Hacker News new | past | comments | ask | show | jobs | submit | more moonfern's comments login

That policy relates to your whole working career. If you somehow managed to violate the policy you will deal with the people who have the power and/or duty to enforce this policy.


Would a different spelling help with the copyright issue? Examples "opensuze" "opensoese"

And khula-suse/khulazuse (Hindi for open) ?

I've a suggestion: Khula-use


It's not a copyright issue, it's a trademark issue. Anything resembling the trademark can be considered an infringement, and it's up to a judge to decide what is.


Then it must be really completely different. Something like "ChameleonOS" would also infringe the trademark since that animal as logo for an OS is also protected?


IANAL, but if they went with ChameleonOS and their logo looked sufficiently different from any SUSE logos, they should be in the clear.


Trademarks can be shared through contract easily enough; this is more or less already happening.


> Examples "opensuze"

Not convinced by that one: https://en.wikipedia.org/wiki/Suze_(drink)


We have about 600 users, most of them use webdav. We just did a painless upgrade.


Tldr: I built a superminer in 2013 for a client. If he would have paid me in bitcoin, then those bitcoins would have been stolen by now. Bitcoin mining uses way too much electricity, now it is 35 terawatt hours at this rate: 2019 > USA,2020 > World


What in the world does this have to do with my comment that you replied to?


In 2016 the global games market had $99.6Bn revenue and a 8.5% YoY. PC had a 27% +4.2% market share, TV 29% +4.5% , mobile 27% +23.7% tablets 10% +4.5% and casual webgames 5% -7.5%. (source:Newzoo) Google with it's presence in mobile, tablets and web seems to be the winner, edge will support webassembly in the future and mozilla which is much smaller than opera on mobile reminds me of Xerox.


In that case you can try yalpstore: https://f-droid.org/wiki/page/com.github.yeriomin.yalpstore The app downloads apks from the play store. You'll have to use a Google account, perhaps a trowaway account created on a different device.


Avast, source https://news.ycombinator.com/item?id=13079569 AJ007

Here are the terms, it's in section 8.Privacy, processing of personal information. https://www.avast.com/eula-avast-free-products

However "AVAST may publish or share such information with third parties that are not part of the AVAST Group but will only ever do so after removing personally identifiable information."


Also: https://www.pehub.com/2015/05/avast-leads-22-mln-round-for-j...

"Jumpshot also captures https clickstream data to reveal in-depth buying and social behavior above and beyond simple browsing."

Capturing https clickstream data is only possible when you MITM the user - see Avast.


They could make a deal with browser extension developers to bundle a surveillance module. That is why I never install any browser extensions.


They could for sure - others already did that and bought well running extensions.

https://www.reddit.com/r/IAmA/comments/1vjj51/i_am_one_of_th...

At least, not all extension developers gave in to $$$.


> removing personally identifiable information

no such thing.


You can setup network namespaces with ip netns and then start your chroot with ip netns exec.


Of course you can. Which means that you're using container primitives with chroot. Which is fine, but if you're going to do that I would recommend using pivot_root and mount namespaces -- which are more secure because there simply is no mapping above / in your namespace (chroot doesn't do this but pivot_root does). This means that there is no way in the VFS layer for you to resolve paths above your root (unless someone bindmounts something in or similar).


There's a device for unlocking I-phones. I saw it in action a few times at work: The I-phone is placed horizontally into a cradle, 40 cm above the screen there's some kind of a device. That device produces flash flights, a couple times per second and I suspect it takes pictures. If I remember correctly there's nothing touching the buttons. The officer said that it can crack I-phone 6 (7 was not out when I asked it). What I suspect is that it uses brute force and avoids the delaying system. Since I work in a low tech environment, I was surprised to see that thing in action.


There's a post on lwn.net from April 2, 2001 about the Linux 2.5 kernel summit:

https://lwn.net/2001/features/KernelSummit/

From that article: " The first presentation was by Lance Larsh of Oracle who, essentially, provided a laundry list of changes and features Oracle would like to see in order to get better performance out of high-end, large database servers "

...bullet list...

" The reception was "generally" positive - many or most of the above problems are well known and on the list to be fixed in 2.5 already. One exception was the non-preemption request, which was considered dangerous and unnecessary. "

J. Corbet is the author.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: