> In addition, the concept is rather silly, as one can just take a > pseudonym without any of us knowing:
When I registered I was prompted to verify my identity by means of my university email (as opposed to my gmail account), which would complicate using a pseudonym. This being said, I have no problem with this restriction. In fact, trying to determine the origin of code before agreeing to distribute it sounds like sound procedure. Perhaps a good compromise would be the ability to hide the uploader on the public website (thus preventing data mining)? From a users perspective, the "Uploaded by" field of Hackage packages is somewhat redundant in the presence of "Maintainer" and "Author" etc. /Jonas On 5 April 2010 01:58, Jesper Louis Andersen <jesper.louis.ander...@gmail.com> wrote: > On Mon, Apr 5, 2010 at 1:49 AM, Brandon S. Allbery KF8NH > <allb...@ece.cmu.edu> wrote: > >> Some people are paranoid about such things, for example because it would >> allow people to google-mine for things they'd rather a random HR person not >> reading by linking names together. > > In addition, the concept is rather silly, as one can just take a > pseudonym without any of us knowing: > > Whats new: > Thu Apr 1 13:37:00 UTC 2010 NicolasBourbaki algebre-1.0 > > History is ripe with examples of this. > > -- > J. > _______________________________________________ > Haskell-Cafe mailing list > Haskell-Cafe@haskell.org > http://www.haskell.org/mailman/listinfo/haskell-cafe > _______________________________________________ Haskell-Cafe mailing list Haskell-Cafe@haskell.org http://www.haskell.org/mailman/listinfo/haskell-cafe