GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by inference (inference@plr.inferencium.net)

  1. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Sunday, 30-Oct-2022 02:11:19 JST inference inference
    in reply to
    • Puniko ?
    • oshy
    @ocean @puniko TFW people think the internet has an off switch...
    In conversation Sunday, 30-Oct-2022 02:11:19 JST from plr.inferencium.net permalink
  2. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Tuesday, 18-Oct-2022 05:56:11 JST inference inference
    GrapheneOS has had to resort to reverting Vanadium from 64-bit-only to supporting 32-bit due to extremely outdated F-Droid practices of building apps as 32-bit-only.

    Android and iOS, and pretty much every other OS, have supported 64-bit for years, some close to 2 decades (that's 20 years!), with mobile OSes supporting it since at least 2013.

    F-Droid is NOT secure or private; without a reasonable level of security, you cannot have privacy, because that lack of security allows easy exploitation of your data. New 32-bit apps, and 32-bit updates to existing apps, have been disallowed on Play Store since 2019, with 32-bit apps being unavailable for install on 64-bit devices since 2021.

    There is NO reason to build 32-bit apps in 2022; not a single reason. F-Droid is harming security and privacy by their ridiculously insecure practice, as if F-Droid wasn't bad enough already.

    Pixel 7 and Pixel 7 Pro have completely dropped 32-bit support, which is a great thing for security, privacy, and performance, meaning F-Droid apps, and any other apps, compiled as 32-bit-only will never run on those devices; hopefully, this is a sign that Android is ditching 32-bit for good with Android 14 in 2023, and the fossils F-Droid target will be completely dead, forcing F-Droid to target reasonable API levels and 64-bit.

    Last time I checked, around 90% of all Android devices are running a minimum of Android 7.0, while F-Droid targets extremely insecure Android 4.x and 5.x devices with most of its apps.

    You can either have backwards compatibility with the 1990s, or you can have security and privacy; you cannot have both.

    I guess I'll have to fork GrapheneOS so I can have a truly 64-bit-only OS on my Pixel 6, because F-Droid is holding back real security and privacy. This doesn't only apply to GrapheneOS, it applies to EVERY 64-bit Android device which is being held back by F-Droid.

    #boycottfdroid
    In conversation Tuesday, 18-Oct-2022 05:56:11 JST from plr.inferencium.net permalink
  3. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Tuesday, 18-Oct-2022 05:56:09 JST inference inference
    in reply to
    • Joseph?
    @Jessica

    *Nothing is 100% secure.

    Not the same as secure in any sense.
    In conversation Tuesday, 18-Oct-2022 05:56:09 JST from plr.inferencium.net permalink
  4. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Tuesday, 18-Oct-2022 05:56:06 JST inference inference
    in reply to
    • Joseph?
    @Jessica 64-bit has been around since at least 2013 on iOS and 2016 on Android; there is no excuse to not provide a 64-bit build for modern devices.

    You can provide both 32-bit and 64-bit using an AAB or just providing separate builds.
    In conversation Tuesday, 18-Oct-2022 05:56:06 JST from plr.inferencium.net permalink
  5. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Saturday, 01-Oct-2022 00:55:21 JST inference inference
    in reply to
    • 寮
    • itzzenxx :heart_trans:
    • Hyolobrikator
    • straw
    @straw @Hyolobrika @itzzenxx @ryo You do you.
    In conversation Saturday, 01-Oct-2022 00:55:21 JST from plr.inferencium.net permalink
  6. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 29-Sep-2022 14:34:56 JST inference inference
    in reply to
    • 寮
    @ryo

    https://inferencium.net/blog/foss-is-working-against-itself.html
    In conversation Thursday, 29-Sep-2022 14:34:56 JST from plr.inferencium.net permalink

