Skip to content

Java at 30: How a language designed for a failed gadget became a global powerhouse

Technology
118 68 863
  • 950 Stimmen
    343 Beiträge
    8k Aufrufe
    spacecadet@feddit.nlS
    You obviously didn’t know how it works if I had to explain it was already possible. If you read my comment properly, you'll see that I wrote: "I know TLS termination and interception and recertifying with custom certificates is a thing" And it isn’t “madness" Yes it is. TLS interception should never be normalized because it breaks the chain of trust upon which TLS is based. It can be useful in some situations, like the fortigate firewall where you control the certificate, but ISPs nor the government should be trusted to wield this power over virtually the whole country. It is a very slippery slope. I am not aware of any mobile device that prevents you installing a new root CA. On Android, apps can't install their own root CA. The user has to manually download it, then jump through a bunch of hoops and deeply nested menus to install it and in the process ignore all the scary warnings that they're communication may be intercepted if they install and trust this certificate, and (at least on Pixel phones) they get a permanent warning in their notification tray that someone may be eavesdropping on them. Which is correct. It is a vastly better option than onerously demanding adults provide their identity to random and potentially adult themed websites where they could be victims of identity theft or extortion I'm strongly against age gates myself, but you're objecting for the wrong reasons. You're not providing your identity to the adult website. You're providing it to the third party identity verifier, who then certifies to the adult website that you are an adult without passing on your actual identity. Keep this in mind when you're arguing against it, because pro-age-gater puritans can use it to undermine your argument. I object to it first and foremost on principle. I shouldn't have to request permission from a third party or the government to do perfectly normal legal adult things in the privacy of my own home. Secondly, there is still a privacy problem at the "identity verifier". They may swear up and down that they do not store my identity data, but there is no way to prove that one way or another so I cannot trust that my data can't be leaked through them. Thirdly, when viewing adult content, I don't want there to be any association between my real identity and the adult content whatsoever, even through a third party, and I don't want there to be anything that uniquely identifies me. Finally, I object to the (re)demonization of all things sexual in our societies. We seem to be backsliding into puritanism under the guise of protecting the children, while we're doing nothing to protect them from real actually harmful online things that are damaging the younger generations beyond repair. I have a Gen Z stepson, and all the ways in which he is fucked up by the online world (no attention span, permanent online-ness, no real world friends, always seeking instant gratification, unrealistic expectations about life, an overly materialistic worldview, plenty of manosphere bullshit, ... ) have precious little do do with viewing porn.
  • