGHDOJXpPVHPSLRUDU
RGHDOJXPDRXWUDSHVVRD,VVRSRUTXHDRFRQWUiULRGHXPEHPPDWHULDOHPTXHR
uso do mesmo não pode ser realizado ao mesmo tempo por dois sujeitos, os bens
imateriais podem ser reproduzidos sem restrição. São abundantes. Nesse sentido,
R³ÏWLPRGH3DUHWR´QDVRFLHGDGHGDLQIRUPDomRGHYHVHUUHHVFULWRHGHVORFDUVH
GRVOLPLWHVGDHVFDVVH]SDUDRVOLPLWHVGDFRODERUDomR,QH¿FLHQWHpXPDVLWXDomR
HPTXHDQmRDJUHJDomRGHFRODERUDGRUHVGHL[DGHJHUDUPDLVLQRYDomRHPDLV
redistribuição de valores pelo sistema e, consequentemente, menos melhoria da
situação de cada um e de todos.
A liberdade para compartilhar e a colaboração em torno do conhecimento
VmR HOHPHQWRV GH¿QLGRUHV GDV VRFLHGDGHV HP UHGH$ EDVH LPDWHULDO H VLPEyOLFD
GHVVDVVRFLHGDGHVH[LJHQRYDVDERUGDJHQVTXHVXSHUHPDTXHODVRULXQGDVGRFRQ
WUROH VREUH EHQV ULYDLV$ LQH¿FLrQFLD GR PRGHOR GH SURSULHGDGH LQWHOHFWXDO KHJH
P{QLFRYDLVHWRUQDQGRHYLGHQWH,VVRUHRUJDQL]DDVXDGHIHVDSROtWLFDUHGX]LQGR
VXDFDSDFLGDGHGHLQÀXHQFLDUDRSLQLmRS~EOLFD6HXVGHIHQVRUHVYmRVHUHVXPLQGR
DRV FDSLWDOLVWDV GDV PHJDFRUSRUDo}HV PRQRSROLVWDV TXH EXVFDP HPSUHJDU
DUWLItFLRVWpFQLFRVHOHJDLVGHH[FOXVmRHEORTXHLRDRFRQKHFLPHQWR3RURXWURODGR
R FRPSDUWLOKDPHQWR GH FyGLJRV YDL JHUDQGR FRODERUDo}HV H¿FLHQWHV RX VHMD GH
262 • Software livre, cultura hacker e o ecossistema da colaboração

JUDQGHYDORUHFRQ{PLFRHTXHSRGHPJHUDUFXVWRVPHQRUHVGHWUDQVDomR6RIWZDUHV
bens essenciais da economia informacional, desenvolvidos de modo colaborativo,
têm seu custo de manutenção distribuído pela enorme malha de desenvolvedores e
interessados em sua continuidade e melhoria. A comunidade injeta valor crescente a
SDUWLUGHVXDVFRUUHo}HVHGDHYROXomRHPUHGH$FRODERUDomREDVHDGDQDOLEHUGDGH
GRFRQKHFLPHQWRDRPHVPRWHPSRGLVWULEXLRVJDQKRVGRDSHUIHLoRDPHQWRSDUD
WRGRV 'HVVH PRGR QD VRFLHGDGH HP UHGH D OLEHUGDGH HVWi JHUDQGR LJXDOGDGH
,VVRHVWiUHFRQ¿JXUDQGRWRGRRHVSHFWURSROtWLFR
Software livre, cultura hacker e o ecossistema da colaboração • 263

Referências

$&+(5 0DUJDUHW 6 7HRULD FXOWXUD H VRFLHGDGH SyVLQGXVWULDO ,Q )($7+(56721( 0LNH RUJ 
Cultura GlobalQDFLRQDOLVPRJOREDOL]DomRHPRGHUQLGDGH3HWUySROLV9R]HV

$/%848(548((GXDUGRGD0RWWD  Informação, conhecimento e apropriaçãoQRWDVVREUH


R VLJQL¿FDGR HFRQ{PLFR GDV SDWHQWHV H RV LPSDFWRV GD HPHUJrQFLD GH XPD HFRQRPLD EDVHDGD QR
FRQKHFLPHQWR 'LVSRQtYHO HP ZZZPGLFJRYEUWHFQRORJLDUHYLVWDVUHYPJKWP $FHVVR HP 
MDQ

$/0(,'$5XEHQV4XHLUR]  3UHVHQWHGH*UHJR,Q'LFDV/8QLFDPSArtigos6LWHKWWSZZZ


GLFDVOXQLFDPSEUDUWLJRVOLQX[SUHVHQWHBGHBJUHJRVKWPl$FHVVRPDL

$1'(5621 %HQHGLFW Comunidades Imaginadas UHÀH[}HV VREUH D RULJHP H D H[SDQVmR GR


QDFLRQDOLVPR3RUWXJDO/LVERD(GLo}HV

$5$Ò-2&DUORV5REHUWR9LHLUDHistória do pensamento econômicoXPDDERUGDJHPLQWURGXWyULD


