deleted by creator
deleted by creator
deleted by creator
deleted by creator
Hey, I tried to look this up on the web for the original news source, but didn’t find any. Can you please share the link? I’d like to share a more formal news story with my collaboration group.
deleted by creator
deleted by creator
It’s crazy how entitled journals feel to receive free content from researchers, extract free labour in the form of peer review, and then just slap their name on the content, and paywall the knowledge. The very knowledge that was generated from tax payer’s money.
Then they wonder why the academic community thinks poorly of journals and their lackeys.
Argh! my bonappletea moment.
deleted by creator
I would love to see tutorials on how to get these services as a website up and running.
Thanks. Rectified the spelling.
I’m a novice myself, so don’t expect an accurate and technical answer. My understanding is that the argument basically boils down to “claim versus veracity” on any vulnerabilities or compromises in the key.
How do you know there aren’t significant security vulnerabilities in the key, or that there aren’t backdoors?
The open source community have some excellent security experts who can check and let us know if all is good, or if something is off.
Please, I don’t mean to be thick, but can someone ELI10 ? I honestly read the article and the comments, but I don’t think I fully appreciate or understand the problem beyond the surface level (incompatible licenses). I mean, like so what? Who is screwing whom here? How are the going to circumvent this? And what tree are they referring to?