That Zoom shut down accounts and calls where people were talking about Tiananmen Square is bad enough. But you need to understand the subtext: Zoom says that their calls are encrypted and private, and yet they can monitor them.
Those two things are mutually exclusive. This entire video chat system is built on a foundation of lies and backdoors.
“A female colleague and [I] had dared to discuss wage transparency and gender pay gap in the office … Unfortunately we miscalculated – our boss Matthias was beyond furious. After that office meeting, he told my colleague ‘there will be consequences.’ … I want to expose the hypocrisy and double standards in FSFE leadership. How the organisation ‘promoting’ transparency, equality and inclusivity treats employees and more specifically women.”
@jim Just the other day I had to deal with a internet broadcast platform that still was using Flash for its management interface...
@t0k @clacke @rysiek @jwildeboer @Steinar @benjaminpaikjones I haven't really looked at the last version yet. At first cursory glance I don't like it from a legal clarity viewpoint. It is very copyright-oriented, but without making clear what "property rights" are in play. Unlike the GPL which makes it abudantly clear that it is a copyright license first and foremost, and if necessary also a patent license.
@clacke @rysiek @jwildeboer @t0k @Steinar @benjaminpaikjones Yes, unless those designs would involve ASICs. Come to think of it, FPGAs are an interesting edge case here, again. Basically, in hardware you cannot solely rely on copyright because the "maker's mark" is not always there. So you end up with more exotic IPR that typically requires (some form of) registration (patents, semiconductor topologies). Which doesn't work too well with open hardware either. So, it's very, very messy.
@clacke @rysiek @jwildeboer @t0k @Steinar @benjaminpaikjones The notion of derivation is very much a copyright thing (and very fuzzy in copyright law). Like I said, the relationship between hardware and copyright is complicated and putting requirements on derivation may be moot if copyright is not in play to begin with. So it's nowhere near as binary as you present it. In a lot of cases the honest answer is "I don't know".
Do stuff with IT-contracts. Moonlight as digital rights activist. Innocent bystander in infosec scene.
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!