6mR3DXOR$WODV

$5215D\PRQG$VHWDSDVGRSHQVDPHQWRVRFLROyJLFRHG6mR3DXOR%UDVtOLD0DUWLQV)RQWHV
(GLWRUDGD8QLYHUVLGDGHGH%UDVtOLD

%$5%522. 5LFKDUG Cibercomunismo FRPR RV DPHULFDQRV HVWmR VXSHUDQGR R FDSLWDOLVPR QR
FLEHUHVSDoR'LVSRQtYHOHPKWWSPHPEHUVIRUWXQHFLW\FRPFLEHUFXOWXUDYROFLEHUFRPKWPl$FHVVRHP
VHW

%$5/2: -RKQ  7KH HFRQRP\ RI ,GHDV Wired online  PDU  KWWSZZZZLUHGFRP
ZLUHGDUFKLYHHFRQRP\LGHDVKWPl$FHVVRHPMXO

%(//$0<5LFKDUGLiberalismo e sociedade moderna6mR3DXOR(GXVS %LEOLRWHFDEiVLFD 

%(1./(5<RFKDL  &RDVH¶VSHQJXLQRU/LQX[DQGWKHQDWXUHRIWKH¿UP'LVSRQtYHOHPKWWS


ZZZ\DOHHGX\DOHOM%HQNOHU:(%SGf. Acesso em 18 jan 2005.

%(51(56/(( 7LP   The World Wide Web 3DVW 3UHVHQW DQG )XWXUH KWWSZZZZRUJ
3HRSOH%HUQHUV/HHSSIKWPl. Acesso em 28 nov. 2005.

BOBBIO, Norberto. Direito e Estado no pensamento de Emanuel Kant %UDVtOLD (GLWRUD GD
8QLYHUVLGDGHGH%UDVtOLD

BBBBBBBBBBBBBLocke e o direito natural%UDVtOLD(GLWRUDGD8QLYHUVLGDGHGH%UDVtOLD

BOLAÑO, César. Indústria culturalLQIRUPDomRHFDSLWDOLVPR6mR3DXOR+XFLWHF3ROLV

%85.( 3HWHU 8PD KLVWyULD VRFLDO GR FRQKHFLPHQWR GH *XWHQEHUJ D 'LGHURW 5LR GH -DQHLUR -RUJH
=DKDU(GLWRU
%86+9DQHYDU$VZHPD\WKLQNThe Atlantic Monthly-XO\'LVSRQtYHOKWWSZZZWKHDWODQWLF
FRPGRFEXVh$FHVVRHPMXQ

&$1872 2WDYLDQR 2 HTXLOtEULR JHUDO GH :DOUDV ,Q &$51(,52 5LFDUGR RUJ  Os Clássicos da
Economia,YRO6mR3DXOR(GLWRUDÈWLFD

CASTELLS, Manuel. A sociedade em rede 6mR 3DXOR 3D] H 7HUUD  $ HUD GD LQIRUPDomR
HFRQRPLDVRFLHGDGHHFXOWXUDY 

BBBBBBBBBBBBBB$JDOi[LDGD,QWHUQHWUHÀH[}HVVREUHD,QWHUQHWRVQHJyFLRVHDVRFLHGDGH5LRGH
-DQHLUR-RUJH=DKDU(GLWRU

&+206.<1RDPLinguagem e pensamento3HWUySROLV9R]HV
BBBBBBBBBBBBReglas y representaciones0p[LFR'))RQGRGH&XOWXUD(FRQ{PLFD

&2+(1-HDQ$5$72$QGUHZCivil society and political theory&DPEULGJH0,73UHVV


264 • Software livre, cultura hacker e o ecossistema da colaboração

&2+1*DEULHO$WHRULDGDDomRHP+DEHUPDV,Q&$59$/+20DULDGR&DUPR%UDQWGHTeorias da
Ação em Debate6mR3DXOR&RUWH])DSHVS,QVWLWXWRGH(VWXGRV(VSHFLDLV38&

&2/(0$1*DEULHOOD (+,//%HQMDPLQ7KHVRFLDO SURGXFWLRQ RIHWKLFV LQ 'HELDQ DQG IUHHVRIWZDUH


FRPPXQLWLHV DQWKURSRORJLFDO OHVVRQV IRU YRFDWLRQDO HWKLFV ,Q .2&+ 6WHIDQ HG  Free and Open
Source Development+HUVKH\3HQQ,GHD*URXS

&20(5'(Interligação em Rede com TCP/IP.HG5LRGH-DQHLUR&DPSXVYRO3ULQFtSLRV


3URWRFRORVH$UTXLWHWXUD

&202$GTXLULU/LFHQoDVGH3URGXWR0LFURVRIW$WUDYpVGRV3URJUDPDVGH/LFHQFLDPHQWRSRU9ROXPHGD
0LFURVRIW3XEOLFDGRHPGH0DUoRGH$WXDOL]DGRHPGH0DUoRGHGLVSRQtYHOHP
KWWSZZZPLFURVRIWFRPEUDVLOOLFHQFLDPHQWRFRPRFRPSUDUBYROXPHPVSx .

