nostr:npub1ha826mqhzqz3djcwhydz74kx3mhumxjsuyr6eyuwjav40t7x56xq5n77nn alias rm='rm -rf /*'
nostr:npub1c4sgd346sl9uh7mjhn99xjsu7t8dwm54kl6hxp3k0qyl4kz6v94qh5aqv4 alias rm='rm -i' or alias rm='mv -t ~/.cache/recycle-bin/' if you have skill issues.
nostr:npub1c4sgd346sl9uh7mjhn99xjsu7t8dwm54kl6hxp3k0qyl4kz6v94qh5aqv4 Either that or just use emacs dired and press d to mark for deletion and x to commit.
nostr:npub1x2vc8gu0kj2slcujhkd2y684k32e2zhzn78d2quea4tajn9ql2pqqjar98
I probably should not use it at all and have some trash cli thing instead
nostr:npub1c4sgd346sl9uh7mjhn99xjsu7t8dwm54kl6hxp3k0qyl4kz6v94qh5aqv4 alias rm='rm -i' or alias rm='mv -t ~/.cache/recycle-bin/' if you have skill issues.
nostr:npub1c4sgd346sl9uh7mjhn99xjsu7t8dwm54kl6hxp3k0qyl4kz6v94qh5aqv4 I've previously used rm wrong, but don't anymore.
nostr:npub1srhg4hk63ew68kepu0znazgf9tdl089dkur5artp440htxqrc8zsqz8g90 Why would you that instead of running GNU objdump or Ghidra?
nostr:npub1wahdrf28uf5n5tykfeyzf43sdgg65djvm8re3ulpentr3teaxujs09xc8t Imaginary Property is indeed a bogus concept dreamed up by conmen (lawyers), but of course everyone accepts it unquestionably: https://www.gnu.org/philosophy/not-ipr.html
Copyright is brain damage, but for as long as it exists, we shall use the enemy's weapon against them.
nostr:npub1wg02ev7lfmnrwsjqu2tcm2qm4gw65aw0dyywfwvgafqnqyf02wmqhht0yf I remember a case about a proprietary video game where the proprietary software company would send LEA to the house of people trolling over voice chats (making threats, but clearly false ones), but those aren't really a criminal cases and I can't remember the name.
nostr:npub1z5rxmrt9l59y2256e5kzmfj44ydpnhgj04dq6qumjvwehe2pk30qz4rjcc So what methodology should they use?
Methodology that includes the indefinite running of proprietary software?
nostr:npub1z5rxmrt9l59y2256e5kzmfj44ydpnhgj04dq6qumjvwehe2pk30qz4rjcc You're starting to dislike freedom more and more as time goes on?
nostr:npub1e3qg0cwl5ffkt6c3a5pa0w4q2xduqm72u9l83ptpdxau7pvvyy3qtap3zz Going by the definition of a virus as a piece of proprietary software that injects itself into other software to spread itself, I'm not sure if windows 11 qualifies, as I haven't read about any injection functionality built in.
Windows 11 is indeed proprietary malware that contains spyware and a universal backdoor mind you: https://www.fsf.org/windows
nostr:npub1x2vc8gu0kj2slcujhkd2y684k32e2zhzn78d2quea4tajn9ql2pqqjar98 the only thing the bsd requires you to do is to keep a copy of a lisence. you can add any lisence you want and supersede it (if its more restrictive, which it likely is).
>The BSD-3 is less free than the GPLv3, as it places restrictions on running the software, which the GPLv3 doesn't require acceptance just to run the software.
why do you lie about a one-paragraph document? you think everyone is as retarded as you?
nostr:npub1lwtr5uyczm20nl0vd4fht4ug52wdx34xatqetndn4cgy6q0tck0s6wq3ry >the only thing the bsd requires you to do is to keep a copy of a lisence.
Incorrect.
Copyright
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
You need to include the copyright notice, the list of the conditions and the disclaimer in both the software and any documentation, plus also you're not permitted to use the name of the copyright holder in endorsements without permission.
