• 0 Posts
  • 255 Comments
Joined 5 years ago
cake
Cake day: February 15th, 2021

help-circle




  • Yes, it also narrows down the number of potential targets for analysis / report. If an extension is not marked “none” then no need to go out of your way to figure out if it does it.

    For some extensions it might actually be relatively easy to figure out if they do communicate with an external server that they might not need to, specially considering that the extension format can easily be decompressed, .crx files are just zip files with some javascript and other files inside… they might want to obfuscate the logic, but it’s not impossible to try and unravel things to some extent.


  • I’ve commented it in the other post, but in my opinion, the issue of the “nothing to hide” -> “no worry in showing” statement is that in between lines (specially in the context for which it’s used) it seems to want to imply that having something to hide must be something rare or perhaps wrong… as if it were not possible to want to hide things that are good for society to keep hidden.

    This isn’t a formal, logical fallacy, but an informal one: https://en.wikipedia.org/wiki/Informal_fallacy

    From a perspective free of presuppositions and biases, I don’t think the logic of the argument on itself is wrong, because of course I wouldn’t be worried about my privacy if I had no interest in keeping my private information hidden… but the premise isn’t true here! the context in which the argument is used is the problem… not the logic of it.

    It’s not incorrect to say: “nothing to hide” -> “no worry in showing” …what’s incorrect is assuming that the “nothing to hide” antecedent is true for all law abiding citizens …as if people didn’t have an interest in keeping perfectly legal and legitimate things hidden and safe from as many prying eyes as possible. The fallacy is in the way that it’s used, they are pretending that this means people shouldn’t be worried, when in fact it means the opposite, since everyone does, in fact, have information that should remain hidden. For our own safety and the safety of our society! …so everyone should in fact be worried about breaches in privacy.


  • In my opinion, this looks more like an informal fallacy, the problem is in the context and the intent that is given to the statement, not so much in the logic of it.

    The postulate has some ambiguity… because in between lines it seems to want to imply that having something to hide must be something rare or perhaps wrong… as if it were not possible to want to hide things that are good for society to keep hidden.

    This isn’t a formal, logical fallacy, but an informal one: https://en.wikipedia.org/wiki/Informal_fallacy

    From a perspective free of presuppositions and biases, I don’t think the logic of the argument on itself is wrong, because of course I wouldn’t be worried about my privacy if I had no interest in keeping my private information hidden… but that premise isn’t true here! the context in which the argument is used is the problem… not the logic of it.

    It’s not incorrect to say: “nothing to hide” -> “No worry for showing it” …what’s incorrect is assuming that the “nothing to hide” antecedent is true for all law abiding citizens …as if people didn’t have an interest in keeping perfectly legal and legitimate things hidden. So it’s not that the statement isn’t logically sound, the fallacy is in the way that it’s used, they are pretending that this means people shouldn’t be worried, when in fact it means the opposite, since everyone does, in fact, have information that should remain hidden. For our own safety and the safety of our society!



  • Yes! I mean, blame those who post AI-generated translations as if they were their own, or blame the AI scrappers that use those poorly generated pages for training, but it makes no sense to blame Wikipedia when the only thing they have done is just exist there and offer a platform for knowledge sharing.

    In fact, this problem is hardly exclusive to Wikipedia, every platform with crowdsourced content is in some level susceptible to AI poisoning which ultimately ends up feeding other AIs, the loop exists in all platforms. Though I understand wanting to highlight particularly the risk of endangered languages being more vulnerable to this, since they have less content available to them so the AI models have a smaller dataset which makes them worse and more sensible to bad data.



  • Did they work on developing new web standards to unlock that potential on the web?

    Back then HTMLv5 wasn’t even a thing, there was no concept of video/microphone/gyroscope/gps access for webapps, notifications, web workers, web sockets, offline PWA webapps, etc. It was not a viable idea unless they actually were to invest big. They weren’t so committed. In Firefox OS even the dialer was a webapp, Mozilla brought forth a lot of innovative APIs to make it possible, many of which are in use today even after the OS was discontinued. And nowadays you even have things like Webassembly that allows you to code it in C or whatever low level language you want.

