Kind of seems like punishing a person for doing what you do.
Yeah, that's the Olympian gods for ya.
There's a reason almost all of Greek mythology can be summed up in only eight words:
"Unfortunately, Zeus was feeling rather horny that day."
Kind of seems like punishing a person for doing what you do.
Yeah, that's the Olympian gods for ya.
There's a reason almost all of Greek mythology can be summed up in only eight words:
"Unfortunately, Zeus was feeling rather horny that day."
May the gigabits be plentiful and lag-free this year! Amen!
I'm not even that interested in kitchenware (mostly) and I still enjoyed that video! Just goes to show how great he is. Hehe.
It's Technology Connections.
It's always worth it. Because
Well, the bottoms of cleets are friction-inducing surfaces, but unless you pour a LOT of soda onto them, they ain't gonna be sticky.
It's as simple as that.
I'm pretty sure that qualifies, at least in the US, as financial fraud...
As @[email protected] said in their above comment, they're also backed by a company heavy into crypto bullshit.
Also, anything can be monetized. Never underestimate the ability of greedy fuckheads to be greedy fuckheads.
There's a certain point where it just comes down to trust. And if you distrust a company enough that you think they aren't posting the same code to the git repository that they say they are, then maybe that's when you shouldn't be doing business with them.
This is the case with all organizations, corporate or otherwise.
My apologies. Your comment came off (to me anyway) as the former.
So, I just looked it up and apparently their official stance is that auditing is questionably effective and thus unnecessary:
Our software is free and open source, while we repute at the moment [it's] not acceptable to provide external companies with root access to our servers to perform audits which can not anyway guarantee future avoidance of traffic logging or transmission to third parties. On the contrary, we deem very useful anything related to penetration tests. Such tests are frequently performed by independent researchers and bounty hunters and we also have a bounty program.
In other words, their reasoning is:
Personally, I don't agree with points #2 and #3, but point #1 is fair I suppose. In my opinion, it should not be up to the users to hold the company accountable; and there is a difference between penetration tests and log auditing, as the former I believe are merely to check the resilience against outside hacking.
My end impression is that judging from their other documentation and forum posts, the fact that their software is fully open-source, and their past behavior in accordance with their stated values, I think I'm inclined to believe them. However, it is somewhat worrying nevertheless that there isn't log auditing involved regardless of their actions.
How is it that no matter what the damn topic is, Linux always seems to be the most level-headed in the room? I really admire him for that...