▲ | regentbowerbird 2 months ago | ||||||||||||||||||||||||||||||||||
You only have to serve those requests if you distribute your changes yourself. So presumably as a hardware company you'd be offering your hardware with your custom linux installed, and then people wanting to audit or hack the product they bought would request the code from you. | |||||||||||||||||||||||||||||||||||
▲ | bluGill 2 months ago | parent [-] | ||||||||||||||||||||||||||||||||||
This is GPL2 - there is no requirement that you be able to install/use/hack the software, only that you get the same source. | |||||||||||||||||||||||||||||||||||
|