[-] kosmoz@lemm.ee 4 points 1 month ago

[…], from that point the app will be built by f-droid with their own digital signature.

This part of your comment is not quite true. One of the advantages of reproducible builds is that the app can be signed by the developer but fdroid can still verify that it has been built from the correct source code. You can check out the documentation here: https://f-droid.org/docs/Reproducible_Builds/

[-] kosmoz@lemm.ee 4 points 2 months ago

Wouldn't that hurt Russia as much as any other country?

[-] kosmoz@lemm.ee 4 points 3 months ago

Space cadet has been reverse engineered and can be installed in Linux through flatpak: https://flathub.org/apps/com.github.k4zmu2a.spacecadetpinball

[-] kosmoz@lemm.ee 12 points 5 months ago

Have you tried Material Files (it's on fdroid)? It's genuinely great and it supports different remote protocols, although I haven't personally tried this feature.

[-] kosmoz@lemm.ee 11 points 6 months ago

Wunderground was great before they got acquired by IBM

[-] kosmoz@lemm.ee 4 points 8 months ago

This is great news! 👏

[-] kosmoz@lemm.ee 5 points 8 months ago

Honest question… Is there a better alternative?

[-] kosmoz@lemm.ee 4 points 8 months ago

Yes it does, but it is not part of nextcloud itself, they require you to host a collabora CODE server. It works quite well but it's a bit of a hassle to set up

https://www.collaboraoffice.com/code/

[-] kosmoz@lemm.ee 13 points 10 months ago

You can actually try kagi for free. 100 searches/month should be enough for you to decide if it's worth the money to you.

(Not affiliated; just a happy user)

[-] kosmoz@lemm.ee 9 points 10 months ago

The website works for me and seems legit (looks like a regular uni website...). It reads:

JAP (called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably.

Without Anonymization, every computer in the internet communicates using a traceable Address. That means:

  • the website visited,
  • the internet service provider (ISP),
  • and any eavesdropper on the internet connection

can determine which websites the user of a specific computer visits. Even the information which the user calls up can be intercepted and seen if encryption is not used. JAP uses a single static address which is shared by many JAP users. That way neither the visited website, nor an eavesdropper can determine which user visited which website. How it works

Instead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called Mixes. JAP uses a predetermined sequence for the mixes. Such a sequence of linked mixes is called a Mix Cascade. Users can choose between different mix cascades.

Since many users use these intermediaries at the same time, the internet connection of any one single user is hidden among the connections of all the other users. No one, not anyone from outside, not any of the other users, not even the provider of the intermediary service can determine which connection belongs to which user. A relationship between a connection and its user could only be determined if all intermediaries worked together to sabotage the anonymization. more...

The intermediaries (mix providers) are generally provided by independent institutions which officially declare, that they do not keep connection log files or exchange such data with other mix providers. JAP shows the identity and number of organisations in each Mix cascade in detail, and verifies this information by cryptographic means. The users are thus able to selectively choose trustable mix cascades.

Seems like a fun research project. But not sure how much I would personally trust it.

Also, no idea about the app but at least the project seems legit.

[-] kosmoz@lemm.ee 3 points 11 months ago* (last edited 11 months ago)

Rainbowdragoneyes makes good chiptune music (no fusion). Very underappreciated, it feels like.

Edit: added link

[-] kosmoz@lemm.ee 3 points 1 year ago

Mullvad DNS works well for this too: https://mullvad.net/en/help/dns-over-https-and-dns-over-tls/

Using DoH (DNS over HTTPS) means it should work on networks that try to block usage of private DNS servers.

view more: next ›

kosmoz

joined 1 year ago