Show more

When you do NOT publish your #android #app in the Play Store (e.g. #gadgetbridge, #fdroidapp , #imagepipe), is there a good reason to increase the #targetSdk ?

Does it matter at all?

The last sdk updates mainly impose restrictions without much benefit for developers and make development harder.

Why upgrade targetSdk when you can completely ignore G***le's rules about minimum targetSdk?

What are your thoughts?

@jz YES! I'm already a practioner! I highly recommend it

@Billie For apps that don't have features broken by , you might as well up it. If your app is in a memory safe language e.g. Java, Kotlin then the targetSdkVersion does not help you much while restricting features. If the app uses C/native code and you don't want to think too much about security vulns, then upping it could help you. My understanding is that thinks of it as a way to protect private data from unknown apps, so they don't have to review uploads to Play.

Sandboxes have often been represented as a security feature, but it seems there are always ways out, e.g. there are always jailbreaks available for iOS. Sandboxes still make sense for restricting non-malware apps from accessing private info. For security, its more important to avoid targeted exploits, e.g. reducing identifiability, to force the use 0days into broader targets, which is then more likely to burn that 0day. Users of 0day exploits are rarely willing to burn one to target one person

@rogermcnamee on top of that, each affected Facebook user has been allocated about $2.25. Yup, two dollars and change. A classic example of the problems of class action lawsuits. The firm gets to cash out with $181 million, but the actual settlement for the affected parties is not worth the time to do the paperwork.

@filippo Cloudflare will tell you about it: blog.cloudflare.com/icloud-pri It is based on the standard for proxying over UDP/QUIC.

Elon gave me no warning.... plus he suspended all of my accounts, half of which track aircraft (NASA aircraft, experimental aircraft, weather, airforce etc). not people including my personal

Today’s social media status quo isn’t cutting it, so Mozilla is exploring an alternative here on Mastodon. In early 2023, Mozilla will be testing a publicly accessible instance in the Fediverse at Mozilla.Social. We will keep you updated, but for now learn more here: mzl.la/3BNXQMQ

"A passionate and bipartisan legislative effort to rein in the country’s largest technology companies collapsed this week, the victim of an epic lobbying campaign by Amazon, Apple, Google and Meta"
bloomberg.com/news/articles/20

@somegirlprivacy@mstdn.asprivacy.com I'm not saying it should not be updated, we welcome contributions there. I would love to see F-Droid working well everywhere, I can't do it all, and the dev team for is small. We can make it work well for a lot more people if there are more contributors.

Tech giants are now spending hundreds of millions to systematically shape policy across the world, including donations and funding to policymakers, civil society orgs, media orgs and academia.

A decade ago, this may not have been clear to everyone. Now it really should be.

Show thread

We welcome help for bumping the and have mapped out what needs to be done:
* gitlab.com/fdroid/fdroidclient
* gitlab.com/fdroid/fdroidclient

Given our limited resources, I have chosen to focus my time on concrete improvements for . The only thing I'm opposed to in all this is removing functionality in order to bump targetSdkVersion. Google's recent changes there have removed functionality that many rely on.

Show thread

When is built into a ROM, like , for , etc there is no popup warning with fdroidclient. That comes from "Play Protect", which is proprietary software that flags things based on automated rules, it does not point to real world security concerns for apps like . I have nothing against the sandbox, I just think it is important to note what it is good for, and what it cannot do well 2/2

Show thread

As lead maintainer of the official client, I hear a lot of criticism that is still at 25. fdroidclient is , publicly audited, with , written in memory safe languages, with a proven record of respecting and delivering . The source and binaries also receive human and machine review. is designed around untrusted proprietary software with non-memory safe code where the binary only gets machine review. 1/2

@guardianproject @lauren And of course is a key part of this whole picture, allowing anyone to confirm that the exact binary that is running on their device matches the source code as published and audited.

@lauren and audits are the only way to provide trustworthy . Apps like , with /#Megolm, with , , provide trustworthy E2EE because they are built on open standards, free software, and have been publicly audited. That is the standard all services should be held to in order to be labeled trustworthy. Anything else just means you have to trust the service operator. 2/2

@lauren It is important to describe the limitations here. E2EE here would be useful when emailing with third parties. Since is proprietary software, users just have to trust to do the right thing. Technically, it is easy to build E2EE where the service can get the private keys and decrypt as they like. Given participation in etc, proprietary Gmail cannot provide trustworthy E2EE, especially considering most emails stay within Gmail 1/2

We may never be able to match the incredible achievements of #JohnMastodon, but the European Union still plays its part!

We are proud funders of Mastodon through the Next Generation Internet initiative (@EC_NGI).

Open,
Interoperable,
Decentralised,
Trust based.

More info: ngi.eu/blog/2022/11/24/how-ngi

People rocking up on this platform and expecting it to be as rich and diverse and mature as their carefully nurtured Twitter feed, fine-tuned over a decade to reflect their interests and values, maybe give it a few weeks of actually investing in finding the accounts that interest you before writing the whole thing off as a howling wasteland.

Show more
image/svg+xml Librem Chat image/svg+xml