DonutVeteran

joined 3 years ago
 

Miniflux - a self-hosted feed reader for the web! I found it while looking for a good desktop feed reader that could sync across devices. After setting it up I can access it on all platforms with a web browser, and there are even several Android clients if needed.

The reader is under the Apache 2 license, written in Go, and looks pretty nice, so wanted to share:

Github | Main site

[–] [email protected] 1 points 3 years ago

You've written a good analysis, OP. Yes, treating email and mastodon as equal forces in the fight for decentralization is inappropriate. However, email is not as one-sided as you have made it out to be:

  • Email does have a community element: mailing lists may be the most obvious example, but email does have the ability to drive community discussion. What is holding it back is obviously its age and ease of use.
  • Organizations use email: Many organizations will self-host email simply to manage mailing lists as well as email notifications. Having an email address at a domain signifies your membership in some sort of community; perhaps your workplace or school.
  • Ubiquity:
    • Email is still a more universal communication method than any other messaging protocol. You can probably reach anyone through email.
    • There are many organizations, communities, etc. offering email services. They must allow their users to communicate with other servers: no email provider is large enough to disregard all the other providers.
    • There is a widespread expectation that your email address will be able to reach any other email address. In this way it is the most federated, decentralized messaging protocol there is today.

I also have a point to make, both in reference to the blog post linked and your analysis: I would not dismiss federation because of some centralization of servers.

We have a case study in email to show us how a healthier (for all of its faults) federated system can survive without becoming wholly centralized. The best way to prevent centralization from dismantling federated systems is to build in an expectation that a server/service/offering in a federated system will always be able to communicate with another in the same system, like in email. As long as one federated server/service/offering/application does not become its own "brand" compared to the other servers and the base protocol/federated system is all the talk, all will be fine.

For example:

  • Let's chat with Element! vs Let's chat with Matrix!
  • Let's join Lemmy.ml! vs Let's join a Lemmy instance!
  • What's your Gmail? vs What's your email?
 

The analysis was possible because Bluetooth devices generally default to broadcasting their unique identities. Yet it appeared that of all the headphones picked up by Hegnes, none of them implemented address randomisation.

Without that randomisation, it was trivial for the devices to be pinged repeatedly, revealing their wearers' precise location as they travelled around the city of Oslo.

 

At a high level, netflow data creates a picture of traffic flow and volume across a network. It can show which server communicated with another, information that may ordinarily only be available to the server owner or the ISP carrying the traffic. Crucially, this data can be used for, among other things, tracking traffic through virtual private networks, which are used to mask where someone is connecting to a server from, and by extension, their approximate physical location.

 

While the language is still evolving, the proposal would seek to expand the definition of “broker” under section 6045(c)(1) of the Internal Revenue Code of 1986 to include anyone who is “responsible for and regularly providing any service effectuating transfers of digital assets” on behalf of another person. These newly defined brokers would be required to comply with IRS reporting requirements for brokers, including filing form 1099s with the IRS. That means they would have to collect user data, including users’ names and addresses.

The broad, confusing language leaves open a door for almost any entity within the cryptocurrency ecosystem to be considered a “broker”—including software developers and cryptocurrency startups that aren’t custodying or controlling assets on behalf of their users. It could even potentially implicate miners, those who confirm and verify blockchain transactions. The mandate to collect names, addresses, and transactions of customers means almost every company even tangentially related to cryptocurrency may suddenly be forced to surveil their users.

 

Large rightsholders—the major studios and record labels—and their lobbyists have done a very good job of divorcing copyright from debates about speech. The debate over the merits of the Digital Millennium Copyright Act (DMCA) is cast as “artists versus Big Tech.” But we must not forget that, at its core, copyright is a restriction on, as well as an engine for, expression.

[–] [email protected] 7 points 3 years ago

The IT security experts received the GEA-1 and GEA-2 algorithms from a source who wishes to remain anonymous and verified their authenticity in the first step. The ciphers had been used to encrypt data traffic over the 2G network, for example when sending emails or visiting websites. The researchers analysed how exactly the algorithms work. They showed that GEA-1 generates encryption keys that are subdivided into three parts, two of which are almost identical. Due to their architecture, these keys are relatively easy to guess.

. . .

The encryptions that GEA-1 and GEA-2 produce are so weak that they could be used to decrypt and read live encrypted data sent over 2G. Today, most data traffic is sent over the 4G network, also called LTE. Moreover, the data is now protected with additional transport encryption. Therefore, the researchers assume that the old vulnerabilities that still exist no longer pose a serious threat to users.

 

It’s important that the public sees documents like this…. The way companies try to silence victims is shocking.

  • Bryant Greening, LegalRideshare
 

The combined crypto market has swung through a range of more than $300 billion over the last week, with Elon Musk's pet project dogecoin ricocheting double-digit percentages and giving weary traders whiplash.

