it is LGPL2 or later. So LGPL3 applies. So the anti tivoization clause applies.
That's the opposite of how that works. It's LGPL 2 or later. That means you can follow the terms of redistribution from either license. Either. Or.
Sure. But it won't be your usual Linux distro.
It will do the same jobs. Most of the software on which we depend predates the GPL3 and/or uses an even more permissive license without an anti-tivoization clause.
The most fortunate part of Bell Labs' situation, however, was that in being attached to a monopoly it could partake in long-term thinking... Without competition nipping at its heels, Bell Labs engineers had the luxury of working out difficult ideas over decades.
Was it the monopoly that made the difference? Or was it simply management smart enough to not only not kill the goose, but also to feed it? They had wins, they got more funding, they had more wins, repeat until they no longer got more funding and stopped getting wins. What's probably more important than why they succeeded is what happened at the end.
Installer level disabling of the installation of systemd, please.
If you're a Debian derivative user, it's called Devuan.
* Note: Removing systemd from a systemd-based system is madness. There's a reason Devuan exists, and it is that simply changing the init system on Debian results in a lot of breakage, which best illustrates the biggest problem with systemd.
systemd is an integral part of many Linux systems. Adding the birth-date to it is the issue here. It's not the right place.
Yes, that is literally the entire ethos behind systemd.
It's crazy to expect a distro maintainer in a sane country to need to yank it out of there manually
Yes, that is literally the entire situation with systemd.
This change literally could not be more on brand for systemd.
What were you thinking making changes like that without firstly checking with the entire community?
That's systemd in a nutshell. Only people like that would willingly work on a project like that.
A Linux distro (even preinstalled) cannot be closed source and/or unmodifiable by the end user, the GPL3 made sure of that.
The Linux kernel is GPL2 and glibc is LGPL, and you can construct a complete userland without any GPL3 components. Also, you seem to be under some weird misapprehension that the federal government will follow the law, which it has never done across the board.
Slavery and many other such things were once legal.
Amendment XIII
Section 1: "Neither slavery nor involuntary servitude, except as a punishment for crime whereof the party shall have been duly convicted, shall exist within the United States, or any place subject to their jurisdiction".
Section 2: "Congress shall have power to enforce this article by appropriate legislation".
Emphasis mine.
The hate really should be directed at the politicians who pushed for these age gate laws
Collaborators can get it.
For the true paranoid, if you need to sandbox, you're doing it wrong.
Everyone is doing it wrong, that's why we need to sandbox.
Even if you were perfect, you wouldn't have time to do everything yourself, so you would still want sandboxing to protect you from the efforts of others.
Why would you presume *that* from what was written?
The principle problem with humans is that they're completely unreliable, due to basic design.
They seem particularly unreliable when asked to tell the difference between a headmaster and a fundamental rule.
QCs are completely unsuitable for reversing hashes and that is what cracking passwords needs.
Translation: we don't currently have a quantum algorithm for reversing hashes. But there was a time, not that long ago, when we didn't have a quantum algo for factorization either. However, I don't expect to see a quantum algo for hash reversion any time soon, because the whole problem of reversing hashes is pretty complex.
Factorization as a classical problem is essentially trivial, in that there are very simple classical algorithms for it. They just take a lot of time to run. But coming up with an efficient quantum algorithm was not trivial, and the algorithm itself isn't so simple. So you can estimate that a quantum version of any algorithm is a lot more complex than the classical counterpart.
"quantum resistant forever" is too strong.
I've only taken fairly general master's level courses in quantum information and regular cryptography, but I agree with this overall sentiment. My math professors used to say that no asymmetric encryption scheme has been proved unbreakable; we only know if they haven't been broken so far. Assuming something is unbreakable is like saying Fermat's last theorem is unprovable — until one day it's proved. So to me "post quantum cryptography" is essentially a buzzword.
Kill Ugly Processor Architectures - Karl Lehenbauer