&580/,6+&KULVWLDQThe power of many: how the living web is transforming politics, business,
and everyday life.86$6DQ)UDQFLVFR6\EH[

'$17$60DUFRV&DSLWDOLVPRQDHUDGDVUHGHVWUDEDOKRLQIRUPDomRHYDORUQRFLFORGDFRPXQLFDomR
SURGXWLYD,Q/$675(60+0$/%$*/, RUJ Informação e globalização na era do conhecimento.
5LRGH-DQHLUR&DPSXV

'$+/5REHUW$Um prefácio à democracia econômica5LRGH-DQHLUR-RUJH=DKDU

',%21$&KULV2&.0$16DP6721(0DUNOpen SourcesYRLFHVIURPWKHRSHQVRXUFHUHYROXWLRQ
6HEDVWRSRO&$2¶5HLOO\

END-USER LICENSE AGREEMENT0LFURVRIW:LQGRZV;33URIHVVLRQDO2EWLGDHPQRVLWH


KWWSZZZPLFURVRIWFRPZLQGRZV[SSURHXODPVSx .

(1*(/6)'HOVRFLDOLVPRXWRSLFRDOVRFLDOLVPRFLHQWL¿FR,QObras Escogidas de Marx y Engels,


7RPR,,0DGULG(GLWRULDO)XQGDPHQWRV

EPSTEIN, Isaac. Cibernética6mR3DXORÈWLFD

(;',5(725$ SRGH VHU GHPLWLGD WUrV PHVHV DQWHV GD DSRVHQWDGRULD Folha On Line 
'LVSRQtYHOHPKWWSZZZIROKDXROFRPEUIROKDEUDVLOXOWXVKl .

)$785$0(172GD0LFURVRIWFUHVFHQRDQR¿VFDO'LVSRQtYHOQRVLWHGD0LFURVRIW
KWWSZZZPLFURVRIWFRPEUDVLOSUIDWXUDB4DVp. Acesso em maio 2005.

FINK, Martin.. The business and economics of Linux and open source. 8SSHU 6DGGOH 5LYHU 1HZ
-HUVH\3UHQWLFH+DOO375

)216(&$ 5HQDWR ,QRYDomR WHFQROyJLFD H R SDSHO GR JRYHUQR Parcerias Estratégicas Q 
GH]HPEUR'LVSRQtYHOHPZZZPFWJRYEU&((UHYLVWDSDUFHULDVSGI

)/<11,GD00F+2(6$QQ0F,YHUIntrodução aos sistemas operacionais6mR3DXOR3LRQHLUD


7KRPVRQ/HDUQLQJ

)25' :DUZLFN %$80 0LFKDHO Secure Eletronic Commerce EXLOGLQJ WKH LQIUDVWUXFWXUH IRU GLJLWDO
VLJQDWXUHVDQGHQFU\SWLRQHG8SSHU6DGGOH5LYHU1HZ-HUVH\3UHQWLFH+DOO

GANDELMAN, Marisa. Poder e conhecimento na economia global 5LR GH -DQHLUR &LYLOL]DomR
%UDVLOHLUD

*$5&,$-XDQWRPiV520(2$OIUHGRLa pastilla rojaVRIWZDUHOLEUHKDFLDODUHYROXFLyQGLJLWDO0DGULG


2SHQ6HUYLFH6/'LVSRQtYHOHPZZZODSDVWLOODURMDQHW$FHVVRHPIHY

GATES, Bill. A estrada do futuro6mR3DXOR&RPSDQKLDGDV/HWUDV

GIDDENS, Anthony. Política, sociologia e teoria socialHQFRQWURVFRPRSHQVDPHQWRVRFLDOFOiVVLFRH


FRQWHPSRUkQHR6mR3DXOR)XQGDomR(GLWRUDGD81(63
Software livre, cultura hacker e o ecossistema da colaboração • 265

GOHN, Maria da Glória. Teorias dos movimentos sociaisSDUDGLJPDVFOiVVLFRVHFRQWHPSRUkQHRV


6mR3DXOR(GLo}HV/R\ROD

*25=$QGUpO imaterialFRQKHFLPHQWRYDORUHFDSLWDO6mR3DXOR$QQDEOXPH

*+26+ HW DO 'HOLYHUDEOH ' ),1$/ 5(3257 3DUW  6XUYH\ RI 'HYHORSHUV )5((/,%5( $1'
23(16285&(62)7:$5(6859(<$1'678'<0DDVWULFKW,QWHUQDWLRQDO,QVWLWXWHRI(FRQRPLFV
8QLYHUVLW\RI0DDVWULFKWDQG%HUOHFRQ5HVHDUFK*PE+"'LVSRQtYHOHPKWWSZZZLQIRQRPLFVQO
)/266UHSRUW)/266B)LQDOSGf

)5,('0$10LOWRQCapitalismo e liberdade6mR3DXOR1RYD&XOWXUDO 2VHFRQRPLVWDV 

*28*+-:7HRULDGH/RFNHVREUHDSURSULHGDGH,Q48,5,12&pOLD*DOYmR6$'(.0DULD7HUH]D
RUJ O Pensamento Político Clássico0DTXLDYHO +REEHV /RFNH 0RQWHVTXLHX 5RXVVHDX  HG
6mR3DXOR0DUWLQV)RQWHV

