Wtf?! No reason to get insulting.
shrugal
No way the Fedora user figured out how to configure partitions in the installer without having to google it at least five times! I've installed Fedora a few times over the years, and that UI still makes no sense to me!
Omg this is comedy gold!
I just watched a video by a German tech magazine the other day, with Fabian Bräunlein (the original researcher) demonstrating a keylogger using the Find My network. It's only 3 days old, so I don't think the main problem is fixed at all.
I think the main concern is how easy and ubiquitous it is, while also being pretty hard to detect. No other transmission method lends itself so perfectly to this kind of attack.
And I wouldn't say it's that unlikely. Every publicly accessible keyboard could be targeted, like in schools or universities. Buy an identical model to those that are used in the computer room, modify it, switch it out, and wait for people to enter their emails and passwords.
Sure no problem
- Definitely. I have a bunch of devices with FF installed, so syncing them makes things much easier, and because it's selfhosted my data stays with me. Although just using Mozilla servers is pretty safe as well, because sync is e2e encrypted. That's not the case for Google sync, so switching from Chrome is the important part.
- You can do that, but afaik it's quite a bit more involved and not really worth it for me. I have a Mozilla account anyway, and the account server doesn't store any more personal data if you use it for syncing. But if you don't want a Mozilla account then it might be a good option.
Replacing Google services with selfhosted or privacy preserving cloud solutions. The biggest one of those was probably switching to Firefox with selfhosted sync server.
The problem is the network effect. It's hard to switch from YT if all your favorite channels and creators are there, but it's also hard for them to switch if all the users are using YT. And because it's many different people we cannot coordinate a simultaneous transition either.
The GPL outlines a bunch of freedoms that you get when somebody distributes software to you. It does not provide any rights to anybody that I have not distributed software to. Is that the loophole?
Imo the loophole is that RH is disrespecting the rights people have under the GPL by threatening negative consequences when they use those rights. E.g. you can't say I have the right to freedom of speech and also break my arm when I do it, just because I can physically speak about whatever I want. Respecting rights includes not punishing someone for using those rights.
Of course technically they are in the right, but imo it still violates the ethos of OSS as I see it.
Does the fact that Red Hat [...] sound like a good direction for the OSS ecosystem? Yes. Yes it does.
I'm not disputing any of that, but it's also not an answer to my argument/question. A bad action is still bad if the same actor also does other good things. As I already said, following the open source rules/ethos in one area doesn't give you a license to break it in another and still call it open source, doesn't matter how big your other contributions are.
shamelessly make exact copies of another product
Making copies of other projects is a core principle of open source, there is absolutely no shame in it. As long as you abide by the rules of the license (e.g. credit the original) you're absolutely fine. That's because usually the creators of OS projects don't do it for the personal benefit, beyond being able to use their own creations. But ...
This sounds attractive and beneficial to you?
Depends on who's prespective you're talking about. For the community as a whole it was very beneficial, but RH as a for-profit company of course wants to make money with the whole endevour. I don't think OSS is the right place to do that (reasons in my previous post), at least not by selling access to the code itself. There are plenty of companies that contribute to OS code while also earning money with services and products surrounding it. I don't see any reason why RH can't do the same, or rather return to doing that.
My NAS does a backup to Synology C2 every night.