> What is your process for automating this checksum twice a year?
Backup programs usually do that as a standard feature. Borg, for example, can do a simple checksum verification (for protection against bitrot) or a full repository verification (for protection against malicious modification).
Did my best to try to summarize the issue within the length limit but, hell, that's hard to explain with so little words. At least the actual post does a good summary of it.
> Are there any examples where legitimately purchased licenses were made unavailable?
From customers point of view, these purchases were legitimate.
But the important point is that they did it in the past and only the right balance between bad PR and expected profits will prevent them from doing again.
Brazil had a similar thing a few weeks ago, but it got drowned in the news because if was related to the Twitter/X block.
While the block itself may be legitimate, as the motivation was the refusal from X from deleting a few tweets doxxing a police investigator and his family members, the whole process was done in a few little short of a full blown dictatorship: one of the points of the court order demanded Google and Apple to remove all VPN apps from their stores, and some legal experts interpreted that as also ordering removal from the phones themselves. The justice that sent the order backtracked it later, but it was possible and the order was standing during that time.
The VPN issue got relatively little discussion on the press and too many people were too quick to equate criticism of the overly broad court order with defense of Twitter and Musk, so the well was poisoned from the start.
> I don't understand the hate. They did a very bad decision and had major backlash. Fast-forward one year: they rectified it completely, they greatly improved the free terms compared to what was before, they replaced the CEO and other involved executives.
But nothing prevent them from doing the same again if their indicators say it would be profitable. Developers just don't want to take the risk anymore.
Backup programs usually do that as a standard feature. Borg, for example, can do a simple checksum verification (for protection against bitrot) or a full repository verification (for protection against malicious modification).