    I feel Apple has always been more interested in their own ecosystem. Opening the web to have the same level of potential as the native apps from their walled garden goes against that strategy, so I don’t believe they were really serious about that approach, it’s always been more interesting for them to prioritize their native apps.



  • Ferk@lemmy.mltoLinux@lemmy.mlFSF announces Librephone project
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    9 days ago

    Good marketing means achieving an arbitrary limit of what you consider “good” marketing. So it depends on where you set the bar.

    The best marketing necessarily requires some level of unethical behavior, because being honest and saying the whole truth doesn’t sell. Everything has drawbacks and benefits… the better marketing minimizes (or even hides / fails to mention) the drawbacks and emphasizes the benefits, which is a form of deception.


  • I feel it’s a bit like the usability vs security dilemma… you can try to optimize to have both, but then you won’t have as a result neither the most secure system nor the smoothest user-friendly experience, but something in between (you might still consider that “secure” or “usable”, but that just depends on where you set your expectations).

    If you want to maximize marketing then the result won’t be as ethical as it could be, and if you want to maximize ethics then the result won’t be as marketable as it could be.


  • Ferk@lemmy.mltoLinux@lemmy.mlis i2p relevant today?
    link
    fedilink
    arrow-up
    6
    ·
    edit-2
    10 days ago

    I always saw I2P as a more modern and distributed onion-routing alternative to Tor.

    The thing is that people are used to making use of Tor in different ways than the way they use I2P, but you can also have outproxies (ie. exit nodes/relays) in I2P the same way as in Tor… and you can also host a service inside the Tor network without relying on an exit node, like in I2P. It’s just that people only seem to want to host exit nodes for Tor and not so much for I2P, this led to internal communications in I2P being more common (which is a good thing), whereas in Tor it’s common to use it for anonymous access to the clearnet (which strains the network and causes chokepoints, specially with big downloads or torrent sharing). That’s just a matter of usage, not capability.




  • I expect it’s a combination of all the above in some sense. They state they want to build on LineageOS (an Android variant) and replace its binary blobs, I expect the result would be a new custom ROM targeting specific compatible hardware with the goal of ultimately supporting usable phones working on fully Free Software.

    What it’s not is the creation of a libre hardware phone. I don’t think they are working on hardware, at least not anytime soon. Also if by “Linux phones” you mean non-Android based, that’s not necessarily a requirement (given that they mention LineageOS), but I expect regardless the kernel will be Linux without the blobs and it’s entirely possible that they add support for installing their firmware on those “Linux phones”.

    I do kinda wish they’d focus on stuff that has a way bigger user impact 😅

    The thing is that technically we already have fully usable FOSS software at that user level. Using for example LineageOS with F-droid as the only app store already gets you there. Whereas, ensuring your phone is not spying you or having some malicious functionality on the hardware/driver level is something that currently is simply not possible.

    The FSF has always been doing the thankless job of championing for the things that are harder and less rewarding to do, but that will advance software freedom most for those who do seek it. Even when that thing is not necessarily the most popular/mainstream. I feel this has more of an impact in software freedom than, say, if they were to reinvent the wheel just to have their brand attached to it, and/or provide a slightly different UI to do the same thing other FOSS software already does.


  • The fingerprint (or you can also call it “security code”, it’s just a code for verification), is generated from the combination of the locally stored encryption keys from each side of the conversation, it will be different every time. I believe it’s also not technically required by the protocol that the same encryption key should be used for all conversations (although I don’t really know if the client does generate a new one every time or keeps reusing the same, that’s up to the implementation I believe).


  • When it comes to initializing the connection, It’s true that those identifiers (or perhaps more accurately, addresses) are susceptible to collisions in a “global space”. But they are temporary, ephemeral addresses (they are discarded after use and/or expiration), and the space is astronomical so chances of collision are tiny, and even in the rare event of a collision you still have a step in which you verify a fingerprint code that’s independent of the address, related to the individual local device… so you have a second factor authentication of sorts, if you are adding a person and the code does match then you can be pretty sure it’s the correct person, since both the shared address and the internal locally-stored key match.