ganymede

joined 4 years ago
MODERATOR OF
[–] [email protected] 47 points 4 days ago* (last edited 4 days ago) (3 children)

just want to add, it's not the zoomer's fault. they were intentionally raised in ignorance because its apparently profitable

fuck the corporations who've deliberately turned our living computers into soulless commercial brainwashing surveillance machines

[–] [email protected] 2 points 1 week ago* (last edited 6 days ago)

Or they’re just adding improvements to the software they heavily rely on.

which they can do in private any time they wish, without any of the fanfare.

if they actually believe in opensource let them opensource windows 7 ^1^, or idk the 1/4 of a century old windows 2k

instead we get the fanare as they pat themselves on the back for opensourcing MS-DOS 4.0 early last year (not even 8.0, which is 24 years old btw, 4.0 which came out in 1986).

38 years ago...

MS-fucking-DOS, from 38 years ago, THAT'S how much they give a shit about opensource mate.

all we get is a poor pantomime which actually only illustrates just how stupid they truly think we are to believe the charade.

does any of that mean they're 100% have to be actively shipping "bad code" in this project, not by any means. does it mean microsoft will never make a useful contribution to linux, not by any means. what it does mean is they're increasing their sphere of influence over the project. and they have absolutely no incentive to help anyone but themselves, in fact the opposite.

as everyone knows (it's not some deep secret the tech heads on lemmy somehow didn't hear about) microsoft is highly dependent on linux for major revenue streams. anything a monolith depends on which they don't control represents a risk. they'd be negligent if they didn't try to exert control over it. and that's for any organisation in their position. then factor in their widespread outspoken agenda against opensource, embrace, extend, extinguish and the vastly lacking longterm evidence to match their claims of <3 opensource.

they're welcome to prove us all wrong, but that isn't even on the horizon currently.

^1^ yes yes they claim they can't because "licensing", which is mostly but not entirely fucking flimsy, but ok devils advocate: release the rest, but nah.

[–] [email protected] 0 points 1 week ago* (last edited 1 week ago) (2 children)

yes they lost the battle, now they're most likely aiming to win the war.

[–] [email protected] 7 points 1 week ago (2 children)

remember back when we didn't listen to famous people's opinions outside their field of expertise?

[–] [email protected] 3 points 1 week ago

A lot of Microsoft-oriented developers still don’t understand the free software movement, and have been trying to twist it into something they can comprehend since it started four decades ago.

[–] [email protected] 2 points 1 week ago
[–] [email protected] 2 points 1 week ago (1 children)

ah fair enough. i think that was the initial confusion from myself and perhaps the other user in this discussion. i didn't realise your use cases.

it's always a fun topic to discuss and got me thinking about some new ideas :)

[–] [email protected] 5 points 1 week ago* (last edited 1 week ago) (3 children)

afaik mmW is FR2

5G FR1 is sub x-band microwave

[–] [email protected] 2 points 1 week ago (3 children)

cool, sounds like you have most of the principles down.

what i didn't yet see articulated with chat-e2ee is how the actual code itself verifies itself to the user in the browser? it sounds to me like it assumes the server which serves the code is 'trusted', while the theoretically different server(s) which transmits the messages can be 'untrusted'.

[–] [email protected] 1 points 1 week ago (2 children)

out of interest, do you actually mean no login, or do you mean no email-verified login?

[–] [email protected] 2 points 1 week ago* (last edited 1 week ago) (5 children)

i'm trying to understand your exact scenario.

but in general, the problem is where do you get your original key, or original hash to verify from? if they are both coming from the server, along with the code which processes them, then if the server is compromised, so are you.

thankfully browsers give alot of crypto API lately (as discussed in your link)

but you still need at minimum a secure key, a hash and trusted code to verify the code the server serves you. there are ofc solutions to this problem, but if the server is unstrusted, you absolutely can't get it from them, which means you have to get it from somewhere else (that you trust).

[–] [email protected] 1 points 2 weeks ago* (last edited 2 weeks ago)

-GIMP is freeware.

did you source that from the GIMP documentation? because it very much appears you didn't. (please link to the direct quote if i'm wrong).

in contrast my quote comes directly from page 4 of their own PDF User Manual which very clearly states:

The GIMP is not freeware

personally i'll go with what GIMP says in their own manual. you're welcome to believe whatever thing you wish - enjoy.

1
submitted 3 years ago* (last edited 3 years ago) by [email protected] to c/[email protected]
 

Getting Started with KLayout

view more: next ›