Fine thanks!
A question: did you consider to separate the crypto functionality that can be executed in the browser and the identity related ones in two different applications?
While I don't like crypto done in Javascript, I think a clear separation of concerns would reduce the attack surface.
Interesting tool, good for self-hosting.
Where does cryptography happen? On the browser or on the server?
@grainloom @z428 @hansup @jamesmullarkey @bamfic @daniels @freedcreative
Here's the links:
https://rhapsode.adrian.geek.nz/
https://rhapsode.adrian.geek.nz/tv
P.S. Rhapsode does, and Haphaestus will, support Gemini. Work's ongoing for Gopher support.
So You Want To Write a Linux Userland? http://tilde.town/~elly/userland.txt
@michi@social.tchncs.de
I'll dive deeper into the Play Services thing. Actually I know about the advertising ID and routinarily change it (but I'd like an App that change it once an hour... i looked to write it myself but apparently I can't find the proper Android's API to use).
As for the Tor Browser's plugin, I'd say it doesn't take #uMatrix into account.
It prevents third parties HTTP requests to be sent, so there's nothing to anonymize.
Last night I described how scheduling works, and the min-heaps Linux uses to implement most of it's schedulers. But once we have multiple programs running (seamingly) simultaneously, we need a way for them to synchronize and communicate.
Producer-consumer queues (atomic ringbuffers) are arguably the easiest technique though mutex locks are often used too, both of which need lowlevel primitives to build upon.
Linux *really* needs this due to multiple cores and hardware interruptions!
1/3?
Uhm... good point!
Actually I did not think about them... but do they enable smartphones to use an ethernet connection?
That was the original plan, but I thought: let's try something anybody can do without voiding the warranty.
So far I only had to download one apk from apkmirror (printer driver) and I double checked SHA-256 from several sources.
Ultimately everything is fine.
Which is very interesting: it's a very simple way to avoid #SurveillanceCapitalism that does NOT require much technical knowledge once you know how to do it.
Do you use uBlock Origin? Did you know that you can use the Better Blocker block list on it?
Just add the rules from here:
https://better.fyi/blockerList.txt
PS. If you have other rule sets, I’d recommend not mixing them as we go to great pains to ensure that we don’t break sites while protecting your/our privacy. If you are mixing rulesets, we can’t help you if things break :)
I've had to buy an #Android phone for reasons and I decided to NOT setup ANY account. This means no properly working browser (as the preinstalled #Chrome cannot be considered properly working without #uMatrix and it doesn't let you install extensions without logging to chrome store) and no #Google Play Store, that require you to autheticate even just to download a #FreeSoftware #APK.
Well, with careful use of #FDroid, #HashDroid and #TorBrowser, #Firefox (obviously with uMatrix and proper tuning), #K9Mail, #Tutanota and few other tools... it's working like a charme!
I planned to root it and install #LineageOS (which is still an option) but not giving it any account and using TorBrowser (still with uMatrix) for anything that does not require authentication seems really... enough to get rid of Google!
Am I missing something obvious?
"The tech industry as a whole is having its own Eternal September. The world, with all its experiences and opinions, has come flooding in, and technologists are now reassessing the consequences of the systems and structures they have built or inherited. Some of these systems are social, and include the general modes of thought and expression that Hacker News embodies."
I'm mystified by this trope that hacker culture and Silicon Valley startup culture are one and the same.
Una bella scoperta: https://learning.garr.it/ e poi https://garr.tv formazione su tanti argomenti: #moodle #didatticaadistanza #h5p molto interessante
There are several cheap laptop that completely rely on WiFi. Chromebook are the first that come to mind.
As for smartphones, I have never seen one with ethernet either, but... why?
We are used to trust the air, but actually it'not that safe. One could argue that etherner connectors are huge compared to a 2020 smartphone, but if we evolved USB so far we could also build tiny ethernet connectors.
@elliptic@mstdn.io
I understand that uMatrix is an advanced tool, but I find NoScript' UI totally unusable.
I wonder how a normal user could comfigure it properly, if it's so confusing to me.
Take for example #Twitter: in the default #Tor's configuration, #NoScript doesn't block #Google #Analytics (!!!) and totally disabling it is several clicks afar.
Also, #uMatrix have a setting to delete cookies 60 minutes after it's last use.
Also it spoof referrers.
Now I think such features should be part of #Firefox itself, but at least #TorBrowser should implement them. At least on mobile, since few really click the Exit button (required to clear cookies on exit).
Worst trap is buying wireless-only laptop. Actually I why we still accept to buy smartphones without ethernet port. If we have USB-C, we could have a small ethernet connector too.
Wireless Is a Trap: https://www.lesswrong.com/posts/8hxvfZiqH24oqyr6y/wireless-is-a-trap