* Posts by doublelayer

9408 publicly visible posts • joined 22 Feb 2018

Microsoft delays controversial ban on paid-for open source, WebKit in app store

doublelayer Silver badge

Re: Free as in freedom

They aren't using this policy to enforce terms of the original license. What they've prohibited is allowed under the license and entirely doable elsewhere, and they just don't accept it in their store. Their goal appears to be to prevent users from receiving code that misleads about its origins and open source developers from having their code used for profit by others, neither of which is a crime but both of which are unpopular.

I see those goals as reasonable. Perhaps others would prefer having no restrictions other than those that are required by law, but the range of opinions is so large that they're going to get negative feedback no matter where they strike a balance.

doublelayer Silver badge

Re: The guy apologises and in marches the drama brigade

There's a difference between "I'm using your code because it's open source", "I forked your code to modify it", and "I'm selling your code without doing anything to add value". All are legal under the license, but one is a lot more likely to anger the original devs. Have you seen all the complaints from developers of things that cloud services are reselling, despite the fact that the cloud providers are actually adding the value of the hardware and contribute code on occasion? It's like that, but even more blatant.

doublelayer Silver badge

Re: The guy apologises and in marches the drama brigade

Yes, a big place with a hard problem to solve. How do you put "only charge for your own open source project" into legal language? How do you define who has the right to do that with a project with many authors. How can you even specify that when the code is licensed under a license that says you can copy it, fork it, and sell it if you wish. They have a lot of lawyers, but those lawyers are doing a lot of things. I don't begrudge them trying to do something about this and doing it wrong the first time seems likely. Be honest, if they were charging a commission over someone's unchanged copy, wouldn't you feel similarly unhappy with them.

doublelayer Silver badge

Re: The guy apologises and in marches the drama brigade

I don't much like app stores either for the same reason you specify. When they're optional (Windows and Android), I either don't use them at all or take circuitous measures to get the files I want. If you're going to have one though, I don't expect it to link everyone's source, as they're also expecting to be providing a lot of non-FOSS programs through it. Those that choose to put open source apps in such a store can link to their repository in the description, and many will use alternative distribution methods like FDroid or the various attempts at a Windows package manager which make obtaining source easier.

doublelayer Silver badge

Re: The guy apologises and in marches the drama brigade

I agree with this, especially because I could see similarly strident complaints if the Microsoft store became well-known for people taking someone else's code, compiling it without modification, and charging money for it. People would be all over it saying "Microsoft's charging a commission and profiting from open source software the authors didn't choose to put in the store". Given that, I can see exactly why they acted to prevent it.

How data on a billion people may have leaked from a Chinese police dashboard

doublelayer Silver badge

A good example that won't be listened to

I'll add this to my list of examples for why collecting data you don't need leads to problems for everyone, especially the data subjects. It's so useful in conversations about surveillance, analytics, or other reasons for collecting information, or at least it should be but no matter how many times it happens, they never listen to it. I wouldn't expect China to hold back on surveillance just because it inevitably leads to problems for their people, but it should be instructive to many people who have more reasons not to want the people they interact with to hate them. I still hope that we'll eventually see some drastic result where one place engaging in surveillance gets seriously destroyed. I would prefer reasonable regulation and enforcement, but if we aren't going to see it, a cautionary tale might be useful.

AI inventors may find it difficult to patent their tech under today's laws

doublelayer Silver badge

Re: There's no problem here

I agree with this distinction with one additional aspect: the product of an AI might itself be patentable, for example a design for a component that the program has created to suit the goals programmed into it by the inventor. That design can be patented, just as one created using manual design software could, but by specifying the unique and invented components of the design, not by attempting to reproduce the training process. The idea of assigning the tool as the inventor or of considering any file such a tool produces as an invention is just going to lead to lawsuits with no beneficial purpose.

This is the military – you can't just delete your history like you're 15

doublelayer Silver badge

Re: I don't believe it!

