federico3

joined 4 years ago
[–] federico3@lemmy.ml 3 points 2 years ago* (last edited 2 years ago)

This is debatable. The GPL allow redistribution of a given version of the software without additional restriction. If the user receives that copy knowing in advance that redistribution will lead to retaliatory actions this can be treated as an additional restriction.

[–] federico3@lemmy.ml 8 points 2 years ago

Software licenses cannot solve every problem and AGPL is still the best option.

There are many larger problems related to FOSS including freeloading, right of repair, surveillance, lock-in... and they require social solutions rather than new licenses.

[–] federico3@lemmy.ml 2 points 2 years ago (1 children)

That's besides the point. Of course it's always possible to create new communities on new instances, and import posts from various sources, but the original community would be still gone.

If an instance is shut down or becomes unusable for a long time there is no way to automatically migrate users to a new instance. Additionally, there is also no guarantee that all users will move to the same alternative instance. This can also cause unnecessary conflict around which alternative instance becomes the "legitimate" successor.

[–] federico3@lemmy.ml 1 points 2 years ago* (last edited 2 years ago) (1 children)

This is not correct. APT always verifies cryptographic signature unless you explicitly disable it. Yet it's very important to understand who is signing packages. What kind of review process did the software go through? What kind of vetting did the package maintainer themselves go through?

If software is signed only by the upstream developer and no 3rd party review is done by a distribution this means trusting a stranger's account on a software forge.

Update: the Debian infrastructure supports checking gpg signatures from upstream developers i.e. on the tarballs published on software forges.

[–] federico3@lemmy.ml 1 points 2 years ago (3 children)

What you are describing is just a local cache of !lemmy@lemmy.ml on your instance and it works only if it has been populated before the downtime of lemmy.ml. If lemmy.ml never comes back to life nobody can post to !lemmy@lemmy.ml proper. All the communities on in would be dead.

[–] federico3@lemmy.ml 2 points 2 years ago (2 children)

Context is important. It's possible that the software is distributed without any warning like that and that the termination of the support contract is done without citing the redistribution of previous versions as a reason. OTOH if the customers could prove that there's widespread knowledge of the retaliatory termination that could be equivalent to a (non-written) restriction that is indeed incompatible with the GPL

[–] federico3@lemmy.ml 3 points 2 years ago* (last edited 2 years ago) (4 children)

Terminating a support contract, in itself, is not a GPL violation. The restrictions only affects the ability to receive future updates.

Edit: Red Hat indeed claims that no GPL violation is happening, yet they inform their customers that sharing updates leads to contract termination, which clearly breaches the GPL at least in spirit: https://sfconservancy.org/blog/2023/jun/23/rhel-gpl-analysis/

[–] federico3@lemmy.ml 5 points 2 years ago* (last edited 2 years ago) (5 children)

This is not a communication problem. Communities are indeed centralized and if an instance is shut down permanently or loses its data all the communities are gone. This is a big design problem of Lemmy.

Edit: it's sometimes possible to rebuild new communities on another instance and recover past messages that have been replicated on other instances (if there were full replicas) but this requires all users and moderators to agree on where to migrate and avoid splits and so on.

[–] federico3@lemmy.ml 3 points 2 years ago

Please do now upvote techrights.org - they use hyperbolic tones and produce clickbait.

[–] federico3@lemmy.ml 2 points 2 years ago (1 children)

It's in no way "everyone", just a vocal minority.

[–] federico3@lemmy.ml 1 points 2 years ago

This is pretty much what already happens, with the main difference that the target group would have a codename or a number. Algorithms don't care.

view more: ‹ prev next ›