 

NSO Group claims that its Pegasus spyware is only used to “investigate terrorism and crime” and “leaves no traces whatsoever”. This Forensic Methodology Report shows that neither of these statements are true. This report accompanies the release of the Pegasus Project, a collaborative investigation that involves more than 80 journalists from 17 media organizations in 10 countries coordinated by Forbidden Stories with technical support of Amnesty International’s Security Lab.

[–] [email protected] 2 points 3 years ago (3 children)
[–] [email protected] 2 points 3 years ago (5 children)

Just one thing. I'm pretty sure it isn't possible yet to "fold" or collapse comment threads on the web client, correct me if I'm wrong. That would be a really nice improvement now that there are longer conversations on some posts.

[–] [email protected] 7 points 3 years ago (1 children)

I'm not familiar with GitHub Copilot's internal workings, copyright law, or the author of the article. However, some ideas:

GitHub Copilot's underlying technology probably cannot be considered artificial intelligence. At best, it can only be considered a context-aware copy-paste program. However, it probably does what it does due to the programming habits of human developers, and how we structure our code. There are established design patterns - ways to do things - that most developers follow; certain names we give to certain variables, certain design patterns that we use in a specific scenario. If you think of programming as a science, you could say that the optimum code for common scenarios for a language have probably already been written.

Human devs' frequent use of 1) tutorial/example/sample code of frameworks, libraries, whatnot and 2) StackOverflow code strengthens this hypothesis. Copilot is so useful (allegedly) - and blatantly copying, for example, GPL code (allegedly) - simply because a program trained on a dataset of crowdsourced, optimal solutions to problems devs face will more often than not simply take that optimal solution and suggest that solution in its entirety. There's no better solution, right? For all I've heard, GitHub Copilot is built on an "AI" specializing in languages and language autocompletion. It may very well be that the "AI" simply goes, when the dev types this code, what usually comes up after? Oh, that? Let's just suggest that then.

There's no real getting around this issue, as developers probably do this when they write their code too. Just use the best solution, right? However, for many algorithms, developers know how they work and implement them based on that knowledge; not because in most code the algorithm looks like this algorithm in FOSS project XYZ. They probably won't use the same variable names too. Of course, it could be argued that the end product is the same, but the process isn't. This is where the ethical dilemma comes up. How can we ensure that the original solvers of the problem, or task, are credited or gain some sort of material benefit? Copilot probably cannot just include the license of the code it has taken and its author when suggesting code snippets, because of how the dataset may be structured. How could it credit code snippets it uses? Is what it does ethical?

I do agree with the article that Copilot does not currently violate copyright law of code protected by the GPL or other licenses, simply due to exceptions in the application of copyright licenses, or the fine print. I don't know what could be a possible solution.

[–] [email protected] 2 points 3 years ago (1 children)

"OpenPPG" > "OpenPGP" ;)

[–] [email protected] 6 points 3 years ago (1 children)

This is a gem that I've never thought of mentioning here. Kudos for bringing it up!

[–] [email protected] 11 points 3 years ago (15 children)

Well, honestly a lot of FOSS software has been lacking in usability in general, not even accessibility. It's to be expected, as lots of software has basically been born from hobby projects and there is no unifying entity creating everything or defining human interface guidelines, besides perhaps GNOME and KDE.

The thing is that there is a big emphasis in FOSS software to "implement yourself" the features needed because most work is volunteer driven. So unless someone or some organization were to fund a developer or two to implement accessibility features, they don't magically come into being.

[–] [email protected] 4 points 3 years ago

Thanks for that article providing a bit more context.

Wenruo's theory is that Zhen Lei submitted this inconsequential patch for Key Performance Indicator (KPI) credit – to do something that gets recognized by an employee performance measurement system as meaningful work.

...

In an email to The Register, Wenruo said, "Some Chinese tech companies are really pushing too hard by assigning almost impossible KPI goals, I think that's the root cause."

"This pushes their employees to do things without using their common sense. And obviously toxic company culture like 996 (9am to 9pm, 6 days a week) and destructive competition."

[–] [email protected] 1 points 3 years ago

That's very informative, thanks!

For others curious:

...

In other words, within your browser, it enables a new connection to a hosted virtual machine (VM) that emulates a physical computer’s processor. This process enables the virtual machine to run a variety of guest operating systems using your Web browser as the display monitor.

The VM display is provided by a direct virtual network computing (VNC) connection. VNC is a graphical desktop-sharing system using the remote frame buffer protocol (RFB) to allow remote control of another computer. Multiple users may connect to the VNC server at the same time.

A button sits in the center of the left window edge of the running distro. Click it to slide out a menu with several options for controlling the VNC display window.

 

Great article that really breaks things down when it comes to the trend of renting/subscriptions vs. buying and owning things. Give it a read!

The real reason why software is included in the most mundane of objects is that the same SaaS subscription models can then be introduced in pretty much anything, along with planned obsolescence.

 

Debian 11 ships with the shiny new Linux 5.10 LTS kernel, which happened to arrive just in time to fit into this release cycle. The 5.10 kernel, which will also be part of the next version of Android, will be supported until 2026.

view more: next ›