Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That seems like a dispute between the user of the device and the owner. If an unauthorized user used dd to wipe someone's computer without the owner's consent, you don't go after the FSF, you go after the person who ran the command.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: