• WalnutLum@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    ·
    28 days ago

    You wouldn’t necessarily punish the person that modified Linux either, you’d punish the person that uses it for a nefarious purpose.

    Important distinction is the intention to deceive, not that the code/model was modified to be able to be used for nefarious purposes.