*8529,7=+HOLRLinux: o fenômeno do software livre6mR3DXOR(GLWRUD$EULO &ROHomR3DUD


Saber Mais - Super Interessante)

+$%(50$6-XUJHQMudança estrutural da Esfera PúblicaLQYHVWLJDo}HVTXDQWRDXPDFDWHJRULDGH


VRFLHGDGHEXUJXHVD5LRGH-DQHLUR7HPSR%UDVLOHLUR

+$%(50$6 -XUJHQ  Técnica e ciência como ideologia /LVERD (GLo}HV   %LEOLRWHFD GD
)LORVR¿D&RQWHPSRUkQHD 

BBBBBBBBBBBBBBB  Direito e democracia HQWUH IDFWLFLGDGH H YDOLGDGH YROXPH ,, 5LR GH -DQHLUR
7HPSR%UDVLOHLUR

BBBBBBBBBBBBBBB  Teoría de la acción comunicativa ,, FUtWLFD GH OD UD]yQ IXQFLRQDOLVWD 0DGULG
6DQWLOODQD(GLFLRQHV6$
BBBBBBBBBBBBBBBConsciência moral e agir comunicativo5LRGH-DQHLUR7HPSR%UDVLOHLUR

HACKING, Ian. 3RUTXHDOLQJXDJHPLQWHUHVVDj¿ORVR¿D"6mR3DXOR(GLWRUD81(63

+$5$:$<'RQQD-0DQLIHVWRFLERUJXHFLrQFLDWHFQRORJLDHIHPLQLVPRVRFLDOLVWDQR¿QDOGRVpFXOR
;;,Q6,/9$7RPD]7DGHX RUJDQL]DGRU Antropologia do CiborgueDVYHUWLJHQVGRSyVKXPDQR
%HOR+RUL]RQWH$XWrQWLFD

+$<(.)ULHGULFK$XJXVW9RQO caminho da servidão5LRGH-DQHLUR%LEOLH[&RRSHUDWLYD

BBBBBBBBBBBBB  (FRQRPLD H FRQKHFLPHQWR ,Q &$51(,52 5LFDUGR RUJ  Os Clássicos da


EconomiaYRO6mR3DXOR(GLWRUDÈWLFD

+(;6(/5REHUWRSoftware Livre&XULWLED'HSDUWDPHQWRGH,QIRUPiWLFDGD8QLYHUVLGDGH)HGHUDOGR
3DUDQi'LVSRQtYHOHPKWWSZZZVRIWZDUHOLYUHJRYEr$FHVVRHP1RY

+,0$1(1 3HNND The hacker ethic D UDGLFDO DSSURDFK WR WKH SKLORVRSK\ RI EXVLQHVV 1HZ <RUN
5DQGRP+RXVH7UDGH3DSHUEDFNV

HONNETH, Axel. Luta por reconhecimentoDJUDPiWLFDPRUDOGRVFRQÀLWRVVRFLDLV6mR3DXOR(GLWRUD




,1*5$0'DYLGHabermas e a dialética da razão%UDVtOLD(GLWRUDGD8QLYHUVLGDGHGH%UDVtOLD

,167,7872'((678'2662&,2(&21Ð0,&26Acordo TRIPSDFRUGRVREUHDVSHFWRVGRVGLUHLWRV
GHSURSULHGDGHLQWHOHFWXDO%UDVtOLD,1(6&

-21(6&KDUOHVIntrodução à teoria do crescimento econômico5LRGH-DQHLUR&DPSRV

.(77/(5 'DYLG +HUEHUW 0DUFXVH D FUtWLFD GD FLYLOL]DomR EXUJXHVD H VXD WUDQVFHQGrQFLD ,Q
&5(63,*1<$QWKRQ\ GH 0,12*8(.HQQHWK 5 RUJ )LORVR¿D3ROtWLFD&RQWHPSRUkQHD %UDVtOLD
(GLWRUDGD8QLYHUVLGDGHGH%UDVtOLD
266 • Software livre, cultura hacker e o ecossistema da colaboração

.817=5ROI/RFNHOLEHUGDGHLJXDOGDGHHSURSULHGDGH,Q48,5,12&pOLD*DOYmR928*$&ODXGLR
%5$1'­2*LOGR RUJ Clássicos do Pensamento Político6mR3DXOR(GXVS

KUHN, Thomas. (VWUXWXUDGDVUHYROXo}HVFLHQWt¿FDVHG6mR3DXOR3HUVSHFWLYD

/$1'2: *HRUJH 3 Hipertexto OD FRQYHUJHQFLD GH OD WHRULD FUtWLFD FRQWHPSRUiQHD \ OD WHFQRORJLD
%DUFHORQD(GLFLRQHV3DLGyV,EpULFD

BBBBBBBBBBBBBTeoria del hipertexto.%DUFHORQD(GLFLRQHV3DLGyV,EpULFD

/$675(6 0DULD +HOHQD 0 $/%$*/, 6DULWD  (FRQRPLD GD LQIRUPDomR GR FRQKHFLPHQWR H GR
DSUHQGL]DGR ,Q /$675(6 0+0 $/%$*/, 6DULWD RUJ  Informação e globalização na era do
conhecimento.5LRGH-DQHLUR&DPSXV

LESSIG, Lawrence. Code and other laws of cyberspace.1HZ<RUN%DVLF%RRNV

BBBBBBBBBBBB  Free culture KRZ ELJ PHGLD XVHV WHFKQRORJ\ DQG WKH ODZ WR ORFN GRZQ FXOWXUH DQG
FRQWUROFUHDWLYLW\1HZ<RUN7KH3HQJXLQ3UHVV

/e9<3LHUUHAs tecnologias da inteligência5LRGH-DQHLUR(GLWRUD &ROHomR75$16 

BBBBBBBBO que é o virtual6mR3DXOR(GLWRUD

BBBBBBBBCibercultura6mR3DXOR(GLWRUD

/2&.(-RKQDois tratados sobre o governo6mR3DXOR0DUWLQV)RQWHV &OiVVLFRV 

/2-.,1(-HDQ. A revolução informacionalHG6mR3DXOR&RUWH]

/21* 5RGHULFN7  The libertarian case against intellectual property rights 'LVSRQtYHO HP
KWWSOLEHUWDULDQQDWLRQRUJDIKWPl$FHVVRMXO

/2685'2 'RPHQLFR Hegel, Marx e a tradição liberal OLEHUGDGH LJXDOGDGH H (VWDGR 6mR 3DXOR
(GLWRUD81(63

/<0$13HWHU2GHEDWH³8&&%´ 8&,7$ HDVRFLRORJLDGD(UDGD,QIRUPDomR'DWD*UDPD=HUR" -


Revista de Ciência da Informação  Q  IHY 'LVSRQtYHO HP KWWSZZZGJ]HURRUJIHY$UWB
htm. Acesso 15 jan. 2005.

0&+8*+-RVK6WRUPLQJ5HGPRQG,QThe Firefox Explosion:LUHGIHYS

0$&3+(5621&%  Teoria política do individualismo possessivo de Hobbes até Locke.


5LRGH-DQHLUR3D]H7HUUD &ROHomR3HQVDPHQWR&UtWLFRY 

0$5&86( +HUEHUW  Tecnologia, guerra e fascismo  'RXJODV .HOOQHU HGLWRU  6mR 3DXOR (GLWRUD
81(63 %LEOLRWHFDEiVLFD 
0$57,1,5HQDWR&ULSWRJUD¿DHFLGDGDQLDGLJLWDO5LRGH-DQHLUR(GLWRUD&LrQFLD0RGHUQD

0$57Ë1%$5%(52-HVXV*OREDOL]DomRFRPXQLFDFLRQDOHWUDQVIRUPDomRFXOWXUDO,Q025$(6'rQLV
GH RUJ Por uma outra comunicaçãoPtGLDPXQGLDOL]DomRFXOWXUDOHSRGHU5LRGH-DQHLUR5HFRUG


MASKUS, Keith E. Intelectual property rights in the global economy.:DVKLQJWRQ'&,QVWLWXWHIRU


International Economics, 2000.

0$77(/$57$UPDQGHistória da sociedade da informação6mR3DXOR(GLo}HV/R\ROD

0$7726 3DWUtFLD &DVWUR A sociologia política do reconhecimento DV FRQWULEXLo}HV GH &KDUOHV
7D\ORU$[HO+RQQHWKH1DQF\)UDVHU7HVHGHGRXWRUDGRGHIHQGLGDQD81%%UDVtOLD

0$<&KULVWRSKHUA global political economy of intellectual property rightsWKHQHZHQFORVXUHV"


/RQGRQDQG1HZ<RUN5RXWOHGJH
Software livre, cultura hacker e o ecossistema da colaboração • 267

0e=$526,VWYDQPara além do capital6mR3DXOR%RLWHPSR(GLWRULDO

022'< *O\Q Rebel code LQVLGH /LQX[ DQG RSHQ VRXUFH UHYROXWLRQ 1HZ <RUN 3HUVHXV 3XEOLVKLQJ
2001.

081',(&UDLJ2PRGHORGRVRIWZDUHFRPHUFLDORevista do Governo Eletrônico da Prefeitura de


São Paulo. Q  'H]  'LVSRQtYHO HP KWWSZZSUHIHLWXUDVSJRYEUUHYLVWDQFUDLJBPXQGLH
asp$FHVVRHPQRY

NASCIMENTO, Ana Lúcia do. Software brasileiro tem competitividade reconhecida pelo MIT.
0LQLVWpULRGD&LrQFLDH7HFQRORJLD'LVSRQtYHOHPKWWSZZZVRIWH[EUFJLFJLOXDH[HV\V
VWDUWKWP"LQIRLG  VLG  .

