• 0 Posts
  • 84 Comments
Joined 3 years ago
cake
Cake day: July 1st, 2023

help-circle


  • A pull request is very much a proposal: It is a proposal to make specific changes to the code-base. The developers are not forced to accept it in any form, and discussions can take place in the pull request, should the developers (or third parties) not agree with (the exact form of) the proposed changes. Which is exactly what happened in the systemd pull request, to the extent that the actual developers had to lock the thread.

    In the case of systemd, the “someone”, or rather the “someones”, who accepted the pull request also included the lead developer on the project, namely Lennart Poettering. Who else do you propose should decide what pull requests and other proposals to accept?



  • Development stopped not because LILO didn’t need any changes, but because of its limitations (source):

    NOTE: I have finished development of LILO at December 2015 because of some limitations (e.g. with BTFS, GPT, RAID). If someone want to develop this nice software further, please let me know …

    Also, I dunno what your position is on this, but it is amusing to see calls for Canonical to replace GPL licensed software, with something with a more lenient license (BSD-3-clause). Normally that would cause outrage around here








  • That’s a lot less likely to be the case; I am aware of just one example of what you describe, and that’s the example you give, whereas I’ve “sped up” my own code many times, by accidentally breaking stuff.

    Rather than assume the presence of backdoors, the rational thing is simply to work out why you are seeing a difference in performance, and to determine if you fixed something by accident, or (the more likely scenario) if you broke something by accident







  • On windows if you don’t disable bitlocker, then login at least once to your outlook.com account so it can backup the key.

    That’s not a bad idea, but if you are going to be using Linux then I’d recommend exporting the key and, for example, saving it in your password manager and/or on a USB stick (preferably after encrypting it). That way you can easily decrypt the partition using dislocker. Also, personally, I do not want to my encryption keys to shared with Microsoft, but that’s just me ¯\(ツ)


  • Do yourself a favor and get a USB stick with Linux on it, regardless of whether or not you are going to use it to install Linux.

    When stuff breaks, you’ll regret not having a bootable media like that. Also, if you are using windows and Bitlocker (the default these days), then be sure to store your encryption keys somewhere, where you can easily access them. Otherwise you won’t be able to access your Windows drives