TheImpressiveX@lemmy.ml to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 30 days agoThe official Nintendo Museum appears to be emulating SNES games on a Windows PC, which is slightly embarrassingwww.pcgamer.comexternal-linkmessage-square83fedilinkarrow-up1234arrow-down15
arrow-up1229arrow-down1external-linkThe official Nintendo Museum appears to be emulating SNES games on a Windows PC, which is slightly embarrassingwww.pcgamer.comTheImpressiveX@lemmy.ml to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 30 days agomessage-square83fedilink
minus-squarecatsup@lemmy.onelinkfedilinkEnglisharrow-up4arrow-down1·28 days ago Proprietary encryption key What if the key was in a book? It would have to be protected by free-speech, which makes it uncensorable. What if the key contents were used as hex values to make a flag? Would you censor a flag too? No such thing as “proprietary encryption keys” exist.
minus-squarepearsaltchocolatebar@discuss.onlinelinkfedilinkEnglisharrow-up1arrow-down1·28 days agoThe key wasn’t used in a book or in the hex values for a flag. That’s like saying the formula for Coke can’t be proprietary because it could be put in a book. Software can absolutely be proprietary, and that key is part of the software.
minus-squarecelsiustimeline@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up0·27 days agoWhat if your hypothetical was real? Then you’d really have a strong argument!
minus-squarefar_university190@feddit.orglinkfedilinkEnglisharrow-up2·27 days agolook up 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 not hypothetical, real flag
What if the key was in a book? It would have to be protected by free-speech, which makes it uncensorable.
What if the key contents were used as hex values to make a flag? Would you censor a flag too?
No such thing as “proprietary encryption keys” exist.
The key wasn’t used in a book or in the hex values for a flag. That’s like saying the formula for Coke can’t be proprietary because it could be put in a book.
Software can absolutely be proprietary, and that key is part of the software.
What if your hypothetical was real? Then you’d really have a strong argument!
look up 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0
not hypothetical, real flag