It depends what the system was intended to do, but I mostly disagree. My work machine permits me to send out emails and upload files to external services. Yet, if I use those mechanisms to steal data, it's still my fault and I still go to jail for it. Locking things down to the extent that I'd be unable to steal corporate files would likely cause many problems with my actual work, and they trust me with the data and the machine, so it's not unreasonable for them to trust me to follow the policy as well.

doublelayer Silver badge

If a system is airgapped or subject to similarly secure procedures, then it's done for a reason. The issue wasn't what they were copying onto it (probably), but rather that they did so at all. Failing to protect a sensitive system is a problem, and when that's your job, giving you a new job has to be considered. Had they been doing something similarly risky with a more obviously dangerous machine, I'm guessing you would agree that it was important.

US floats framework for international crypto regulations that cement its power

doublelayer Silver badge

Re: Another Angle

No, it's really not like stock. Someone controls a company which moves around the value of stock. There is a person or group of people to be regulated, and you can find them, take their company off them, fine them, etc as needed to enforce regulations. Many successful cryptocurrencies don't work like that. They are a lot like commodities: something you can have that might be of value to someone, but maybe not. Whether they're valuable as gold or cheap as sand, they have similar levels of ability to regulate. You can easily regulate those places that buy, sell, or hold gold, but you can't pass a law instructing that gold file papers like you can with a company issuing stock.

doublelayer Silver badge

Re: OK but...

The early ones did have the decentralized and uncontrollable aspects as goals, but newer ones, including anything a government comes up with, have dropped it. It's likely that governments wishing to maintain control over their monetary system will attempt to regulate or prohibit those cryptocurrencies that don't continue to have them at the helm. I don't know how successful that will end up being, but I'm in the position of disliking every side of it. I don't much like the cryptocurrencies, but I also oppose governments thinking that they should have a monopoly on exchanging value.

doublelayer Silver badge

It's unclear writing, but here's what it means:

1. People who write regulations for financial things are usually prohibited from investing in the things they're regulating to avoid conflicts of interest.

2. Some securities that people invest in are so common that many will invest in them routinely. These are specifically excluded from the previous requirement, meaning that people working on regulations for them can still invest in them.

3. Cryptocurrencies are not in that list, so point 1 applies to people regulating them.

4. They're allowed to invest up to $50k in them, but only indirectly through a fund they don't control. Owning them directly would disqualify them. Owning more of a fund would also disqualify them.

5. People who don't regulate cryptocurrencies don't have to care about these restrictions unless they're trying to transfer into that role.

Elon Musk considering 'drastic action' as Twitter takeover in 'jeopardy'

doublelayer Silver badge

Re: Burn

While I don't have a Twitter account and don't follow any of those bots, there are bots that provide a useful service. I've created several of my own to automatically retrieve information and present it in a useful way. I know some using Twitter can do the same.

COO of failed bio-biz Theranos found guilty on all twelve fraud counts

doublelayer Silver badge

"I can't help but think that the pair of them fell perhaps knowingly into a honey trap baited by the financiers,"

You have it wrong. They were the honey trap for the financiers. There's a reason they didn't get any investors who knew anything about the field. They couldn't get anyone who knew about their product to accept it, from the first professors who told Holmes her idea was infeasible to the FDA investigators who kept saying the product would need to demonstrate efficacy before they'd give licenses. They targeted people who had a lot of money and no knowledge of the field, often those who didn't have much investing background, because they thought it would be easier to lie to them. When people who knew enough about investing started looking at reports, they created false reports and put other companies' names on them to get them out of the way. The financiers have not gotten anything out of this; yes the fraudsters are being punished and there's some chance of taking some money back, but they're still taking a loss from this.

Apple's latest security feature could literally save lives

doublelayer Silver badge

Re: State Surveillance. The weakness here is in swapping out for a compromised device.

"Given this is attempting to prevent State surveillance. Worth stating that deliveries can be intercepted and addresses flagged for purchases of electronic equipment due to be delivered and examined/opened before delivery."

NSO malware is frequently used by states surveilling people in other states. Saudi Arabia couldn't have intercepted a phone being delivered in the US to compromise it, at least not as cheaply as doing it locally. They may also lack a convenient exploit kit to install on a phone that remains resident, given that the initial setup process only happens normally when there is no user data.

