Hacker Newsnew | past | comments | ask | show | jobs | submit | webstrand's commentslogin

Its purpose "if you run the software you should be able to inspect and modify that software, and to share those modifications with your peers" not explicitly resist copyright. Yes copyright is bad in that it often prevents one from doing that, but it is not the purpose of the GPL to dismantle copyright.

Reducing it to "well you can clone the proprietary software you're forced to use by LLM" is really missing the soul of the GPL.


If not for copyright, you could always do that and copyleft wouldn't be needed.

Just because something is copyleft doesn't mean the person who gave you the binary you're using has to supply you with the code the used to build it. That's what the GPL does.

If nothing else the _perception_ of it is enough to have had a chilling effect, my own parents were concerned and affected by it enough to tell me where not to play outside so that I wouldn't be seen by randoms.

yeah, I would rather it did that. You run Claude in a sandbox that restricts visibility to only the files it should know about in the first place. Currently I use a mix of bwrap and syd for filtering.

To wit, if you get to vote for the HOA board but not for the government that can override every decision the HOA makes, are you meaningfully enfranchised?

They're arguing that due to the failure/stalling of the two-state solution, the PA is effectively not a national government. It administers local services, like policing, courts, infrastructure. But it doesn't control borders, tarrifs and duties, or airspace. The Israeli military operates a parallel legal system that can detain and prosecute them, all under a legal framework that they have no vote or say in. I think its fair to call this a kind of disenfranchisement?


I understand where you're coming from, but this is a flawed analogy.

The legal framework for the Palestinian Authority's existence is a bilateral treaty. Israel did not unilaterally create this flawed administrative entity: it was jointly created with the PLO, as an interim step towards a fully sovereign Palestinian state. The negotiations that followed were also bilateral. These negotiations failed, leaving both sides with an incomplete interim solution. As a result Palestinians are neither citizens of Israel, nor of a wholly sovereign state. They are stateless, that is undeniable. But the reason they are stateless is not that they "have no vote or say". They had a say at the negotiation table in Oslo. They also had a say in Camp David in 2000, when Yasser Arafat walked away from a deal that would have given him a state with its capital in Jerusalem, and started the second intifada instead. They had a say in 2005 when they elected Abbas over reformist alternatives. They had a say in 2006 when they elected Hamas in Gaza. And they have a say now, as Abbas maintains the "pay to slay" program that rewards attacks against Israeli citizens with welfare payments to the attacker's families. There's a reason Israel insisted on overriding security control in the interim state. They couldn't trust the PLO, the very group that killed countless Israeli civilians in shootings, stabbings and bombings, to become the sole guardians of Israeli safety overnight. In Oslo the Palestinian Authority accepted the responsibility to prevent terrorist attacks against Israel. They are free to deliver on that commitment anytime.

My issue with your framing ("the PA is like an HOA"), the parent comment's framing ("Israel solely controls the fate of Palestinians"), and the original comment that started this whole debate ("Palestinians are a disenfranchised part of Israeli population"), is that it strips Palestinians of agency and shared responsibility. It's annoying when you do it. But it's tragic when Palestinians do it to themselves. By perpetuating this myth that they are helpless, blameless victims of external forces, they are making internal reform impossible ("what is there to reform? All our problems are Israel's fault") and any resolution to the conflict impossible ("we are the rebels, Israel is the empire. The only resolution is to blow up the death star").

To tie this back to the original topic of disenfranchisement: even in the flawed interim state created in Oslo, Palestinians have had the opportunity to vote. Not in a state, but in an institution created specifically to chart a path to a state. They elected a president, who then proceeded to cancel presidential elections (the last one was in 2005). They elected a legislative body, who started a civil war and established one of the most violent theocracies in the world. None of this was Israel's doing. To the extent that Palestinians are disenfranchised - denied the opportunity to vote - it is by their own leaders. If anything, it makes me glad Palestine isn't a full-blown state: with leaders like that, the more limits to their power, the better.


The liability exemption is a moving target

> good faith effort to comply with this title, taking into consideration available technology and any reasonable technical limitations or outages

could easily be read as meaning "facial recognition technology exists and is available, not using it is a business decision, failure to use it removes the good faith protection".

If the lawmakers didn't intend this, then they didn't need to add all the wiggle words that'll let the courts expand the scope of this law.


