It amazes me how many people see Apple's "privacy" advertisements and believe every part of it.
If I remember correctly, the catchphrase is: "what goes on your iphone stays on your iphone".
As always there's a grain of truth in claims of the sort - for example, it seems that to save server processing time, they don't actually do the relatively computationally expensive process of analyzing images for spying purposes - instead they have hardware acceleration for that built into the SoC, so the processing can be done on the device and the result can be sent off to their server - while the image remains on the device (or not, as whoops, it just got uploaded to "icloud").
Apple appears to not sell the spying information directly, rather they only sell access to interfaces that do things with "anonymized" spying results instead, even though you can extra data from those interfaces and a dataset built up of personal information can always be de-anonymized unless you can't tell the differences between any individuals in that dataset and in that case, the dataset is useless.
Apple has also taken some steps to prevent some 3rd party proprietary malware from spying on the user in certain ways sometimes - but that's only because Apple doesn't want spying competition.
nostr:npub1xrmj2tt4cht9tse4f4287en9g9xjwa9le0adnek60afvapeu5pqs6pdncv Yeah, that license isn't what I would call perfect.
Licenses are based off copyright, which the author allocates, but written is: "Copyright (c) Every-fucking-one, except the Author" - so that's saying that the author hasn't licensed their copyright although the rest of the license seems to imply otherwise?
Clause 0 seems to require that the software be made to look proprietary, as; "as long as you NEVER LEAVE A FUCKING TRACE TO TRACK THE AUTHOR" seems to imply requiring the removal of copyright notices from the author (and maybe even the license text), which will results in the software looking like it's under no license and therefore looks proprietary.
The perfect license for most software is the AGPLv3-or-later.
nostr:npub106dam65ww9ztdqj26xvh08dyuc7lj7nmkrtrujwsmyq2n6g3r33saq3m89 The thing is you can't, as any half decent optimizing compiler throws away enough information that you don't can't get intelligible source code no matter how good your decompiler is.
Even if you were to do that, you couldn't legally modify or distribute that software due to copyright law.
The only practical choice to escape from the shackles is to reverse engineer the software with a deassembler and write a re-implementation from scratch.
nostr:npub1z5rxmrt9l59y2256e5kzmfj44ydpnhgj04dq6qumjvwehe2pk30qz4rjcc Vi Vim Vi - the editor of the devil.
Install GNU Emacs.
nostr:npub108pv4cg5ag52nq082kd5leu9ffrn2gdg6g4xdwatn73y36uzplmq9uyev6 What was your explanation as to my avatar to your wife, or what would it be?
nostr:npub1d0npefkxtfkcptjdawvwkfu58japhjfaljt4hqtpq2xqn8pt2nwqdjahqw I could go that far, but I really just settle for a 100% free software BIOS with a SPI flash chip that can't be written without root access and no proprietary software runs as root either, as I doubt the glowers have dedicated resources to getting me...yet.
"Secure boot" is not a basic security feature, as it gives a false sense of security, as it's extremely trivial to bypass, as clowns have signed every proprietary binary under the sun under the root UEFI certificates.
Although there are revocation lists for known buggy binaries, those revocation lists are extremely rarely ever implemented.
Really, the only way to achieve a similar level of security than Grub gpg signing is to disable all the default UEFI root certificates and load up your own keys.
nostr:npub1sgeuuk0339kqfspuc755jq49mpayjt49s25nlmsjednarakcjlaqhy4e9j Tell me about it.
nostr:npub1unuezse65ps83m8m3a7qxnuzlpfdczvpqy2cku2a2p0js5hr8vhqclzsng Since they're pretty confident you're a sucker as you run their proprietary JavaScript.
nostr:npub1z4ppnl4myf7dr30t6lhdah3d7apdtsa5skwj0lttjl08flyn97rs0z4u3u >I think we should seriously consider whether the performance improvement is really worth the constant security & correctness issues.
If CPUs were made without speculative execution, I estimate that CPUs would be 80% slower - not really a problem for decently written software, but a massive problem for what proprietary software writers and web-developers put out.
Theoretically you could do speculative execution securely if you didn't cut corners and made it impossible to recover information from mispredictions - but that would be quite a bit slower, so CPU manufacturers won't do that.
Really, attacks seem to only be a problem if you're running proprietary malware on your computer - if you don't do that, you're pretty safe.
nostr:npub19ujyvh3q75rrv7mkd8ytqd3ne5lc9357z3z232pj9hwpel7cxs9syrctex Mach and pretty much every other kernel ever written - as kernels don't really care about userspace that much, interfacing the userspace with the kernel is mostly is up to the libc, due to this, most decently written software doesn't care what kernel is in use (with very few exceptions).
There is no "Linux ecosystem" as the kernel, Linux really only has the SYSCALL, /proc and /dev interfaces (nothing that has a feel), such systems are really the GNU system, plus other software that depends on GNU software (or used to in the past).
nostr:npub10cq07ulfyc7y2l8rczk9s36g8j65tq3m6xk9us8hr3ua4ktfmaqq9a6nm3 Mostly because only 5 people will figure it out and only 3 will bother showing up.
nostr:npub1ysufjjd485tftr4wy2a83fqyqvtfq0yn820gl8vl6hcsdz8uv2hskx2jyl What do you expect from a site that doesn't show anything unless you run proprietary software really?
nostr:npub1vmtc8smdjzgwj5z4tsrcfawr9s7yjtes0g32upg2ks832k3e75fq2duely The bombs didn't create アニメ, both rather enhanced it.
The movie doesn't show Hiroshima or Nagasaki getting nuked, so it's a 0/10 from that alone.
nostr:npub1et4ne8tc8ndzfvq0y00h645scx8yw0zpxqspkrt6w7juk7s4qz0q24a68x I've read that the most effective technique is to just decide that you'll never smoke again (with no other behavior changes required), discard any cigs or smoking implements and push through the withdrawals (they get very bad for a few days and then they subside) and then you win.
I would love to do the same with proprietary software completely, but of course the government ensures that it's extremely difficult to give up certain brands of proprietary software cigs.
nostr:npub1y6tk68elxfcrz8yx5kf32agav67hwz4rt2ff22f8rl98yxh7uxhsx69wl9 For 99% of cases that is correct, but not all.
GNU is extremely convenient, but it's also very healthy for your freedom.
nostr:npub1jkh4ezmf6zzulh86fam5lj8q236eed00qejz8d4eyqqtpdhdvyzqatm08d Yes, but hopefully I'll be with a bang of nuclear fire right in the heart of the enemy rather than with a whimper.
nostr:npub1ysufjjd485tftr4wy2a83fqyqvtfq0yn820gl8vl6hcsdz8uv2hskx2jyl You'd prefer if we didn't have a actually working buildsystem?
Sure they're painfully hard to regenerate, but you *can* regenerate them.
nostr:npub1wj863g5d8grekajsm6ggsuu63n3klk7kmqasq3t9k9sf0paauwgq3jn95j Damn, that's a lot of exploits that only seem to apply if you run proprietary malware on your computer.
nostr:npub1u83gudwdfwjngz5eqxkrnpvsuydvqwjxwz0majvehqrh62804hfq8yr2s5 No, the potteringware gods have come after your sound.
Straight ALSA works fine with everything but firewire attached sound cards, so just don't add bloat on top of ALSA pretty much.
?name=844a799896b0ffe44129bf92d2fa55a5.jpg