"If you're going to this much trouble, you also need to go to the trouble of obtaining a device through someone else, who isn't being targeted"

Or get lucky. The last laptop I bought for someone was by walking into a shop, paying for it, and carrying it out. You can buy phones like that too. Try intercepting that delivery. Unless they've got a spy in every computer store or opportunistic malware on all of them (and I'm sure they'd like to), you can't guarantee it. They can do a number of things, but they aren't certain and they're expensive and difficult.

"Apple is likely to have a list of devices with this feature enabled,"

Why? They don't need that in a database. As you correctly point out, doing that could cause problems. There's no reason for them to want that list or to put in code to collect it, which could not help them but would certainly anger users.

"Surely better to sit below the radar with an unassuming run-of-the-mill device within the masses, switch off every privacy compromising feature you can, so that it looks like every other regular Apple device. The idea is not to stand out from the crowd."

Again, this is on-device config. It's not a spotlight attracting attention to you. Likely, if you're turning this on, they already know who you are and can find your device without needing this, and the feature just protects you from their attempts to penetrate your defenses.

"This doesn't fit the zero-trust model."

Actually, it entirely does. The zero trust model isn't about trying to hide. It's about having protections on everything. A zero trust configuration is very different from a default config that has several trust-based attack surfaces. I should point out, however, that zero trust configurations don't announce themselves routinely. You only find out whether it is one when you intercept its traffic or attempt an attack.

doublelayer Silver badge

Re: WebKit, anyone?

I can answer that one for you: they wouldn't install it. Since this is a user-decidable switch, Apple could even add that to the features: turn on the lockdown mode and non-WebKit engines get blocked. This wouldn't be a problem because a user who wanted a different engine could disable it. The issue about engines is with choice. If you don't want any engine other than WebKit, then don't install one and you'll be just fine. You'll probably be in the same group as many others, including me, as I don't have a need for a different one given the tiny amount of browsing I do on the device. Others choosing to do so won't force us to.

doublelayer Silver badge

Re: Nokia 3310

The article listed the restrictions. That list didn't include turning off all applications. They would still end up being very different products.

UK tribunal: App Store class action seeking up to $1.8b can continue

doublelayer Silver badge

Re: Stop us if you've heard this before

In most cases where a monopolist has been broken up by legal action, the resultant pieces have remained private. They continue to operate without government control, just without being able to work in concert. The person you replied to did not suggest nationalization, so suggesting that they desire it is putting words into their mouth.

doublelayer Silver badge

Re: Commission isn't even the biggest issue

The point is that, to get the XCode needed to build for the latest IOS, you need the latest Mac OS which means quite recent Mac hardware. To get the tools needed for the latest Android, you click a link which runs on basically everything, even equipment a decade old. The big GUI stuff might grow in system requirements, but you don't have to run it, so your app can still be built on lots of computers.

doublelayer Silver badge

Re: How did they come up with that value

"And if 15% is fair, we need the same everywhere. Microsoft store, Epic store, Playstation Store etc."

No, we don't. What we need is choice, and limits only if there isn't choice. If the Microsoft store charged 99.5% (and they don't, it's 12%), that would be fine. Why? Because you don't need to get apps from that store and most commercial ones aren't there at all. If they wanted to charge that much, all commercial apps would leave and they'd have to decrease it to compete. Apple's is different because they've denied other choices. I agree that, if their commission is too high, anyone else with such a monopoly on distribution should have the same action brought and their commissions reduced as well. It would probably be better for everyone, including Apple's profits, if they allowed different installation mechanisms instead.

doublelayer Silver badge

Re: Commission isn't even the biggest issue

"how are you going to test/maintain the app if you dont keep up to date to a reasonable level?"

By testing on the latest version of IOS, the platform they appear to be compiling for. Running a very new version of Mac OS will do nothing for you if you're testing on old versions of IOS, and staying on an old Mac OS will not harm you if you're testing properly. For developing Mac OS applications, your statement applies better, but they're developing mobile apps.

doublelayer Silver badge

They have some writers in the U.S., with their U.S. office in San Francisco. One of them can call Apple any time they want. I'm guessing it's been tried and didn't work any better. They probably got a response this time because it's a boiler plate and some PR employee was told to send that to anyone who asks about this case.

