This is a read-only archive. Find the latest Linux articles, documentation, and answers at the new Linux.com!

Linux.com

Re:Whose hardware?

Posted by: Joseph Cooper on February 04, 2006 03:55 AM
I agree - on a case by case basis, there are good reasons for this stuff.

And honestly, who modifies their cell phone code?

If a manufacturer tells me they're not going to fix a bug, I buy from another manufacturer. That is a thousand times easier than hacking the phone.

It's sorta like the X-Box DRM, where you can't go on X-Box Live if a modified X-Box. It's ~your~ X-Box, not "loaned". You can modify it how the heck ever. But obviously it's not a good idea to put hacked X-Boxes on an online game cause then we end up with everything being like Diablo.

Remember Diablo? After a while it wasn't even a game anymore. Just a bunch of assholes hacking it so they can have level 1000000000 strength and one hit kill everyone and everything. That's not even a game, it's like a contest of who can type in a bigger number.

I like my personal computer how it is; Personalized. That's what a personal computer is. That's not, however, what a phone is supposed to do. A phone is supposed to be exactly the same as every other phone so it works with the network without flaw.

But I couldn't care less what my cell phone does so long as it can make calls. My calls. I don't want it to be modifiable so I (and by "I" I mean a greesy sexless hacker) can reprogram it to call 1-800-PHONSEX five times a day.

#

Return to Torvalds versus GPLv3 DRM restrictions