Comment Re:Better to eat them than rape them... (Score 1) 447
I'm trying to figure out how you plan to do those two things consecutively, in that particular order...
I'm trying to figure out how you plan to do those two things consecutively, in that particular order...
[...] It is better to make a list of safe software which can't compromise an installation [...]
Except that you can't guarantee that the list of software is really safe, just that there are no currently known vulnerabilities.
If at some time in the future a vulnerability is found and a malicious user can just install the application and exploit it to get real root access and do whatever they feel like.
[...]conspiracy to commit premeditated murder,[...]
Well, at least it wasn't a conspiracy to commit unpremeditated murder...
[...] epsom printers[...]
They make printers out of salt now?
Just to nit-pick a bit, the 85 is not an upgradeable calculator. It's only the ones that are that are affected by this.
except that it doesn't subvert copyright at all, all it does is allow the installation of unofficial firmware, the signing never prevented copying in the first place...
summary taken from http://www.nesfa.org/Recursion/recursive_L.htm#LewisJackWhosCribbing
Ever read the short story Who's Cribbing by Jack Lewis?
A new science fiction writer finds that all his submitted stories are being rejected because they are copies of those published by another writer in the 1930s and 1940s. He does not understand what is happening. When he finally gathers all his letters and rejection slips and tries to publish that, he is told that this, too, was the work of that other author.
In no particular order.
If they change the contract after the fact, it may no longer be binding...
The Lawyerpocalypse is nigh!
Intel CPUs are not defective, they just act that way. -- Henry Spencer