• 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: July 14th, 2023

help-circle

  • If you are not a copyright holder, then you are not in a position to make any demands. I find it especially ironic, considering when the GPL was actually violated on multiple occasions, even as recently as a few months ago, nobody ever takes issue with that.

    Ironic that he says he understands licensing but doesn’t understand that, if you’re not a copyright holder, you don’t have standing to do anything about those violations. The Violations of GNU Licenses page states that if you see a violation, you should confirm the violation, collect as many details as you can, and then:

    Once you have collected the details, you should send a precise report to the copyright holders of the packages that are being wrongly distributed. The GNU licenses are copyright licenses; free licenses in general are based on copyright. In most countries only the copyright holders are legally empowered to act against violations.

    I remember reading about someone attempting to challenge that by suing for the rights that should have been conveyed to them by the infringer respecting copyright, but I wasn’t able to find anything on it. I did find references to people who were partial copyright holders being found to not have standing due to not having sufficient ownership to make a claim, though - see the outcome of https://sfconservancy.org/copyleft-compliance/vmware-lawsuit-faq.html










  • What exactly are you trusting a cert provider with and what are the security implications?

    End users trust the cert provider. The cert provider has a process that they use to determine if they can trust you.

    What attack vectors do you open yourself up to when trusting a certificate authority with your websites’ certificates?

    You’re not really trusting them with your certificates. You don’t give them your private key or anything like that, and the certs are visible to anyone navigating to your website.

    Your new vulnerabilities are basically limited to what you do for them - any changes you make to your domain’s DNS config, or anything you host, etc. - and depend on that introducing a vulnerability of its own. You also open a new phishing attack vector, where someone might contact you, posing as the certificate authority, and ask you to make a change that would introduce a vulnerability.

    In what way could it benefit security and/or privacy to utilize a paid service?

    For most use cases, as far as I know, it doesn’t.

    LetsEncrypt doesn’t offer EV or OV certificates, which you may need for your use case. However, these are mostly relevant at the enterprise level. Maybe you have a storefront and want an EV cert?

    LetsEncrypt also only offers community support, and if you set something up wrong you could be less secure.

    Other CAs may offer services that enhance privacy and security, as well, like scanning your site to confirm your config is sound… but the core offering isn’t really going to be different (aside from LE having intentionally short renewal periods), and theoretically you could get those same services from a different vendor.


  • It’s a bit unclear what you mean by “Apple” - I’m assuming you mean Safari on both Mac and iOS.

    The search engine I use is SearxNg. On Firefox on Mac it was pretty easy to add.

    To use it in Safari, I installed the Keyword Search extension from the App Store. It has the option to set a search engine as the default if you don’t use a keyword, so I did that. This works in both Mac and on iOS / iPadOS.

    There are other Safari extensions that do similar things, like Customize Search Engine (free). Kagi has an extension that can make Kagi the default search engine, for example (it doesn’t appear that there’s an equivalent for Startpage, though). I haven’t used anything other than Keyword Search for this, though.