• 0 Posts
  • 37 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle


  • This!

    APK signatures exist and they’re enough for making sure the file you got isn’t modified. Warning people when they use apks for stuff like banking, I get, but if they wanna take the risk, it’s on them.

    Blocking root makes no sense because I’d argue that if the person knows enough to root their phone and got past all those bricked phone/thermonuclear war warnings, the onus is on them to not get their keychain compromised by giving root to some random app. Again, a warning is fine.

    Aside from that, people need to understand: THE CLIENT IS NEVER SECURE. NO EXCEPTIONS.

    Any self respecting secure API is made under the assumption that all the calls are coming from some malicious state actor using curl until proven beyond doubt that it’s an actual user.




  • Hardware isn’t everything. Apple has a couple of advantages over iPhone that let them do more with less:

    • iOS needs to support a MUCH fewer devices than Android. Even before they switched to their own silicon, they’ve been optimizing the OS to the hardware really well giving you devices that go toe to toe with Android flagships of the same generation with SIGNIFICANTLY better hardware and like double the RAM. Also why Apple doesn’t really care to increase RAM as much as the android side of things.
    • Apple silicon is actually really good and making their own hardware allows them to optimize on both sides of the equation and lets them do more with less.

    The selling points for Android (at least the way I’ve seen it over the years) have always been full control (talking about non-root, I’d rather not go down the root rabbit hole here) and (since iPhone 11 started doing firmware blocks on parts) reparability…but both seem to be going out the window lately.

    Prices are crap though, but then again Android phones on the top end don’t seem much better. 1-2 gen old iPhones are usually a bit more reasonable though tbh.








  • whats_all_this_then@lemmy.worldtoLinux@lemmy.worldDo you use aliases?
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    7 months ago

    Oh boy, my time to shine:

    • mkd - Create directory and immediately cd into it
    • dei - docker exec -i
    • dps - docker ps
    • mdocker - Switch to minikube’s docker context
    • n - nvim
    • n. - nvim .

    Node package managers

    Exampes use pnpm but I have them for yarn, npm, and bun too

    • pi - pnpm install
    • pd - pnpm run dev

    fzf stuff

    • sdh - Search home directory (directories, recursive)

    Meme

    • fuckyou - git push --force
    • nano - nvim

    Misc

    createpgdb - Create a postgres db on the given container with the given name

    Usage: createpgdb "postgres container" "db name"

    I have similar ones for dropdb and pg_dump. Here’s the command:

    f() { local __user; if [ -z $3 ]; then __user=postgres; else __user=$3; fi; docker exec -i $1 createdb -U $__user $2; unset -f f; }; f'
    

  • I’m no cryptography expert but I don’t see how they could implement this with true anonymity or without it being spoofed in other browsers. There is currently no way to know with absolute certainty what browser/client web traffic is actually coming from and game anti-cheat devs will probably tell you it’s a nightmare of a problem.

    The way I see this working is making it a Mozilla account thing and not a Firefox thing through some sort of stateless cross-origin cookie the sites agree to support. But then, you’re giving up at least some privacy because even if the sites you visit don’t know who you are, you’ll still have to trust that Mozilla is logging anonymized visit counts and that some CEO 5 years from now isn’t going to change that for a quick buck.

    Maybe I’m just out of my depth here and someone’s gonna correct me (please do if I’m wrong).