Yes, I understand, but your explanation isn't reassuring to me. It's confirming that I actually do understand the mechanism and its ramifications.
Red Hat can do whatever it likes (although my take on it is that they're not likely to do this unique identifier thing). I'm not saying otherwise -- that's their right, after all.
All I am saying is that software that does this sort of thing is unacceptable to me and I will avoid it to the best of my ability. As is my right.
Yes, I understand, but your explanation isn't reassuring to me. It's confirming that I actually do understand the mechanism and its ramifications.
Red Hat can do whatever it likes (although my take on it is that they're not likely to do this unique identifier thing). I'm not saying otherwise -- that's their right, after all.
All I am saying is that software that does this sort of thing is unacceptable to me and I will avoid it to the best of my ability. As is my right.