The "past event" taints everything going forward and for obvious good reason.
Conversation
Kernel maintainers being consistently dishonest taints the project. Misrepresenting what happened and making unjustified accusations against good faith contributions from students isn't a good look.
Slandering students there for something they didn't do really doesn't look good.
2
1
Saying the student submitted a do-nothing patch (at best) isn't slander
1
Huge difference between stating that you think the study was unethical (I fully agree) and attacking students that weren't involved in it and who have engaged in making substantial good faith and usually helpful contributions as part of these efforts.
1
2
Criticizing the study for unethical human experimentation makes sense. Attacking these students and spreading misinformation in a misguided attempt to defend the kernel's reputation is worse than what the study actually did. Kernel maintainers did most of the harm themselves...
1
2
I think their unethical study demonstrated something important and useful. Maybe I'll fund similar work. Maybe we won't tell them we did it like they did in this study. If that's a problem, well, that's the point. It's clear to a lot of us it's unworkable, but to most it isn't.
1
1
"I should do that unethical thing those guys did" isn't helping me see you or your argument in a better light.
1
It's not a literal statement. It's an explanation of why this is a problem. Depending on trusting that everyone in the world won't do this is a problem. The study was unethical, not malicious. Plenty of people have malicious intent. Someone could do it simply as trolling...
2
It's a problem because the kernel is really complicated code written in a really unsafe language.
Making the problem harder doesn't help anyone.
"It's possible to submit malicious code to open source projects" isn't a revelation by any metric.
1
1
It being possible to submit code is a lot different than it being possible to land malicious code.
The kernel being entirely written in a very unsafe language is part of the problem. That doesn't imply being able to so easily succeed in landing vulnerabilities in a project.
s/submit/land doesn't make it a revelation either. Of course open source is effectively build upon trust. And it's worth noting that the patches that most recently re-awakened this subject were actually "caught" pretty quickly.
1
Again, they didn't submit these patches from university email addresses and you're continuing to engage in slandering students not involved in it. That's unethical behavior too. Spreading misinformation as misdirection, especially attacking innocent people, is not okay.
2
Show replies

