cultural reviewer and dabbler in stylistic premonitions

  • 247 Posts
  • 622 Comments
Joined 3 years ago
cake
Cake day: January 17th, 2022

help-circle



  • Arthur Besse@lemmy.mltolinuxmemes@lemmy.worldLinux "Anti"-Piracy Screen
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    2 days ago

    What a confused image.

    1. TiVo complied with the GPLv2 and distributed source code for their modifications to Linux. What they did not do was distribute the cryptographic keys which would allow TiVo customers to run modified versions it on their TiVo devices. This is what motivated the so-called anti-tivoization clause in GPLv3 (the “Installation Information” part of Section 6. Conveying Non-Source Forms.).
    2. Linux remains GPLv2, so, everyone today still has the right to do the same thing TiVo did (shipping it in a product with a locked bootloader).
    3. Distributing Linux (or any GPLv2 software) with a threat of violence against recipients who exercise some of the rights granted by the license, as is depicted in this post, would be a violation section 6 of GPLv2 (“You may not impose any further restrictions on the recipients’ exercise of the rights granted herein.”).


  • They only do that if you are a threat.

    Lmao. Even CBP does not claim that. On the contrary, they say (and courts have so far agreed) that they can perform these types of border searches without any probable cause, and even without reasonable suspicion (a weaker legal standard than probable cause).

    In practice they routinely do it to people who are friends with someone (or recently interacted with someone on social media) who they think could be a threat, as well as to people who have a name similar to someone else they’re interested in for whatever reason, or if the CBP officer just feels like it - often because of what the person looks like.

    It’s nice for you that you feel confident that you won’t be subjected to this kind of thing, but you shouldn’t assume OP and other people don’t need to be prepared for it.















  • Arthur Besse@lemmy.mltoPrivacy@lemmy.mlPro Tip: Global eSims
    link
    fedilink
    English
    arrow-up
    24
    ·
    edit-2
    14 days ago

    It seems to me that switching SIMs provides little privacy benefit, because carriers, data brokers, and the adversaries of privacy-desiring people whom they share data with are obviously able to correlate IMEIs (phones) with IMSIs (SIMs).

    What kind of specific privacy threats do you think are mitigated by using different SIMs in the same phone (especially the common practice of using an “anonymous” SIM in a phone where you’ve previously used a SIM linked to your name)?