To be fair, it's entirely possible to make the same and very similar mistakes in Rust, too.
you can't know that
I think that entire comment is actually incorrect. My understanding is that they did not "remove" any maintainers, but actually rejected patches from Russian citizens (because of their employer), and also removed some Russian names from the maintainers list who already have code in the kernel.
That doesn't invalidate my statement though.
I have nothing to hide
Ok, pull down your pants and hand me your unlocked phone.
Join our Discord Support Server
Right into the trash.
Only took 18 years since it was first reported.
Privacy measures currently being rolled out, such as end-to-end encryption, will stop tech companies from seeing any offending
Front doors also stop them from seeing things... is that next? What about clothes to conceal drugs?
That was probably me. You can check it here among other scary fingerprint stuff https://abrahamjuliot.github.io/creepjs/
The server is proprietary and last I checked you can't even turn off auto-updating or verify the binaries they push to you.
https://www.zdnet.com/article/linux-mint-dumps-ubuntu-snap/
In the Ubuntu 20.04 package base, the Chromium package is indeed empty and acting, without your consent, as a backdoor by connecting your computer to the Ubuntu Store. Applications in this store cannot be patched, or pinned. You can't audit them, hold them, modify them, or even point Snap to a different store. You've as much empowerment with this as if you were using proprietary software, i.e. none. This is in effect similar to a commercial proprietary solution, but with two major differences: It runs as root, and it installs itself without asking you.
you must be fun at parties