• 5 Posts
  • 7 Comments
Joined 1 year ago
cake
Cake day: July 4th, 2023

help-circle

  • I don’t know if Google Camera would share the information with Sandboxed Google Play. However, something to be careful of, is if you have two apps by the same developer (Google in this case), and you have network permissions for only one of them. The developer could share those permissions with their other app. TheHatedOne did a podcast episode on this. He checked with a GrapheneOS developer beforehand, and found, that this is possible.




  • cogitoprinciple@lemmy.worldtoThinkPad@lemmy.mlIs this a good deal?
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    10 months ago

    Do you know what model it is? That price is hefty considering the condition. I try to avoid buying old thinkpads over $150AU if possible.

    Generally I will try to get them under $100AU. That’s considering that they are usable and in working condition.

    If it were a newer model like a T480 I’d be willing to spend between $300-$350AU. But it would depend on CPU and Display Panel used, as well as the condition of it, of course.

    You could try figuring out what parts need replacing and seeing how much those parts would cost on eBay, Gumtree or AliExpress (if you’re comfortable with this final option).

    Edit: It honestly looks like someone bought a laptop, it got damaged so now they’re trying to get their money back by selling it on FaceBook Marketplace. I’d be careful with this seller.






  • Only potential security issues, would be related to a lack of maintenance on a particular project. If an open source tool has not been updated for over a year or more, then it may have security vulnerabilities. I usually won’t use something if it has not been updated for a year or more.

    However, people who make that claim, seem to subscribe to security by obscurity. They may think that the source code being public makes it more likely to be exploited for vulnerabilities. But I would say that is a strength, since many people can verify the security of a project and can have patches applied. In standard proprietary software, a security vulnerability could exist for years, without being patched because no one knows it’s there. It may or may not be exploited within this time.

    It is our responsibility to choose the digital tools we use wisely, and to be mindful of a lack or drop of maintenance on a particularly project.