Just to be sure, I scanned all apps on @fdroidorg and found no apps that used the libs vulnerable to -2025-55182 aka .

I'm no nor dev though, maybe it was silly to scan apps for server components? In any case, 's data collection is easy to scan via scripts, so better safe than sorry.

I made a minor v2.4.3 release of fdroidserver to support Python 3.14, which is rollling out some places already
pypi.org/project/fdroidserver/

I'm a big fan of encrypted connections. Towards that end, I just did a survey of all the apps in @fdroidorg to see if any of the source repos would not work with https://. This includes the over 5000 apps and all of their git submodules. All the git URLs that did not have encrypted connections (e.g. git:// http://) could be upgraded to https://. So I filed a bunch of merge requests, and am working towards forcing https://

gitlab.com/fdroid/fdroidserver

When building software, I believe it is important to work in public. Software can give small groups of developers immense power over lots of people. Like how governments work in public and corporations have to be more public than private company, developers should be transparent not only with their source code, but also the discussions and processes while building it. This can be hard to get used to, but not bad once used to it. Great examples of this are and IMHO

Some packages are updated with a revision number, but does not allow installs to use that revision number. This sometimes breaks . There is an issue open since 2017 about this:
issuetracker.google.com/issues

If anyone wants this feature, it should be easy to implement in 's sdkmanager:
gitlab.com/fdroid/sdkmanager/-

A simple metric from data: app downloads per week. Start with data from 1 of 2 servers for f-droid.org: http02, add hits for paths ending in ".apk". That gave about 2 million. Multiply by 18 (fronters + mirrors) and get ~36 mil app downloads a week.

import requests
hits = 0
r = requests.get(f'fdroid.gitlab.io/metrics/http0')
data = r.json()
for path in data['paths']:
if path.endswith('.apk'):
hits += data['paths'][path]['hits']
print('APKs', hits)

forum.f-droid.org/t/experiment

funds this think tank to put out policy papers saying will break their lovely scare screens, making us all less safe and "it require[s] Google to allow developers to insert links inside their Play Store apps".

ecipe.org/publications/eu-dma-

As I've always said in relation to the , let @fdroidorg compete on trustworthiness. I'd love to see this think thank include analysis malware rates of with and compare that to

We're starting to implement support for split APKs in . wants to gather as much data about its users as possible, so trying to hide info about language, country, device specs was not a design concern for them. It is central for us. We want the official client to leak as little data as possible to any server, be it ours, mirrors, or custom repos. We welcome input:

gitlab.com/fdroid/fdroidclient

Show more
image/svg+xml Librem Chat image/svg+xml