$185m anti-malware patent dispute: Norton and Columbia University fight on

doublelayer Silver badge

Re: Juries determine facts

The problem is with fact 3, if the participants choose to bring it up:

3. Did the defendant's thing come under the plaintiff's patent?

If they're arguing about timing like the one mentioned in the article, that's not a problem (yet), but many cases will see the defendant claim that their product is different from the patent, so it's not covered. As for this case, it's still important. If everyone agrees that Norton used the idea in 2009 and the patent wasn't until later, that makes Norton's use of it prior art and invalidates the patent. This means that someone is going to suggest that what Norton did in 2009 wasn't covered under the patent and they added that at a later point after the patent was filed, leading to the same question as before. There's not a great answer to who should decide this, but the average jury isn't going to know.

People who regularly talk to AI chatbots often start to believe they're sentient, says CEO

doublelayer Silver badge

"one times in three, the correct answer comes out - do you get that this would be impossible if the model didn't have understanding?"

It wouldn't be impossible. It has the answer, written by someone else who has understanding. It correctly found the right snippet. It's like a person who doesn't know how to write code but finds a Stack Overflow post that actually wrote what they want. They don't understand the code, or they could have written it themselves, but when they paste it in, it works. When the model gets the wrong snippet, it has no clue that it's messed up.

You're ascribing something that is the entire point of the model to understanding, but no understanding is needed to produce that result.

doublelayer Silver badge

These bots are not understanding the world any more than I would demonstrate understanding of something by rephrasing a Wikipedia article. I could take that text, written by someone who understands it, and use my knowledge of language to move the words around in a way that seems natural. Hopefully, I'd do it without making the facts incorrect, though AIs fail to meet that requirement all the time and somehow you don't appear to think that counts. In any case, any correctness seen in the result was generated by someone else. The chatbots we've seen the workings of don't read text to understand its meaning, but instead read it to copy chunks that are hopefully relevant.

British Army Twitter and YouTube feeds hijacked by crypto-promos

doublelayer Silver badge

Re: The standard

How they got into those accounts might be a problem. As the article said, either they had a password leaked or the attacker has access to one of their contact methods to perform a reset. Either of those could be concerning for additional actions, although given what this attacker chose to do, probably not that bad.

The App Gap and supply chains: Purism CEO on what's ahead for the Librem 5 USA

doublelayer Silver badge

Re: A chain is only as strong as its weakest link

So Librem are responsible for fixing the internet now? Yes, there's leakage when you use systems. You don't want the leakage, can't use the systems. ESNI will eventually deal with the URL leakage problem. Nothing short of improving the mobile operators will fix their leakage problems. In neither case will the device at the endpoint be able to make massive networks stop using protocols with privacy risks on its own.

doublelayer Silver badge

Re: The sales patter is good - just wondering where the holes are.

I think the encrypted phones you're talking about were either things like An0m which were created by law enforcement, or Encrochat which was compromised by them. In both cases, those were mostly comms services, not hardware manufacturers. There is always a chance that someone set up Librem as a front, but if they did, they'd have made better hardware that didn't take five years to get to this buggy state. You can also review the code and designs that go into the device. Nothing can give you perfect guarantees, but those make it unlikely to be compromised.

doublelayer Silver badge

Because it's running a mobile Linux distribution, it can be compatible with apps being written for others. The standard distro problem exists where an app may be written for a different mobile Linux in an incompatible way, but many will work. There are devices like the PinePhone that can be used by developers to port their app to a cheaper device. That doesn't give you U.S. assembly, so if you care about that you're stuck with the higher bill to buy this one, but if a developer writes for one of those, it can probably be used on this too.

doublelayer Silver badge

Re: Asterisk @sergio

Well, sort of, but it depends why you value the USA-based assembly. If you think that it helps you with the security of the components, then having important components made elsewhere (the CPU probably being the most obvious) isn't great for that use case. If a Korean-made CPU is satisfactory, maybe they should try making the whole thing there. This all depends on whether you consider a US-assembled device to have advantages, because if you don't, it doesn't matter much.

doublelayer Silver badge

Re: 3GB a day huh?

