• 0 Posts
  • 40 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle

  • Valid question. You can ask this about many things:

    Would the Internet as we know it exist if Facebook, AOL, and Yahoo had united to create a walled garden?

    Would Macbooks as we know them today exist without an open source ecosystem? Would the company Appke exist? Would there be an iPhone?

    Would the web exist without Linux? Both developed at the same time, 1991 till now, and most stuff runs on Linux servers.

    Would the people who build all the hardware and software even be interested in computers had they not played with (build) computers in the 90ies? What if we had given them an iPad aith CandyCrush that just works; and not BIOS codes, cables, extension cards and drivers?








  • Not legal advice, just an idea.

    Publish early and frequently (e.g. on github with a license statement) and encourage others to clone it. Now the code is out there. You can’t take it back. Even better if the funding agency explicitly approves this.

    You can still dual-license, later, i.e. use a more permissive (or different) license if the agency or a research partner requires this. Just make sure the repo with your preferred licence stays available and uptodate.

    The license is less important than you think. OSS projects live as long as there is at least one maintainer.


  • Not an expert, not an insider. Just commenting to inform about what i know.

    When wayland was designed, security was a concern and it was handled differently than in X decades ago. That is good.

    Under X any application can be a screenreader and see your data. This was okay when you trusted everything on your machine, but is a problem today.

    Under wayland’s original design, no application could be a screenreader. That’s bad. It took way too long to agree on how to make exceptions to the rule, e.g. for screen readers, screen sharing in video calls, etc.










  • Short version: No, most likely not.

    They see who you are, but not what you do.

    Slightly longer: Someone can probably see your connections to google and notion and infer that you are using Notion, but they cannot see your Google/Notion account and not what content you are working on. (Also those are very popular tools, unless you are the enemy of the state number 1, why would they care?)

    Even longer: If your laptop or your gmail or your notion account is compromised, they can see everything.