Off topic: Why is there a “gift” code and various tracking paramters in the url?
Url does seem to work without them: https://www.theatlantic.com/politics/archive/2025/03/trump-administration-accidentally-texted-me-its-war-plans/682151/
IP based blocking is complicated once you are big enough
It’s literally as simple as importing an ipset into iptables and refreshing it from time to time. There is even predefined tools for that.
While AI crawlers are a problem I’m also kind of astonished why so many projects don’t use tools like ratelimiters or IP-blocklists. These are pretty simple to setup, cause no/very little additional load and don’t cause collateral damage for legitimate users that just happend to use a different browser.
No need to do that, you can simply scroll down to the footer and find the current version there ;)
With F-droid you trust F-droid to build the binary from the developers’ source code
Not when using a self-hosted F-Droid Repo - which is the case for Ironfox.
because it takes a like 3 or 4 minutes to boot
What kind of PC is this? Does it have an SSD?
saying there are unspecified “known vulnerabilities” within Signal
His source: Trust me bro
There are some more privacy friendly forks of “Firefox for Android”, which have sponsored shortcuts disabled or minimized by default. For example:
Feel free to give them a try :)
The same apps that have access to more of your data (because they’re not sandboxed in a browser), use electron (ships a browser) and include trackers that one can’t simply block with an extension?
Yeah but have you ever tried to install it directly?
There is stuff like notarization that’s literally designed in a way that only Apple approved software can be run on your machine.
Has since been removed.
Short answer: Google Play
Long answer: Google Play and/or people with special requests like https://lemmy.ml/post/12332630
I also want to highlight Florida - which has around 10 different electric grids…
Well from my personal PoV there are a few problems with that
I also personally ask myself how a PyPI Admin & Director of Infrastructure can miss out on so many basic coding and security relevant aspects:
On the other hand what went well:
Just for further clarification, the API works like this:
time
is the local (client) time (in this case UTC-7)servertimezone
is the time zone where the server is locatedtimezoneoffset
is the offset of the local time relative to the servertimezone (offset from the servers PoV)To get the UTC date you have to do something like this:
time.minusHours(timezoneoffset).atZone(servertimezone).toUTC()
Well if it’s a 32bit timestamp you’re screwed after 19 January 2038 (at 03:14:07 UTC)
So just for additional context:
This meme was brought to you by the following API response scheme:
{
"time": "2007-12-24 18:12",
"servertimezone": "Europe/Vienna",
"timezoneoffset": -8
}
when it could have just been
{
"date": "2007-12-24T18:21:00-07:00"
}
Can’t wait for all the other horror stories getting posted here :D