If my IOS devices sent 90 GB per month, I'd see that in my WiFi stats. They don't. They track, and it's really important, and it's an issue that needs solving. Had they just stated the fact of tracking, they'd have been fine. When they decided to state a number, they did something wrong, because it led to this discussion about whether they're accurate while leaving it out would have prevented it.

Open source body quits GitHub, urges you to do the same

doublelayer Silver badge

Re: Somebody is going to have to create some case law on this

"does the DoT own the copyright on the shape of the STOP sign?"

No. For one thing, such things are frequently standardized, so it wouldn't necessarily be them. Many governments, including the American government, can't copyright things, so things they have designed and published are automatically in the public domain.

"Do the people whose faces were used for your iPhone camera's face detection have a copyright on the algorithm?"

I'm guessing the photos used were collected by the algorithm writers to avoid this. Unlike, for example, facial recognition where it needs the details of many peoples' faces, face detection just requires a lot of pictures of faces on different backgrounds. They can be from a small subset of people, so it's easier to get consent.

"Can criminals register a trademark on their face and stop police using it in mugshots?"

No. Getting a trademark or copyright doesn't prevent people from using the work, but from conducting business with it or distributing it respectively. A criminal could copyright a photo, but the police will be taking a new one not copyrighted by them. They could trademark their face, but the use of the image would be allowed because the police weren't using it to sell products or imply endorsement.

In this circumstance, however, the code is copyrighted and not licensed such that Microsoft's use is acceptable. Microsoft could probably argue successfully that they were permitted to read it and use it in derivative works, and thus the creation of their tool is fine. However, the tool is going to output things which potentially fall under licenses with other terms, and Microsoft doesn't appear to have a plan for how they'll deal with those. In short, they would have no legal problem if they created this thing, including reading all the code they did, but never used it. As soon as they want to distribute the result, they have an issue.

doublelayer Silver badge

Probably more that the developers of this tool were at GitHub, not the main Microsoft organization, so didn't have access. While I entirely understand the SFC's complaint and think that Microsoft/GitHub's excuses are stupid, I'm having trouble caring because the tool they've built seems so useless to me. There's no way that Copilot can understand what I want the code to do, so no matter how much good code they've ingested, they'll not have anything to fill in. At least when an IDE suggests parameters or the like, they have a reason for doing that, but I also turn that off too.

doublelayer Silver badge

Re: 7 Zip

Microsoft didn't say that, and the complainer in that case didn't list GitHub as the only "acceptable" location. In any case, it's the raving of someone who doesn't understand a lot of things, from open source to security to Russia's war in Ukraine. I wouldn't take that complaint as representative of anything in this debate.

Arrogant, subtle, entitled: 'Toxic' open source GitHub discussions examined

doublelayer Silver badge

Re: Eh?

"there may have already been a lot of behavior that annoys the first person who simply does not like to be coerced, just because others feel entitled to restrict him from acting anywhere outside of their scope of imagination."

I'll say it again. Not implementing the feature you want is not coercion. It's not restricting the user from getting what they want. It doesn't force the user to use something specific. A user who doesn't like a decision may well be annoyed that the developer won't do it for them, and they're allowed to express that annoyance if they want, but they shouldn't be defended as if the developer's decision is in any way coercing them into never seeing the idea come to fruition. They have lots of options left, even when the developers they're asking aren't going to do it for them.

doublelayer Silver badge

Re: Great responses tho

There's a balance between "we designed it this way and it's not changing without good reason" and "we designed it this way and it's not changing".

That's very true, but that balance is often more obvious to the developer who read all the requests rather than the kind of user who doesn't understand that "good reason" doesn't automatically include "I want it". I've had to deal with users who figured that demonstrating that they would benefit automatically meant the request was high priority to change right now. For that matter, I've dealt with users who figured just stating the request meant that, not even bothering to work with me on explaining why this was a good thing for them.

doublelayer Silver badge

Re: Eh?

