• 0 Posts
  • 102 Comments
Joined 2 years ago
cake
Cake day: June 28th, 2023

help-circle
rss

  • They’re not refusing. They’re actually doing the opposite. But they needed to get their house in order first.

    The 3.0 upgrade was the result of the getting their house in order and modernizing. Doing cosmetic changed before hand would have made no sense because those changes would have been thrown away when they would have to modernize things anyways.

    I think I have an analogy.

    Gimp was like an old American style wooden house that was flooded. After the water recedes you could try to make things look nicer by plastering and painting the walls etc. But as goes with flooded houses if you do this the mold will rot everything out.

    In order to save a flooded house you need to remove all the dry wall and use fans to dry out the internals. Once things are dry then you can plaster and repaint things.

    Gimp 3.0 was them ripping out dry wall and air drying the internals. Now that that is done it now makes sense to clean up the UI.

    If you clean up the UI before you dry the walls out it’s just a waste of time because those improvements would need to be ripped out with the dry walls always.

    It’s not perfect as far as an analogy goes but it’s close. Gimp should have never let the house flood in the first place. (Analogy breaks down here a bit). But since they did. They needed to fix the fundamental before it would be worth fixing the UI.

    This all being said they could at this point genuinely refuse to change things UI wise. I hope they choose to pull a Blender or Krita but they don’t have to.


  • I mean the whole point of doing the mega rewrite to gtk3 was specifically to enable such forward looking progress.

    What they did in the 3.0 release was, largely, a massive modernization of a dinosaur code base.

    Now that it’s done it makes sense to do a UI overhaul. Before 3.0 it made no sense to even try, now it does.



  • I think you should do more then just add a disclaimer. You should add a proper license. It protects you and allows others to build upon your work in a predictable way.

    That and licenses are legally battle hardened and proven. A self written disclaimer is not.

    I would recommend licensing your scripts under the GPL. This lets other people use it with the understanding that if they improve it they have to let others use the improvements too.

    That and it protects you like you want. Particularly section 15 and 16.

    1. Disclaimer of Warranty.

    THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

    1. Limitation of Liability.

    IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

    Alternatively you could use the MIT or BSD licenses, but they don’t have the “share alike” clause, so I tend not to recommend them.

    https://www.gnu.org/licenses/gpl-3.0.en.html






  • I don’t think it’s equivalent to sovereign citizens. OP is the author of their comment and therefore has the copyrights. As the author one can license their work as all rights reserved or other permissive licenses.

    OP chooses to license their work as Creative Commons.

    They’re not forcing you to accept the license, it’s your local government that enforces copyright.

    The reason why this might work on Lemmy but not on corporate Social media is that corporate social media often have terms of service that require you to give them ownership/rights/etc. Lemmy has no such ToC.


  • It’s government reporting data. If you find a better source I say go for it. But I used that data for salary negotiations in the past successfully.

    I’m not talking about take home. I’m talking about total annual compensation including things like RSU payouts etc.

    Even if we throw out the ones you doubt there are many 300k to 400k entries with the AI researcher title. If we add annualized RSU payouts we easily hit over €500k.

    At this point t though you are free to doubt me.




  • I see your point but like I think you underestimate the skill of coders. You make sure your timeout is inclusive of JavaScript run times. Maybe set a memory limit too. Like imagine you wanted to scrape the internet. You could solve all these tarpits. Any capable coder could. Now imagine a team of 20 of the best coders money can buy each paid 500.000€. They can certainly do the same.

    Like I see the appeal of running a tar pit. But like I don’t see how they can “trap” anyone but script kiddies.







  • I like the fact that it is a solid mandatory access control system. With SELinux you are substantially more safe than without.

    For example. Let’s say you are running a compromised version of OpenSSH. Threw a XZ style back door a hacker gets in as OpenSSH (which runs as root).

    Without SELinux the system is fully owned. With SELinux the attacker can only access what OpenSSH needs to access even if they have root. They can’t just chmod files and folders wherever. That means your photos and application data are still secure. With the pre written SELinux policies this applies not just for OpenSSH but for every piece of software installed on your system. Everything is limited to the exact folders, ports, and system capabilities that it needs and no more. Even stuff like seperate websites being served under Nginx. You can have Nginx-subgroup-1 and Nginx-subgroup-2 where the applications can’t see each other even though they are being run as the Nginx user.

    I don’t trust any Linux distro without this security layer.

    It’s a little difficult to learn and master, but it’s totally worth it if you care about security.

    Redhat put out a comic about it a few years ago explaining the basics. https://people.redhat.com/duffy/selinux/selinux-coloring-book_A4-Stapled.pdf