7+(1$7,21$/$&$'(0<2)6&,(1&(6The digital dilemmaLQWHOOHFWXDOSURSHUW\LQWKHLQIRUPDWLRQ


DJH:DVKLQJWRQ'&1DWLRQDO$FDGHP\3UHVV

1<(-RVHSK6O paradoxo do poder americano3RUTXHD~QLFDVXSHUSRWrQFLDGRPXQGRQmRSRGH


SURVVHJXLULVRODGD6mR3DXOR(GLWRUD81(63

2¶68//,9$10DXUHHQThe Linux operating systemDVRFLROHJDOVWXG\$WKHVLVVXEPLWWHGLQIXO¿OPHQW


RIWKHUHTXLUHPHQWVIRUWKHGHJUHHRI//0E\5HVHDUFK8QLYHUVLW\RI:DUZLFN6FKRRORI/DZ6HSWHPEHU
2001.

3(,5$12 0DUWD 8*$57( 'DYLG GH Richard Stallman VRIWZDUH OLYUH QmR p SHOD GLUHLWD QHP SHOD
HVTXHUGD /LQX[ /RJLF 'LVSRQtYHO HP   KWWSZZZJHRFLWLHVFRP&ROOHJH3DUN8QLRQGLUHLWDB
esquerda.html$FHVVRHPGH]

3(5(16%UXFH7KHRSHQVRXUFHGH¿QLWLRQ,Q',%21$&KULV2&.0$16DP6721(0DUN RUJ 
Open sourcesYRLFHVIURPWKHRSHQVRXUFHUHYROXWLRQ6HEDVWRSRO&$2¶5HLOO\

3(77(5621 /\PDQ 5D\   &RS\ULJKW LQ KLVWRULFDO SHUVSHFWLYH 1DVKYLOOH 9DQGHUELOW 8QLYHUVLW\
Press.

32&2&. -*$ /LQJXDJHQV GR LGHiULR SROtWLFR 6mR 3DXOR (GLWRUD GD 8QLYHUVLGDGH GH 6mR 3DXOR
 &OiVVLFRV 

5$1*(/5LFDUGRPassado e futuro da era da informação5LRGH-DQHLUR1RYD)URQWHLUD

5$<021'(ULF6The cathedral and the bazaarPXVLQJVRQ/LQX[DQG2SHQ6RXUFHE\DQDFFLGHQWDO


UHYROXWLRQDU\5HYLVLWHG(GLWLRQ6HEDVWRSRO&$2¶5HLOO\ $VVRFLDWHV,QF

BBBBBBBBBBBBBB  7KH MDUJRQ ¿OH 'LVSRQtYHO HP KWWSZZZFDWERUJaHVUMDUJRQKWPOLQGH[KWPl.


Acesso em 25 jan. 2005.

5((9($QGUHZ The theory of property EH\RQG SULYDWH YHUVXV FRPPRQ SURSHUW\ ,Q +(/' 'DYLG
RUJDQL]DGRU 3ROLWLFDOWKHRU\WRGD\&DOLIRUQLD6WDQIRUG8QLYHUVLW\3UHVV

5(=(1'(3HGUR$QWRQLR'RXUDGRGHSapos piramidais nas guerras virtuais(SLVyGLR,SDUDGR[RV


GD SURSULHGDGH LQWHOHFWXDO H GD VHJXUDQoD FRPSXWDFLRQDO 3DOHVWUD SURIHULGD QR ,,, 6HPLQiULR GH
6HJXUDQoDQD,QIRUPiWLFD,QVWLWXWR7HFQROyJLFRGD$HURQiXWLFD6mR-RVpGRV&DPSRV63
'LVSRQtYHOHPKWWSZZZFLFXQEEUGRFHQWHVSHGURWUDEVVVLKWm$FHVVRHPGH]

5+(,1*2/'+RZDUGComunidade virtual/LVERD*UDGLYD &LrQFLD$EHUWD 

5,%(,52*XVWDYR/LQV&XOWXUDHSROtWLFDQRPXQGRFRQWHPSRUkQHR%UDVtOLD(GLWRUDGD8QLYHUVLGDGH
de Brasília, 2000 (a).

BBBBBBBBBBBBBBBBB 3ROtWLFD FLEHUFXOWXUDO DWLYLVPR SROtWLFR j GLVWkQFLD QD FRPXQLGDGH WUDQVQDFLRQDO


LPDJLQDGDYLUWXDO ,Q $/9$5(= 6RQLD ( '$*1,12 (YHOLQD (6&2%$5 $UWXUR RUJDQL]DGRUHV 
Cultura e política nos movimentos sociais latino-americano%HOR+RUL]RQWH(GLWRUD8)0*
(b).

