
In addition, the concept is rather silly, as one can just take a pseudonym without any of us knowing:
When I registered I was prompted to verify my identity by means of my
university email (as opposed to my gmail account), which would
complicate using a pseudonym.
This being said, I have no problem with this restriction. In fact,
trying to determine the origin of code before agreeing to distribute
it sounds like sound procedure.
Perhaps a good compromise would be the ability to hide the uploader on
the public website (thus preventing data mining)? From a users
perspective, the "Uploaded by" field of Hackage packages is somewhat
redundant in the presence of "Maintainer" and "Author" etc.
/Jonas
On 5 April 2010 01:58, Jesper Louis Andersen
On Mon, Apr 5, 2010 at 1:49 AM, Brandon S. Allbery KF8NH
wrote: Some people are paranoid about such things, for example because it would allow people to google-mine for things they'd rather a random HR person not reading by linking names together.
In addition, the concept is rather silly, as one can just take a pseudonym without any of us knowing:
Whats new: Thu Apr 1 13:37:00 UTC 2010 NicolasBourbaki algebre-1.0
History is ripe with examples of this.
-- J. _______________________________________________ Haskell-Cafe mailing list Haskell-Cafe@haskell.org http://www.haskell.org/mailman/listinfo/haskell-cafe