On Saturday, February 1, 2025 3:33:35 PM CET Peter 'PMc' Much wrote:
> I tried to, but got the impression that the target audience is
> rather commercial providers of infrastructure services, like
> domain registrars and dns service providers. Not somebody like
> me who just runs a cloud infrastructure for their own purposes.

In all fairness, that is more or less how I currently run the software too. 
The end goal is commercial, sure, but it's still a few years off to get the 
legal kinks sorted out. Until then, this is a small individual operation just 
like yours.

> Exactly, that is the idea! And I love it - it allows me to NOT
> depend on service providers, to run my infrastructure in the way
> I like it, and to be in control. I don't like it when people want
> to tell me what is best for me to eat, or what is best for me to
> buy, or what is best for me to run my computers. I don't like it
> when people think they know better than me what is good for me.
> And anyway, what qualification do these people have?
> 
> But this is exactly what will disappear, and the road map is clear.

That is a sentiment that I share, strongly so. We should be able to use our 
computers however we want. And if we can perform the protocols involved, we 
should be able to go on the internet ourselves to perform them. Gate-keeping 
that should never be the norm. I'll return to this later.

> Because, for ordinary people, regulations are not necessary. Already
> now, if you want to get affordable prices at the supermarket, you
> have to buy a smartphone from one of only two software providers -
> and none of them gives you root access. (Or more cleariy, if someone
> doesn't get it yet: you DON'T OWN the thing, you merely pay for it).

This is something that I think deserves a bit more nuance. What you're 
referring to (rooting) is something I do think is by and large missing in the 
mobile market. Whether that is for security reasons or otherwise is a debate 
in its own right. Personally I share the sentiment of LineageOS on this 
matter. Keep root access available over ADB, but do not support root access 
managers like Magisk. It's just too easy for people to ruin their systems with 
those, because they don't necessarily see or even understand the commands 
being executed. It's hard to argue against that being risky, but that doesn't 
mean that it should be excluded entirely.

Another point worthy of nuance is that even if you do have root access to the 
device, you still don't necessarily control it. The argument I'm going to make 
here is the Tivo case. It's the "look but don't touch" argument. Even if you 
have root access, that doesn't necessarily mean that the system is open 
source. So you're still looking at unmodifiable binary blobs. Or even if you 
have the source code, it may not be able to build.. looking at you Mediatek, 
for what little source code of theirs is public to begin with. Or even if it 
is open source and it builds, you may not be able to flash it. That would be 
the case with Tivo, Samsung, and AVM to name a few.

With Samsung, there's hardware in place now (so-called e-fuses) that trip when 
the bootloader is unlocked. That, in turn, voids your warranty.. even for 
hardware failures that the software had nothing to do with. Even Google pulled 
that stunt before with their Nexus 6P fiasco. Lawsuit forced Google to issue 
refunds, but only to Americans with a receipt, and on devices that could prove 
the fault on official firmware. You had to disable half the CPU cores in a 
modified recovery to boot at all, so that was a catch-22. And it was vile. 
Those phones were a disaster.

With AVM meanwhile, I have one of their Fritz!Box 7490 routers. The firmware 
for that is based on Linux, and source code is available. Some people have 
even hacked on that firmware to create Freetz, a modified version of AVM's 
original firmware. But the forums are dead, were all in German, and the version 
of Ubuntu that was used to build the firmware is well out of date. So I 
couldn't build that firmware, much less flash it. And it's not like I can 
replace that router, because it's one of the few devices that Belgacom (the 
50%+1 share government-owned company that owns the phone lines) has 
whitelisted. Needless to say, that is next to their own devices which are even 
more locked in.

So yeah... Even if you have the source code, there are many compounding 
factors that still make it a case of "good luck using it". Look but don't 
touch.

> So, at some point not so far in the future, I imagine, running your
> own computer will simply become prohibited.
> Just like, you can be perfectly able to build a helicopter, but you
> will not be allowed to fly it. So why should one be allowed to run
> their own computer on the internet, and potentially pose a risk
> to the other users?

Now, to be fair, when actual safety is involved, that's perhaps a case where 
regulation is justified. It's more or less like that with the radios in mobile 
devices too. Not sure if that firmware should be proprietary, but allowing 
everyone to have an SDR in their pockets might not be a great idea either.

Granted, recently I did take apart a tablet of mine. It had an issue where the 
battery sat for too long and has discharged beyond recovery. The tablet boots 
up when an external power source is connected, but displays a "battery dead" 
message and just.. stays there. So I soldered some wires on the motherboard, 
which were test pads for the battery's connector. Positive and negative, and a 
mystery pad that could've been a thermistor in a past life. Monitoring the 
battery temperature would be a good idea. But that is apparently not what that 
pad does, because it refused to boot even with both the original battery and 
mine connected. It also refused to boot at all with a 10k resistor between it 
and ground, with only my healthy battery connected. So my guess is that that 
tablet has been chipped. And at that point, well... I could reverse engineer 
it I guess. But I don't have that kind of oscilloscope. Realistically, I could 
hope that replacement batteries for an obscure cheapo Medion tablet exist.. or 
I could just dunk it in the bin and go for the next tablet that's going to do 
exactly the same. I went for an iPad Air 2. That's something I've seen a lot 
in both tablets and laptops, and that kind of hostile engineering is something 
I strongly object to. Heh, maybe I should just go ahead and do that myself 
too. Electronics, sysadmin, development... shit never ends, does it.

-- 
Met vriendelijke groet,
Michael De Roover

Mail: i...@nixmagic.com
Web: michael.de.roover.eu.org


-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to