Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Predicted long ago by GPLv3 (Score 1) 102

Way back then, when GPLv3 was veing written, this scenario was already had in consideration. We needed stronger copyleft for the online world of cloud services, and that was something Affero GPL and GPLv3 addressed.

But all the "business savvy" open source advocates made it hard to reach a consensus (they did not want the closure of the loopholes), instead they caused a bit of FUD chaos and then proceeded to have a strong impulse of new cloud oriented software that went all the way opposite the GPLv3 and in fact opened MORE loopholes, hence the strong investment into MIT, Apache 2, and other less strong free software licenses.

This way, they could make proprietary versions (and many companies went the proprietary relicensing bait and switch model of "open core") or turn software proprietary for all practical effects by having it used in cloud services (without the additional requisites addressed by GPLv3) without a "download me" recourse.

Nothing good ever comes from "there's a problem, instead of fixing it let's add more complexity".

And adding contracts to free software... IMHO, is an epitome of that.

Comment The goal is quite clear at the end of the page... (Score 1, Informative) 186

The goal is quite clear at the end of the page, and it's one of replacing the GNU GPL (sort of like a constitution) with a license that allows the commons to be reduced.

"uutils is licensed under the MIT License - see the LICENSE file for details
GNU Coreutils is licensed under the GPL 3.0 or later."

Comment DNS is (usually) not available behind proxy, (Score 1) 97

Many browsers reside behind http proxies. Unless they are also using DoH and assuming that is not blocked for some fascist-like reason or another, you'd basically be crippling the browsing experience.

DNS is not really a good solution for this, but (stapled) OCSP might be, even if not without it's flaws).

Submission + - Google quietly makes "optional" web DRM mandatory in Chrome 2

JustAnotherOldGuy writes: The World Wide Web Consortium's Encrypted Media Extensions (EME) is a DRM system for web video, being pushed by Netflix, movie studios, and a few broadcasters. It's been hugely controversial within the W3C and outside of it, but one argument that DRM defenders have made throughout the debate is that the DRM is optional, and if you don't like it, you don't have to use it. That's not true any more. Some time in the past few days, Google quietly updated Chrome (and derivative browsers like Chromium) so that Widevine (Google's version of EME) can no longer be disabled; it comes switched on and installed in every Chrome instance. Because of laws like section 1201 of the US Digital Millennium Copyright Act (and Canada's Bill C11, and EU implementations of Article 6 of the EUCD), browsers that have DRM in them are risky for security researchers to audit. These laws provide both criminal and civil penalties for those who tamper with DRM, even for legal, legitimate purposes, and courts and companies have interpreted this to mean that companies can punish security researchers who reveal defects in their products.

Comment Re:Hmmm... (Score 1) 159

At least where I live (Israel), most (but not all) criminal charges require a "criminal intent" component. You cannot be charged with murder if you did not intend anyone killed (but can be charged with man slauter, as that one doesn't require criminal intent).

US law used to recognize Mens Rae (guilty mind) as a necessary component for a criminal conviction. However, the War On Drugs has given rise to the predominance of strict liability in criminal law (whereas it was formerly confined primarily to civil law).

Comment Re:that's not even wrong... (Score 1) 250

The whole point of the Thompson hack is that it would survive a source code audit. If you compiled the clean source for the compiler with a dirty compiler, it would insert the backdoor into the new executable, making it self-replicating in an virtually undetectable fashion. The code you compiled yourself would be byte-for-byte identical with the bootstrap compiler.

Slashdot Top Deals

"If value corrupts then absolute value corrupts absolutely."

Working...