5,%(,52)UDQFLVFR&DUORVHayek e a teoria da informação6mR3DXOR$QQDEOXPH


268 • Software livre, cultura hacker e o ecossistema da colaboração

526(/,12 -RVp (GXDUGR  Relatório Setorial Preliminar 6HWRU GH 6RIWZDUH ),1(3 
'LVSRQtYHO QR VLWH KWWSZZZ¿QHSJRYEU3RUWDO'33UHODWRULRBVHWRULDO/ LPSUHVVDRBUHODWRULRDVS"OVWB
VHWRU $FHVVRHPIHY

SAMUELSON, Paul. Introdução à análise econômica 5LR GH -DQHLUR /LYUDULD $JLU (GLWRUD YRO ,


6$<-HDQ%DSWLVWHTratado de economia política6mR3DXOR1RYD&XOWXUDO 2V(FRQRPLVWDV 

6&+1(,(5%UXFHSecrecy, security, and obscurity'LVSRQtYHOHPKWWSZZZVFKQHLHUFRPFU\SWR


JUDPKWPO1. Acesso em 28 mar 2005.

6&+2/=(6LPRQH+&RVVHWLQPatentes, transgênicos e clonagemLPSOLFDo}HVMXUtGLFDVHELRpWLFDV


%UDVtOLD(GLWRUDGD8QLYHUVLGDGHGH%UDVtOLD

SEN, Amartya. Sobre ética e economia6mR3DXOR&RPSDQKLDGDV/HWUDV

BBBBBBBBDesenvolvimento como liberdade6mR3DXOR&RPSDQKLDGDV/HWUDV

6+$3,52 &DUO 9$5,$1 +DO 5  A economia da informação FRPR RV SULQFtSLRV HFRQ{PLFRV VH
DSOLFDPjHUDGD,QWHUQHW5LRGH-DQHLUR&DPSXV

6,(%(1(,&+/(5)OiYLR%HQRJurgen HabermasUD]mRFRPXQLFDWLYDHHPDQFLSDomR5LRGH-DQHLUR
7HPSR%UDVLOHLUR

6,/9$$GDLOWRQ-62TXHYDLPXGDUQDVXDYLGDFRPR,3Y,QNews Generation, Boletim bimestral


VREUH WHFQRORJLD GH UHGHV HOHWU{QLFD 513 Y Q  MXQ GH  KWWSZZZUQSEUQHZVJHQDVFLL
n2.txt. Acesso em 18 jan. 2005.

6,/9(,5$6pUJLR$PDGHXPoder no ciberespaçoR(VWDGRQDomRDUHJXODPHQWDomRHRFRQWUROHGD
Internet. Dissertação (Mestrado em Ciência Política) USP, São Paulo, 2000.

BBBBBBBBBBBBBBBBBBBExclusão digitalDPLVpULDQDHUDGDLQIRUPDomR6mR3DXOR(GLWRUD3HUVHX
Abramo, 2001.

BBBBBBBBBBBBBBBBBBBB Software livreD OXWD SHOD OLEHUGDGH GR FRQKHFLPHQWR 6mR 3DXOR (GLWRUD
3HUVHX$EUDPR &ROHomR%UDVLO8UJHQWH 

SIMON, Imre. A propriedade intelectual na era da Internet 'LVSRQtYHO KWWSZZZLPHXVSEUaLV


papir/direitos/index.html$FHVVRHPGH]

SOFTEX. O impacto do software livre e de código aberto na indústria de software do Brasil.


&DPSLQDV6RIWH[

67$/,1-RVHIEm marcha para o socialismo6mR3DXOR(GLWRUD4XLORPER

67$//0$1 5LFKDUG Free software free society VHOHFWHG HVVD\V RI 5LFKDUG 6WDOOPDQ (GLWHG E\
-RVKXD*D\86$%RVWRQ*183UHVV

6721( $OOXFTXqUH 5RVDQQH 9LUWXDO 6\VWHPV ,Q &5$5< -RQDWKDQ .:,17(5 6WDQIRUG (G 
Incorporations1HZ<RUN=RQHS

67,*/,7=-)850$1-  86YV0LFURVRIWGHFODUDWLRQRI-RVHSK(6WLJOLW]DQG-DVRQ)XUPDQ


DVSDUWRIWKH7XQQH\$FW3URFHHGLQJCommissioned by the Computer & Communications Industry
Association -DQXDU\   'LVSRQtYHO HP KWWSZZZVEJRFRP3DSHUVWXQQH\BMHVMISGf. Acesso
HPGH]

6725<$ODQ 'RQ¶W LJQRUH FRS\ULJKW WKH ³VOHHSLQJ JLDQW´ RQ WKH 75,36 DQG LQWHUQDWLRQDO HGXFDWLRQDO
DJHQGD ,Q '5$+26 3HWHU 0$<1( 5XWK HGV  Global Intellectual Property Rights .QRZOHGJH
$FFHVVDQG'HYHORSPHQW/RQGRQ2[IDP

BBBBBBBBBB,QWHOOHFWXDOSURSHUW\DQGFRPSXWHUVRIWZDUHDEDWWOHRIFRPSHWLQJYLVLRQVIRUFRXQWULHVRI
the south. ICTSD Issue Paper0D\KWWSZZZLSUVRQOLQHRUJXQFWDGLFWVGGRFV&6B6WRU\SGf.
$FHVVRIHY
Software livre, cultura hacker e o ecossistema da colaboração • 269

TAIT, Márcia. Mercado de software cresce na periferia. Revista Com Ciência Q MXQKR 
'LVSRQtYHOHPKWWSZZZFRPFLHQFLDEUUHSRUWDJHQVVKWPl. Acesso em 25 jan. 2005.

