Linux
Welcome to c/linux!
Welcome to our thriving Linux community! Whether you're a seasoned Linux enthusiast or just starting your journey, we're excited to have you here. Explore, learn, and collaborate with like-minded individuals who share a passion for open-source software and the endless possibilities it offers. Together, let's dive into the world of Linux and embrace the power of freedom, customization, and innovation. Enjoy your stay and feel free to join the vibrant discussions that await you!
Rules:
-
Stay on topic: Posts and discussions should be related to Linux, open source software, and related technologies.
-
Be respectful: Treat fellow community members with respect and courtesy.
-
Quality over quantity: Share informative and thought-provoking content.
-
No spam or self-promotion: Avoid excessive self-promotion or spamming.
-
No NSFW adult content
-
Follow general lemmy guidelines.
view the rest of the comments
My ideal outcome here is that this stuff sparks a renaissance in covert, anonymous software development and distribution, and various infrastructure to support it. Ideally this should be standard; your work may at some point in the future be deemed illegal, at which point you can be forced to comply if you haven't protected yourself from the start. The most obvious solution is to manage projects from the start as if it was already illegal; carefully conceal your identity before it's technically required to do so, then when draconian laws show up just carry on as normal.