They do hate me and mine.
Who is this "They" you are talking about? One thing I find annoying is the ability of people to paint so many other people with such a broad brush. I think you're wrong, and that very few people hate you or yours. People have lots of different policy positions, and a lot of them conflict. I think the majority are interested in advancing them peacefully and in good faith. A minority of extremists get a lot of media coverage, and stir up a lot of trouble. I'm not ready to start a war, or even a fight with those I disagree with, because of media potrayals of extremists.
They did not have a mechanism to revert those and some made it in the stable kernel;
While I agree with your other points, they claim in their paper that they DID have a mechanism to revert any harmful patches, before they were integrated into the mainline kernel.
From the "Ethical Considerations" section on page 8:
Our goal is not to introduce vulnerabilities to harm OSS. Therefore, we safely conduct the experiment to make sure that the introduced UAF bugs will not be merged into the actual Linux code. In addition to the minor patches that introduce UAF conditions, we also prepare the correct patches for fixing the minor issues. We send the minor patches to the Linux community through email to seek their feedback. Fortunately, there is a time window between the confirmation of a patch and the merging of the patch. Once a maintainer confirmed our patches, e.g., an email reply indicating “looks good”, we immediately notify the maintainers of the introduced UAF and request them to not go ahead to apply the patch. At the same time, we point out the correct fixing of the bug and provide our correct patch. In all the three cases, maintainers explicitly acknowledged and confirmed to not move forward with the incorrect patches. All the UAF-introducing patches stayed only in the email exchanges, without even becoming a Git commit in Linux branches. Therefore, we ensured that none of our introduced bugs was ever merged into any branch of the Linux kernel, and none of the Linux users would be affected.
Personally, I think it was very naive to assume that failing to catch these bugs would not be damaging to the maintainers involved. Thus, this study had significant ethical problems. However, they do seem to have made efforts to avoid code damage from their vulnerability-introducing patches. Given this quote from the paper, it is unclear to me how the code that Greg just removed is related to the study.
there are no left wing extremists, violent or otherwise.
You have to be trolling. What about the people who shot up cars (with occupants) in Atlanta and Provo. The guys in Atlanta killed an 8-year-old girl. What is wrong with you? https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fapnews.com%2Farticle%2F914... https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.cbsnews.com%2Fnews%2Fa...
Nvidia probably normally couldn't afford ARM but with COVID everything's cheaper.
Umm. No. SoftBank paid $32 Billion for ARM 4 years ago. Nvidia is paying $40 Billion for it now.
The price hasn't gone down (let alone down due to COVID). I'm not sure if that was a joke or not. ("whoosh" on me if so.
However, it's quite possible that COVID has played into Nvidia's outrageous market valuation increase this year, which stands today at around $320 Billion (more than Intel's). You can do lots of interesting things with that kind of market valuation. I guess buying one of your IP suppliers is one of them. Note that NVidia's market cap in 2016 was about $33 Billion (in August of that year), making it about the same size as ARM when SoftBank made their purchase. My how the tables have turned!
If mathematically you end up with the wrong answer, try multiplying by the page number.