Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> The only difference from before is [...]

Yes, I understand, but your explanation isn't reassuring to me. It's confirming that I actually do understand the mechanism and its ramifications.

Red Hat can do whatever it likes (although my take on it is that they're not likely to do this unique identifier thing). I'm not saying otherwise -- that's their right, after all.

All I am saying is that software that does this sort of thing is unacceptable to me and I will avoid it to the best of my ability. As is my right.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: