This really sucks for bug reporting. I don’t mind this at all for hosting as that cost notable resources (especially their free CI tier) and they can set their own terms, but I want people to be able to report bugs without any trouble. (Although if spam is an issue maybe projects could opt-in to requiring this verification to report bugs).
A work-around is maybe the service desk feature allowing reporting bugs via email but this has issues for proper collaboration:
The reporter’s email is shared.
The issue is private by default.
Can’t collaborate on an existing issue.
Maybe I’ll just go back to mailing lists… Or GitHub has gotten better recently. But GitLab’s CI is so much better.
I want people to be able to report bugs without any trouble.
Thank you for being aware! I’ve experienced this on github.com. I’ve tried to submit issues several times to open source projects, complete with proposed code to solve a bug, but github shadowbans my account 6 hours after creating it (because I use a VPN? a third-party email provider? do not provide a phone number? who knows). I can see the issue and pull request when logged in, but they only see a 404 on their project page even if I give them a direct link. I ended up sending them a screenshot of the issue page just to convince them this was even possible. Sad to hear gitlab does it even worse now by making phone mandatory.
Not really. The official repository (with issue management) is located on Codeberg. GitHub serves as a mirror in case of any issues with the primary service.
As much as I dislike Google spying on my relatives, I’d rather them be spied by Google than by some Chinese entity (BTW: their spying would probably not be on top of Google’s)
I have a box (X96 Max+), with a custom ROM, comes with only the essencial, but AndroidTV itself is not FOSS, the launcher and other services are proprietary, without it is just AOSP.
You can check the supported devices on the site slimboxtv.ru
There used to be an app called aegis that did something like this, it used texts to your phone to trigger stuff. It was made by one of the CyanogenMod devs, I’m not sure if it’s still around… EDIT: the github is here, but it hasn’t been touched in a while lol
This is extra maddening with my banking app recently. I even set up split tunneling for it, but it still somehow figures out the VPN. The problem is, it doesn’t let me do ATM withdrawals nor generate one-time virtual cards. Ironically, it still let’s me view full details of my physical card…
So just disconnect from VPN? Oh, not so fast. It remembers that VPN was used at some point, and I’ll have to deactivate the app and then reactivate it without ever connecting to VPN.
Since I have to deactivate and reactivate it daily, immediately when needed, this has led me to decreasing the security by using virtual card reader for 2FA kept on same device as opposed to using physical one and keeping it at home as I used to before this BS.
This is what I mean by the physical 2FA card reader: https://i.imgur.com/QrcEkko.jpg
Yes, that’s the only thing at hand I had to cover the card number :)
That’s an inherent problem with shared connections.
The thing with sites telling you that your login is incorrect is also sometimes intentional, so people trying to brute-force logins won’t realize they’re getting blocked or just that their attempt was incorrect.
And yes, the only possibility is to try a different server that hasn’t been abused, or run your own.
It’s worth noting that Facebook regularly collects information and builds profiles about people who are not users (or are users who but aren’t logged in). The average user would be surprised what a company like Facebook can put together on individuals who have never made an account.
I’ve been fairly parsimonious with my information for a fair while - I don’t use my real name online except when unavoidable for payment etc, don’t put photos of me anywhere, use social media (other than Lemmy, and I’m not very social on here really!) and I think I have fairly good habits to keep information and habits separated. I alternate between using FF, Librewolf and Mullvad browser for different things, don’t reuse usernames/id’s, use a VPN router at home and have VPNs on my mobile devices, email masks and relays, and where possible pay with virtual cards etc. I think my most unique identifier, last time I checked with the EFF site, was the size and resolution of my screens. I’m not really sure how much data there is to collect about me past the mundane, as I don’t really associate with anyone in the real world online, and almost exclusively use signal in the real world.
I do the same, obviously all bullshit info, email forwarders for the acct, VPN, and it’s cookies containerized so it can’t go snooping, and make sure your browser isn’t successfully being fingerprinted or it’s all pointless.
I have a VPN router, and will either use Mullvad browser with no other tabs open (and obviously all cookies freshly cleared etc) or maybe a vanilla FF on a VM. With all my details being nonsense, a unique relayed email, and the browser essentially completely resetting after every use, I doubt they can find out much useful about me
The eIDAS regulation makes an enormous change by mandating man-in-the-middle attack technology that it would be illegal for browser makers to defend against
How would this law affect websites with Onion Services (eg Facebook) that don’t use http at all, but Tor’s internal pinned end-to-end encryption with a pinned certificate tied to the .onion name?
This doesn’t affect websites as such - it’s the end clients, i.e. browsers that would be forced to accept gov issued CAs. I don’t see anyone going after TOR as it’s already a very niche thing, so it should be fine.
@Weslee consent-o-matic, made by @midasnouwenshttps://consentomatic.au.dk. the one recommended below auto accepts them or blocks the notice, while consent-o-matic sends the legally binding reject signal.
This add-on is built and maintained by workers at Aarhus University in Denmark. We are privacy researchers that got tired of seeing how companies violate the EU’s General Data Protection Regulation (GDPR). Because the organisations that enforce the GDPR do not have enough resources, we built this add-on to help them out.
regardless of what measures you set up, they’ll still be able to collect a bunch of data based on what pages you visit their service, which posts do you spend more time looking at and which you scroll past, and so on.
I figure that if I can keep it pretty isolated, they’ll only get “scrolls marketplace in SE uk” out of it - I’m never going to look at the feed or have “friends”.
@furzegulo consent-o-matic, made by @midasnouwenshttps://consentomatic.au.dk. the idontcareaboutcookies one doesn’t do what you want as it auto accepts them or blocks the notice, while consent-o-matic sends a legally binding reject signal.
privacy
Active
This magazine is from a federated server and may be incomplete. Browse more on the original instance.