Maybe I’m behind on my terms but does this count as a dark pattern?
It was my understanding that dark patterns are a thing designed to use a service in a way that they wouldn’t normally intend to, like renew a subscription or leave privacy options to the benefit of the company instead of the user.
This just seems like a scam, or at best highly deceptive advertising? Like, for it to be a dark pattern it would have to actually be able to send you to some android update system, but it almost certainly isn’t ever going to do that.
On iOS: Safari > Lemmy website > Hit share button > Add to home screen. On android, I assume steps will be similar.
I wholeheartedly recommend PWA app as such is published by the publisher of website itself, and I don’t need to download it either from official or 3rd party store.
In case you don’t know, PWA is basically a web app, running using your browser engine, which has almost same look-n-feel of native app.
It’s on a Fairphone 3 on Android 13. On Wi-Fi Private DNS works perfectly, but as soon as I switch to 4G the internet connection don’t work anymore. As soon as I reset the private DNS to default it works as intended again. That’s seems to be a carrier issue.
I recall that was a bug for a couple days and only on some sort modes when some instances upgraded to v19 and were shitting errors everywhere. All fixed now
I don’t undestand the need to have an app for stuff that works just fine on browser. In my books less apps is always better. The desktop and mobile version of Lemmy on browser gets the job done perfectly and is way more polished looking aswell.
Yup, lemmy works fine in a browser.
Also basically no apps support mod and admin actions or do it weird.
I’ll say that DMs could be a bit better in the browser, but otherwise it’s fine.
The dev has to do what they have to do to feed themselves. If you really like the app, deal with the ads or pay for the app. I personally can’t deal with ads so I’m on Eternity for Lemmy (through the fdroid store)
If new versions don’t make it to F-Droid, they might as well not exist for me. There are only a couple of apps that I find important enough that I’ll spend time manually building/pulling/installing, and a Lemmy reader isn’t one of them. Thanks for the tip, though.
Have you considered using github.com/imranr98/obtainiumYou give it the repository of the app and it will handle checking for new versions and updating them
This is exactly the reason why I don’t like F-Droid as a way to get apps. You’ll have to trust an additional party when getting your apps, and updates are often a couple days behind. I prefer to get it straight from the developer’s GitHub or Coderberg or whatever.
You’ll have to trust an additional party when getting your apps, and updates are often a couple days behind.
I know how it works, and in this case, that’s fine with me.
F-Droid has an excellent track record; better than many developers have. And I’m not addicted to having the latest versions of everything on the day they’re released. In fact, not immediately jumping on the latest versions has saved me from nasty bugs more than once.
Part of what I value in F-Droid is the additional layer in the build/release process, because it makes tampering more likely to be detected.
Barely and not really. “F-Droid can’t ensure the apps are safe. You still need to trust the upstream developers. We only do some basic check.” forum.f-droid.org/t/…/2
So it could still be considered less secure than N.
It could be, or it could not be. Depends on the particulars, and on the needs of the individual.
Mind, I’m not going around presuming to tell other people what’s better for them, as one or two others in this thread are doing. I’m just stating what’s a good fit for me.
Depends on the particulars, and on the needs of the individual.
That’s not really how things like security works. It’s either more secure or it’s not. The security of a thing does not depend on needs. Now, does the application of it or does someone need it to be more secure? That’s where risk acceptance and the needs of the individual come into play.
I’m not going around presuming to tell other people what’s better for them, as one or two others in this thread are doing.
Same. I’m not saying “stop doing this.” I’m just trying to educate people and make sure they’re not operating with a misunderstanding. Needs of the individual and all that. I think some people just go crazy for something that’s not big tech, and then quit looking at the particulars.
If that were true, threat modeling wouldn’t exist.
I feel like we’re talking about different things. I’m talking about static concepts, if X is more secure than Y, not individual setups where something is tweaked. Threat modeling is tailoring the security to your needs. It doesn’t bend security of a static object or make the application of something less than what it is. It requires one’s actions to do that by not utilizing it.
Take bullet proof glass, for example. Bullet proof glass is more secure than regular glass. Now, do you need (does your threat model require) bullet proof glass? No? Ok, that doesn’t mean bullet proof is now less secure than regular glass, it’s just unneeded.
Maybe pedantic, but it’s a totally different developer that took the Infinity for Reddit source code and forked it into Eternity for Lemmy. The Infinity dev was not interested.
Add comment