Evaluating the harm from closed source
Summary of `types of harm': “reliability harm”, “unhackability harm”, “agency harm”, “lock-in harm”, “amnesia harm”.
 Joshua Judson Rosen
Joshua Judson Rosen
             Summary of `types of harm': “reliability harm”, “unhackability harm”, “agency harm”, “lock-in harm”, “amnesia harm”.
 Joshua Judson Rosen
Joshua Judson Rosen
              Hacker Poesy is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.
      All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.
 All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.
