General statistics
List of Youtube channels
Youtube commenter search
Distinguished comments
About
dkosmari
The Lunduke Journal
comments
Comments by "dkosmari" (@dkosmari) on "The Lunduke Journal" channel.
Previous
2
Next
...
All
Greg Korah-Hartman glows.
9
Not the first time the Smithsonian tried to peddle lies. They lied about the invention of the airplane, falsely claiming Samuel Langley's aerodrome flew, when there was no evidence or witness that it ever flew. For 40 years, the Smithsonian denied the Wrights, when everyone else in the world, even the French, recognized them as the true pioneers of flying.
8
Because 1) the decree (not law) is broad enough to forbid all contracts relating to software and 2) legal precedent said that conforming to a license such as the GPL counts as entering a legal contract.
8
@AsAs-nd7gy "Just accept your guilt and apologize to the bolshevik inquisitors" is not being neutral.
8
Fun fact: web browsers are the only type of software where the cache makes it slower.
7
Yeah, Firefox is gone. Now I need an alternative to Thunderbird.
7
Her Wikipedia claims all she ever did was write a LED driver for Android. Linux had LED drivers long before Android existed. In fact, plenty of Computer Sciences/Engineering courses had a project/assignment to write some I/O driver for Linux (or Minix) to control LEDs or step motors; it's not a particularly challenging task. She did basically nothing, and got into a position of privilege in the project, and immediately started controlling everyone's language. She's the one that banned "master/slave", "whitelist", "blacklist."
7
Pretending the hardest, yes, they were.
7
If the attacker can get into your "protected" local network through some other means, and send out UDP packets, you're still vulnerable. That mere intrusion of your local network trivially turns into escalation to root on all desktop machines. Some distros will even share discovered printers by default, so the user doesn't even have to start a printing job on the malicious printer, that will do that step too.
7
Are you a tourist? Arch is just as bad. Why would you brag about using a woke distro?
7
@zyxzevn You can do the same in C, using `malloc()` and no `free()`. Memory safety has never been easier!
7
"Incorrect 1/3 of the time" is absurdly optimistic. The error rate grows up so fast for each new qubit you add, we have to ask "how many nines in 99.9999...." to talk about the error rate.
7
@yoppindia Selling has nothing to do with copyright, or kids wouldn't end up sued for downloading and sharing movies and games for free.
7
The real question is: will Bryan learn to pronounce "Mozilla" before it disappears?
7
He's been a lolcow for a while, loud enough to earn him a thread on the fruit farms.
7
3 of these myths were taught to me in university, by my professors. You're a bit off the mark by blaming the media; even the academic history books spread the myths. The Ada Lovelace myth I figured out on my own very quickly, but the others I never bothered to look up because they felt like irrelevant factoids.
7
Who's this Shuah Khan that's calling the shots? Her Wikipedia page says all she contributed was LED drivers for Android... talk about diversity hire...
6
Yeah, now the project needs to set up a payment system in order to even exist. And the legitimate user reporting a bug, needs to register with some payment system. You clearly didn't think this through, huh? That's a sure way to kill all community participation with the project.
6
@yoeight Mald and dilate.
6
You're way off the mark. Same thing happened with video games. It's the lack of gate keeping. Open Source threw away the main gate keeping requirement from Free Software, which was freedom. So it immediately got taken over by corporate interests, and now ideological agents.
6
@paulw5039 not even on paper. I challenge you to find a single paragraph of Karl Marx promoting freedom in any form.
6
@pavel9652 You're clearly one of the scammers shown in this video. Yes, that report shown was malicious. You have to be very dishonest to claim otherwise.
6
@kvdrr Tell us you didn't watch the video, without telling us you didn't watch the video.
6
I tested gimp 2.99 last month, it was crashing a lot even when only doing basic pixel editing (no filters, no plugins). Thankfully gimp 2.10 was able to open the same .xcf files, and allowed me to finish my work without having to start from scratch.
6
And how long does it take you to tell it doesn't make sense? You get a full bug report, with "steps to reproduce", with "sample configuration", with "compilation options", with code fragments showing where the bug is manifesting, etc. How can you tell it's slop? How long does it take to notice something is off? You're thinking of 1 AI slop bug report out of 10 reports. What if it's 90 out of 100?