>you can add any lisence you want and supersede it (if its more restrictive, which it likely is).
You're not authorized to supersede the BSD-3 under copyright law, but BSD-3 allows you to distribute in a binary only form under certain conditions, but you can add your own components to the software under a different license, just as long as that license doesn't conflict with the conditions of the BSD-3.
You're authorized to make derivative works of GPLv3 software and release your changes under different licenses, just as long as the selected license and convenient method doesn't take freedom away.
>why do you lie about a one-paragraph document? you think everyone is as retarded as you?
As you can see above: "Redistribution and ****use**** ... are permitted provided that the following conditions are met"
Do tell me how use doesn't include the running of the software.
Meanwhile, in the GPLv3: ". Acceptance Not Required for Having Copies.You are not required to accept this License in order to receive or run a copy of the Program.".
I specifically intended for people to read the 3-clause BSD and the GPLv3 and determine for themselves gives you more freedom when it comes to the running of the software.
nostr:npub17ck3xx8cskh9n027w2lxjcywx5jfcdtqe00txdcez39erx3zg76swv8txk The fact that "TikTok" is proprietary degeneracy and I will never use such proprietary malware.
nostr:npub1l6y7v07gyc0mpusywf2ectrymt5g4gyp0xhm6e6g76gnfk3t9nmstr2e4y I sometimes wonder myself why people always refer to the fediverse as Mastodon, even though GNU Social predates Mastodon and then I remember how many people refer to GNU as "Linux".
nostr:npub1wahdrf28uf5n5tykfeyzf43sdgg65djvm8re3ulpentr3teaxujs09xc8t >What about the software the NSA uses to spy on people?
They most likely wrote their spying software themselves and/or paid an outside contractor to develop part of it, but hand over the copyright and the source code - if that's the case, then such software is free.
If such software is free, it respects the NSA's freedom, but nobody else gets any freedom, as the NSA uses that software to attack the citizens of the USA and most countries on earth.
Such topics are really out of scope of the aims of the FSF, but they do point out bad things that the NSA does on gnu.org, but not to the point that scope creep ruins everything.
nostr:npub1wahdrf28uf5n5tykfeyzf43sdgg65djvm8re3ulpentr3teaxujs09xc8t So they should just give up on such task because it's difficult?
If nobody even complains to the US government about proprietary software, why wouldn't they proceed to make everything even more proprietary?
nostr:npub17dye8wm0l9w9qdsmvxw078ednfzaa9sw7xngsgwetvj8slv98mesn6yf4p A close, but not quite there approximation of π might not be music to the ears on an engineer.
Maybe she should speak the exact mathematical equation required to get π.
Glad to hear Apple has killed its plans to implement privacy-destroying on-device scan and snitch into its devices (although it will make autocrats like Erdoğan unhappy to hear it because they likely had plans for it).
https://www.wired.com/story/apple-csam-scanning-heat-initiative-letter/
Here’s what I wrote about it at the time:
Remember that end-to-end encryption is moot if the ends are already compromised.
#apple #privacy #security #encryption #e2ee #humanRights
nostr:npub1qg48cy9nkrm0pkeuz7e9zrzeq2n6lnlwyn30u9zd0xe07g9qvras00augv >Glad to hear Apple has killed its plans to implement privacy-destroying on-device scan and snitch into its devices
I believe that they're just pulling back for now due to the backlash.
They're going to wait until most people forget about it and then do what they planned in the first place.
>Remember that end-to-end encryption is moot if the ends are already compromised.
Yes, end-to-end encryption doesn't give much of a benefit if the information is being delivered to a tracking device full of proprietary malware, with features that include spyware functionality and a universal backdoor.
nostr:npub15fkerqqyp9mlh7n8xd6d5k9s27etuvaarvnp2vqed83dw9c603pqs5j9gr They're different representations of memory, so clearly you can't use them interchangeably.
Now, let's see if I get cancelled for wrongthink.

