Show more

@josias@theres.life the problem with short seth godin style blog posts is that it reduces the information density of my list of blog posts, and also i have an rss feed that ends up in people's feed readers and i don't want to put <1000 word stuff there.

also my CMS is a git repo that is used to build a jekyll static site (with protected master), and branch, editor, commit, pull request, wait for build (5 mins, i reduced it with caching), check preview/staging url to make sure i didn't break anything, merge

@Mte90@hostux.social @paoloredaelli

it's not anonymous unless it's submitted via tor. any telemetry that submits itself using my client ip is not anonymous and you're lying if you say it is.

i don't give a shit if it's public.

software that implements silent telemetry without advance, informed, opt-in consent is unethical malware and the people who make it should be ashamed of themselves.

@Dashtop

I mean how many use macOS without a VPN?

Are you familiar with why people use VPNs?

i'm done with this conversation

@Mte90@hostux.social @paoloredaelli that's not true.

firefox has telemetry that is expressly intended as telemetry, on by default.

the macOS prompts you for opt-in consent for telemetry/analytics.

there are some macOS phone-home issues that aren't intended (or used) as telemetry by apple.

i would use mozilla software if i could say the same about them. i can't, so i don't.

i'm making a personal promise to myself right now: i'm never typing an apple id email address or apple id password on a mac ever again.

you have to do it on iOS, because without identifying yourself to apple you can't even install free apps on your tablet or phone. i have throwaway, disposable email address apple IDs for that purpose there, which of course serve as permanent unique tracking identifiers. i'm not doing it on the mac, ever.

@sp1rit can't download xcode to compile macos gui apps without an apple id either.

@paoloredaelli

you're late to the "referencing the right to read" party.

sneak.berlin/20201112/your-com

signed kernel and signed binaries means that malware that gains root can't overwrite them. this is largely a good thing, and great for platform security. the question is as always: who owns the keys?

oh the irony: ungoogled-chromium for macos is built using github actions (which means it's built by microsoft, on microsoft servers).

the builds are, of course, not reproducible.

ungoogled-software.github.io/u

ungoogled-software.github.io/u

why is this so difficult

@paoloredaelli @Mte90@hostux.social

you aren't understanding me

wireguard for macOS only has download links on their webpage that link to the apple Mac App Store, which can only be used with an apple ID, even for free apps.

wireguard, please provide direct download links to the wireguard macOS gui application that don't involve doxxing oneself to apple.

used the new m1 air for a whole poop, a chrome install, and some tooting (the activitypub kind), maybe 20 mins or so?

and it's still at 100% battery

what sorcery is this

@timkrief perhaps the solution is just to increase my masto max toot size to like 10000 like some instances do, and trigger a rebuild of my static website (with a page that republishes my mastodon feed) each and every time i toot.

yo @containsliquid@mstdn.io did you ever find a solution to your webhook question?

github.com/tootsuite/mastodon/

that link that @rinsuki posted in the thread is dead

i would like each toot i make on my mastodon instance to trigger a webhook. is there an easy way to do this within mastodon, or a complete/ready-to-use app that will poll my mastodon api and make the outbound HTTP requests on changes?

also, anyone know of the same for RSS?

@protonvpn thanks for checking this out. i'm doing the same. it will be nice if we can make the best laptop in the world also network-trustworthy.

sneak boosted

In the recent macOS Big Sur release, Apple placed 56 of its own apps, such as FaceTime and Apple Maps, on an exclusion list allowing them to bypass firewalls and certain VPNs without users’ knowledge. This seriously undermines macOS users’ security and privacy.

After thorough examination, we confirm that on ProtonVPN’s macOS app, no traffic is excluded from the encrypted VPN tunnel when Kill Switch is enabled (including Apple apps’ traffic). More details here: protonvpn.com/blog/big-sur-exc

oh, at least activity monitor shows the architecture of the running processes. interesting that apple lists the architectures as "Intel" or "Apple".

intel didn't invent the x86_64 ISA (also known as amd64), and apple didn't invent the ARM ISA.

when and how did the term "architecture" come to mean "processor manufacturer"?

is there any normie/supported gui way of finding out if an app is a fat binary or not? having to run "file" on everything is going to get annoying

I triggered the rosetta install by duplicating terminal.app and doing a get info on the new one and checking "open using rosetta" per the instructions here:

notion.so/Run-x86-Apps-includi

one critical bug: after duplicating terminal, both icons had exactly the same name, no "Terminal (1)" or "Terminal copy": just two identical "Terminal" programs. Def a security issue there...

Show more
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!