Removing Google Pin and Pocket from Firefox
https://peertube.linuxrocks.online/videos/watch/2ff2facd-393d-4b61-8dd6-48b75e8edb5a
While this is the smartest objection to my usual comparison of free software and free speech, I think you are missing an important detail.
#FreeSoftware is a work-aroud to defeat unjust #Copyright laws.
If I take #Microsoft #Windows code (or executables, it doesn't change much), modify it and publicily share the result under any form, I'm going to be criminalised and actually indicted for copyright infridgement.
Now for a #hacker, programming is a form of expression just like writing is for everybody else.
International copyright laws and agreements is basically statal censorship for economical (thus ideological and political) gain.
Now, one might argue that #hackers are a tiny minority that do not deserve such right to expression and it have to sacrify it for the other mainstream programmers.
And it's surely true that the #OpenSource people did their best to take Free Software from hackers to turn it into an exploitative, ethically washed, #marketing tool.
And I agree that, because of that, we are reaching the limits of what a #copyleft licence, however strong, can protect.
For example, thanks to the progress of #hardware, we can all see that all free software copyleft forgot the right (duty?) to #SelfHosting.
But free software still stands as a tool to create a protected zone of free programming expression in a hostil environment ruled by (corporate friendly) copyright law.
Since copyright infrigement can lead hackers to statal jail, free software IS free speech.
@wim_v12e@octodon.social
Well... actually lambda calculus AND bb encoding. But I'm quite familiar with lambda calculus and I see that BB encoding can enhance what you can do with it.
@wim_v12e@octodon.social
I'd like to read such blog.
I like the idea a lot in particular because it does NOT play well with typeclasses.
BTW, you should also add an example of interpretation.
Proprio no.
È il momento di passare ad https://e.foundation
---
RT @apple
È il momento di passare ad iPhone.
https://twitter.com/Apple/status/1263011988453588992
The Internet: To me it's the embodiment of "with great power comes great responsibility". So at it's most basic, how does it work? And how is it implemented in Linux?
Linux exposes this to userspace as (what ammounts to) a File subclass called "sockets", including userspace-callable initializers to open new ones.
Most of this is implemented within Linux, with only encryption (until, worryingly, recently) and the application-level in userspace.
1/?
Actually a clear separation between encryption&signing on one side and identity management in the other would allow to separate packaging, deployment and upgrade.
For example you could install the browser-only system on a server that do not provide any serverside scripting.
This would reduce the attack surface both for the server and for the visitor.
It's not safe(TM) anyway, but it could be useful in some self-hosted system.
Fine thanks!
A question: did you consider to separate the crypto functionality that can be executed in the browser and the identity related ones in two different applications?
While I don't like crypto done in Javascript, I think a clear separation of concerns would reduce the attack surface.
Interesting tool, good for self-hosting.
Where does cryptography happen? On the browser or on the server?
@grainloom @z428 @hansup @jamesmullarkey @bamfic @daniels @freedcreative
Here's the links:
https://rhapsode.adrian.geek.nz/
https://rhapsode.adrian.geek.nz/tv
P.S. Rhapsode does, and Haphaestus will, support Gemini. Work's ongoing for Gopher support.
So You Want To Write a Linux Userland? http://tilde.town/~elly/userland.txt
@michi@social.tchncs.de
I'll dive deeper into the Play Services thing. Actually I know about the advertising ID and routinarily change it (but I'd like an App that change it once an hour... i looked to write it myself but apparently I can't find the proper Android's API to use).
As for the Tor Browser's plugin, I'd say it doesn't take #uMatrix into account.
It prevents third parties HTTP requests to be sent, so there's nothing to anonymize.
Last night I described how scheduling works, and the min-heaps Linux uses to implement most of it's schedulers. But once we have multiple programs running (seamingly) simultaneously, we need a way for them to synchronize and communicate.
Producer-consumer queues (atomic ringbuffers) are arguably the easiest technique though mutex locks are often used too, both of which need lowlevel primitives to build upon.
Linux *really* needs this due to multiple cores and hardware interruptions!
1/3?
Uhm... good point!
Actually I did not think about them... but do they enable smartphones to use an ethernet connection?