← Back to context

Comment by crooked-v

4 years ago

Even that tenuous face value falls apart as soon as you consider that the person who clicks through the UI isn't necessarily the legal owner of the device.

That seems like a dispute between the user of the device and the owner. If an unauthorized user used dd to wipe someone's computer without the owner's consent, you don't go after the FSF, you go after the person who ran the command.