We have no guarantee that the person saying this was one, and even if they were, it doesn't change the situation. If I sell products, I may be open to user requests, probably more than when it's open source, but it doesn't mean I automatically take any request a customer has. I evaluate each request for the benefits I expect the users to receive, the effort required to develop and maintain it, and many other issues. If I get a suggestion that I decide won't be beneficial or won't be worth doing given the cost, then I'm afraid the customer will be disappointed. If the product is worthless to them without it, they can try either encouraging me more to change my mind or find a product that better suits their needs.

I've refrained from buying many products on the basis that it doesn't do what I wanted. I don't expect the manufacturer to receive my suggestion email for changing their product and hop to the task of making something for my specific use case. They might read it and take my suggestion if enough other people have also suggested it, but usually they will not. If you do, please send me your email because I have about twenty ideas for products I want but don't have enough time to make myself, so I'd be happy to take advantage of very cheap design and engineering work. I'm guessing everyone who values their time isn't much interested in that proposal.

doublelayer Silver badge

Re: Eh?

We interpret their comment very differently. You took this from it:

"Sounds to me like somebody knows a better way to do something, and yet is being forced into doing it in a way that drastically slows down the entire process."

I doubt it on both points. First, if they know a better way, they could implement the better way. Proving something better often gives clearer results if you have working code to demonstrate the advantages. This sounds to me like they have a preference and they're unhappy that the authors didn't go make it. It could be better, but just because I think it's a good idea doesn't make it the best course of action for all users and doesn't guarantee the developers will do it.

As for being forced to do anything, no, they're not. You are not forced to use a project, to refrain from forking it for your purposes, or to care what the developers think. If they disagree with your idea, they are not forcing you to abandon your idea. You can try selling it more, usually by taking more initiative because they have already said no to the level you had. You can fork their project to take it in your direction, optionally bringing it back if you turn out to be right and they want to merge. You can make your own alternative. You may be able to make a plugin or overlay adding your feature. That they didn't take your suggestion immediately without reservation does not constitute forcing you not to use it. It just means there's a bit more work involved, and it's your idea, so it's not surprising that implementing your idea may take work.

Moscow court fines Pinterest, Airbnb, Twitch, UPS for not storing data locally

doublelayer Silver badge

Re: Terrorist state

"I am sorry, but I can't see many Russians against the war, in fact it is quite the opposite."

Have you been running surveys? I'll say up front that I hate what the Russian government is doing, and I don't want any country to let up on them until all the people who aided this invasion are testing their defense tactics in war crime trials. However, I know many Russian people who agree with me on that. Most of the ones I know aren't located in Russia anymore, because I'm not from there and don't know many people living there, but I also know some who are still located in Russia because it's not easy to leave for another country if you don't have a lot of money.

Just because there are Russians who don't agree doesn't mean we refrain from actions that harm Russia as a country, but it's still useful to understand that they exist. These are possible allies, so it's helpful to ensure they keep receiving correct information and that, when we can, we target those doing the actions and not those opposing them.

doublelayer Silver badge

Re: "legalized the import of products without the authorization of the trademark holder"

"is this an open invitation to steal stuff and bring it to Moscow ?"

Yes. They are getting tired of companies no longer selling to them, so they've given up on trying to convince them to change their minds. It won't help much; they already had piracy, and all the problems it had remain.

The Raspberry Pi Pico goes wireless with the $6 W

doublelayer Silver badge

Re: 2.4 band only :-(

I agree. What's worse, there are still larger devices that ship with 2.4-only WiFi. It's not true in every product type, but a lot of things at the cheaper end leave out that comparatively simple feature. There are a lot of places where the performance on 2.4 is not good at all.

doublelayer Silver badge

Re: "the 50 per cent premium"

"Nice but more limited in terms of IO, memory and processing power"

With I/O, you're right, or at least the I/O is different with each having some features not supported by the other. You're not about the others; the ESP32 has at least 320k of RAM, and often more depending on which module is used. 520k is common. The Pico only has 264, which may not sound a lot less, but when you're doing things like using TLS encryption and caching web requests, it can be. The processor runs a different ISA, but it can be clocked at 240 MHz, providing more power than the Pico's. You may not need either of these, but characterizing them as more limited is incorrect.

California's attempt to protect kids online could end adults' internet anonymity

doublelayer Silver badge

Re: anonimity ? Internet ?

