With multiple file systems per drive, a given file system doesn't necessarily know the drive is idle so some other process would need to do the delayed TRIM which is what Canonical is suggesting.
Why would a filesystem need to know? On FreeBSD, the filesystem just spits a BIO_DELETE command into the GEOM layer, and it is up to GEOM to schedule when to dispatch it - it's free to reorder it, as long as it doesn't move it after a BIO_WRITE with an overlapping range. If the filesystem needs to know about the status of other filesystems then that's a serious layering problem. The FS should not be making the decision about whether to send the BIO_DELETE, because it's the responsibility of something lower down the stack to decide what to do with it. For example, a RAM disk can use it to free the underlying memory. You don't want every filesystem to have to know about every possible kind of device.
If I make a web page that crashes IE6, am I at fault?
If you make a web site and it happens to crash IE6, then you're not at fault. If you make a web site that intentionally crashes IE6 and encourage IE6 users to visit it, then I don't see why it would be treated any differently from any other DoS attack. If I find a bug that crashes Apache from a malformed URL and then stick a link to someone's Apache server with such a URL on my web page, I don't think there's any doubt that it's malicious.
In the case of Google, they intentionally exploited a security hole in Safari to collect information about the user. This seems like something that is a pretty clear cut case of violating whatever the US equivalent of the Computer Misuse Act is. $17m seems like a very low fine considering the number of people who were affected. It's under $1 per incident, which doesn't seem enough to discourage a company like Google.
Can I now sue Verizon for crapwares that make my phone vulernable?
If they install them for the purpose of making your phone vulnerable, yes. If they exploit the holes introduced by the crapware for profit (or for other purposes), then yes.
I guess I am asking others: What line the sand did Google step across?
They identified a vulnerability in a piece of software, and instead of reporting it they decided to exploit it.
Apple is stripping out GPL3 based components
More specifically, Apple does not and never has allowed GPLv3 code into the building. They're not stripping out GPLv3 code, they're staying with old versions of projects that switched to GPLv3 until a permissively licensed replacement is finished. This is not a strategy exclusive to Apple - a lot of companies were unhappy with GPLv2 and now find GPLv3 quite scary. We've had quite a few companies start to contribute to FreeBSD and related projects as a result of GPLv3.
If you want to put yourself on the map, publish your own map.