Show newer

@ekaitz_zarraga

I spent some time tweaking it with a lawyer that is expert in IP and Free Software licensing.

Obviously he noticed how the wording makes it formally violate the freedom zero: you must NOT use the Hack to restrict the rights granted by the license to third parties.

But that's part of the Hacking License being an hack itself: it's designed to be incompatible with any definition of freedom that reduces commons to garbage anybody can exploit.

So while a judge would enforce it as a wrap contract and a license, it is neither compatible with (yeah!) nor with (sadly, but inevitably).

Unfortunately the native culture of tainted in subtle ways that made it easy for corporations to exploit the work of .

They always find a way, as has shown.

The is designed to keep not only hackers work in the commons, but also any derivative work and any work dependent on it.

To make ALL knowledge free for people who share what they learn.

@ekaitz_zarraga

Unfortunately the has new loopholes now.

My network of choice, right now is the : tesio.it/documents/HACK.txt

@aral @Pixificial @craigmaloney@octodon.social

The power that sed unlock when you understand how to use the hold space is unbelievable.

Beyond an actual use case that I had to handle with it because of lack of alternatives on the target system (not even vi or awk were available, and I was not allowed to transfer the data outside), what opened my eyes have been the sed manual¹: other texts where technically complete but somehow didn't clicked.

Now I wonder why nobody have built a graphical sed debugger that shows you the pattern space, the hold space and the program so that you can step into it and see what happens.

I now have a good mental model of its inner working, but to teach it to kids (as we should) we need something like that.

Also I wonder if we should build a less succint sed language: the one letter commands are effectively an pretty good machine code for a sed machine AND they let you write powerful one-liners that fit well in a script but they are pretty hard for kids to learn.
____
¹ gnu.org/software/sed/manual/se

Shamar boosted

when you think about it, the idea that software should scale is actually really weird. "sure this garden is nice, but how nice can it be if it doesn't grow to cover the entire surface of the earth?"

@prasoon

Sounds interesting...

May I ask what you mean by "tit-for-tat" and "forgiving-tit-for-tat"?
(Maybe there is a language barrier at work here, I don't know these English idioms)

Also which biological structure inspires such approach?

@natecull

Shamar boosted

I wonder how you could recreate the ideas of mutual aid societies using decentralised Internet technology, without recreating the darker aspects of secrecy and hierarchy.

"Fraternities" of any kind just really don't have a good name at the moment, and secret ones much less.

But we need *some* kind of way of organising mutual aid. Living as little atoms all in economic competition with each other seems to just make us fearful, angry and tense.

Show thread
Shamar boosted

Qual è il sistema operativo principale nel tuo computer?

Boost apprezzato per aumentare la dimensione del campione nel fediverso italiano :)

:gnu: #gnu :linux: #linux
:windows: #windows :mac: #macos :fediverso: #fediverso

Shamar boosted

@devol @quinta c'era la diretta disponibile su YouTube nel canale ufficiale del Senato. Ovviamente tutti i diritti sono riservati, anche se non capisco per quale motivo una delle quattro istituzioni cardine della Repubblica dovrebbe mettere il video soltanto su YouTube
youtu.be/eIyBRC6dHoQ

I just spent 20 minutes contemplating a powerful (and totally unsafe) text template engine I wrote for automatic code generation in .

In 5 lines of ¹

I'm too overwhelmed by the power of sed, to ponder consequences.

____
¹ piped to rc

Shamar boosted
Shamar boosted

@loke

One might argue that having a job there is a good way to kill the monster from the inside, through leaks, bugs and so on...

But to me the risk I could somehow help them is too disgusting.

@dredmorbius @rysiek@mastodon.technology

@oleksiy

Why? What's wrong with feeds? Or you are talking of RSS specifically (and not Atom, for example)?

@loke

So you mean it wasn't a phishing attempt?

If so, I guess they wrote a bot to annoy every programmer on github or something... because someone from mailed ME too.

And I mean... me.

One who hate whole heartly and think is a against all of us to distract from their business model and make us forget .

A bot from wouldn't have wasted such bandwidth... but from Facebook... they are just spammers on steroids.

@dredmorbius @rysiek@mastodon.technology

Shamar boosted

The Assange trial thread is on Twitter, but it's worth following: nitter.unixfox.eu/SMaurizi/sta ♻ @SMaurizi: 23. it really keeps me awake at night how in the last 11 years we journalists,activists,intellectuals haven't been able to stop this upside down world in which courageous whistleblowers and publishers go to prison while war criminals and torturers sleep peacefully in their beds

@gubi

La complessità di un browser non la ordina il dottore.

Un browser (o un sistema operativo o..) non è un fenomeno naturale come la gravità, che possiamo studiare, ma dobbiamo accettare come è.

È un artefatto umano.

Esistono browser che un programmatore può studiare e comprendere completamente in una settimana o un mese¹.

Ma software come o sono intenzionalmente progettati per vanificare le 4 libertà.

NON È VERO che puoi pagare qualcuno per studiarlo se non ti fidi di Google (che controlla entrambi, Mozilla è solo la loro PR geek-friendly).

NON puoi.
NON hai i fondi necessari.

E anche se hai le competenza (io le ho), non avrai mai il tempo (a meno di essere assunto per 2 o 3 anni da terzi per farlo, ma è estremamente improbabile)

Di fatto dunque i browser ed i sistemi operativi mainstream sono indistinguibili da software proprietari per la stragrande maggioranza delle persone.

Perché non PUOI scegliere di fidarti: sei COSTRETTO a fidarti.

E di chi?

Di Google. 🤦‍♂️

Che controlla (insieme a , , , ...) gli standard che regolano il web.

Una backdoor poi è del tutto indistinguibile da una vulnerabilità, soprattutto quando il software in questione esegue automaticamente codice arbitrario inviato da terze parti che possono personalizzarlo targettizzando un singolo utente.

Come fanno i browser mainstream, appunto.

Insomma, attenzione all'open washing: la situazione è molto peggiore di quanto sembri proprio perché le persone non hanno il coraggio o gli strumenti tecnici e critici per guardare in faccia la realtà.
____

¹ netsurf-browser.org/

@miriamgreco@mastodon.uno @informapirata

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.