• 0 Posts
  • 42 Comments
Joined 1 year ago
cake
Cake day: August 15th, 2023

help-circle




  • Why does FUTO have to shoot itself in the foot?

    There is as far as I can tell no new actual license just a payment scheme and some shaming functionality. They even offer you the software if you don’t pay. Remember the GPL allows them to require payment to give you the software, they just can’t prohibit someone else giving you the software.

    However calling unpaid copies unlicensed is incorrect, they are licensed under the GPL (just like paid ones are).

    They should remove references to licensing and display something like “This instance of Immich has been paid/not been paid for.” Call the key PRODUCT key.

    Sure some find the “pay or shame” scheme distasteful but it is not against the GPL which allows commercial use.





  • No DRM digital files downloads is the simple answer. There is no reason to go back to physical media to avoid subscriptions.

    Keep in mind that DVDs did have DRM and the corps did try and get at the people who broke it. A new and improved physical media would have DRM and it’s possible the corporations will prevent it being defeated this time.

    Which means that yoy would only be able to play it on approved hardware. You can have your shiny disc but they will decide if you can play it. Perhaps they can detect how many people are present via a camera or require you do drink that verification can.




  • That… is not a study by anyone who knows what they are talking about. It also does not mention fingerprints at all.

    They seem to believe that the app can use permissions undeclared in the manifest file because they obviously think it’s only for the store to show the permissions to the user. Android will not actually allow an app to use undeclared permissions. The most rational explanation is the codebase is shared with different version of the app (possibly not released) that had different manifests.

    It also makes a big deal of checking if running as root. That is not evidence of having an escalation exploit. If they have an ability to get root before running the app why would they need to use the app to exploit it? They could just do whatever they wanted and avoid leaving traces in the app. Though I doubt they would root phones to just brick them. It’s the kind of mischief you would expect from a kid writing viruses, not an intelligence agency or criminal enterprise.

    Users who root their own phones are very unlikely to run temu as root. In fact a lot of apps related to shopping or banking try to detect root to refuse to work as your system is unsafely. In any case it’s a very niche group to target.

    To keep things short, that ‘study’ does not really look credible or written by actual experts.