Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)RO
Posts
0
Comments
61
Joined
1 yr. ago

  • I don’t dispute imaginary statistics, there’s no point.

    And if that were true, it makes no difference. Nintendo meticulously goes after fan projects and emulators that are completely legal. If they want to go after sites distributing ROMs - totally fair.

    Saying Nintendo is only anti-consumer to pirates is a bootlicker take.

  • I might catch some heat.. but I gotta speak my truth - this is all I need. I game, I program, I have 2 function keys that change the layout and provide access to any keys not physically present.

  • I recognize this is a “feature” but I think it should be treated like a bug, or at least let us turn it off!!

    Whatever egghead came up with the “keyboard hot zone” that dynamically (and invisibly) increases the size of the keys based on what it thinks you’ll type deserves to be tarred and feathered. Problem is, it’s always fucking wrong. It happened already typing this text, the above “increases” was first typed as “increased” because it expected “d” and thus made the “d” key zone slightly larger and the “s” zone slightly smaller. I tried typing “NCASE”, like the PC case brand, the other day, and I had to try repeatedly to get the “s” key to pop. I kept hitting the “a” key because it expected “NCAA” and increased that key zone.

    Just the iPhone keyboard overall is bad. Inconsistent layouts based on where you’re typing. No number row. No period/comma (unless you’re typing a website). Just why.

  • Permanently Deleted

    Jump
  • Same. That was 2 days ago and nothing yet. I’m skeptical they even have staff to complete these requests. Not sure how long I’m gonna wait before just pulling the trigger. I’m planning to scramble as much data as possible and change my address to somewhere in California but doubtful that will do much.

  • This isn’t malware, it’s a scam which is harder to detect. No filtering process is ever 100% successful. I’d argue they do a good job at keeping out most of the junk. A quick look at the Playstore confirms this.

    Sideloading is accessible to anyone with 15 minutes to educate themselves on it. I have a torrent client, an ad-free YouTube, and UTM sideloaded on my US iPhone.

    I do not want to download a different app launcher for every app I download. Especially given they won’t be restricted to Apple’s strict privacy policies. Imagine a different launcher for every bank card, none of them supporting Wallet anymore.

    I realize not everyone will agree with this, but I bought an iPhone for easy of use and because I like Apple’s offerings. I knew about the walled garden going in, and if I didn’t want to participate in it, I would just bought a different phone - as anyone is free to do.

  • I’ll add 2 more that resonate with me:

    1. Discussions of distributing copyright material is banned. (Not actually sharing, obviously that is illegal, but they’ve banned the mere discussion of it.)
    2. They have not defederated from Meta’s Threads
  • You can on any iOS device without jailbreaking. Look into AltStore or Sidestore. The caveat is that you can only sign 3 apps at a time, and must resign these apps every week - which is done over your WiFi to a PC running AltStore server.

    If you have a $99/year Apple developer account, you can use AltStore to sign as many apps as you like, and you only need to resign once per year.

  • Was CVE-2024-44133 Already Exploited?

    After concocting their exploit, Microsoft started scanning customer environments for activity that aligned with what they'd found. On one device, lo and behold, they spotted something quite closely resembling what they were looking for.

    It was a program digging into the victim's Chrome configuration settings, adding approval for microphone and camera access to a specific URL. It also did more: gathering user and device information, laying the groundwork for a second-stage payload.

    I’m not sure if this article is disingenuous or if I’m just confused… but it states when MS scanned their customers’ environments, they discovered malware making changes to the Chrome config. And the Safari CVE was patched in September. So we don’t have proof of this happening in the wild then?

    What’s more, the Safari exploit requires making changes to a protected directory. But no indication of how that is done by just the browser exploit. Did the attackers already have access to the machine? If so, this article is a nothing burger.