• 0 Posts
  • 110 Comments
Joined 1 year ago
cake
Cake day: July 23rd, 2023

help-circle


  • Why is that a gap worth filling? There is no benefit to users as long as its free of a EULA they don’t have to care either way. For those wanting to produce open source software based on same they already have all the rights they could need. The only party clamoring for permissively licensed software are companies intending to close off the source and sell other people’s work.

    I understand why they would want to do that I don’t understand why anyone would feel the need to work for free for something someone else closes off.







  • This is complicated. Firstly outside of Wayland Nvidia works pretty great and has worked great for me 21 years on the other hand the amount spent is kinda irrelevant using different hardware is often actually the correct advice. Often though the logical move is use Windows on your effectively Windows only laptop and if you want to run Linux buy something compatible next go round.

    Some hardware just isn’t supported and given hostile to indifferent oems it will always be so


  • WWI and WW2 were absolutely necessary actions to contain others aggression. The Korean war is the only reason that the entirety of Korea isn’t under an insane dictatorship. Afghanistan attacked the US (stupidly enough) Iraq v1 was to contain a war of aggression.

    Vietnam and Iraq v2 were wrong.

    and fascism committed by your armies on foreign soil.

    How does one commit a fascism?











  • This isn’t useful or sufficient. You have to consider how many bots get banned and cost to determine efficacy. If you want 10,000 fake people to manipulate real people $10,000 doesn’t seem a high price if you make the fake people act organic enough that they largely aren’t banned.

    It would be more useful if a singular service verified sufficient credentials to prove you were an authentic human and allowed you to auth to various sites. This in turn creates the problem that verifiers now know a LOT about your online life.

    If the verification involved site -> verifier -> government held public key I think you could arrange so that none of the parties had enough info to identify users.