Oof Sourceforge AND flatpaks? I’ll have to check this out but I’ll make sure I read it over well before anything.
Heratiki
I’m thinking the code is obfuscated by random calls to various functions so that the code block isn’t just one section you can easily see but sprinkled throughout instead.
Isn’t this the RockPi? Or is the RockPi just based on the RK3588? It’s great for open-source but good lord are these SBC’s astronomically high.
IRIX was Unix based with BSD extensions and I believe Maxx Interactive now runs on FreeBSD without Linux compatibility mode. So hopefully it won’t be long before it goes open source. Though I can’t understand why it would be needed outside of anything but nostalgia.
Android? It’s not wholly closed source similar to RedHat they’ve got closed source elements while using open source elements.
Linux and its kernel are based on GPL and so to distribute something using it would require a compatible license. That means a full distro can’t be anything but open source and actually be distributed in free or paid versions. That doesn’t mean there aren’t closed source interfaces being used personally or undistributed.
We had to walk a delicate line with our kids (2005-2017) when it came to interaction online. Never wanted them to feel like we were keeping them from experiencing the knowledge or social interaction the internet provided. But we also kept close tabs and paid special attention to specific behaviors. So if they were in their netbooks we’d make it a habit to walk behind them not to look but just to see what their reaction would be. Kids mostly know right from wrong and when they feel it “might” be wrong they try and hide it from their parents. If you pay attention you’ll see them “hiding” and that’s a sign to dig deeper. This way they maintain their privacy and any issues can be brought to light with them directly.
(Understand that the following will have specific details changed just for anonymity’s sake) Grooveshark was the first interaction we saw was troublesome. So we sat our daughter down and asked her direct why she was trying to hide her netbook from us seeing it and what had she been doing she felt she needed to hide? The alternative was to relinquish the netbook until she told us. Come to find out a friend of hers from school (female 2 years older) was trying to slowly convince her to lie to her parents and sneak off with her. Our daughter told us this because it scared her not because she would lose her access. We also stayed open and active with our kids indulging in the same things they were interested in (Minecraft, Guitar Hero, etc) regardless if it was explicitly something we enjoyed. So she didn’t lose access to Grooveshark because she really loved listening to music. We just kept an eye on it and she removed her friend from communication. We explained what she was likely attempting and her friend admitted to it. They’re not friends now but it never happened again.
Don’t get me wrong, we made tons of bad calls before we learned what worked. But the key to all of it is paying attention. Not hovering over them and stopping them from making mistakes. But watching the nuance of their interactions with everyone around them. If they start to get secretive then there is usually a reason. And it’s best to just talk to them about it. And if one conversation doesn’t do it then have multiple conversations. Listen to what they have to say and why they were being secretive. Works best when they’re not expecting it too (like in the middle of playing Minecraft together). Anyway that’s just IMHO.
I love Tabby simply because it allows me to set it up like the drop down terminal in Quake. Specifically its capabilities make my use of it easier and far more capable than something like guake.
Conveniently leaving out the loudest idiotic voices… nice.
It’s more than likely they “borrowed” some other Chinese company’s cloned Windows drive and used it for their install rather than roll their own. Could be they were malicious but coming out and claiming it was an error so quickly doesn’t really push that narrative hard.
According to this Tom’s Hardware article (https://www.tomshardware.com/desktops/mini-pcs/mini-pc-maker-ships-systems-with-factory-installed-spyware-acemagic-says-issue-was-contained-to-the-first-shipment) it isn’t firmware based spyware but just existing on the machine drive.
They were also found on the restore partition so a full wipe and fresh install would eliminate the issue. AceMagic have also claimed that the issue was isolated to the first round of shipments.
This is probably the worst website I’ve ever seen. 9000 ads for 15 words.