<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mjg59</title><link>https://news.ycombinator.com/user?id=mjg59</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 05 Apr 2026 13:26:52 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mjg59" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>There's three steps here:<p>1) Obtaining the copyrighted works used for training. Anthropic did this without asking for the copyright holders' permission, which would be a copyright violation for any work that isn't under a license that grants permission to duplicate. The GFDL does, so no issue here.
2) Training the model. The case held that this was fair use, so no issue here.
3) Whether the output is a derivative work. If so then you get to figure out how the GFDL applies to the output, but to the best of my knowledge the case didn't ask this question so we don't know.</p>
]]></description><pubDate>Fri, 20 Mar 2026 18:39:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47458781</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47458781</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47458781</guid></item><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>No. The GFDL grants you permission to copy the work.</p>
]]></description><pubDate>Fri, 20 Mar 2026 15:53:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47456384</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47456384</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47456384</guid></item><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>No harm under copyright law</p>
]]></description><pubDate>Fri, 20 Mar 2026 15:51:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47456353</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47456353</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47456353</guid></item><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>The short answer is that we don't know. The longer answer based purely on this case is that there's an argument that training is fair use and so copyleft doesn't have any impact on the model, but this is one case in California and doesn't inherently set precedent in the US in general and has no impact at all on legal interpretations in other countries.</p>
]]></description><pubDate>Fri, 20 Mar 2026 08:29:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47451957</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47451957</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47451957</guid></item><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>If what you do with a copyrighted work is covered by fair use it doesn't matter what the license says - you can do it anyway. The GFDL imposes restrictions on <i>distribution</i>, not copying, so merely downloading a copy imposes no obligation on you and so isn't a copyright infringement either.<p>I used to be on the FSF board of directors. I have provided legal testimony regarding copyleft licenses. I am excruciatingly aware of the difference between a copyleft license and the public domain.</p>
]]></description><pubDate>Fri, 20 Mar 2026 08:25:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47451924</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47451924</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47451924</guid></item><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>No, it looks like the stance of the FSF is that models should be free as a matter of principle, the same as their stance when it comes to software. Nothing in the linked post contradicts the description that the judgement was that the training was fair use.</p>
]]></description><pubDate>Fri, 20 Mar 2026 08:21:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47451892</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47451892</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47451892</guid></item><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>Copyright infringement causes harm, so if there's no harm there's no infringement. You can freely duplicate GFDLed material, so downloading it isn't an infringement. If training a model on that downloaded material is fair use then there's no infringement.</p>
]]></description><pubDate>Fri, 20 Mar 2026 08:17:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47451868</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47451868</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47451868</guid></item><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>And the judgement said that the training was fair use, but that the duplication might be an infringement. The GFDL doesn't restrict duplication, only distribution, so if training on GFDLed material is fair use and not the creation of a derivative work then there's no damage.</p>
]]></description><pubDate>Fri, 20 Mar 2026 08:16:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47451857</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47451857</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47451857</guid></item><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>If it's pretty fucking simple, can you point to the statement in the linked post that supports this assertion? What it says is "According to the notice, the district court ruled that using the books to train LLMs was fair use", and while I accept that this doesn't mean the same would be true for software, I don't see anything in the FSF's post that contradicts the idea that training on GPLed software would also be fair use. I'm not passing a value judgement here, I'm a former board member of the FSF and I strongly believe in the value and effectiveness of copyleft licenses, I'm just asking how you get from what's in the post to such an absolute assertion.</p>
]]></description><pubDate>Fri, 20 Mar 2026 07:05:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47451401</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47451401</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47451401</guid></item><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>Is it? The FSF's description of the judgement is that the training was fair use, but that the actual downloading of the material may have been a copyright infringement. What software does the FSF hold copyright to that can't be downloaded freely? Under what circumstances would the FSF be in a position to influence the nature of a settlement if they weren't harmed?</p>
]]></description><pubDate>Fri, 20 Mar 2026 07:01:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47451369</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47451369</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47451369</guid></item><item><title><![CDATA[New comment by mjg59 in "FSF statement on copyright infringement lawsuit Bartz v. Anthropic"]]></title><description><![CDATA[
<p>Where's the threat? The FSF was notified that as part of the settlement in Bartz v. Anthropic they were potentially entitled to money, but in this case the works in question were released under a license that allowed free duplication and distribution so no harm was caused. There's then a note that <i>if</i> the FSF had been involved in such a suit they'd insist on any settlement requiring that the trained model be released under a free license. But they weren't, and they're not.<p>(Edit: In the event of it being changed to match the actual article title, the current subject line for this thread is " FSF Threatens Anthropic over Infringed Copyright: Share Your LLMs Freel")</p>
