Psychologically speaking I think about the situation as
So… yes in fine it’s the same, i.e “more hoops” to go through to do the same things, BUT when framed positively it’s genuinely more exciting, more empowering!
that can help notice a compromised CDN, but not a compromised server.
Not sure I understand the distinction, a CDN is a server, so if OP is hosting code to execute on their server, they would be checked by whatever has already been downloaded and run locally before, i.e a PWA
If the hash is permanently stored in the browser, that is better, but there are also browser updates
I’m rather sure that localStorage persists over browser updates so that can be “permanent enough”
to say nothing of exploits.
I mean… sure but at that point the same apply to native. If you can’t trust the running environment you are screwed anyway.
attacker takes over the server and replaces the JS with a backdoored version, which the users receive next time they reload the page
Isn’t it exactly what hashing of JS libraries is for? e.g https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity that one can see on e.g https://cdnjs.com/libraries/three.js giving you the script to execute, yes, but also a hash to verify that what you receive is indeed what you expect?
So, assuming there is once a trusted loaded version (which HAS to be the case anyway otherwise you can’t start, the same as one would do with a native executable) then there can’t be an arbitrary version loaded next without it being validated first.
PS: I’m not saying this what OP does, I’m saying executing code (Javascript or not) that must be downloaded first is not in itself a security problem.
Still hitting their servers. So not doing much privacy wise
I wouldn’t underestimate how much they are getting, technically but also legally, from a logged-in account using their interface. So using another interface and without having an account can already help a lot. They don’t want “just” the data to improve a profile, they also need some way to server back the ads to, otherwise it costs them but doesn’t bring money back. I imagine in such cases, especially in jurisdictions where ghost profiles are illegal, this does a lot already.
EFF nicely provided a direct link to disable it https://x.com/settings/grok_settings and takes 2 clicks.
Not sure I understand either but when I need to tinker with devices from another network through the Internet I usually rely on Tailscale or setup my own dedicated VPN using e.g OpenVPN.
Because it’s a tool by one of the biggest, if not THE biggest, corporation ever made. It’s nothing more than a way to lock-in users deeper in an ecosystem of extortion and learned helplessness.
Through Windows, computer users discover that they have a black box at work and then at home. It is NOT their computer. It is a computer that they are allowed to use a certain way. This then is extended in a myriad of ways, through other tools, e.g mobile phone, and services, e.g Office360, reinforcing that behavior. It becomes a second nature to the point that computer users dare not even imagine HOW they want to use a computer. Instead they buy whatever they are allowed to consume.
I do not care for Windows as an OS, I absolutely do HATE it though as a vehicle for cognitive enslavement. I do so keeping in mind the history of the company that made it. It is not a repeated random process, it’s a strategy. This is what I find disgusting.
If all you need is to grab your groceries etc from the next village, then yes it looks like it could do that.
This is exactly the kind of usages I imagine the market target is. Namely I believe it’s :
but rather, as you suggest, going from one small town to another, say 50km radius or less. It’s while one lives in the country side to go to the farmer market on Thursday. It’s to go from and to work from the suburb, without proper bus, even less tram, to work downtown, etc.
I imagine it’s basically where most people who wouldn’t feel “adventurous” enough to use an electric bike, due to the bad weather or workload, could use something just a big bigger.
So you’re saying they are legal, truly sold, but the volume? weight? autonomy isn’t enough?
Sorry if you specified a criteria rather than an example that I missed. I’m genuinely curious as to understand because it seem you are dismissing it as useless for anyone rather than, like a buggy, something that one potentially useful but only within some context, to go with your example something one wouldn’t use in a city center but works perfectly on a beach.
PS: full disclosure, I don’t have that car, not have any economical link to the company, only trying to understand the position.
I’m not sure what you mean by “serious” here. Are you saying it’s fake in the sense that it won’t be sold? Or that the license plate would not actually legally allow it to on the road in France or Europe? Or some of the criteria, e.g autonomy, power, etc would make it realistically usable for any use case except literally playing in a playground?
I’d be up for a review on new models, e.g https://kilow.com/pages/la-bagnole from France, which claims to be repairable.
but… supports not just CLI apps, or a terminal, like Termux, but also KWin with Wayland, so GUI, not just TUI.
Comparison with existing alternatives, e.g Termux, please.
Looks like a USB stick.
IMHO the question isn’t as much you as a user of such platforms is “f*cked” because you sound both mindful and technically savvy. So, on that front, you will be OK.
The harder question I would say is how morally bankrupt you will feel by contributing to worsening the privacy of others for profit. Namely that yes by using Facebook/Insta/TikTok/etc you will gain more customers but those customers are gradually losing their privacy while you make those companies bigger by paying them. That means you depend on those companies more while they get more power.
Because of that I would argue that sure, do everything you can to protect yourself but it can’t stop there. I would argue then than the question is rather, where else can you find more clients, and maybe even “better” clients who are more aligned with your own views on privacy, and maybe even more. It’s definitely a challenge, especially seeing the trend of surveillance capitalism, but as you acknowledge yourself by using Lemmy, there are actual alternatives.
Neat, and if you want a physical item to prompt you to do so https://www.crowdsupply.com/dicekeys/dicekeys can be an interesting option.
Edit: neat, it works! No BT though
Update : it works now! Just updated Danctnix and voila, WiFi networks detected and connected.
PS: no BT though
Doesn’t really matter if it’s not open source anyway. I prefer something open source without Linux support (that can thus have community builds) than something proprietary with Linux support.