The binaries in question are various GNU and FOSS tools from elsewhere, not part of the Ventoy project itself. So no, the Ventoy author does not own the copyright of the tools in question.
I can see that you’ve taken on a lot of the feedback from previous comments threads. This is great! Thank you.
And thank you for open sourcing it.
Question: I was using Quiblr before without logging in. If I sign up an account now and log in, will it transfer my locally stored data into the account to keep the recommendation (see more/see less) settings?
I think for now Forgejo is a drop-in replacement. However since they are a hard-fork, at some point in the future they will diverge enough to be mutually incompatible, so the clock is ticking on migrating.
deleted by creator
If you’re not storing on a filesystem that calculates and checks erasure codes then you can always generate PAR2 files yourself.
deleted by creator
What was your XMPP client connecting to? Was it a well-known public endpoint (that they could be whitelisting) or was it a private server? If the latter then that indicates that they are allowing arbitrary IP connections which in theory means that you should be able to proxy any traffic you want. I doubt they are doing DPI, since TLS makes this very difficult these days when you don’t control the certificate stores on the clients.
I’d imagine they’re relying on some combination of DNS whitelisting and port blocking which should be trivial to circumvent if you know ahead of time what traffic they allow through.
Add your name to our petition to help stop this part of the bill from becoming law.
Where can I find the text of the petition that they will be submitting to the French government? How do I know what I am signing if they don’t actually display the petition text?
It sounds like they have some nice improvements, but I wonder why they didn’t contribute them back to the original restic project.
I also wouldn’t rely on an immature piece of software to handle backups - you want to avoid as many risk factors as possible with backups, since when you need to restore you really need it to work.
Thanks for posting this. I’ve been meaning to write something similar for a while but never got around to it. I wish Restic would ship an official client application for managing this stuff!
If this is impersonation (which it looks to be) shouldn’t it be removed?
Are you going to set the precedent that impersonation of figures in the open source community is allowed?
Personally I would be in favor of removing this post until OP can provide proof of identity (eg. by posting something on the main github account corroborating this post).