Follow

@mmu_man

Except one that hides to the users the source they are copying, helping them to violate any open-source license that requires proper attribution and, what's worse, any imposing reciprocity video.twimg.com/tweet_video/E5

That's why I wrote the tesio.it/documents/HACK.txt so that when we will be able to prove that distributed any work under such license, we will have to assume that accepted the license, that the "models" of are used under its terms and thus all the software that adopted its "suggestions" can be used under its terms too.

@BrodieOnLinux

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.