]]></description><pubDate>Fri, 20 Mar 2026 06:31:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47451192</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47451192</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47451192</guid></item><item><title><![CDATA[New comment by mjg59 in "Never Bet Against x86"]]></title><description><![CDATA[
<p>To respond in more detail: secure boot (as in the UEFI specification) does nothing to prevent a user from modifying their system firmware. Intel's Boot Guard and AMD's Platform Secure Boot do, to varying degrees of effectiveness, but they're not part of the UEFI spec and are not UEFI specific. I have replaced UEFI firmware on several systems with Coreboot (including having ported Coreboot to that hardware myself), I am extremely familiar with what's possible here.<p>> Trustzone usually runs code from eMMC.<p>This might be true in so far as the largest number of systems using Trustzone may be using eMMC, but there's nothing magical about eMMC here (my phone, which absolutely uses Trustzone, has no eMMC). But when you then go on to say:<p>> Without that key you can't update the code Trustzone executes. Only the manufacturer can update it.<p>you're describing the same sort of limitation that you decried with SMM. As commonly deployed, Trustzone is strictly <i>worse</i> for user freedom than SMM is. This isn't an advantage for Arm.<p>> Also, any ring -2 code can be used for secure boot locking the device to manufacturer approved OS<p>No, the secure boot code that implements cryptographic validation of the OS is typically running in an entirely normal CPU mode.<p>> enforce DRM<p>This is more typical, but only on Arm - on x86 it's typically running on the GPU in a more convoluted way.<p>> lock hardware upgrades and repairs<p>Typically no, because there's no need at all to do any sort of hardware binding at that level - you can implement it more easily in normal code, why make it harder?<p>> spy<p>When you're saying "can be used", what do you mean here? Code running in any execution environment is able to spy.<p>> call home<p>Code in SMM or Trustzone? That isn't literally impossible but it would be far from trivial, and I don't think we've seen examples of it that don't also involve OS-level components.<p>> install trojans by remote commands<p>Again, without OS support, I'm calling absolute bullshit on this. You're going to have an SMM trap on every network packet to check whether it's a remote command? You're going to understand a journaling filesystem and modify it in a way that remains consistent with whatever's in cache? This would be an absolute nightmare to implement in a reliable way.<p>> And you can't audit what it does.<p>Trustzone blobs do have a nasty habit of being encrypted, but SMM is just… sitting there. You can pull it out of your firmware. It's plain x86, an extremely well understood architecture with amazing reverse engineering tools. You can absolutely audit it, and in many ways it's easier to notice backdoors in binary than it is in source.<p>Trustzone is mostly deployed on Devicetree-based platform. What saves you here isn't the choice of firmware interface, it's whether the platform depends on hostile code. If you don't care about secure boot (or if you do but don't care about updating the validation keys at runtime), you can implement a functional UEFI/ACPI platform on x86 with zero SMM.</p>
]]></description><pubDate>Tue, 10 Mar 2026 01:04:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47317929</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47317929</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47317929</guid></item><item><title><![CDATA[New comment by mjg59 in "Never Bet Against x86"]]></title><description><![CDATA[
<p>You've managed to reference multiple concepts in a way that misrepesents basically all of them, well done.</p>
]]></description><pubDate>Mon, 09 Mar 2026 07:54:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47305996</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47305996</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47305996</guid></item><item><title><![CDATA[New comment by mjg59 in "Never Bet Against x86"]]></title><description><![CDATA[
<p>Could you please describe the meaningful difference between SMM and Trustzone, or why the properties of UEFI and ACPI are dangerous?</p>
]]></description><pubDate>Sun, 08 Mar 2026 06:26:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47295069</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47295069</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47295069</guid></item><item><title><![CDATA[New comment by mjg59 in "Never Bet Against x86"]]></title><description><![CDATA[
<p>Yes, and you can do this with ACPI as well. There's no difference between the inherent freedom of ACPI and Devicetree.</p>
]]></description><pubDate>Sun, 08 Mar 2026 06:25:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47295063</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47295063</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47295063</guid></item><item><title><![CDATA[New comment by mjg59 in "Never Bet Against x86"]]></title><description><![CDATA[
<p>What do you mean by "Dangerous capabilities"?</p>
]]></description><pubDate>Sat, 07 Mar 2026 22:59:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47292303</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47292303</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47292303</guid></item><item><title><![CDATA[New comment by mjg59 in "Never Bet Against x86"]]></title><description><![CDATA[
<p>You can convert ACPI bytecode back to source with iasl. No difference at all.</p>
]]></description><pubDate>Sat, 07 Mar 2026 22:58:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47292294</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47292294</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47292294</guid></item><item><title><![CDATA[New comment by mjg59 in "Never Bet Against x86"]]></title><description><![CDATA[
<p>I've a bunch of devices running coreboot with a Tianocore payload, but they're largely either very weird and now unavailable or I haven't upstreamed them so it's not super helpful, but it's absolutely not impossible and you can certainly buy Librebooted devices</p>
]]></description><pubDate>Sat, 07 Mar 2026 07:21:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47285305</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47285305</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47285305</guid></item><item><title><![CDATA[New comment by mjg59 in "Never Bet Against x86"]]></title><description><![CDATA[
<p>And you're stuck with whatever fucked up kernel the vendor gave you, assuming they even followed their obligations and gave you access to the source. The vast majority of x86 systems run mainline kernels because there's a sufficient level of abstraction. The number of Arm devices that's true for is a tiny percentage of the Arm devices out there running Linux.</p>
]]></description><pubDate>Sat, 07 Mar 2026 06:54:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47285152</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47285152</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47285152</guid></item><item><title><![CDATA[New comment by mjg59 in "Never Bet Against x86"]]></title><description><![CDATA[
<p>A DTB is a blob. Whether you have the source is a vendor decision, just like ACPI. There's no inherent difference here.</p>
]]></description><pubDate>Sat, 07 Mar 2026 06:51:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47285136</link><dc:creator>mjg59</dc:creator><comments>https://news.ycombinator.com/item?id=47285136</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47285136</guid></item></channel></rss>