privacy

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

kevincox, in Gitlab now requires phone number/credit card verification
@kevincox@lemmy.ml avatar

This really sucks for bug reporting. I don’t mind this at all for hosting as that cost notable resources (especially their free CI tier) and they can set their own terms, but I want people to be able to report bugs without any trouble. (Although if spam is an issue maybe projects could opt-in to requiring this verification to report bugs).

A work-around is maybe the service desk feature allowing reporting bugs via email but this has issues for proper collaboration:

  1. The reporter’s email is shared.
  2. The issue is private by default.
  3. Can’t collaborate on an existing issue.

Maybe I’ll just go back to mailing lists… Or GitHub has gotten better recently. But GitLab’s CI is so much better.

TauZero,

I want people to be able to report bugs without any trouble.

Thank you for being aware! I’ve experienced this on github.com. I’ve tried to submit issues several times to open source projects, complete with proposed code to solve a bug, but github shadowbans my account 6 hours after creating it (because I use a VPN? a third-party email provider? do not provide a phone number? who knows). I can see the issue and pull request when logged in, but they only see a 404 on their project page even if I give them a direct link. I ended up sending them a screenshot of the issue page just to convince them this was even possible. Sad to hear gitlab does it even worse now by making phone mandatory.

Bipta,

Kbin uses Gitlab so it's too bad.

ernest, (edited )
@ernest@kbin.social avatar

Not really. The official repository (with issue management) is located on Codeberg. GitHub serves as a mirror in case of any issues with the primary service.

https://codeberg.org/Kbin/kbin-core

roguetrick,

Well what would you know about it, ernest.

nix,
@nix@merv.news avatar

Hopefully the move to codeberg.org

Jaggs, in Looking for FOSS android TV (or something like Kodi, but dumber)

What about one of the Chinese TV boxes? For example = www.aliexpress.com/item/1005005533473983.html

solariplex,

Aren’t most of those at best vulnerable as a leaf in the wind; and at worst literal hacker gateways to your home?

deadcream,

Google-certified Android TV devices aren't known to receive security updates either.

RobMyBot,

Yeah you wouldn’t catch me even considering one of those monstrosities.

gomp,

As much as I dislike Google spying on my relatives, I’d rather them be spied by Google than by some Chinese entity (BTW: their spying would probably not be on top of Google’s)

American_Jesus,

Most don’t support HD streaming due to lack of certification, the UI is mobile not AndroidTV, and many can include malware

tomsguide.com/…/thousands-of-android-tv-boxes-inf…

I have a box (X96 Max+), with a custom ROM, comes with only the essencial, but AndroidTV itself is not FOSS, the launcher and other services are proprietary, without it is just AOSP.

You can check the supported devices on the site
slimboxtv.ru

thegreekgeek, in Open Source Anti-Theft App
@thegreekgeek@midwest.social avatar

There used to be an app called aegis that did something like this, it used texts to your phone to trigger stuff. It was made by one of the CyanogenMod devs, I’m not sure if it’s still around… EDIT: the github is here, but it hasn’t been touched in a while lol

library_napper, in Looking for FOSS android TV (or something like Kodi, but dumber)
@library_napper@monyet.cc avatar

What happened to roku? Is it not open source?

gomp,

It’s closed-source AFAIK (also, not sure how it is privacy-wise)

user224, in What can we do about major sites blocking VPN providers?
@user224@lemmy.sdf.org avatar

This is extra maddening with my banking app recently. I even set up split tunneling for it, but it still somehow figures out the VPN. The problem is, it doesn’t let me do ATM withdrawals nor generate one-time virtual cards. Ironically, it still let’s me view full details of my physical card…

So just disconnect from VPN? Oh, not so fast. It remembers that VPN was used at some point, and I’ll have to deactivate the app and then reactivate it without ever connecting to VPN.
Since I have to deactivate and reactivate it daily, immediately when needed, this has led me to decreasing the security by using virtual card reader for 2FA kept on same device as opposed to using physical one and keeping it at home as I used to before this BS.

This is what I mean by the physical 2FA card reader:
https://i.imgur.com/QrcEkko.jpg
Yes, that’s the only thing at hand I had to cover the card number :)

Sanguine,

Lmfao at the arch sticker. Also use arch btw.

kungen, in What can we do about major sites blocking VPN providers?

That’s an inherent problem with shared connections.

The thing with sites telling you that your login is incorrect is also sometimes intentional, so people trying to brute-force logins won’t realize they’re getting blocked or just that their attempt was incorrect.

