ajklsdhfniuwehf | 4 years ago | on: I Built My New Linux Gaming Desktop in 2021 with AMD (CPU+GPU) and GNU Guix
ajklsdhfniuwehf's comments
ajklsdhfniuwehf | 4 years ago | on: Show HN: NFC Passport/ID for remote user registration
edit: i mean, you claim "Success signal Binary — Yes or No" but there's face verification involved. how is that not a threshold signal in the end where the system can still be fooled/passed the verification decision back to the client? ...seems like a more expensive step before the video call in the end :)
ajklsdhfniuwehf | 4 years ago | on: Affinity 1.10
i wasn't even too sad with them shipping features missing 90% of the old functionality while they got the code right, but doing that just to copy apple frivolous design choices was just too much.
ajklsdhfniuwehf | 4 years ago | on: Giraffes are as socially complex as elephants
ajklsdhfniuwehf | 4 years ago | on: The Real Story of Pixar
The film was completed much earlier. But distribution company held it for reasons nobody know. /insert business conspiracy theory.
It was very amateur. 3ds-max-4-like program on dos, called topaz (never saw it after that). and render "farms" were just using the animators (486?) computers at night.
ajklsdhfniuwehf | 4 years ago | on: Uptime Lab's CM4 Blade Adds NVMe, TPM 2.0 to Raspberry Pi
ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft
it's utter nonsense and pure FUD.
the article everyone is talking about is about valid cases where the build is used a extra step to try to work around the GPL (akin to saying "the developer used gloves to make the code changes to the GPL'd code so it doesn't count as change", it's stupid). but as the author argee, even pointing that stupidity out is bad because it is used as fuel for the actual FUD where people using GPL correctly are mislead about what they must share
ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft
LOL. you are joking right? Apple uses the textbook from microsoft the second they can. When they stuck gold on IOS the first thing they did was draw up a monopoly on music and ibooks licensing scheme. And those are just the ones they were found guild on courts with public records. The last one, also on courts public records, is about how they prevent their messaging applications to work on non-apple because it would "allow families to buy android devices to their children"
Oh, you trolls. I keep falling for your low efforts...
ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft
not really. Nobody can or wish to dictate how someone sells a product.
GPL is about GPL'ed code. not products.
> Suppose a company has patented some algorithm ... that also uses GPLv3 code
you keep moving the goal post. Remove GPL from your example! If that "some algorithm" was built on top of someone else's proprietary (and patented) work, wouldn't they have to satisfy that entity desires on how it wishes to license their work?
The ONLY difference is that GPL only requires that you make your work available under GPL. Easy. Other entities might ask for money. Others, such as apple, would just tell you to F off and you'd never be able to sell the code or the product. Which one is more restrictive or worse?
compare apples to apples please.
ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft
GPLv3 only goal is exclusively to twart bad actors from using needlessly complex things with the sole goal of avoiding GPLv2 (and 3 since they are practicaly the same) goals, which is to provide source for code that was originally GPL'ed.
In Tivo specific case, that needlesly complex thing was a rubegoldberg build/install process. Also TIVO did not find a loophole. They provided the code as their shenanigans was exposed as such in the end.
Note that you are commenting under an article which main point was exactly to dismiss the misunderstanding in pop culture about the TIVO case! and here you are repeating it. sigh.
ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft
Yeah the installation requirement is silly. But android in general is plagued by GPL violations in that every single piece of it is linux based (or other GPL code based), and yet no user will ever get the source no matter how much they ask.
ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft
what is that even supposed to mean?
ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft
Microsoft wrote the book in the 90s about this. https://en.wikipedia.org/wiki/Embrace,_extend,_and_extinguis...
ajklsdhfniuwehf | 4 years ago | on: “Tivoization” and Your Right to Install Under Copyleft
> gpl is too difficult to enforce. throw hands up in the air
riiiigth.
ajklsdhfniuwehf | 4 years ago | on: Technical Introduction to the Use of Trusted Platform Module 2.0 with Linux [pdf]
ajklsdhfniuwehf | 4 years ago | on: Technical Introduction to the Use of Trusted Platform Module 2.0 with Linux [pdf]
well, this might be true if you use some NIST or RSA certified process :) but who cares about that other than bureaucrats who run entire cities with one set of master keys anyway.
> This is rate-limited by hardware
See this is the kinda of thing those bureaucrats would say. If your hdd is out of your device and i am brute forcing the key, who cares about the password to key transformation? that is already behind me.
ajklsdhfniuwehf | 4 years ago | on: Technical Introduction to the Use of Trusted Platform Module 2.0 with Linux [pdf]
i have never seen a consumer motherboard with a TPM device in the last 15 years. In fact, the last batch of enthusiast AM4 ones ("pro" model), the TPM doesn't even have the Header populated, only the holes for one that you can solder a header.
And non-workstation office machines from hp and dell ship weird ones that probably won't even pass the win11 test.
ajklsdhfniuwehf | 4 years ago | on: Technical Introduction to the Use of Trusted Platform Module 2.0 with Linux [pdf]
this is already the case with every single open source encryption model out there. You have a simple password which then encodes the true key.
Nothing will save you from GPU cluster brute forcing it, if the adversary have your harddrive.
ajklsdhfniuwehf | 4 years ago | on: Starlink review, four months in
Enjoy the early adopter moment. Even if they keep increasing the numbers, they will probably move those new satellites in a much wider net to cover more subscribers the second they must show a profit.
ajklsdhfniuwehf | 4 years ago | on: Reverse-Engineering the Mali G78
https://www.gsmarena.com/blackberry_key2-9187.php
:)
i was on this front for a long time, but now it feels like a lost cause.
What guix suggest for managing services/containers/chroots/cgroups?