I dunno. Plenty of people have gotten in serious trouble for just accessing publicly reachable data and systems. And this was without identifying themselves as someone else or acting as someone else.
I wonder if the courts would agree with you. I don’t think “your lock was shitty” will hold up in court.
Maybe this is one of those cases where every single user of the software is liable since they are the one accessing the computer systems? But the software creator isn’t? I dunno.
This is just a comment on accessing computer systems. Not a comment on 3D printers or Louis.
The impersonating metadata Bambu refers to is AFAIK only the User-Agent header in the request, and the forker didn’t “inject” or “falsify” anything, they just used that part of the open source code as it was provided by Bambu.
I’ve just been listening to the Origin of Consciousness in the Breakdown of The Bicameral mind and your username is a word I had to learn in the process.
I dunno. Plenty of people have gotten in serious trouble for just accessing publicly reachable data and systems. And this was without identifying themselves as someone else or acting as someone else.
I wonder if the courts would agree with you. I don’t think “your lock was shitty” will hold up in court.
Maybe this is one of those cases where every single user of the software is liable since they are the one accessing the computer systems? But the software creator isn’t? I dunno.
This is just a comment on accessing computer systems. Not a comment on 3D printers or Louis.
The impersonating metadata Bambu refers to is AFAIK only the User-Agent header in the request, and the forker didn’t “inject” or “falsify” anything, they just used that part of the open source code as it was provided by Bambu.
I’ve just been listening to the Origin of Consciousness in the Breakdown of The Bicameral mind and your username is a word I had to learn in the process.