• 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: January 3rd, 2024

help-circle
  • MajorHavoc@programming.devtolinuxmemes@lemmy.worldKinda sus...
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    8 hours ago

    I had a hard time choosing a link. Searching GitHub for “F-Droid” reveals a long convoluted back-and-forth about meeting F-Droid’s requirements for reproducible builds. Signal is not, as of earlier today, listed on F-Droid.

    F-Droid’s reproducibility rules are meant to cut out the kind of shenanigans that would be necessary to hide a back door in the binaries.

    Again, this isn’t proof. But it’s beyond fishy for an open source security tool.

    Edit: And Signal’s official statements on the topic are always reasonable - but kind of bullshit.

    Reasonable in that I alwould absolutely accept that answer, if it were the first time that Signal rejected a contribution to add it to F-Droid.

    Bullshit in that it’s been a long time, lots of folks have volunteered to help, and Signal still isn’t available on F-Droid.


  • I don’t have such a source, but the Cybersecurity community throw accusations around easily, and are loathe to ever bless any software as completely innocent - which is a good thing.

    When the accusations stop, the issue has either been addressed (typical outcome), or the product owner was written off by the Cybersecurity community as a lost cause (rare, but it happens).



  • Or am I reading this wrong and this is just because they have to send your data to the brokers to process deletions?

    You are reading it correctly.

    If they only used your data to process deletions, it would read along the lines of “data shared with partners as necessary to provide (data deletion, etc) services.”

    It should also normally be followed by a sentence that links to each partners privacy policies, and says that each partner complies with similar restrictions on using your data only for the same purposes listed in the earlier sentence.


  • And it feels incredibly clunky to use with gdm when signing in, where no extension can help it…

    That’s true. Windows also did this badly, on the same tablet, so I didn’t notice.

    If KDE does better, I might switch. I think I would use my tablet un-docked more often if logging in wasn’t so clunky.






  • Lol. Even among those less stupid, most didn’t hire junior developers for the last three years, to hedge their bets.

    Well, it’s three years later, AI didn’t solve shit, and we are facing an entire missing cohort of senior developers.

    We’ve seen this before - back when web frameworks “made all of us obsolete” back in 2003.-

    Here’s what comes next:

    Everyone who needs a senior developer gets to start bidding up the prices of the missing senior developers. Since there simply aren’t enough to go around, the “find out” phase will be punctuated.

    Losing bidders get to pay 4x rates for 1/3 the output from consulting companies.

    Cheers!

    Source: I was made obsolete by web frameworks so hard that I entered a delusion where working with web frameworks just let us produce bigger buggier websites even faster - and where the demand for web developers skyrocketed and I made some seriously respectable money while helping train up junior developers to help address the severe shortage.


  • TL;DR - Google makes (arguably insane) claim that it previously acted responsibly with regards to fingerprinting, and says they will begin acting irresponsibility with fingerprinting in February.

    Practical take-aways you probably already knew:

    • Today’s Google may do or say anything to make an extra nickel.
    • Today’s Google, while it employs some excellent privacy minded engineers, has not demonstrated an organizational commitment to user privacy.
    • It is probably wise to assume that the next serious data breach at Google will end marriages, get politicians arrested, get famous people canceled, fuel successful scammers, and have every other privacy impact you can imagine. We know the Google data pool is massive, and we have reason to believe it is incredibly personal. I’m aware that Google has anonymozation solutions in play, and I do not believe those solutions will be effective in a breach scenario.
    • I believe that the average person will likely be better off ten years from now if they interact less with Google services.