And yes, the only possibility is to try a different server that hasn’t been abused, or run your own.

library_napper,
@library_napper@monyet.cc avatar

This is what 2FA is for

Rearsays, in Meta payment message

It seems like a nice idea that they offer a paid option for an ad free internet

glasgitarrewelt,

Still a privacy nightmare, with and without ads.

kratoz29, in Is YouTube starting another attack on third party clients?
@kratoz29@lemm.ee avatar

I think Smart Tube Next has never failed on me, I use the beta version and update it regularly (or not) so well, maybe that helps.

digger, in is there a way tominimise risk while using facebook?
@digger@lemmy.ca avatar

It’s worth noting that Facebook regularly collects information and builds profiles about people who are not users (or are users who but aren’t logged in). The average user would be surprised what a company like Facebook can put together on individuals who have never made an account.

howtogeek.com/…/what-are-facebook-shadow-profiles…

TheBiscuitLout,

I’ve been fairly parsimonious with my information for a fair while - I don’t use my real name online except when unavoidable for payment etc, don’t put photos of me anywhere, use social media (other than Lemmy, and I’m not very social on here really!) and I think I have fairly good habits to keep information and habits separated. I alternate between using FF, Librewolf and Mullvad browser for different things, don’t reuse usernames/id’s, use a VPN router at home and have VPNs on my mobile devices, email masks and relays, and where possible pay with virtual cards etc. I think my most unique identifier, last time I checked with the EFF site, was the size and resolution of my screens. I’m not really sure how much data there is to collect about me past the mundane, as I don’t really associate with anyone in the real world online, and almost exclusively use signal in the real world.

random65837, in is there a way tominimise risk while using facebook?

I do the same, obviously all bullshit info, email forwarders for the acct, VPN, and it’s cookies containerized so it can’t go snooping, and make sure your browser isn’t successfully being fingerprinted or it’s all pointless.

coveryourtracks.eff.org

Never fuck up and don’t hop on without a VPN, or from it’s proper container. As said, just minimizing, not removing.

TheBiscuitLout,

I have a VPN router, and will either use Mullvad browser with no other tabs open (and obviously all cookies freshly cleared etc) or maybe a vanilla FF on a VM. With all my details being nonsense, a unique relayed email, and the browser essentially completely resetting after every use, I doubt they can find out much useful about me

library_napper, in Privacy wars will be with us always. Let's set some rules
@library_napper@monyet.cc avatar

The eIDAS regulation makes an enormous change by mandating man-in-the-middle attack technology that it would be illegal for browser makers to defend against

How would this law affect websites with Onion Services (eg Facebook) that don’t use http at all, but Tor’s internal pinned end-to-end encryption with a pinned certificate tied to the .onion name?

Illecors,

This doesn’t affect websites as such - it’s the end clients, i.e. browsers that would be forced to accept gov issued CAs. I don’t see anyone going after TOR as it’s already a very niche thing, so it should be fine.

mikarv, in Is there any Firefox extension to automatically reject cookie popups?
@mikarv@someone.elses.computer avatar

@Weslee consent-o-matic, made by @midasnouwens https://consentomatic.au.dk. the one recommended below auto accepts them or blocks the notice, while consent-o-matic sends the legally binding reject signal.

shakyhans,

Been using this a couple of weeks and it is great. Looking forward to more add-ons like this coming to Firefox for Android.

Inductor,

I would also recommend consent-o-matic. It works really well, and has a really simple interface for letting the devs know when it doesn’t work.

Lemmchen,

addons.mozilla.org/en-US/…/consent-o-matic/

This add-on is built and maintained by workers at Aarhus University in Denmark. We are privacy researchers that got tired of seeing how companies violate the EU’s General Data Protection Regulation (GDPR). Because the organisations that enforce the GDPR do not have enough resources, we built this add-on to help them out.

Nice!

github.com/cavi-au/Consent-O-Matic

noodlejetski, in is there a way tominimise risk while using facebook?

regardless of what measures you set up, they’ll still be able to collect a bunch of data based on what pages you visit their service, which posts do you spend more time looking at and which you scroll past, and so on.

TheBiscuitLout,

I figure that if I can keep it pretty isolated, they’ll only get “scrolls marketplace in SE uk” out of it - I’m never going to look at the feed or have “friends”.

Titou, in Is YouTube starting another attack on third party clients?
@Titou@feddit.de avatar

NewPipe seems to work fine for me

furzegulo, in Is there any Firefox extension to automatically reject cookie popups?
mikarv,
@mikarv@someone.elses.computer avatar

@furzegulo consent-o-matic, made by @midasnouwens https://consentomatic.au.dk. the idontcareaboutcookies one doesn’t do what you want as it auto accepts them or blocks the notice, while consent-o-matic sends a legally binding reject signal.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #