@wim_v12e@octodon.social
I'd like to read such blog.
I like the idea a lot in particular because it does NOT play well with typeclasses.
BTW, you should also add an example of interpretation.
Proprio no.
È il momento di passare ad https://e.foundation
---
RT @apple
È il momento di passare ad iPhone.
https://twitter.com/Apple/status/1263011988453588992
The Internet: To me it's the embodiment of "with great power comes great responsibility". So at it's most basic, how does it work? And how is it implemented in Linux?
Linux exposes this to userspace as (what ammounts to) a File subclass called "sockets", including userspace-callable initializers to open new ones.
Most of this is implemented within Linux, with only encryption (until, worryingly, recently) and the application-level in userspace.
1/?
Actually a clear separation between encryption&signing on one side and identity management in the other would allow to separate packaging, deployment and upgrade.
For example you could install the browser-only system on a server that do not provide any serverside scripting.
This would reduce the attack surface both for the server and for the visitor.
It's not safe(TM) anyway, but it could be useful in some self-hosted system.
Fine thanks!
A question: did you consider to separate the crypto functionality that can be executed in the browser and the identity related ones in two different applications?
While I don't like crypto done in Javascript, I think a clear separation of concerns would reduce the attack surface.
Interesting tool, good for self-hosting.
Where does cryptography happen? On the browser or on the server?
@grainloom @z428 @hansup @jamesmullarkey @bamfic @daniels @freedcreative
Here's the links:
https://rhapsode.adrian.geek.nz/
https://rhapsode.adrian.geek.nz/tv
P.S. Rhapsode does, and Haphaestus will, support Gemini. Work's ongoing for Gopher support.
So You Want To Write a Linux Userland? http://tilde.town/~elly/userland.txt
@michi@social.tchncs.de
I'll dive deeper into the Play Services thing. Actually I know about the advertising ID and routinarily change it (but I'd like an App that change it once an hour... i looked to write it myself but apparently I can't find the proper Android's API to use).
As for the Tor Browser's plugin, I'd say it doesn't take #uMatrix into account.
It prevents third parties HTTP requests to be sent, so there's nothing to anonymize.
Last night I described how scheduling works, and the min-heaps Linux uses to implement most of it's schedulers. But once we have multiple programs running (seamingly) simultaneously, we need a way for them to synchronize and communicate.
Producer-consumer queues (atomic ringbuffers) are arguably the easiest technique though mutex locks are often used too, both of which need lowlevel primitives to build upon.
Linux *really* needs this due to multiple cores and hardware interruptions!
1/3?
Uhm... good point!
Actually I did not think about them... but do they enable smartphones to use an ethernet connection?
That was the original plan, but I thought: let's try something anybody can do without voiding the warranty.
So far I only had to download one apk from apkmirror (printer driver) and I double checked SHA-256 from several sources.
Ultimately everything is fine.
Which is very interesting: it's a very simple way to avoid #SurveillanceCapitalism that does NOT require much technical knowledge once you know how to do it.
Do you use uBlock Origin? Did you know that you can use the Better Blocker block list on it?
Just add the rules from here:
https://better.fyi/blockerList.txt
PS. If you have other rule sets, I’d recommend not mixing them as we go to great pains to ensure that we don’t break sites while protecting your/our privacy. If you are mixing rulesets, we can’t help you if things break :)