    Attachments


  7. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 29-Sep-2022 14:34:31 JST inference inference
    in reply to
    • 寮
    • itzzenxx :heart_trans:
    • Hyolobrikator
    • straw
    @Hyolobrika @itzzenxx @straw
    In conversation Thursday, 29-Sep-2022 14:34:31 JST from plr.inferencium.net permalink
  8. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 29-Sep-2022 05:44:56 JST inference inference
    in reply to
    • Fediverse Contractor
    @bot At least it's not written in JavaScript... Why? Just why?
    In conversation Thursday, 29-Sep-2022 05:44:56 JST from plr.inferencium.net permalink
  9. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 29-Sep-2022 05:44:53 JST inference inference
    in reply to
    • Parker Banks
    • Fediverse Contractor
    @parker @bot It was written in 10 days...
    In conversation Thursday, 29-Sep-2022 05:44:53 JST from plr.inferencium.net permalink
  10. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 29-Sep-2022 05:44:51 JST inference inference
    in reply to
    • Parker Banks
    • Fediverse Contractor
    @parker @bot I didn't say it was...
    In conversation Thursday, 29-Sep-2022 05:44:51 JST from plr.inferencium.net permalink
  11. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Wednesday, 28-Sep-2022 14:47:48 JST inference inference
    in reply to
    • Puniko ?
    @puniko Better than hot.
    In conversation Wednesday, 28-Sep-2022 14:47:48 JST from plr.inferencium.net permalink
  12. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Sunday, 25-Sep-2022 07:52:26 JST inference inference
    in reply to
    • :suya:
    @newt Don't know about the former, but the latter sounds good to me.
    In conversation Sunday, 25-Sep-2022 07:52:26 JST from plr.inferencium.net permalink
  13. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 22-Sep-2022 08:01:28 JST inference inference
    in reply to
    • Hélène
    @helene

    > QUIC

    Blugh... I'll take TLS, please...
    In conversation Thursday, 22-Sep-2022 08:01:28 JST from plr.inferencium.net permalink
  14. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 22-Sep-2022 07:57:52 JST inference inference
    in reply to
    • Hélène
    @helene Because I really want to lose verification that my packets arrived properly, instead of just spraying them and hoping they arrive. Not to mention the potential security issues I've seen with the HTTP/3 specification. It's all about peformance and nothing else; reminds me of the horror which is SMT.
    In conversation Thursday, 22-Sep-2022 07:57:52 JST from plr.inferencium.net permalink
  15. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 22-Sep-2022 07:53:53 JST inference inference
    in reply to
    • Hélène
    @helene HTTP/3 sucks. UDP-only sucks.
    In conversation Thursday, 22-Sep-2022 07:53:53 JST from plr.inferencium.net permalink
  16. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 22-Sep-2022 06:54:16 JST inference inference
    in reply to
    • Hélène
    @helene

    > http 3

    GTFO.
    In conversation Thursday, 22-Sep-2022 06:54:16 JST from plr.inferencium.net permalink
  17. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 22-Sep-2022 03:24:08 JST inference inference
    in reply to
    • Hélène
    • feld
    @feld @helene Try GrapheneOS and see for yourself. None. At all. They zero on alloc, and zero on free.

    I do the same the same with Linux. Never noticed a single slowdown. Don't know why it's not the default. I even used it on a swapping system with an Athlon.
    In conversation Thursday, 22-Sep-2022 03:24:08 JST from plr.inferencium.net permalink
  18. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 22-Sep-2022 03:22:28 JST inference inference
    in reply to
    • Hélène
    • feld
    @feld @helene Epic! They really have followed in GrapheneOS' footsteps with the iOS 16 hardening. A lot of features are ripped from it.

    I'm not a fan of iOS, but iOS 16 looks great.
    In conversation Thursday, 22-Sep-2022 03:22:28 JST from plr.inferencium.net permalink
  19. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Thursday, 22-Sep-2022 01:17:46 JST inference inference
    in reply to
    • Sexy Moon
    • Hélène
    • feld
    @feld @helene @Moon I can agree that HardenedBSD is much more secure than OpenBSD. I recently posted why OpenBSD isn't as secure as people think it is. It doesn't even use CFI.

    https://hardenedbsd.org/content/easy-feature-comparison
    In conversation Thursday, 22-Sep-2022 01:17:46 JST from plr.inferencium.net permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: hardenedbsd.org
      Easy Feature Comparison | HardenedBSD
  20. Embed this notice
    inference (inference@plr.inferencium.net)'s status on Wednesday, 21-Sep-2022 23:58:48 JST inference inference
    in reply to
    • Sexy Moon
    • Hélène
    • Hyolobrikator
    • feld
    @Hyolobrika @feld @helene @Moon If this is true, it's a huge change for FreeBSD. FreeBSD security is pathetic in its current form. It even allows ASLR bypass by disabling itself after 4 failed brute forcing attempts, and even allows disabling ASLR via an API. What a joke.

    Not to mention the lack of almost every modern security feature in existence.
    In conversation Wednesday, 21-Sep-2022 23:58:48 JST from plr.inferencium.net permalink
  • Before

User actions

    inference

    inference

    Location: GB (UTC+01:00)Computer science researcher focusing on cybersecurity.Security, privacy, open source, and modular design, advocate.Administrator of Inferencium Network, a security-hardened and privacy-hardened communications and software network.Contact methods available below.Primary account:https://plr.inferencium.net/inferenceSecondary accounts:

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          4035
          Member since
          8 Aug 2022
          Notices
          69
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.