I'm somewhat skeptical. What if LetsEncrypt decided to misbehave tomorrow? Would the browsers have the guts to shut it down and break all sites using it?
The infraction should be in what's generated. Because the interest by itself also enables many legitimate, non-infracting uses: uses, which don't involve generating creative work at all, or where the creative input comes from the user.
That's only US courts. Other countries don't even have a procedure for registering copyrights.
Huh. I guess that's what happens when Google actually prefer that you download the add-y version, because they also make money from the ads.
Electronic voting, maybe? But for most cases a transparently ran centralized ledger should work better.
This isn’t a well-controlled comparison.
It is. If you're going to virtualize a board game, there's no need to stick to the limitation of a physical board game. So, once you make full use of the virtual environment, you get a video game. If you compare to just virtualized board games, then you're artificially disadvantaging the virtual side.
PS. I also added this significant edit to my last post (bad form for discussion, but it makes more sense there than here)
I think the point of the article is to show that the CEOs empty words are empty
Maybe. To me it read more like: "According to Zoom's CEO, Zoom can't fully replace in-person interaction for work. Therefore, it's bad/useless software - or the CEO is bullshitting." Which is just bad reasoning. The conclusion doesn't follow from the premises. Maybe I'm just taking it too literally, but I just don't like when articles use such bad reasoning, even if I agree with their conclusion.
Yes, there's little interesting content there. But I think if you get a code for the extra-cheap bundle that's less than $20/year, it can be worth it.
Firefox + ublock (it has filters that block the "install app" on mobile, but need to be enabled from the settings) is useable.
There are ways to secure the update process. For example, you can enable secure boot and store your secure boot keys encrypted (or on a smart card). Then (if a full chain of trust is implemented) to update your system, you'd need to enter the private key password (or insert the smart card), and a root-access executable couldn't to that automatically.
While technically possible, you wouldn't want to compile everything locally on NixOS. Only packages that you've made changes to (such as applied a patch) will be built locally, and everything else (by default) will be pulled from the precomputed binary cache.
You can disable the binary cache, or make changes to every package. The thing is, if you update a nix
package, you'll have to rebuild everything that depends on it, and with lower-level components, that can be literally everything. It's not a sustainable workflow.
NixOS is not the most efficient distro either. I already mentioned some compiler optimizations are disabled by default, because they break build reproducibility. It also tends to use more disk space than other distros. So actually trying to super-optimize every package on it is somewhat pointless.
15 hours for what period of time? The article mentions they'd refill in two days...