• kylebaker@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 year ago

      Canonical has its own issues. Security updates to packages being put behind a paywall called “Ubuntu Pro” even during the LTS window is driving people away from Ubuntu right now as well.

      • dragonfly4933@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        1
        ·
        1 year ago

        Tbh, just stop using software well past it’s prime, or pay the cost of developing the fixes.

        Everything can’t be free, at some point it’s gotta cost something.

        • corsicanguppy@lemmy.ca
          link
          fedilink
          arrow-up
          1
          ·
          10 months ago

          Everything can’t be free, at some point it’s gotta cost something.

          Not everything is a “fuck you pay me” relationship. Being a dev who for years built a tool used by people on the daily, the entire thing was a labour of love and I was glad others used and improved it.

          I’m sorry you were raised so mercenary. American?

        • kylebaker@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 year ago

          If you want more info look here: https://ubuntu.com/security/esm

          Imagine if you were trying to keep compliance and suddenly a security update was an ESM package found in the Universe repo? To get that update installed you’d have to pay Ubuntu Pro for each host you have.

          They have a personal license like how Red Hat allows some licenses for personal use so if you have a few home machines it’s fine. But if you have a job that has a fleet? Not a fun time to suddenly need to pay for updates even during LTS window.

      • Raphael@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        1 year ago

        You mean the security updates they get for free from Debian?

        Or are they developing their own security patches and NOT pushing it back upstream?