I think it's fair for a requirement to be that the model that generates this is free software in itself, even though that wasn't a hard requirement in the early free software days (eg, free software was free even if you needed a non-free toolchain to build it before gcc was bootstrapped)
Thought experiment: imagine a language model where you can describe exactly how you want software to behave, and it produces a binary that does that. You don't get the source code, but it works 100% of the time. As long as you can install this binary on whatever device you have, does this achieve the goals of free software?
Turns out the actual reason my video streaming was broken was an upstream kernel bug where under certain circumstances if a packet too big ICMP was received on one interface but a different interface was sending the traffic, the cache on the egress interface wouldn't be properly updated, so full marks to Fastly for diagnosing that and working to get it upstream: https://lore.kernel.org/netdev/4be64c29-f495-4fdb-a565-2540745d5412@fastly.com/T/
If your argument is that vendors should use email for 2FA and password resets instead of SMS then how do you propose Google allow typical users to recover their Gmail password
Random question is CVE-2024-23832 mitigated if you use Soapbox as a Mastodon frontend and if not has anyone checked whether Truth Social (who last updated their Mastodon source download in June 2022) is vulnerable because well
This is weird - IPv6 is working fine for most of my devices (can ping google.com, for instance). But on *one* device, ICMP packets go out, but no response comes back. If ping a machine I control I can see it generate reply packets, but tcpdump on the router's WAN port shows the outbound ICMP but no replies. Firewall is set to accept all IPv6. Anyone have any ideas?
"Did BIOS have as many security vulnerabilities as UEFI" well no because BIOS would just boot whatever the fuck you gave it and drew no security boundary between that and the firmware so by virtue of not attempting to be secure it had no vulnerabilities
Set of people who are all "We reverse engineered this CPU with an undocumented ISA and found a vulnerability that allowed us to flip a single bit in an HSE to obtain a key that allowed us to encrypt a payload that gave us arbitrary code execution on the ISS" and simultaneously also "It's literally impossible to prevent this single fucking guy from showing up at the event we run"
2024 has begun with discovering that my spouse had never seen Shia LeBeouf Live, so entering the year with the energy of gnawing my own leg off and then still beating a Hollywood celebrity in a fight to the death
Complaints about CEO salaries at non-profits are disproportionately targeted at people who aren't men and you should take that into account before amplifying them
@vaurora I don't fundamentally disagree and also would probably prefer someone else to be running the org, but also it's not clear that the amount she's paid is grossly incompatible with the amount of value produced? It feels like it's easier to argue about whether the incentive structure for what Mozilla produces is correct and whether this is the right way to achieve that
Former biologist. Actual PhD in genetics. Security at https://aurora.tech, OS security teaching at https://www.ischool.berkeley.edu. Blog: https://mjg59.dreamwidth.org. He/him.