• 0 Posts
  • 28 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle

  • Most of those 90% of vendors are not big enough to pull it off. The ones with the muscle to do it successfully are apparently offered special deals by Google that make it not really worth it for them to spend the effort to try and invest in building their own store. Specially if doing so compromises that deal.

    Add to that the technical hurdles of trying to run a store in an OS managed by the competition and with increasingly tight security restrictions for functionality that is considered “system level” (eg. automatic updates on F-droid don’t work unless you root/flash the firmware…), to the point that you need to make your own OS/firmware if you want to be a real alternative with the same level of user friendliness.

    Then add the technical hurdles of installing/managing an alternative firmware for several phone models, to the point that it might be easier to become (or partner with) a phone manufacturer.

    Then add to that how competitive and ruthless the phone manufacturing market is, with very thin margins, and how reluctant people are to trying something that isn’t already mainstream and doesn’t have the fancy apps from the remaining 10% of successful big companies in the Play Store.

    A giant as big as Amazon tried to pull it off at a few of those levels (from running their own installable store on regular Android to making their own devices with their own firmware) and even with all the pull from Amazon it isn’t making much of a dent. And in some of the device categories (like the fire phones) they already gave up.


  • This is further crippled by how the increasingly tight security measures in Android make harder and harder to add functionality that is considered “system-level” and is as deeply integrated as the Play Store.

    You can’t simply install F-droid and expect the same level of user friendliness and automatic app updates as in the official Play Store. Without esoteric, hackish and warranty-voiding rooting methods, you need to give manual user confirmation for every small update. You need to update 30 apps that accumulated because you forgot to manually update each of them? get prepared for going 30 times thought the same process of pressing buttons and giving confirmation for each of them.


  • If your grocery store “willfully acquired or maintained monopoly power by engaging in anticompetitive conduct”… then you’d be actively and purposefully affecting the ability for anyone to “try to build an alternative to compete with [it]”.

    They aren’t asking Google to use a specific price, what they are asking is for them to stop offering special custom-made deals under the table for some of the partners with the intent of preventing competition. Nobody is stopping Google from offering the same fees to everyone indiscriminately… the issue is when they pick and choose with the purpose of minimizing/discouraging competition. Particularly when they are already the biggest one in their market by a wide margin, so they have a higher power/responsibility than a Mom’n’Pop store.



  • Will you be notified and asked permission before the page is loaded?

    I mean, even for self-signed/invalid certificates, most browsers allow you to optionally access the page anyway… it’ll show some error page first, but it’ll allow you to load it if you explicitly request to continue in the error page itself, right? and you’ll get an eye-catching red icon indicating the website is untrusted… why can’t browsers implement something similar to that? Just use a different icon and a different page/dialog to opt-in on first visit. Something that isn’t as strong as the error page, but that makes it clear to the user which organization/government is responsible for authorizing the access.

    But then again… why not simply have that website registered under .id.eu (for example) and have the EU use that DNS for registering/signing subdomains using eIDAS certificates? then there would be no risk for it to potentially poison other top-level domains if it’s compromised. And imho, it would be great if when a citizen gets their eIDAS certificate it comes with a personal domain that they can freely use.

    I feel I’m not fully understanding here neither what exactly is being asked nor the purpose for asking it.
    Is there some more clear and unbiased information on this? …the way they wanna call it “secret” is also very confusing to me, that smells of FUD… in which way is it “secret”? are there no public details about the request? “secret legislation” feels almost like an oximoron. I feel that what they want to say is that the controversial sections were introduced very late in the process, following some closed-door meetings, but that’s no the same thing as the legislation being “secret”…


  • coders revealed to 404 Media that “some of Kirsina’s Instagram posts are word-for-word copies of Sizovs’ LinkedIn posts, sometimes published more than a year later.” In addition, “some of the images [Kirsina] posted on Instagram show computer monitors with code that show her logged in under Sizovs’ name.” But perhaps most striking is the fact that an administrator told 404 Media that both Sizovs’ and Kirsina’s accounts were banned “multiple times” by the Lobste.rs coding forum for “sockpuppeting”—using a false identity to deceive others—in 2019 and 2020.

    Lol… for reference, this is the twitter account: https://nitter.net/UnicornCoding

    It’s full of advertisements about the DevTernity conference… as does the instagram, which has so many professional-looking photos that feel like she was an actual model, always with different backgrounds. Is the laptop wirelessly streaming to the ultrawide screen in her Twitter profile picture? because I see no cables, she’s not even connected to a charger, how long of a coding session can you have like that?



