Yes, and get requests with the sensitive data as query parameters are often used to exfiltrate data. The attackers doesn't even need to set up a special handler, as long as they can read the access logs.
But similarly to you recommending the Osprey backpack to your friends because you are a happy customer, happy/successful customers of a dating site will spread the word.
I've always thought of it as: Stallman wants the code itself to enjoy freedom, more than caring about the freedom of the people who create and use that code.
I work directly with telcos. All text messages, calls, etc go through telco systems that are in data centers far from the towers. There is no benefit for one cell phone being geographically close to another to send spam messages.
They also used to offer source downloads to paying customers, but never claimed to be open source, because the licence they gave to customers to access that source did not allow for distribution. (It was meant for auditing, and help in building extensions, I think)
reply