Show more

While China's passing of a strict privacy law pushing back on technology companies’ data collection is a big win for Chinese citizens, unfortunately it does not extend to the state's widespread surveillance.

Eva Xiao reports:
wsj.com/articles/china-passes-

Original tweet : twitter.com/DuckDuckGo/status/

Modern day Hitler apologists also want to claim the Nazi role in the hitler.org/artifacts/autobahn/

And the contemporary German government tries to highlight that the Autobahn wasn't purely built by the Nazis, but can't get around that they drove their widespread creation and adoption dw.com/en/the-myth-of-hitlers-

Show thread

I'd love to see a well researched documentary or book about the fascist roots of how cars came to dominate the world, the story is out there plain to see: Mussolini and Hilter pioneered the freeway, Nazis started VW, Franco started SEAT, Ford loved the Nazis, Fiats owners were tied to Mussolini, Peugeot and Citroen owners switched to producing for the occupying Nazi armies. warhistoryonline.com/instant-a jalopnik.com/the-inventor-of-t pbs.org/wgbh/americanexperienc voxeu.org/article/nazi-pork-an webuildvalue.com/en/infrastruc

Anyone whose paid attention to over two decades knew the gov would collapse like a house of cards, it is corrupt from top to bottom. Kudos to for finally ending the charade. theguardian.com/world/2021/aug

In countries from the UK to Indonesia, it will be easy for governments to ask Apple to expand their message-scanning program—and hard for Apple to say no. eff.org/deeplinks/2021/08/if-y

Even if you think the is bad does not mean that the war in makes any sense. We are finally now seeing the truth: that 20 year long war was built on willful fiction theguardian.com/commentisfree/

tbray.org/ongoing/When/202x/20 is worth reading, though its a bit ranty. The core idea he's talking about is one that it is rarely taught yet is really valuable to learn: sometimes the best choice is to not change something.

sounds like it is taking the right approach on building a coherent operating system. Consistency, interaction, and minimalism means the OS gets out of the way of the user theregister.com/2021/06/16/hel

Building a bunch of wind and solar is not proven to cool the , it could backfire. Reducing consumption is proven: Eat a lot less meat! Get rid of your cars! Yes, also electric cars. Ride the train! Take mass transit! sciencenews.org/article/how-wi

Sometimes the best tech is low tech. Cash leaves no digital footprints, unlike credit cards. So we’ve teamed up with dozens of groups to urge Congress to require stores to take cash. eff.org/document/2021-08-05-gr

"Es ist nicht lustig, wenn plötzlich Maskierte mit Sturmgewehren in den Kinderzimmern stehen" - 9 von 60 Hausdurchsuchungen sind rechtswidrig. derstandard.at/story/200012865

is leading the charge to deliver a truly mobile device, it is also . Since it is based on , you can port it to lots of devices, even if they do not support a locked bootloader.

It is exciting to see 's delivery program collapsing, I hope this is the end of this idea. It would really have a horrible impact on so many aspects of daily life. wired.co.uk/article/amazon-dro

Hosting code with automated publishing into well known namespaces is looking more and more like a broken model. A better approach is human verification of package names like in , @fdroidorg, . Then other pieces can be safely automated bleepingcomputer.com/news/secu

I'd love to see data on what verified boot actually stops. The ideal malware implants itself at the lowest level possible. Is there good public data on these kinds of exploits on etc? Does standard spyware do that? Writing to /system requires a root exploit, lots of malware never gets root. How often there are vulns in itself. Here's a real world full of verified boot:
threatpost.com/multiple-vulner

created an ecosystem where the software available there is reviewed and trusted, so the system can prioritize flexibility over security. In Play, there are many apps we feel forced to use, despite knowing they are unethical or are tracking us. Google responds by locking down to reduce data leaks, which also reduces the system's flexibility. puts the user in control so we can build user-friendly systems without being forced into bad decisions.

Dark Patterns are unethical by design, aimed at tricking you into giving away your data, and ultimately stealing your freedom to choose privacy.

Can you spot one when you see one? Take this quiz from @alfredwkng & @sammorrisdesign to find out: themarkup.org/2021/06/03/dark-

Original tweet : twitter.com/DuckDuckGo/status/

Torsten Grote explored Free Software alternatives for smartphones as early as 2012. ⭐

In our interview we look back at the start of Free Your Android campaign.

Of course, we asked @grote@status.grobox.de which options are available for liberating our phones today.

The interview was conducted in the context of celebrating 20 Years of the FSFE 🙂 #FSFE20

fsfe.org/news/2021/news-202106

Does anyone know how to query the system for information about Trichrome Libraries chromium.googlesource.com/chro? They seem to be installed as APKs, but the regular way of querying for app metadata does not work. For example, is there a separate concept of "Version Code" for Trichrome libraries?

Show more
image/svg+xml Librem Chat image/svg+xml