this post was submitted on 14 May 2026
1383 points (99.2% liked)

Technology

84646 readers
4414 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Godort@lemmy.ca 82 points 1 day ago (3 children)

Jarczak’s fork crossed the line by injecting falsified identity metadata into its network communication. “In simple terms: it pretended to be the official Bambu Studio client when communicating with our servers.”

If it's easy enough to get access to your cloud infrastructure by just changing some metadata about the connection, then you really should re-think your authentication systems. If I were to publish the exact model and pinning of the lock on my house, it would be silly of me to be mad that someone used that to make their own keys.

[–] 4am@lemmy.zip 35 points 1 day ago (2 children)

The DMCA is literally written in a way that they could write “DO NOT USE” in a text file and include it with firmware and claim that using the firmware Ina way they didn’t like was “breaking a digital lock”

Honestly I’m perfectly fine with the DMCA just being entirely revoked at this point. It has enabled more bad than it has done good, even when things went “right”

[–] Venator@lemmy.nz 2 points 16 hours ago

what good has DMCA done???

[–] henfredemars@lemdro.id 3 points 22 hours ago

There are even supposed to be safe harbor protections, but the reality is that individuals don’t have the legal resources for it to matter.

[–] floquant@lemmy.dbzer0.com 10 points 1 day ago (1 children)

What, are they claiming the user agent their application uses is copyrightable IP?

[–] xthexder@l.sw0.com 22 points 1 day ago* (last edited 1 day ago) (2 children)

They're claiming that forking their open source code and using the user agent in it unchanged is "impersonation". And the only reason that might be an issue is because Section 1201 of the DMCA makes it illegal to break any digital lock, even if it's a shitty one. Whether this even counts as a lock is up for debate in my opinion, but that doesn't stop people from getting sued and owing lawyers money.

[–] masterofn001@lemmy.ca 14 points 1 day ago (1 children)

If you share the lock and the key with the public and tell them (via AGPL copyleft open source license) they may use, share, modify it (or not), etc with no penalty, and they even give you the secret knock, i can't in any way see how that's breaking a lock.

[–] Bazoogle@lemmy.world 3 points 21 hours ago

But they said don't use the key or the secret knock, otherwise they'll write a blog shit talking you.

[–] new_world_odor@lemmy.world 3 points 1 day ago

So if there is a legal battle, this would likely be the crux of their argument. Good to know.

[–] paraphrand@lemmy.world 11 points 1 day ago* (last edited 1 day ago) (2 children)

I dunno. Plenty of people have gotten in serious trouble for just accessing publicly reachable data and systems. And this was without identifying themselves as someone else or acting as someone else.

I wonder if the courts would agree with you. I don’t think “your lock was shitty” will hold up in court.

Maybe this is one of those cases where every single user of the software is liable since they are the one accessing the computer systems? But the software creator isn’t? I dunno.

This is just a comment on accessing computer systems. Not a comment on 3D printers or Louis.

[–] wintermute@discuss.tchncs.de 4 points 15 hours ago* (last edited 15 hours ago)

The impersonating metadata Bambu refers to is AFAIK only the User-Agent header in the request, and the forker didn’t “inject” or “falsify” anything, they just used that part of the open source code as it was provided by Bambu.

[–] deacon@lemmy.world 3 points 1 day ago

I’ve just been listening to the Origin of Consciousness in the Breakdown of The Bicameral mind and your username is a word I had to learn in the process.