TheImpressiveX@lemmy.ml to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 16 days agoThe official Nintendo Museum appears to be emulating SNES games on a Windows PC, which is slightly embarrassingwww.pcgamer.comexternal-linkmessage-square91fedilinkarrow-up1381arrow-down19cross-posted to: games@lemmy.world
arrow-up1372arrow-down1external-linkThe official Nintendo Museum appears to be emulating SNES games on a Windows PC, which is slightly embarrassingwww.pcgamer.comTheImpressiveX@lemmy.ml to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 16 days agomessage-square91fedilinkcross-posted to: games@lemmy.world
minus-squarecatsup@lemmy.onelinkfedilinkEnglisharrow-up6arrow-down2·15 days ago Proprietary encryption key What if the key was in a book? It would have to be protected by free-speech, which makes it uncensorable. What if the key contents were used as hex values to make a flag? Would you censor a flag too? No such thing as “proprietary encryption keys” exist.
minus-squarepearsaltchocolatebar@discuss.onlinelinkfedilinkEnglisharrow-up3arrow-down1·15 days agoThe key wasn’t used in a book or in the hex values for a flag. That’s like saying the formula for Coke can’t be proprietary because it could be put in a book. Software can absolutely be proprietary, and that key is part of the software.
minus-squarecelsiustimeline@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up2·14 days agoWhat if your hypothetical was real? Then you’d really have a strong argument!
minus-squarefar_university190@feddit.orglinkfedilinkEnglisharrow-up3·13 days agolook up 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 not hypothetical, real flag
What if the key was in a book? It would have to be protected by free-speech, which makes it uncensorable.
What if the key contents were used as hex values to make a flag? Would you censor a flag too?
No such thing as “proprietary encryption keys” exist.
The key wasn’t used in a book or in the hex values for a flag. That’s like saying the formula for Coke can’t be proprietary because it could be put in a book.
Software can absolutely be proprietary, and that key is part of the software.
deleted by creator
What if your hypothetical was real? Then you’d really have a strong argument!
look up 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0
not hypothetical, real flag