6
That's what he meant, yes. But there are plenty of ways to break into a private network, and this vulnerability becomes a "free telnet root login with no password" for an attacker.
6
It's even easier to add security holes in proprietary software. If that convoluted backdoor was implemented in a proprietary Microsoft DLL, we might have never known about it.
5
Struggle Sessions. Linux is undergoing a Cultural Revolution, there will be nothing left.
5
It wasn't the first. Claiming it was the first, is the myth.
5
The bug caused by a real bug, that was a real incident in 1947. It wasn't the first computer bug, by a long shot. It wasn't the first use of the word bug to refer to a malfunction. Thomas Edison used it in 1878; the term was common for both mechanical machines and electrical circuits, before computers existed.
5
If Rust programmers spent half the time they proselytize in actually coding a kernel, they'd be done by now.
5
Not to mention, they increase waste of RAM and disk storage. There's also a lot of compatibility problems when said app needs to break out of the container in order to interact with the system. It's common to find users reporting bugs about certain packages, only to "resolve" the bug by installing a native package. And let's not even get into the whole security nightmare that these packages introduce, by bundling their own runtime environment, that might not get security updates regularly like your distro.
5
This is not "open source." This is an industry standard. Most of the software in the world runs either C or C++ code. There's a large overlap between the C and C++ working groups; if this guy is banned from the C++ WG, he's also banned from the C WG. This will have consequences to the Microsoft compiler, the Google compiler, the GNU compiler, etc. It's far beyond "open source." This is equivalent to the International System of Units deciding to sabotage the meter and the second units.
5
Are you aware that KDE runs on top of GNOME libraries for nearly 2 decades now?
4
Time to check out Enlightenment again.
4
Simone said it's "been running on everything for 20 years", but systemd is only 14 years old.
4
Exactly. Everyone bragging about their UDP ports not being exposed to the internet, are just one extra step away from getting rooted. You don't even need to break out of the Android sandbox to send out this trivial UDP packet, so your smart TV, your phone, etc, could be triggering the exploit in your local network.
4
You're terminally online.
4
Looked him up on the fruit farms yesterday. He appears to be big enough of a lolcow to do this.
4
Gnome Shell is implemented in JavaScript. I don't see JavaScript programmers bragging about how their magic programming language solves memory problems. In fact, most JavaScript programmers are so ashamed of their own language, they say "I'm a Node.js programmer."
4
@rapamune The main issue does not use buffer overflows. Keep crying, Ruster.
3
@marmadukemontague4081 Trump Derangement Syndrome.
3
It's not so much a design problem; it's a lack of funding and interest for the fundamental components of the system. Some old software, despite "working fine," is so ugly and convoluted, there's no saving, you're better off just writing a new implementation from scratch. See fontconfig for instance.
3
The bug is real. It wasn't the first computer bug. It wasn't the first bug that was a real bug. It wasn't the first use of the word "bug" for that purpose. Thomas Edison did use the term "bug" to refer to a malfunction in one of his machines, in 1878. That term was in common usage for both mechanical machines and electric circuits, long before that 1947 incident.
3
He literally isn't. He said, "why didn't you confess to your crimes so the show trial could be concluded quickly and we could go back to work?" He's an enabler, and his legacy will be taken from him, and burnt to the ground.
3
@tehehe5929 Sorry, I forgot to include idiots into the equation. Nobody wants AI surveilling their computers, except for idiots. And Windows users. But I repeat myself.
3
Nobody knows what the vulnerability is, and there's no fix available yet.
3
If the attacker gets into your network, and can send out UDP datagrams, you're vulnerable. So a non-root exploit on something like a router, a media player, a smart appliance, etc, can trivially root your desktop, because the UDP call is coming from inside the house.
3
@volodyanarchist Stroustrup said people should not have taken offense AND the author should have admitted to his guilt and changed the title as was demanded.
3
This is just as exploitable through TCP. The protocol has nothing to do with it. It's the bad architecture, plus bad default configs.
3
Previous
2
Next
...
All