That only works if the main reason someone uses Linux is personal privacy.
That only works if the main reason someone uses Linux is personal privacy.
The biggest issue is that there isn’t a universal agreement on what causes harm. There is agreement on the basics - murder, violence, etc - but they’re already illegal anyways, no need to ban them by license.
Because FOSS shouldn’t add burdens. You publish your work and let everyone else use it. That shouldn’t add extra obligations on you. Usually, you’d also write some docs - after all, without them nobody will know how to use your program, so why bother publishing - but it shouldn’t be an obligation. Make it easy for people to open up their code without this attaching strings.
Documentation is nice, but it’s kind of different thing that open source: a program can be open and undocumented, or closed but well documented - and I don’t see why we’d want it different for models.
A bunch of these columns are outright absurd TBH, to the extend I’m not sure the author really knows what FOSS is about. What’s open API access even supposed to be - API access is closed by definition.
Also there has never been a requirement that open source software needs to be documented - and for good reason - so I’m not a fan of the documentation column as well.
However, it also uses halium and libhybris. That means you can’t just install your favourite distro and upstream tools. Everything that needs GPU acceleration needs to be patched for libhybris. For example, that means no upstream wlroots - and the latest patched version I think is 0.12 or so.
Actually, no, this seems to work on a very different principle.
Not really. It seems to use a very different technology from termux.
15 hours for what period of time? The article mentions they’d refill in two days…
I’m somewhat skeptical. What if LetsEncrypt decided to misbehave tomorrow? Would the browsers have the guts to shut it down and break all sites using it?
It seems to me like a MITM hacker can just redirect all requests to a Blockchain node towards their malicious node.
Actually, that’s not quite as clear.
The conventional wisdom used to be, (normal) porn makes people more likely to commit sexual abuse (in general). Then scientists decided to look into that. Slowly, over time, they’ve become more and more convinced that (normal) porn availability in fact reduces sexual assault.
I don’t see an obvious reason why it should be different in case of CP, now that it can be generated.
How do you declaratively apply the configuration? Is that a feature of Kvaesitso?
Good point. I’d try to grep for something like [Bb3][Ee3]g[Ii1][nη]\w+<and so on>
but I just know I’ll miss something
Oh, in that case we don’t need to read either - just run a simple grep!
Finally, presumably if anyone added some malicious code in a their program, it would be sneaky and not obvious from quickly reading the code.
AI that can auto generate all those command line arguments I keep forgetting? Sure.
Closed source terminal that requires account? No way.
Because it’s not a very easy case. In fact, there is no real case.
Because judges are people, not robots mindlessly applying legislation. To succeed in such case you need the judges on the trial and all appeals to all decide to maliciously comply with the law.
We had Ansible, containers, ZFS and BTRFS that provided all the required immutability needed already but someone decided that is is time to transform proven development techniques
Just so you know, NixOS is older than all of these, actually. And for that matter, no less flexible.
They are major concerns, but they aren’t the only reasons people would use Linux, and also not everyone who uses Linux does it for these reasons. For example, while I care about them, my most important reason for using it is utility features such as my tiling WM.