I wonder if Paul remembers that his company (Apple Corp.) had several trademark lawsuits[1] against Apple Computer over the name. Which is why System 7 had a alert sound called "sosumi".
By the same standard, Chrome itself is "a tool to download files from Google's servers." Chrome doesn't only download from Google's servers, but the same thing applies to yt-dlp.
I'm equally not "surprised" by their bad behavior, but that shouldn't stop us from condemning Google for unethically misleading people and engaging in browser monopoly abuse.
---
EDIT: holding up (hilariously) RIAA lawyers as ethical role models only proves my point, thanks.
Actually that is what they want you to believe. Behind the scenes, secretly Chrome is mostly "a tool to upload files to Google's servers" but because it does not require any actions from the user to do that, many people miss that part.
I am sure that RIAA lawyers would rofl at this yt-dlp labelling being an example of Google "... unethically misleading people and (committing) browser monopoly abuse". I want to live in that fantasy world with you though.
Come to our fantasy Linux land anytime you want. We circumvent all of the strange things both RIAA, MPAA, Google and many other companies do to attempt to lock information into a box with only one hole they allow you to look through.
Our fantasy land gets better every time your reality gets worse.
> Chrome itself is "a tool to download files from Google's servers."
...legitimately. While Google (I will reinforce: Google, not everyone) sees downloading of the videos and other content from the YouTube by third-party services as illegitimate because of YouTube's ToS. After all, they're making money from the YouTube Premium and "Download" option provided by it, so things like that are kinda expected to happen.
And no, I don't agree that it's right. While I can understand the position of Google, the method they (allegedly) used here... Well... I don't even know what to say. That's plainly wrong, in my opinion. After all, "download" is defined as "To transfer (data or a program) from a central computer or website to a peripheral computer or device." by The American Heritage Dictionary of the English Language (5th Edition), so when you just watch videos, you download them already, don't you? What about watching them in browser, somewhere in embed on some website? Does that constitute a legitimate client (I guess so, because most of embeds still use YouTube Player after all)? That just makes me laugh : )
The reason that has to be done is precisely that the law has no common, well-architected rationale. The vast majority of law in common-law jurisdictions is ad hoc precedent from decades or centuries ago, patchwork laws that match current, ephemeral intuition about what the law should be, etc. Perfect and inevitable enforcement makes this situation a nightmare, given the expectation that the average US citizen commits multiple felonies per day. Something will have to give.
I thought the AR UI in "Rainbow's End"[1] made more sense than hand gestures: with digital clothing, all of our movements become controls. And we each train our inputs according to our own slight tweaks and movements. Also, pretty sure this book was a big impetus for Google, Meta, etc to get started with AR, drones, and self-driving cars.
I only use authenticator with an old phone next to my work computer. No sim card, minimal apps. Don't do work apps on my main phone, especially InTune.
>> Abstractions often really do speed up production, but you pay the price in maintenance later on.
> What? I don't know what this means. Good abstractions allow us to better maintain code. Maintaining something that hasn't been structured into appropriate abstractions is a nightmare.
100% agree with this. Name it well, maintain it in one place ... profit.
It's the not abstracting up front that can catch you: The countless times I have been asked to add feature x, but that it is a one-off/PoC. Which sometimes even means it might not get the full TDD/IoC/feature flag treatment (which aren't always available depending upon the client's stack).
Then, months later get asked to created an entire application or feature set on top of that. Abstracting that one-off up into a method/function/class tags and bags it: it is now named and better documented. Can be visible in IDE, called from anywhere and looped over if need be.
There is obviously a limit to where the abstraction juice isn't worth the squeeze, but otherwise, it just adds superpowers as time goes on.
I mean, it’s sort of a vector. The malware itself can only be executed if you click a suspicious .lnk file. The moral here isn’t that subtitles are a “vector”, but to not indiscriminately run scripts.
Funny story, the lead on our Eastern European team told me a while back that he had to tell his team:
When the North Americans ask at the beginning of a meeting "How's it going?", they do NOT really want to know how you are doing. It's just social lubrication before getting to work.
Before that, we were getting to learn that their mother in-laws in town or different medical issues.
[1] https://en.wikipedia.org/wiki/Apple_Corps_v_Apple_Computer#S...
reply