After reading through that fairly lengthy thread, I'm afraid that I can no longer tell exactly what is being proposed. Who has read access? Who has write access? Bugs are handled where, and by whom? Are we considering a fairly tightly controlled system, or a wild free-for-all? Exactly which problem are we proposing to solve here?
If someone could succinctly summarize the current schools of thought, I'd be quite indebted. Thanks, g2boojum
pgp7AyKI0mdf3.pgp
Description: PGP signature