@josias@theres.life the problem with short seth godin style blog posts is that it reduces the information density of my list of blog posts, and also i have an rss feed that ends up in people's feed readers and i don't want to put <1000 word stuff there.
also my CMS is a git repo that is used to build a jekyll static site (with protected master), and branch, editor, commit, pull request, wait for build (5 mins, i reduced it with caching), check preview/staging url to make sure i didn't break anything, merge
@Mte90@hostux.social @paoloredaelli
it's not anonymous unless it's submitted via tor. any telemetry that submits itself using my client ip is not anonymous and you're lying if you say it is.
i don't give a shit if it's public.
software that implements silent telemetry without advance, informed, opt-in consent is unethical malware and the people who make it should be ashamed of themselves.
I mean how many use macOS without a VPN?
Are you familiar with why people use VPNs?
i'm done with this conversation
@Mte90@hostux.social @paoloredaelli that's not true.
firefox has telemetry that is expressly intended as telemetry, on by default.
the macOS prompts you for opt-in consent for telemetry/analytics.
there are some macOS phone-home issues that aren't intended (or used) as telemetry by apple.
i would use mozilla software if i could say the same about them. i can't, so i don't.
i'm making a personal promise to myself right now: i'm never typing an apple id email address or apple id password on a mac ever again.
you have to do it on iOS, because without identifying yourself to apple you can't even install free apps on your tablet or phone. i have throwaway, disposable email address apple IDs for that purpose there, which of course serve as permanent unique tracking identifiers. i'm not doing it on the mac, ever.
@sp1rit can't download xcode to compile macos gui apps without an apple id either.
you're late to the "referencing the right to read" party.
https://sneak.berlin/20201112/your-computer-isnt-yours/
signed kernel and signed binaries means that malware that gains root can't overwrite them. this is largely a good thing, and great for platform security. the question is as always: who owns the keys?
oh the irony: ungoogled-chromium for macos is built using github actions (which means it's built by microsoft, on microsoft servers).
the builds are, of course, not reproducible.
https://ungoogled-software.github.io/ungoogled-chromium-binaries/releases/macos/85.0.4183.121-1.2
https://ungoogled-software.github.io/ungoogled-chromium-binaries/
why is this so difficult
@paoloredaelli @Mte90@hostux.social
you aren't understanding me
@timkrief perhaps the solution is just to increase my masto max toot size to like 10000 like some instances do, and trigger a rebuild of my static website (with a page that republishes my mastodon feed) each and every time i toot.
yo @containsliquid@mstdn.io did you ever find a solution to your webhook question?
https://github.com/tootsuite/mastodon/issues/8890
that link that @rinsuki posted in the thread is dead
@protonvpn thanks for checking this out. i'm doing the same. it will be nice if we can make the best laptop in the world also network-trustworthy.
In the recent macOS Big Sur release, Apple placed 56 of its own apps, such as FaceTime and Apple Maps, on an exclusion list allowing them to bypass firewalls and certain VPNs without users’ knowledge. This seriously undermines macOS users’ security and privacy.
After thorough examination, we confirm that on ProtonVPN’s macOS app, no traffic is excluded from the encrypted VPN tunnel when Kill Switch is enabled (including Apple apps’ traffic). More details here: https://protonvpn.com/blog/big-sur-exclusion-list/
oh, at least activity monitor shows the architecture of the running processes. interesting that apple lists the architectures as "Intel" or "Apple".
intel didn't invent the x86_64 ISA (also known as amd64), and apple didn't invent the ARM ISA.
when and how did the term "architecture" come to mean "processor manufacturer"?
I triggered the rosetta install by duplicating terminal.app and doing a get info on the new one and checking "open using rosetta" per the instructions here:
one critical bug: after duplicating terminal, both icons had exactly the same name, no "Terminal (1)" or "Terminal copy": just two identical "Terminal" programs. Def a security issue there...
Hacker, researcher, entrepreneur. Make sure we're connected at https://sneak.berlin/list
these toots are also available at https://s.sneak.berlin/@sneak.rss if you're into that.