I don’t think it’s accurate to say that everyone can just decompile the code and reuse it. Decompiling and reverse engineering a binary is incredibly hard. Even if you do that there are some aspects of the original code which get optimised out in the compiler and can’t be reproduced from just the binary.
- 0 Posts
- 11 Comments
The GPL uses copyright because it’s the legal mechanism available to enforce the principles that the GPL wants to enforce. It’s entirely consistent to believe that copyright shouldn’t exist while also believing that a law should exist to allow/enforce the principles of the GPL.
I don’t think anyone but you ever said he was irrelevant, or bragged about not knowing who he was. You’re extracting a ton of meaning to a short comment which I just don’t think is actually there
https://socialblade.com/youtube/handle/asmontv says there’s over thousand youtube channels with more subscribers than him. He might well be large & influential in his niche, but it’s unlikely that people outaide his niche will know who he is. Do you think you’ve heard of 1,000 biggest youtubers whose channels aren’t about things you’re interested in?
Pewdiepie, by comparison, is the 12th most subscribed channel on youtube. I think you’re underestimating how much more famous that makes him with the general public.
The email address attached to the public key, eng@eightsleep.com, to me suggests the private key is likely accessible to the entire engineering team.
This assumption is doing a lot of heavy lifting in the authors argument that this is a big deal.
CosmicGiraffe@lemmy.worldto
Showerthoughts@lemmy.world•You could probably get electrical energy that is needed to run a gym (lights, accountant pc, vending machine) if you just install generators in all of this gym's exercise equipment
38·10 months agoHere’s an Olympic sprinter powering a toaster. He generates 0.021kWh going flat out: https://youtu.be/S4O5voOCqAQ
CosmicGiraffe@lemmy.worldto
Privacy Guides@lemmy.one•DivestOS ends developmentEnglish
115·11 months agoIt’s a quite entitled view to take that they should make an effort to pass the project on. It would be very hard to build sufficient trust in a new developer quickly, and passing it on without that trust would be undermining the trust that users of the projects have placed in this dev. If I were him, I wouldn’t be staking my reputation on finding someone to take over from me if there wasn’t already an obvious candidate.
The successful fundraiser you mention looks to have had a target of $12k USD (from: https://discuss.techlore.tech/t/divestos-is-unsustainable-needs-community-support-we-sent-250-and-you-can-help-too/6660, the original page has been taken down), and was as a alternative to them taking a full time job. I’d say its a reasonable bet that money was spent on living expenses, and IMO $12k a year is much less than this level of skilled work is worth. It’s certainly not enough money to make it unreasonable to shut down the project a year later, and I doubt anyone who donated feels shortchanged by it.
CosmicGiraffe@lemmy.worldto
Linux@lemmy.ml•How grep with -e (regex) `/log/messages` ? [ solved ]
4·1 year agoIt’s marked solved, but since OP didn’t post the solution:
-euses basic regular expressions, where you need to escape the meta-characters ((|)) with a backslash. Alternatively, use extended regex with-E$ echo a | grep -E "(a|b)" a $ echo a | grep -e "\(a\|b\)" a $ echo a | grep -e "(a|b)" $ echo a | grep -E "\(a\|b\)"
CosmicGiraffe@lemmy.worldto
Linux@lemmy.ml•Any suggestions for cheap but decent laptops for coding?
2·1 year agoThe x390/x280 are the same era as these but smaller, so might be a better fit here. The X390 has soldered RAM though, so I’d look for the 16GB version if you can find it (there’s not much of a price difference used)
CosmicGiraffe@lemmy.worldto
Linux@lemmy.ml•Privacy DNS Chooser Script v1.0 "Snow Breeze"
4·2 years agoDNS = Domain Name System. This is used to lookup an IP address (e.g. 123.234.54.32) from a domain name (e.g. lemmy.ml). A DNS query is one of the first things your computer does when you visit a site.
Plain DNS is unencrypted, which means that anyone with the ability to read your requests (e.g. your ISP) can see the names of sites that you’re visiting.
TLS = Transport Layer Security. This is a protocol that’s used to create an encrypted connection between your device and another one, in this case the DNS server. When this is used, the content of your DNS requests is hidden. Your ISP can still see that you’re talking to the DNS server, but not what you’re saying to it.
TLS also allows your device to cryptographically verify the identity of the DNS server. Without it, someone with the ability to modify your connection could change the responses from the DNS server. That would allow them to send you back the IP address of a server they control, rather than the real servers IP.



They tested using a green light for the front brake light, not a red one