Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IR
Posts
0
Comments
322
Joined
2 yr. ago

  • A couple months ago Apple released some code for porting games that supposedly handles having to write custom code specifically for Metal. It's based on Wine so it seems similar to Proton, but Apple probably wants developers to package their games and get them approved for sale on the app store or whatever instead of having users just running their own games. It looked hastily put together when I checked it out, but I don't develop for Macs anymore so I haven't actually used it. It's too soon to tell if game companies care to port their games and go through retesting that the graphics work using the API translation layers to run on different drivers and hardware.

  • I saw a lot of people excited to try it. Losing 80% of its peak users at this point doesn't seem like a failure to me. Anybody who was curious was counted as a user. I'm sure fediverse sites have had similar, smaller influxes of new users that create an account to check it out and then don't come back. It takes some determination to move to another social networking ecosystem.

  • I have a Kobo Forma and a Boox Lumi.

    The Lumi is huge and works well for manga, especially considering the sad state of legally obtainable manga in the United States where everything requires proprietary Android apps, or if you want to do workbooks or something using the stylus. It's surprisingly good, even for things you wouldn't normally do an an ebook device. I've never used any of the smaller Boox devices so I can't say whether it's the same for all of them.

    The Forma is a normal size so it's much more portable.

    Both of them have wifi and you can run your own software on them, but I think running your own software on Kobo devices is less well supported than running your own software on Boox devices.

  • The security is still implemented on the server. When you log in, most sites issue a cookie or otherwise store in the browser an authentication token. Subsequent requests provide that token so the server knows it's still you. If the cookie is not persisted across tabs or browser sessions, every time you visit the site you must log in again (there are ways to make browsers do this if you really want to). If you didn't allow even temporary client-side storage while on the page, most of the internet just wouldn't work.

  • This is unlikely to work for internet messaging services. If you're finding the location of the phone based on the location of the tower that delivers the message to the phone, the analogous part in modern internet messaging services would be a cloud server in a cloud data center hub. There are few of these in the world, so even if you could narrow it down that way, you'd end up with vague locations like "western North America" or "Europe".

    Additionally, the routing of messages in internet messaging services is usually not so sophisticated. You can only tell the difference between sending a message to somebody from their east and sending a message to somebody from their west if the message is taking a different route to get to the user based on the physical direction. If the path of the message is always sender->infrastructure->central database->infrastructure->receiver, you change only change the sender->infrastructure and maybe the infrastructure->central db latency. Without being able to change the path the message takes back out of the system to the target, you can't gain any useful information.

    It should work with direct IP networking, but for locating IP addresses we already have location databases and traceroute so it wouldn't be necessary. Maybe it could work if there was a pseudo p2p service where clients connect to the nearest Cloudflare edge compute node or something and then the nodes connect directly between each other at the IP layer, because in that case you would be going through sufficiently sophisticated internet routing but the target's IP wouldn't be available for a less sophisticated and more accurate approach.

  • This is close to the real problem. If the NSA is able to buy it without a warrant, that means it's effectively public information about you that is collected and published without your consent (regardless of what it says deep inside a privacy policy that you are forced to accept to continue). If that information is useful to the NSA, then it shouldn't be legal for that information to be collected without benefit to the user or sold at all, aggregated or not.

  • Cookies are an important part of the internet. The misconception that cookies were added to browsers to track people is why websites that operate in Europe are always bothering you about necessary cookies. You're talking about third-party cookies and analytics tools, which don't even need cookies at all to track exactly what you're doing on a single site. Without cookies (or cookies reimplemented using client-side storage APIs instead of regular cookies), websites cannot keep you logged in or remember what you have in your shopping cart or any sort of preferences you have set.

    At least in the US, don't assume that local stores aren't collecting the same information using cameras and credit card numbers and device trackers (eg if the store has free wifi, which sections of the store are wifi client devices in?).

  • The technology is useless if you can pass an integrity check just by running as admin. The point is that Google has control over what the process is doing and knows if you're tampering with it. I guess nothing would stop you from making a device's that uses the hdcp osd support to draw black boxes over ads you find using accessibility information, but if you're able to modify the page through extensions or developer tools or memory manipulation, then you're able to make automated API calls, and preventing that is supposedly the whole point of this system.

    The reason for using an external device to overlay data on the video signal is that there is a browser API for tracking occlusion. It's supposed to be used for things like disabling animations of elements that are not visible, but could be unethically used for things like making you pay extra to listen to videos if you don't have an extra display to put them on.

    I don't know why you think secure computing doesn't relate to driver control. Drivers run with special privileges and can modify protected memory. This is why people write root kits, and detecting those root kits is one of the primary motivations behind secure computing.

  • To be fair, it is useful for other purposes, but the cost to users is likely to be huge, with ad blocking being one of them. It probably also prevents other things even outside your browser because there's no point in securing a browser running in an untrusted environment. IIRC there is/was an issue running Netflix on certain Android devices and rooted devices after a similar feature was added to Android.