Copyright is always about distribution. So yes, you are allowed to fork, but you are not allowed to distribute the copyrighted content to other people. And with the No Derivatives clause you are also not allowed to change it. You might be able to stay in the gray are by telling everyone “build it yourself”, but nobody would be allowed to package it either.
- 0 Posts
- 9 Comments
Joined 2 years ago
Cake day: December 3rd, 2023
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
DasSkelett@discuss.tchncs.deto
Fuck Cars@lemmy.world•Nobody takes a train from Germany to FranceEnglish
5·6 months agoYou don’t?
DasSkelett@discuss.tchncs.deto
Technology@lemmy.world•Valve CEO Gabe Newell’s Neuralink competitor is expecting its first brain chip this yearEnglish
16·7 months agoAs far as I can see the company behind it (Starfish Neuroscience) is not affiliated with Valve in any way? (Aside from having the same CEO)
DasSkelett@discuss.tchncs.deto
Technology@lemmy.world•Valve CEO Gabe Newell’s Neuralink competitor is expecting its first brain chip this yearEnglish
10·7 months agoYperating System?
Like Firefox
(partially kidding)
DasSkelett@discuss.tchncs.deto
Technology@lemmy.world•China scientists develop flash memory 10,000× faster than current techEnglish
8·8 months agoSeriously, for me a “China scientist” is someone doing research on China, like a space scientist would do research on astronomy and similar. But I’m not a native English speaker, so, idk
Gitea has basic federation, I believe

Except you’re still trusting a lot of people and systems there. Those that programmed, compiled and/or packaged your software in use (be it e.g. the cryptographic libraries themselves, the OS, random user space applications you are running that might be able to access your mail some way or another…), the hardware you use, the software, hardware and OpSec of the recipient…
The amount of people who have actually the resources, time and knowledge to eliminate all these points (i.e. reviewing the entire source code of all the software you use, and all the diffs of every new release you use, somehow check all the firmware blobs for your hardware or manage to get a fully de-blobbed system running and connected to the internet, and otherwise making sure your keyboard doesn’t sent a copy of every keystroke to “the enemy”, …) is very low. And the amount of people who actually do it might be zero? Not even a person in the NSA will have done all of this themself. They’re trusting some coworkers for some of these parts…