@theorytoe There is no ecosystem - an ecosystem is something that has naturally occurred that you simply observe - you do not question whether it is right for the owl to eat the mouse - you just observe that is occurs.
Meanwhile, the free GNU system was developed via hard work no matter what it took and no matter what proprietary software "people" tried to add to the system.
The FSF did not invent free software - it existed from the start of computing - although rms did come up with the free software definition when a definition became required, when it because extremely common for software to be proprietary; https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms
It was and is the FSF and rms that assisted the GNU project when it comes to legal matter and the project direction.
@SuperDicq@lina >until all of the firmware blobs are fully replaced. The proprietary software is digitally handcuffed and therefore it will never be replaced unless a complete flaw is found in the signing scheme.
@SuperDicq@lina >It is obviously better to run them in such a way that they can not access anything But how do you know the proprietary malware doesn't have access? Manufacturers love backdooring their proprietary software (backdooring hardware is less popular as that is manufacturing physical evidence).
>this firmware is backed into the device on a read-only chip. Software in usb keyboards is now often stored in r/w EEPROM within a microprocessor, but in almost all cases manufacturers usually never offer an update - thus it's equivalent to a circuit and the question is whether there's a malicious circuit.
The user could solder some wires up and replace the software (just like how the user could start re-wiring the keyboard), but the user may not have any interest in doing so, if the keyboard works as a keyboard, but even then, there isn't digital handcuffs preventing the user from replacing the software either - thus the users can in fact do so if they want to (there is no proprietary license forbidding reverse engineering and that level of hardware reverse engineering isn't forbiddingly hard).
There are also old keyboards available that use ROM and some PS/2 keyboards that just use circuits to generate the PS/2 signals from the button presses - but the functional result is still the same.
@SuperDicq@lina Yes, the massive amounts of proprietary software that init's the hardware has full system access (maybe spread out into many executables?), as how else would it init the hardware?
I'm reminded how a bootrom vulnerability in many iphone SoC's was found, that allowed loading whatever software you want and that software can get full system access - although the intention was that apple would get full system access, but you would not - but the vulnerability overrode that intention.
There may be ARM Trustzone stuff and proprietary software that implements IOMMU, but good luck relying on proprietary malware to defend you from proprietary malware.
When it comes to free software, of course the free software has full system access - how else would it serve the user appropriately?
The KGPE-D16 does in fact have IOMMU, in the correct place to prevent unauthorized access too.
@nyanide Yes, most windows developers have gotten into the habit of statically linking everything or including all needed .dll's with the binary, which means bloat and none of the benefits of dynamic linking, as getting things to compile on windows in a reasonable amount of time is impossible.
Yes, flatpacks emulate the window soydev behavior of including all the .dll's with the .exe by including all the .so's with the .elf's - even unneeded ones.
@nyanide The kernel, Linux has a static SYSCALL ABI, thus if you compile a program to only use Linux SYSCALLs (i.e. statically link everything including the libc), that binary will continue to run on GNU/Linux no matter what changes in GNU.
The GNU system is designed around source code distribution, but glibc for example now has a forward-compatible ABI, thus there is now no binary compatibility issues with glibc unless some digital handcuffs in proprietary malware doesn't like how elf sections containing information that is not part of the ABI have changed.
On GNU, if all you have is a binary and you don't have source code and that binary needs libraries of a version that you can't be bothered to install, you just locate binaries of the wanted .so files and copy them into the same directory and the dynamic linker will see those libraries and the binary will work (for example if a program wants Qt4, you can just grab the Qt4 library .so's instead of having to install Qt4, but you may as well port the program from source to Qt5, as it's usually easy).
@snacks Look up the "source" build instructions for GNU/Linux and you'll realize that the build script downloads proprietary binaries from microsoft and executes them.
I suggest the CC BY-SA 4.0, as stock photo sites generally do not sell copies of images under that license, but it happens, there is no problem, as the photo will have to remain free.
There are also some unexplained "source" files like; src/t_facon.c src/t_fsin.c, src/t_ftan.c, src/t_tan2a.c (it could be just lookup tables, but there is no explanation).
It also depends on at least one proprietary library like fmod as detailed in; assets/LICENSE-3RD-PARTY.txt
There is some very slopping licensing under src/hardware for example too.
The project is quite a mess and until the point that the proprietary software is removed and the licensing situation is cleaned up, it is proprietary software.
@Haijo7@SuperDicq ID software took more than a decade to release the source code for DOOM I under a free license.
It was a nasty move to put the DOOM I levels and graphics under a proprietary license after so long, considering that there was no excuse for doing so - as as much profit as possible has already been extracted from that game (id software no longer accepts payments for copies - they only bundle it in later doom games).
[[[ To any NSA, CIA & FBI agents reading my profile; please consider ]]][[[ whether defending the US Constitution against all enemies, ]]][[[ foreign or domestic, requires you to follow Snowden's example. ]]]Free software extremist who enjoys freedom and posting ですぅ.Please don't confuse me with an "open source" supporter ですぅ.GNU+Jihad against proprietary and "open source" software ですぅぅぅぅぅぅ!!!ⓘ User is the leader of an international terrorist organization.ですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅですぅ??