From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_ADSP_CUSTOM_MED, DKIM_INVALID,DKIM_SIGNED,FREEMAIL_FROM,MAILING_LIST_MULTI, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 16560 invoked from network); 8 Sep 2022 16:49:09 -0000 Received: from minnie.tuhs.org (50.116.15.146) by inbox.vuxu.org with ESMTPUTF8; 8 Sep 2022 16:49:09 -0000 Received: from minnie.tuhs.org (localhost [IPv6:::1]) by minnie.tuhs.org (Postfix) with ESMTP id 08D6A4179D; Fri, 9 Sep 2022 02:49:02 +1000 (AEST) Received: from mail-yb1-f169.google.com (mail-yb1-f169.google.com [209.85.219.169]) by minnie.tuhs.org (Postfix) with ESMTPS id 9A9AD4179C for ; Fri, 9 Sep 2022 02:48:57 +1000 (AEST) Received: by mail-yb1-f169.google.com with SMTP id b136so6603574yba.2 for ; Thu, 08 Sep 2022 09:48:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:references:in-reply-to :mime-version:from:to:cc:subject:date; bh=azvA5b/DaY9arRQPCP17yny09lF4zNI+rgYHwufLSFE=; b=NIi1bA0j3QjLJkcfdyLJKiEwGwlOOyO8WPVKFTtmUVIlvo8TGrRR2xfMadWQuRmRUm oparSAAuEy/Pfgo4s9WFpLL/Waa5PyoOWCF+8oB6AVMWtdDkEUBSV3k+0seeX+5JFDBp amHqpZbbL2qQwkFDmdm9y6jG6ac2PqyxMAivV76SnBspdG2vrIfdc9BCbXsagzZ4FGXM Vi8pPPkY7/3A79o6+PGvn/HgykOAfsmaEZ14bEeujm19Hc0EOdRzXFbD2UI3lwQPPVlA lSmTxOZczdyP1YY8ekkWhNyhBtrR0M5QA8uqf6wUNMRFQHVbVKu17504p6nlf6JjUyUH oCOA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:references:in-reply-to :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=azvA5b/DaY9arRQPCP17yny09lF4zNI+rgYHwufLSFE=; b=4hcPLJFO39/C6sTM4SbeRp3cxO0emXs9h2avCZzuurzI3nR25qNrgBpfHEcMLJyNsN DQYaI7cJtpk2FqaEtzZqab8+iWjNYJUW5MJAX+1ywiTOQvlkP7kM3sZHmavYNM1yfwfS Z68G2NxKEvNIgOrXTJQA9fjBdpf/YmFzT6fOLC36AgNCfO+SPDJYYkWRB+q+0iUOrdhx ZBVrgLEjXmeyhez5P/Lo91G0TnhxxS4NJQaO594JKjJkCMETi1yho5pRCeqanaHGeKYW jmIce56MIBKL829PvQmYbDnE1Vinb06tRMWxxa7QvW8jmS4xyfDgciTsaNf4OoRNk1IG 8zXg== X-Gm-Message-State: ACgBeo3YYooTC9+u7kPVTJhQAiVM0nkMQsUWleewwsEF1g27I+P1QGoA WlIK3Fi6a9L7sY+XB0MIHCNUuhyzjEUMtsCyRsk= X-Google-Smtp-Source: AA6agR6phuif3HIi4/qdGiY0OBtj8a/M0sNfQUB53n/wglX+c6frmqLIkKsdJTODCY/zw+fbzGopS0gOQlIoKcEu82k= X-Received: by 2002:a25:ca90:0:b0:6a9:ffe:1102 with SMTP id a138-20020a25ca90000000b006a90ffe1102mr8474882ybg.617.1662655676987; Thu, 08 Sep 2022 09:47:56 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a05:7000:660d:0:0:0:0 with HTTP; Thu, 8 Sep 2022 09:47:56 -0700 (PDT) In-Reply-To: References: <20220907145631.GN31856@mcvoy.com> <8DDF5A51-AABF-41AF-993C-4D087903BDC9@canb.auug.org.au> From: Paul Winalski Date: Thu, 8 Sep 2022 12:47:56 -0400 Message-ID: To: Warner Losh Content-Type: text/plain; charset="UTF-8" Message-ID-Hash: IYJ3XXRKXWFXNTUPBPIGZ52NTFJFB3N4 X-Message-ID-Hash: IYJ3XXRKXWFXNTUPBPIGZ52NTFJFB3N4 X-MailFrom: paul.winalski@gmail.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tuhs.tuhs.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: Steve Jenkin , TUHS X-Mailman-Version: 3.3.6b1 Precedence: list Subject: [TUHS] Re: Has this been discussed on-list? How Unix changed Software. List-Id: The Unix Heritage Society mailing list Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: On 9/8/22, Warner Losh wrote: > > In addition, when Dennis would talk about Coherent and his evaluation of > the source code, he said he used the known to him, but not widely known > bugs in Unix to try to catch copying. If there was copying, those would be > copied. If it was freshly implemented, there's a high likelihood that they > wouldn't. His conclusion was that someone had access to a lot of knowledge > about the Unix system given the fidelity of the implementation, but the > lack of bugs and novel ways of doing it suggested independent > implementation. The software equivalent of a common technique used by mapmakers to detect copying. You sprinkle a few fake locations or other deliberate errors into your map. If these show up in a competitor's map you know they were copied. -Paul W.