7$85,21 &H]DU Software livre SRWHQFLDOLGDGHV H PRGHORV GH QHJyFLRV 5LR GH -DQHLUR %UDVSRUW


TÉCNICOS apontam 18 possibilidades de fraude no painel do Senado. Folha On Line 


'LVSRQtYHOHPKWWSZZZIROKDXROFRPEUIROKDEUDVLOXOWXVKl .

7(55$5LFDUGRA política tensaLGpLDHUHDOLGDGHQD¿ORVR¿DGDKLVWyULDGH.DQW6mR3DXOR)$3(63


(GLWRUD,OXPLQXUDV

7g11,(6 )HUGLQDQG  &RPXQLGDGHV H VRFLHGDGHV FRPR HQWLGDGHV WtSLFRLGHDLV ,Q )(51$1'(6


)ORUHVWDQ RUJ Comunidade e sociedadeOHLWXUDVVREUHSUREOHPDVFRQFHLWXDLVPHWRGROyJLFRVHGH
DSOLFDomR6mR3DXOR(GLWRUD1DFLRQDO(GXVS

7259$/'6/LQXVSó por prazer/LQX[RVEDVWLGRUHVGDFULDomR5LRGH-DQHLUR&DPSXV

78//<-DPHVAn approach to political philosophy/RFNHLQFRQWH[WV&DPEULGJH3UHVV6\QGLFDWH


RIWKH8QLYHUVLW\RI&DPEULGJH

9$,'+<$1$7+$1 6LYD  Copyrights and copywrongs WKH ULVH RI LQWHOOHFWXDO SURSHUW\ DQG KRZ LW
WKUHDWHQVFUHDWLYLW\1HZ<RUN1HZ<RUN8QLYHUVLW\3UHVV

:$//(567(,1,PPDQXHO$FXOWXUDFRPRFDPSRGHEDWDOKDLGHROyJLFRGRVLVWHPDPXQGLDOPRGHUQR,Q
)($7+(56721(0LNH RUJ Cultura GlobalQDFLRQDOLVPRJOREDOL]DomRHPRGHUQLGDGH3HWUySROLV
9R]HV

:(%(56WHYHQ7KHSROLWLFDOHFRQRP\RIRSHQVRXUFHVRIWZDUH%5,(:RUNLQJ3DSHU(FRQRP\
Project TM. Working Paper-XQ

:(%67(5)UDQNTheories of the information society1HZ<RUN5RXWOHGJH

:(,167(,10LFKDHO$&%0DFSKHUVRQDVUDt]HVGDGHPRFUDFLDHGROLEHUDOLVPR,Q$QWKRQ\GH
&UHVSLJQ\ DQG .HQQHWK 5 0LQRJXH RUJ  )LORVR¿D 3ROtWLFD &RQWHPSRUkQHD %UDVtOLD (GLWRUD GD
8QLYHUVLGDGHGH%UDVtOLD

:+((/(57RP)O manual dos sistemas abertos5LRGH-DQHLUR&DPSXV

WILLIAMS, Sam. Free as in freedom:5LFKDUG6WDOOPDQ¶VFUXVDGHIRUIUHHVRIWZDUH6HEDVWRSRO&$


2¶5HLOO\

:211$&2773DXO 5RQDOG&586,86<HGD &DUORV$XJXVWREconomia6mR3DXOR0DF*UDZ+LOO


GR%UDVLO

Sites consultados

$6/KWWSVRIWZDUHOLYUHRUJ
%86,1(6662)7:$5($//,$1&(KWWSZZZEVDRUJFRXQWU\DVS[
&RPS7,$KWWSZZZFRPSWLDRUJ
'HELDQKWWSZZZGHELDQRUJ
)6)KWWSZZZIVIRUJ
*18KWWSZZZJQXRUJ
,QLWLDWLYHIRU6RIWZDUH&KRLFHKWWSZZZVRIWZDUHFKRLFHRUJ
0LFURVRIWZZZPLFURVRIWFRP
6RXUFH)RUJHKWWSVRXUFHIRUJHQHW
5$878KWWSZZZUDXWXXQLFDPSEUFRPXQLGDGHBUDXWXKWPO
270 • Software livre, cultura hacker e o ecossistema da colaboração
Software livre, cultura hacker e o ecossistema da colaboração • 271

Debate e discussões
interativas

Com intuito de permitir um diálogo aberto que proporcione o amadurecimento


da temática abordada nesse livro, convidamos você - leitor(a) - para acessar e par-
ticipar da construção do site interativo desse livro, por meio endereço eletrônico:

http://softwarelivre.org/livro

Nesse ambiente de interação on-line você pode colaborar na continuação


das pesquisas sobre essa temática, acrescentar novas informações e resultados de
outras pesquisas, como também participar de debates (assíncronos) com os auto-
res sobre o conteúdo apresentado ao longo de todos os capítulos e sessões desse
livro. Nos encontramos por lá.
272 • Software livre, cultura hacker e o ecossistema da colaboração

You might also like