That one is highly inconsistent, on some platforms its useless. For instance on Chrome/linux entering historic dates via the datepicker takes minutes to slowly scroll through the years. Always build your own datepicker, you know better what UX pattern will best suit your application and your users.


I wonder if this is a potential "off switch" for the internet. Just hit the root ca so they can't hand out the renewed certificates, you only have to push them over for a week or so.


People will learn to press all the buttons with scarry messages to ignore the wrong certificates. It may be a problem for credit cards and online shopping.


HSTS was specifically designed to block you from having any ignore buttons. (And Firefox refuses to implement a way to bypass it.)

But this is also why the current PKI mindset is insane. The warnings are never truly about a security problem, and users have correctly learned the warnings are useless. The CA/B is accomplishing absolutely nothing for security and absolutely everything for centralized control and platform instability.


> The CA/B is accomplishing absolutely nothing for security and absolutely everything for centralized control and platform instability.

is it their fault?

with the structure of the browser market today: you do what Google or Apple tell you to, or you're finished as a CA

the "forum" seems to be more of a puppet government


The CA/B is basically some Apple and Google people plus a bunch of people who rubber stamp the Apple and Google positions. Everyone is culpable and it creates a self-fulfilling process. Everyone is the expert for their company's certificate policy so nobody can tell them it's dumb and everyone else can say they have no choice because the CA/B decided it.

Even Google and Apple from a corporate level likely have no idea what their CA/B reps are doing and would trust their expertise if asked, regardless of how many billions of dollars it is burning.

The CA/B has basically made itself accountable to nobody including itself, it has no incentives to balance practicality or measure effectiveness. It's basically a runaway train of ineffective policy and procedure.


Any user agent worthy of the name will ignore that user-hostile part of the spec.


Really? I thought MitM was always intercepting/manipulating traffic from or to the victim.


What you wrote is the definition of MITM.

Op and others are saying DNS poisoning is a popular way of achieving that goal.


Oh you mean that it's a popular way of initiating the interception part of MitM, got it.


MitM isn't even necessary, a rogue DHCP server configuring a malicious DNS could attack this.


That's still a MITM, albeit a LAN-local one. Non-LAN WAN isn't the total scope of MITMs.


If my computer asks your computer what dns server to use, and you respond with the address of a nefarious one, it's not necessarily a mitm.


The MitM happens when the client sends packets to the fake IP, I think the argument goes.


That is a form of MiTM. It’s just changing DNS to IP bindings rather than IP to MAC or prefix to ISP.


No? If the device is connected to a cell, they can still triangulate it just like normal.


In an emergency you might really want GPS precision.


Which emergency can happen that I really want this? And now don't say suicide attempt. Nearby all emergencies that could happen where someone needs my exact position are things that would additionally lead to a loss of the base connection or a switched off smart phone.


Car accident? Broken leg while hiking? Mugging? Slip and fall on icy sidewalk?


Cell tower triangulation does not provide the same precision as GPS.


Triangulation does not provide granularity needed for emergency response.

You want EMS looking for a needle in a haystack while you are suffering a heart attack?


Indeed.

How might people suggest that this would work, do you suppose?

"We've narrowed the victim's location down to one city block, boys! Assemble a posse and start knocking on doors: If they don't answer, kick it in!" ?

(And before anyone says "Well, it can work however it used to work!" please remember: Previously, we had landline phones in our homes. When we called 0118 999 881 999 119 725 3 for emergency services, there was a database that linked the landline to a street address and [if applicable] unit.

That doesn't work anymore because, broadly-speaking, we now have pocket supercomputers instead of landlines.)


We also had phone books with everyone's name and address listed.

Everyone was effectively doxxed yet it was never a security issue.


Sure. But we usually didn't need it: We kept the phone numbers for our friends, family, and our favorite pizza place memorized.

And if the phone rang, it was answered. It was almost certainly a real person calling; spam calls were infrequent to the point of almost never happening.

It was a different time, and it is lost to us now.

(We do still have public name-to-address databases, though. For instance: In my state of Ohio, that part of a person's voter registration is public information that anybody can access. Everyone is still effectively doxxed and it's still not a security issue.)


Oh right. Forgot registered voter records are public. Similar to your point about phonebooks, I never use them.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: