mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions.git
synced 2025-07-02 11:56:40 +00:00
Fixed typos and broken link
This commit is contained in:
parent
6eb68f0270
commit
dcf265743e
38 changed files with 88 additions and 88 deletions
|
@ -80,7 +80,7 @@
|
|||
<img src="1.png" class="imgRz">
|
||||
<p>The catch here is that when you try to reverse-engineer binary files, it's going to be very hard to figure out what the original source code was. This practice is called <a href="https://blog.nowhere.moe/binexp.html">Reverse Engineering</a>, a niche in cybersecurity, where someone tries to figure out what the original sourcecode was intended to be, with only the binary to work with.</p>
|
||||
<p>One thing is for sure: you can't arrive at the original sourcecode from just the binary. It's mostly guess work.</p>
|
||||
<p>Most software companies (which can be corporations) out there are greedy, they work hard to produce software, and they hate to have any competition. Hence they want keep their software sourcecode private, to make it as hard as possible to others to arrive at the same level of functionnality. That is exactly why closed source software is used by most people. </p>
|
||||
<p>Most software companies (which can be corporations) out there are greedy, they work hard to produce software, and they hate to have any competition. Hence they want keep their software sourcecode private, to make it as hard as possible to others to arrive at the same level of functionality. That is exactly why closed source software is used by most people. </p>
|
||||
|
||||
<p>The most popular example out there is Windows, they would definitely not like their sourcecode to be leaked/reversed like it with <a href="https://www.theverge.com/2018/2/8/16992626/apple-github-dmca-request-ios-iboot-source-code">Apple's IOS</a>.</p>
|
||||
</div>
|
||||
|
@ -125,7 +125,7 @@
|
|||
<li><p>It should not contain any telemetry, or any spyware.</p></li>
|
||||
<li><p>It should ONLY do what it was originally meant to do.</p></li>
|
||||
</ol>
|
||||
<p>By that standard, you can already discard software like Windows, Discord, Whatsapp, Instagram, iOS, pre-installed phone host OSes, Word, Excel, etc, as none of them are open source, and you can be damn sure that they are spying on everything you do, willfully or not. (ever since the US government passed the <a href="https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf">FISA section 702</a>.)</p>
|
||||
<p>By that standard, you can already discard software like Windows, Discord, Whatsapp, Instagram, iOS, pre-installed phone host OSes, Word, Excel, etc, as none of them are open source, and you can be damn sure that they are spying on everything you do, wilfully or not. (ever since the US government passed the <a href="https://www.dni.gov/files/icotr/Section702-Basics-Infographic.pdf">FISA section 702</a>.)</p>
|
||||
|
||||
<p><b>YOU CAN NEVER TRUST PEOPLE.</b></p>
|
||||
<p><b>SO YOU CAN'T TRUST THEIR CLOSED SOURCE SOFTWARE.</b></p>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue