Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)UT
Posts
2
Comments
801
Joined
4 yr. ago

  • Thanks again, if the wallet is "filled" by a bank transfer then I imagine anything able to do so, e.g. my random European bank that allow IBAN transfer, would suffice as long as my wallet itself has an IBAN or that the service provider hosting that wallet has one and then "store" the then "money" for it and allow me to spend it with other GNU Taler wallets.

    Anyway I'll explore through a recent technical talk indeed, good suggestion.

  • I don't necessarily have to wait, it's more a generic advice.

    Can you please expand though, as I'm curious, why you won't wait and you plan to use it?

    Can you also comment on my follow up question, namely what are the limitations at the moment, both technically and legally? Basically does not living in Switzerland make a difference anyway for users?

  • Also... I'm wondering what that means in practice because if it's online infrastructure then... it can be operating in Switzerland but both sellers and buyers, remotely or face-to-face, can rely on it to exchange money.

    So... what are the limitations at the moment, both technically and legally?

  • best choice for privacy [...] “reputation” of being secure

    Disentangling privacy and security, and potentially other priorities, e.g. secrecy, anonymity, etc might be important before making suggestion.

    Another way to help deciding what is the best choice for you, not necessarily anybody else, is what is your threat model?

    An analogy I thought recently is "Are you putting a very tough lock on your door but leaving the windows opened?" or "Are you locking your car but walking outside naked?". The point here is not to imply that people do obvious mistakes but rather that, truly there are people who go to parades naked AND lock their cars. The concerns can be orthogonal and thus must be considered individually. For that I believe thinking about "who the enemy is" as a way to discover your threat model is interesting, namely :

    Are you worried by :

    • government getting your private data without your consent?
    • government doing so automatically and cheaply through intermediaries e.g. platforms?
    • government doing so via extremely costly individual security attacks e.g. 0-days, with a "legit" hacker manually doing it?
    • small private companies?
    • platforms?
    • your actual neighbor?

    The answer to those questions will then provide you a more limited set of options. Basically I would argue only the 3rd option ties tightly with security but that's up to a certain extent and companies like Pegasus shows that it can also be done at scale, for profit. Still, AFAICT it wasn't done for a random person BUT that was few years ago.

    Anyway one you go through options, e.g. iPhone vs Android vs deGoogled Android vs Linux phone vs dumb phone you will see your usage itself will have to change. This is not necessarily a bad thing but it is not something most people will think about initially.

    I suggest then to... try. I know it's not the answer you want but what you are asking for, I believe, is genuine change. It is about the technology, yes, but it also is about your habits. Consequently it is a process with some success, failures, cascading changes and thus IMHO must be iterated on.

    It is worth it though.

  • This isn't what you asked for but... maybe you have one already?

    My phone has an ARM processor and I can use my BT keyboard (Corne-ish Zen) with it.

    Edit: alternatively the PinePhone also has a battery+keyboard case but I admit I don't exactly love typing on it.

  • I agree and I think games are a good example, especially with the Cloud Gaming trend that is trying to apply the same model from video streaming including both the advantages (to be fair, in particular instantaneous start, in theory) but also huge disadvantages (privacy, connectivity needed, no sovereignty, price increase, etc).

  • I can think of plenty of reasons, e.g. NSA, or any US institution interested in intelligence gathering, paying for it.

    I can though, at the same time, imagine that Apple itself would still NOT want to do it, neither in software or hardware, because once discovered (not when) their economical value would crater.

    The market value of Apple is totally different from alternatives, e.g. Chinese companies, as you mention, but also Microsoft or Google. Yes, they ALL sell vertical integration of software and hardware BUT everybody expects Google or Meta to "steal" your data. Most people expect Chinese companies to do the same. Most people understand that Microsoft do it because it's profitable so they follow their footstep.

    Everybody who knows this is buying Apple for the prestige AND because they are "different". Namely you are "hip" by buying from them because they are NOT Google subsidizing hardware for privacy, Xioami or anything Android because it's the same but "cheap" or Microsoft because it's what one uses at work.

    So... if tomorrow Apple is not "cool" anymore, that's actually a very big deal for the bottom line IMHO.

    They might be tempted to do so, regardless of how genuine the "culture" of the corporation is, but even if one were to care solely for money, their image is deeply intertwine now with the notion that at least if you buy some fancy Apple device they'll work and nothing with leak.

    That's why economical, not technical, bet on how I have a hard time imagining a hardware backdoor.

  • Sorry to say but looks like you are investing a ton of resources for a behavior that is not very healthy.

    I know it's tempting to go back but ponder why though.

    Lemmy isn't perfect but maybe we can help do better, be better?

  • I wouldn't build anything significant on the RPi Zero and instead would try to build elsewhere, namely on a more powerful machine with the same architecture, or cross-build as others suggested.

    That being said, what's interesting IMHO with container image building is that you can rely on layers. So... my advice would be to find the existing image supported by your architecture then rely on it to layer on top of it. This way you only build on the RPi what is truly not available elsewhere.

  • doubt Apple is doing anything beyond the software level.

    Why though? They are designing the most complex part of the computer, the M* chip, so they definitely have the technical and production capability to do whatever they want with the hardware. I'm not saying they do though but they could if they wanted to. That being said however they do it, they would still have to transmit whatever data being captured with interroperable means, i.e over the Internet (being over BT relayed to another device, WiFi, Ethernet, etc) which then in turn could be spotted with any network traffic analysis tool. A single instance of this would bring their entire goodwill and thus probably business to the ground though.

    So... I'm not saying one has any reason to worry but also claiming they don't do anything beyond software is strange to me.

  • Absolutely, but OP will have to explain a bit to their boss why. Maybe we can help OP there?

    Fuck that walled garden is not a business value added task so can we, as a community who cares how openness, translate that to C-suite MBA speech?

    • Apple devices are more expensive to manage (source? time from OP to do so? additional hardware? TCO comparisons?)
    • Apple devices are less compatible with software solution we use in the company (examples?)
    • Apple devices ...

    Maybe Ubuntu, RedHat, and other company selling FLOSS have reports to help there.

    This is nearly 20 years old but give the idea of the words needed https://www.cio.com/article/274764/operating-systems-the-tco-of-operating-systems-compare-the-big-oses.html

    Here is something a bit more recent https://umatechnology.org/comparing-operating-system-costs-windows-macos-linux/ but again this isn't to give an "answer" but at least understanding management perspective, which is not really a technical one but rather a cost/value one.

  • Mine, we're one in it, me ;)

    Interesting, thanks for sharing the use cases and clarifying your choices.

    I do also have a standing desk with a relatively large screen on a monitor arm. I also have a walking pad under the standing desk. The goal being to ergonomically have as much freedom as possible while still being efficient.

    I did try the XReal months ago but I don't think I tried the Pro.

    Otherwise I worked with pretty much everything (Google Glass, HoloLens, Vision Pro, Quest (all models), Lynx XR1, Monocle/Frames, my own DIY ones, etc) but my main focus is WebXR and 6DoF, so not really replacing a screen. I do understand it is useful, and sometimes as I travel I use the Quest 3 or Vision Pro to work in there but that's typically a temporary measure. My professional perspective is that 6DoF with hand tracking and accessories (6DoF pens, BT keyboard, etc) is the most novel way to interact with information hence why I build open-source WebXR prototypes on that topic.