{"id":1925,"date":"2005-02-15T14:45:39","date_gmt":"2005-02-15T17:45:39","guid":{"rendered":"http:\/\/brockerhoff.net\/bb\/viewtopic.php?p=1089"},"modified":"2010-05-08T21:06:28","modified_gmt":"2010-05-09T00:06:28","slug":"re-transparency","status":"publish","type":"post","link":"https:\/\/brockerhoff.net\/blog\/2005\/02\/15\/re-transparency\/","title":{"rendered":"Re: Transparency"},"content":{"rendered":"<p>Regarding <a href=\"\/bb\/viewtopic.php?p=1084#1084\">issues of trust<\/a> between shareware authors and users, an interesting discussion has developed over on the <a href=\"\/bb\/viewtopic.php?p=1083#1083\">XRay 1.1 support forum<\/a>.<\/p>\n<p>It appears to be based on a difference of mindset between old-time Mac users and users coming in from Unix or Linux platforms. I&#8217;m squarely inside the first camp, of course, never having used Unix or Linux (nor Windows, either, except on a very few occasions).<\/p>\n<p><a href=\"\/xray\">XRay<\/a>&#8216;s original purpose, as regular readers well know, was to offer a user-friendly way to view and set file\/folder attributes, including BSD permission flags &#8211; the latter being a completely new concept to me and, judging by the software&#8217;s popularity, most Mac OS X users. As such, both the installation process and normal use try to insulate the user from the details as much as possible; the rationale being that anybody knowledgeable enough to use various Terminal commands such as chown and chmod would prefer using them directly, while old-time Mac users would prefer using XRay as a graphic wrapper for these commands.<\/p>\n<p>I think is this the second (or third?) time, in the 3+ years that XRay has been available, that a former Unix\/Linux user has thought that XRay&#8217;s installation procedure is &#8220;suspicious&#8221;; either because it asks for an administrator password to copy stuff into \/Library\/Application Support, or because it sets world-writeable permissions on the folders it creates there, or something. I must confess I had a hard time even understanding those arguments at first&#8230;<\/p>\n<p>Of course I&#8217;m concerned with that and will try to make the whole process more transparent, but I&#8217;m not entirely sure how to go about that. Should I ask the user first &#8220;are you an old-time Machead or a suspicious former Unixer?&#8221;&#8230; <img decoding=\"async\" src=\"\/blog\/wp-includes\/images\/smilies\/icon_lol.gif\" border=\"0\" alt=\"icon_lol.gif\" \/><\/p>\n<p>So far the least disagreeable solution seems to be to list, on demand, all steps that are done &#8211; or perhaps before each one is done &#8211; and explain why, and offer the user a chance not to do that, and say what restrictions will result from cancelling. Seems an awful lot of work, though, to accomodate a very small proportion of users.<\/p>\n<p>Comments?<\/p>\n<p><a rel=\"tag\" href=\"http:\/\/www.technorati.com\/tag\/Shareware\">Shareware<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Regarding issues of trust between shareware authors and users, an interesting discussion has developed over on the XRay 1.1 support forum. It appears to be based on a difference of mindset between old-time Mac users and users coming in from Unix or Linux platforms. I&#8217;m squarely inside the first camp, of course, never having used [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4,19],"tags":[29],"class_list":["post-1925","post","type-post","status-publish","format-standard","hentry","category-dev","category-software","tag-xray"],"featured_image_src":null,"author_info":{"display_name":"Rainer Brockerhoff","author_link":"https:\/\/brockerhoff.net\/blog\/author\/rbrockerhoff\/"},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1q3Zc-v3","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/brockerhoff.net\/blog\/wp-json\/wp\/v2\/posts\/1925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/brockerhoff.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/brockerhoff.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/brockerhoff.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/brockerhoff.net\/blog\/wp-json\/wp\/v2\/comments?post=1925"}],"version-history":[{"count":0,"href":"https:\/\/brockerhoff.net\/blog\/wp-json\/wp\/v2\/posts\/1925\/revisions"}],"wp:attachment":[{"href":"https:\/\/brockerhoff.net\/blog\/wp-json\/wp\/v2\/media?parent=1925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/brockerhoff.net\/blog\/wp-json\/wp\/v2\/categories?post=1925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/brockerhoff.net\/blog\/wp-json\/wp\/v2\/tags?post=1925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}