Conversation

Replying to and
Again, they didn't submit these patches from university email addresses and you're continuing to engage in slandering students not involved in it. That's unethical behavior too. Spreading misinformation as misdirection, especially attacking innocent people, is not okay.
2
Definitely not widely accepted that by using open source software, you inherently trust any random person able to submit code to a mailing list from Gmail. Pretty big difference between trusting the developers of a project and trusting anyone able to submit patches to it.
2
1
Replying to and
You're simply continuing to make disingenuous arguments. I never said anything of the kind. I'm well aware of the serious systemic security issues of the Linux kernel, which go way beyond an unsafe language and very lax code review. I really don't need you to explain it to me.
1
1
Replying to and
Clutching pearls? What? I'm simply explaining that to many people, the findings of the study are far from obvious. It was obvious to me, and clearly to you, but it isn't to many people. Scientific studies demonstrating something some people think is obvious aren't useless.
2
1
They could have found a way to do this kind of study in an ethical way, and I don't think it would be useless. Some projects have stricter code review, safer languages / architectures, etc. Some don't take public patches (SQLite). It's not universally the same situation at all.
1
Replying to and
They believe that C is the best choice of a language, a monolithic kernel is best architecture and everything being in the same Git repository is the best approach to development. As long as that's true, then there's certainly a reason to demonstrate that this is unworkable.
The scale of the kernel is not a problem they were given, but rather the development and architectural choice they made and continue to promote. They want a monolithic kernel. They want all drivers, etc. as part of the upstream project and deliberately make the alternatives hard.
1
Show replies