My ISP knows who I am, but if you come to my place and use my connection, it won't automatically know that. There are also methods to hide information about the destination, by using VPN providers that don't log, for example. Even if the VPN provider knows who I am through my payment method, they could still refrain from tracking my activities (and if they don't, that's not a VPN I want to use). If you want, there are more extreme ways to hide network activity. Just because some information is available to ISPs doesn't mean it always is or that it's reasonable to have other places collect even more.

doublelayer Silver badge

Protect everyone and you won't need to verify

There are two types of protections that children are supposedly getting with this system. The first I can't really do much about: to give children a seemingly safer system with dangerous features disabled which doesn't actually happen. However, the second one is protecting children from tracking, and that one I can do something about. If they passed a rigorous privacy protection law instead, they wouldn't have to identify who is and isn't a child. If tracking was illegal no matter how old the user was, then the same goal could be achieved without destroying anonymity. I'm an adult who wouldn't mind a privacy law that prevents tracking and gets enforced, so would someone please think of the adults who want it too?

doublelayer Silver badge

Re: I can't see this working

"While I think there should be range of trusted identity providers, I expect my own government should be one of them."

Don't give them ideas. Do you think the legislators will understand the requirements to identify without recording details or knowing the service requesting the identity? Let them start down that path, and they'll create a government account that you have to link with every site you use.

FBI warning: Crooks are using deepfake videos in interviews for remote gigs

doublelayer Silver badge

Re: How to stop it in it's tracks.

I'm guessing they're not trying something that extreme. It just prevents them from having to find someone that looks very much like them to steal their identity. Certain other characteristics are harder to fake, so I'd guess the age, gender, and some other physical characteristics will get matched reasonably closely before a victim is selected.

Running DOS on 64-bit Windows and Linux: Just because you can

doublelayer Silver badge

I'm having trouble figuring out why that work needs to be destroyed? There are three alternatives I can see for getting around the plagiarism situation:

1. Go on the offensive and accuse the person with evidence.

2. Release it publicly before anyone could plagiarize so the person who did the work gets the credit. This could be a commercial publishing if you can convince a publisher, but it could be as simple as uploading it to a website. If you don't want to maintain a website, there are library/archive sites willing to do the hosting and presentation.

3. Wait to release it until it doesn't matter anymore.

None of those options requires hiding or destroying historical information, and I'm sure there are people who would like to know it and would greatly appreciate the effort he has put in.

Misguided call for a 7-Zip boycott brings attention to FOSS archiving tools

doublelayer Silver badge

Er, yeah, it is. A CLI option is great for many cases, and whatever you use will provide one, so you're not losing that option. A GUI can be useful, not only for users that don't like the CLI, but also for users who are entirely comfortable but understand that GUIs can offer useful features. For example, if you have an archive that contains, let's say, twenty thousand files, and you want to understand its structure and contents, which option do you want:

1. A CLI command that prints all of the filenames to a console, you pipe it through a sorter, then you have to read it page by page to find what's in the archive.

2. A CLI command that prints one directory, and in order to explore the contents of that directory or to move up, you run the command over and over, each time specifying a full path.

3. A GUI that can print part of a directory structure in a visually-understandable method, permit you to move around in the structure without reissuing commands, and also has all the functions you might want to perform exposed as controls.

I doubt you're using Lynx to read this article, so I'm guessing you also understand that not everything is best done on the command line.

doublelayer Silver badge

Re: Not my problem

I would if I wanted the functionality. I wouldn't if using it funded murder, but it's open source, so I'm not paying anyone. The current developers of it (there appear to be some occasionally pushing changes) probably aren't murderers, so as long as donations went to them, that would also be acceptable.

You need to RTFM, but feel free to use your brain too

doublelayer Silver badge

Re: Check you can complete before you start

The test instructions come in various forms. Some do specify to read all text on the exam before starting, but quite frequently, I've seen the test with that removed. The instruction says to follow all instructions, and the person being examined has to go find it. Every real exam puts some instructions at the beginning and then a bunch of questions. It's not unreasonable for people to assume the normal format, as they would with single instruction lists on the front of a machine.