  • With the new European regulations Whatapp will soon be forced to offer some compatibility towards 3rd party apps, so there are chances that perhaps bridging in this way will become easier in the near future, or at least have some level of official support. But we won’t know for certain how will it work until it happens. All we know is that Whatsapp is currently working on a way for 3rd parties to connect with them.

    Personally, I’d hold for a bit to see where does that go and then decide what method to use.


  • Ideally, it would be a P2P protocol where the main seeder is either the content creator directly, or a service paid by the content creator (who is funded by their audience and/or sponsors).

    I believe there are many podcasts that work somewhat like that (minus the P2P part, they just simply use RSS). Some hosting services have features to insert ads into the audio podcast being hosted… so the content creators still can choose to do that if they want, but the advantage is that there’s isn’t a monopoly for a single hosting provider and you can access the podcasts from many different podcast apps without needing to rely on a specific website and company that decides how you can watch it.


  • Ferk@kbin.socialtoProgramming@programming.devWhy Git is hard
    link
    fedilink
    arrow-up
    10
    ·
    edit-2
    8 months ago

    It’s also kinda annoying to have a history full of “merge” commits polluting the commit messages and an entwined mix of parallel branches crossing each other at every merge all over the timeline. Rebasing makes things so much cleaner, keeping the branches separate until a proper merge is needed once the branch is ready.


  • Yes, I got your point. Mine was that many of the things we do (specially online) cannot be protected by trying to keep it “secret” in the way you previously described. Because they often involve a “Bob”, even if it’s one we sometimes don’t even notice.

    So it makes sense for someone to try and look for ways to at least get some level of protection from Alices in other ways than just “don’t tell Bob” even if they might not be flawless (you gave some examples of such ways in that last response).


  • That’s true, though personally I find a sort of warm feeling about the idea of my messages and content I produced being available for my descendants, beyond just my bank account.

    I wish I had a way to see how my great-grandparents were. What their life was like. That I could check out conversations they had in a public forum. Or see what hobbies they had… but life back then left no traces, so their thoughts were lost to time after my grandparents and my father went away. If they wrote any letters they were lost. So I’d be ok if one day one of my descendants has a way to see what accounts I used and they come upon this message when wondering about me. Like a time-traveling high-five from past-me to my relatives.



  • Systemd “enabled” services are literal symlinks… whenever a target runs, it tries to start also all the service files on its “wants” directory.

    You can literally enable any service for next boot by making a symlink in /etc/systemd/system/multi-user.target.wants/ (or whichever other target you want it to run on) as root (and installation scripts are run as root).

    ln -s /usr/lib/systemd/system/whatever.service  /etc/systemd/system/multi-user.target.wants/whatever.service
    
    

  • Personally, while I appreciate when people add a “snippet of explanation”, I do prefer that to be in the comments. Not as the main text of the submission.

    Making it part of the submission can feel like editorializing. If I want to read the artice, I read the article, if I want to read opinions / interpretations of the article, I read the comments.

    Using the “text snippet” for opinions or interpretations can cause bias… and it also might encourage people to repost the same content multiple times just so they can post with a different bias.

    I think the comment section is a more organized and suitable place for that. It also allows people to use their votes to decide whether the opinion/explanation deserves the upvote, separatelly from whether the link itself deserves promotion.


  • I think it’s also safe to presume that in the ultra future tech advanced society of Star Trek, they can remove the bacteria that causes body odor in humans.

    A lot of odor-causing bacteria are actually beneficial for us though. And what causes Vulcans to experience that “odor” might not be coming from bacteria to begin with… for all we know it might be one of the thousand of compounds that leak into the air we exhale directly from our lungs.

    Virtually every gas or volatile liquid is susceptible to cause odor. The only reason we interpret pure water as odorless/tasteless is because water is everywhere so our senses evolved in a way that it doesn’t trigger a response. There are many other compounds we don’t really perceive because we are used to them at the concentrations that exist in our breath.

    If let’s say an alien species is not used to having 78% Nitrogen in their atmosphere, and they happen to have receptors sensible enough, then being in a ship with breathable air similar to Earth might just make them puke in disgust after having a sniff of what we might consider “clean air”.

    I’d argue it’d make more sense for everyone to wear the equivalent of a high tech mask (supressants?) rather than having to re-engineer the biology of the species every time they encounter an alien that might have a different set of compounds they might find unpleasant.