Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)L
Posts
4
Comments
448
Joined
2 yr. ago

  • Road Redemption (motorcycle combat game)

    7 Days to Die (zombie scavenging survival craft with mostly 2-wheeled vehicles)

  • Rude? No it's not. I know of only 2 people who consider it rude, and they're both assholes.

    I consider it rude to present generative AI output as if it were a legitimate human creation. I consider it rude to train AI on works whose authors didn't give that permission, and then sell that output or use it in any commercial way.

  • As a STEM graduate, I would much rather hold hands with an econ graduate than a business graduate. Economists can do real good for the world, while MBAs seem to be mostly harmful.

  • Even if you can buy it, you can't file a warranty return if you are outside Fairphone's small support area.

  • Fairphone has guaranteed 0 years of support in my country.

  • The point of the blockchain is to achieve distributed consensus of what's in the database. That way, one entity can't unilaterally change what the database says.

    If you have a public non-profit institution maintaining the database, obligated to serve all legal customers, with serious consequences for tampering with it, you can get pretty much everything blockchain can do, for a billionth of the computing power.

    But with that system, you would lose these features:

    • partially-anonymous participants
    • service of all customers, even illegal ones
    • immunity to court orders
  • bmw

    Jump
  • I did not know about soft turn signals until I saw this post.

    I question why this feature exists. Drivers should be aiming to signal 10 seconds ahead. When making a lane change or turn, you should be keeping your signal on until the maneuver is completed. I can't think of a circumstance where 3 blinks is enough. 1 blink looks more like a mistaken signal.

  • Swapping out random parts of the OS will certainly lead to breakage and dependency hell in your package manager (unless you just replace files without using the package manager, which might make all of this even worse).

    I've done it, and it works. I've built packages of libraries and binaries before, at higher version numbers than Debian had, and deployed them to multiple Debian sid systems. They worked. When Debian caught up, I seamlessly upgraded all 3 systems with no problems.

    Even in the worst case scenario of dependency hell, you would be able to downgrade to the Debian supported version. But I never had to do anything like that.

    I'm not going to respond to all the rest of your post, because I don't think it will help with anything. It seems that we have very different ideas about device ownership.

  • Some apps resist being backed up. "android:allowBackup=false" was one way. Apparently that can be overridden, but there are other ways apps can resist backup that can't be overridden. It's not clear what those are, but some of my apps definitely aren't being backed up by Seedvault, even though they aren't using keystore.

    The apps using keystore can only ever be backed up by installing a backdoor in the TEE.

  • They do provide instructions for compiling from source, they just don't support you at all afterwards. If you compile GrapheneOS and put it on your phone, they say "you are not running GrapheneOS" at that point. Unlike Debian or Ubuntu, where every package can be replaced by a hand-compiled version, and it's still Debian or Ubuntu.

  • need to charge it in a public space? You better hope no one had modified the charger with something like an RPI to silently exploit your phone

    Any secure Android device should be starting each USB session in device mode, set to charge only. It is usually not possible to change this mode without unlocking the screen. I don't know what this has to do with sandboxing or unlocked bootloaders.

    Crossing a border into a country and they suspect you’re some sort of threat?

    How does this attack work? Are you saying they'd replace the operating system by using the unlocked bootloader? There are plenty of ways to prevent this with full disk encryption. Of course you need to check for modifications when you get it back, but that's true even if you have a locked bootloader, because of hardware modifications and leaked keys.

    Not running software that updates the hardware’s proprietary software drivers? One text message and you’ve got a rootkit.

    In any of the open source Android distros, like LineageOS or GrapheneOS, those updates come as part of the operating system. The updater is open source, and doesn't care whether your bootloader is locked. I assume a Linux Mobile system would be closer to Debian's Apt system, which is also an open source updater than can install proprietary drivers, and also doesn't care if your bootloader is locked.

    didn’t really need an “um ackshually” about people who don’t want a secure os

    This is pointlessly condescending.

  • Comprehensive backups, which can only be done after rooting. You can do this, but only after disabling verified boot.

  • They literally have a whole instruction page for it on their official website: https://grapheneos.org/build

    I've asked, and they don't support you at all after you build it. You can't get updates or packages from GrapheneOS. Compare to Debian, Ubuntu, RHEL, etc., where you can compile your own newer package, install it, even replace core operating system components, and then seamlessly upgrade to the OS vendor's version when they catch up.

    What they don’t support is making modifications to GrapheneOS, compiling it, and then still calling it GrapheneOS. It’s not. You changed it, so it’s something else. It’s your own fork of GrapheneOS, so you should name it accordingly.

    Even if you don't modify it, they tell you not to call it GrapheneOS, and don't offer any way to install patches, besides building it again.

    Uh that’s by design? Do you even understand the purpose of a secure element and trusted execution environment, and how they work?

    Yes, I understand it. I've opposed TPM from the start, and this is just TPM for Android. I don't want a device that keeps secrets from me. I do want comprehensive backups, including all cryptographic keys. I should be able to access the TEE from my authenticated PC over SSH.

    I'm fully aware that Widevine won't run on a device where the owner has control over the whole device.

    The code is open source, you can freely modify the OS, compile it, sign it with your own keys...

    I don't have the resources to do this (PC nor effort). They recommend 100GB+ storage and 32GB RAM for building it, and you seemingly can't do it incrementally, since you have to flash an entire operating system at a time. I want to modify one file, like the call recording xml file. (That file is from a previous operating system I had, but I can't provide an example of niche cases like that for GrapheneOS, because I only ever used GrapheneOS for a few days, so I don't know what kind of small modifications I would want to make.)

  • Can you please explain how rooting adb only, not any apps, makes it less secure? Use concrete examples, not abstract.

  • Not everyone runs dangerous proprietary apps that need sandboxing. Does my offline puzzle game need sandboxing? Firefox has its own sandbox built in.

    Some people consider unlocked bootloaders a feature.

  • Just try asking about rooting in the GraoheneOS Discord, and you risk getting banned.

    GrapheneOS has a ton of locked down stuff they don't want you to access. They make rooting extra hard, they don't support compiling the OS from source, there's still the TEE you can't access even with root, and the OS filesystem is readonly to inhibit customization.

    GrapheneOS promotes "verified boot" that stops you from doing many important things.

  • Even if Discord wasn't doing it, public Discord guilds are known to be scraped by a number of different bots. Previously, it was for spies, cops, and private investigators who wanted to search for messages by username. If those bots could do it before, AI bots will be doing it aggressively today.

  • Cloudflare has IP banned me before for no reason (no proxy, no VPN, residential ISP with no bot traffic). They've switched their captcha system a few times, and some years it's easy, some years it's impossible.

  • Give Microsoft some credit! Excel has been able to come up with wrong answers for decades. For example, reporting 1900 as a leap year.