• don
    link
    fedilink
    English
    6011 months ago

    This is like Apple telling its OS upgrade servers to reject hardware past a certain age, despite there being no issues running the latest version of MacOS on 5-8+ year old gear.

    This convinces the average user to toss their gear and needlessly buy new hardware, just so Apple can continue its march to a quintillion dollar valuation.

    This is late-stage capitalism at its finest, and the tech-savvy of us need to donate billions into Linux development post fucking haste. Maybe some kind of open hardware scanner can be developed. The corporate greed needs to be killed with prejudice.

    • Squirrel
      link
      fedilink
      911 months ago

      I don’t see that as being the same. And an 8+ year old computer is pretty old. Maybe the latest Mac or windows would work and maybe not, but it’s unrealistic to expect support for something that dated. However, you are still not prevented from using your old computer. You can continue using an older, supported version of Mac or windows or just install Linux. So your analogy breaks down fairly quickly.

      A more apt analogy is if the OS manufacturer doesn’t let you use your computer without premium internet access that you must subscribe to through them.

      • @secret301@sh.itjust.works
        link
        fedilink
        English
        1311 months ago

        The problem is we aren’t asking for support we’re just asking that they don’t go out of their way to not support it.

          • @secret301@sh.itjust.works
            link
            fedilink
            English
            511 months ago

            Bro they literally have to go out of their way to make sure you can’t easily update your operating system. They could just say after this time we don’t give support but you can still download the update that’s there either way.

            • @InvertedParallax@lemm.ee
              link
              fedilink
              English
              411 months ago

              The updates are cryptographically authenticated and use closed source code.

              You can’t write or build or update them, and that is all by their explicit design.