Admin of lemmy.name - I like self hosting, 3D printing, video games, generative AI, among other things

he/him

  • 6 Posts
  • 26 Comments
Joined 1 year ago
cake
Cake day: June 21st, 2023

help-circle



  • aranym@lemmy.nametoFediverse@lemmy.worldHow should we be using Lemmy?
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    edit-2
    1 year ago

    I personally host my own instance, from which I interact with communities on many other instances.

    This ensures my Lemmy account can’t just be decimated because my admin decided to stop maintaining their instance and I avoid defederation that can block content I’m interested in (including the infighting among larger instances.)



  • Even if the big players choose not to accept mail from us, we can accept mail from each other.

    Yes, but my point was that those operators make up the vast majority of email accounts. Yes, all of your smaller servers can communicate with each other, but that doesn’t matter when like 99.5% of the time, your target recipient will NOT be another small server.

    Yes, email and ActivityPub are both decentralized, but that’s about where the similarities end. Email, as a decentralized protocol, has been an abject failure. It is well known that big players DO actively block email from smaller servers often. Your individual experience is irrelevant. (For more details, see the thread at https://twitter.com/cfenollosa/status/1566484145446027265?lang=en)


  • The idea that email is “truly open” demonstrates a ton of ignorance on this topic. Email is entirely controlled by like less than 20 large operators, who often completely ignore email from smaller servers.

    Email is literally one of the worst examples of an open protocol. The fact that this person thinks for a second it is even comparable to ActivityPub in terms of openness should completely undermine their credibility in your mind.


  • As much as I don’t think the pact will do much, it’s their right to defederate whichever instances they want. The protocol is still “open and interoperable” and this does not change that - in fact, this move is only possible because of that openness.

    Your argument only sounds kinda sane when applied to Meta, but the same could be said about instances made by bad actors (spammers, for example). Please do further research before commenting on this.








  • Accidentally deleted my last comment… but a summary of what I had said, I don’t think it’s clickbait. This is an inflection point for the entire space and I actually considered changing the title because I didn’t think it properly expressed just how damaging it is. It restricts people receiving RHEL source, compromising existing derivatives and essentially closing off the possibility of any more. RHEL is an extremely influential distro, others will follow its lead. Also, it’s a copy and paste of the original title.

    If you think anything I’ve said here is incorrect or you have a different perspective, I’m totally open for discourse. Just don’t go around leaving negative comments without explaining yourself - I was hoping this community would be better than Reddit too.

    (Lemmy REALLY needs a confirmation box for that. Not the first time lol)


  • …I don’t see how this is clickbait, this is a major damaging move to downstream distros. They can no longer use RHEL source. Also, I just copy and pasted the original article’s title. RHEL is an extremely influential distro, others will follow its lead.

    I actually considered changing it at first because I didn’t think it properly conveyed just how damaging to open source this is. This is an inflection point for the entire space. Red Hat is one of the most influential distros and others will follow its lead.

    If you disagree with my take, fair, but tell me why. Same for all the people upvoting @carlyman’s comment. I want to have real discourse with you all, and I will change the title if you have good reasoning that it is in fact inaccurate. Like you said, we don’t want this to be like Reddit.


  • Another excerpt from the GPLv3 that explicitly describes and disallows what Red Hat is doing - you are explicitly not allowed to add any restrictions when you redistribute GPLv3 licensed software:

    If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term.
    

    …aaand an additional excerpt which disallows Red Hat’s restrictions:

    Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License.
    

    (note: “original licensors” is not Red Hat regarding any software other than their own. Red Hat cannot change or infringe upon rights received from upstream.)

    and ANOTHER excerpt:

    If you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code.
    

  • I was confused they didn’t think of this either, but the language in the license is very clear. I see no way it cannot be infringing - the only way you can be restricted from redistributing GPLv3’d source is if you publish it incorrectly. If you override these rights in any way, you lose your license to distribute the GPLed software and it turns into piracy.

    That’s ignoring the variety of other OSS licenses used for software in their repositories, many of which have similar (or even broader) redistribution rights.

    Relevant GPLv3 language:

    Section 4. Conveying Verbatim Copies.
    
    "You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program."
    
    
    Section 5. Conveying Modified Source Versions.
    
    "You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:
    a) The work must carry prominent notices stating that you modified it, and giving a relevant date.
    b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.
    c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it.
    d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so."