Show more

One thing that most impressed me about the culture of Brooklyn was how after the September 11th attacks, mainstream culture rallied to protect its Arab and Muslim communities because we knew they would be unfairly targeted web.archive.org/web/2021071220

Sadly, what I see now in Europe is the mainstream adopting the bigoted views of people like Netanyahu, Ben-Gvir, Likud, Shas, etc. and coding it nice sounding language. The should protect and respect all of its citizens and residents equally.

We are looking for feedback about how to help interested devs start messing around with . What are your blockers and interests?

The first fully merged, audited and shipped bit of code from our defo.ie project is Hybrid Public Key Encryption ( RFC9180), it has been shipped by openssl.org/blog/blog/2023/10/ It is a building block for and , providing standard methods for using public key cryptography to encrypt arbitrary blocks of data.

For anyone who is interested in implementing Encrypted ClientHello (), we have set up a new public room: matrix.to/#/#ech-dev:matrix.or or irc://irc.oftc.net/ech-dev

I wonder if uses the deobfuscation data in the "mapping.txt" file in the app review process? It would bring the binary code a bit closer to being more readable like source code. Their documentation only mentions crash reports as a use case:

support.google.com/googleplay/

Willkommen bei #ORFodon!

Der @ORF_News Bot hat jetzt seine eigene Instanz und eine Menge neuer Funktionen. Die Sparten und Bundesländernachrichten haben jetzt ihre eigenen Konten und dementsprechend ist eine viel flexiblere Filterung der Nachrichten und Beiträge des #ORF möglich.

Um Mehrfachbeiträge zu vermeiden, boosten die Kanäle einander.

Der Dienst wird weiterhin inoffiziell und privat betrieben.

Viel Spaß!

Weitere Informationen:
orfodon.org/about

#Mastodon #Fediverse #News

austrian public broadcaster is on the fediverse, in case you are into monitoring int'l news: orfodon.org/@ORFodon/111375092

Looks like 's keeping the "Web Integrity API" alive in the WebView, despite widespread disapproval for the "Web Integrity API" as a web standard. arstechnica.com/google/2023/11

Apparently 's MAC privacy protection never really worked as released in 2020, they apparently just fixed it in 17.1 after years of touting this privacy protection.
arstechnica.com/security/2023/

etc have massive piles of "cash on hand". They are supposed to be innovative companies which hire as much talent as they can, so something is clearly wrong with this picture. Lots of skilled people also have morals, and want to build things they believe are beneficial and . So many developers would rather work on things they believe in and are willing to get paid a fraction of what they could earn: so they reject working for

investors.com/etfs-and-funds/s

It makes me happy to read that 's delivery program is barely functional. It would be such a nightmarish thing if it ever caught on. All that buzzing noise, drones falling out of the sky when they hit things like birds, ever more resources used for unnecessary delivery. Its like flying cars and space tourism; oligarchs like keep investing in these ideas while ignoring the hard technical realities as well as the well being of most people on this planet

news.yahoo.com/look-sky-soup-1

This complaint against for illegally gathering user data with explicit consent gives me a lot of optimism that it is possible to defeat the "free" business models and bring back real freedom in media distribution to the internet. Paying with your data and privacy gives the illusion of freedom when getting media on the internet. These regulations will pop that bubble if the actually enforces them.
theregister.com/2023/10/26/pri

It looks like the future of mobile is exploiting messenger apps. has clearly demonstrated it is possible to silently exploit and own devices via messenger apps. Now gangs have a proven pattern to follow with their millions for dev budgets. And it could spread from there. Could it be that this becomes a bigger threat than install by ?

I wonder why they stopped publishing this report in 2018? Since then, they have implemented and rolled out a number of key features in that make installing outside of a lot safer. I think the changes to "Unknown Sources" improved both the user experience and the security of the platform. I would have thought they would want to advertise that.

Show thread

just posted a pointer to a bit of related data:

"Google hasn't published detailed stats about the dangers of sideloading in a while, but in 2018, it used to publish yearly security reports with statistics on malware installation sources. Back then, Google found that 0.04 percent of all downloads from the Google Play Store were "PHAs" (potentially harmful apps), while sources "Outside of Google Play" had a 0.92 percent PHA install rate."

arstechnica.com/gadgets/2023/1

Show thread

For example, the biggest incident that I know about remains en.wikipedia.org/wiki/XcodeGho, which got into over 4000 apps, which all passed 's review and were shipped by the Apple App Store. All told, those apps were installed 128 million times. Another measure is which seems to have maintained zero click access to and for years. That is spread by exploiting messenger apps, not by or "sideloading" 3/

Show thread
Show more
image/svg+xml Librem Chat image/svg+xml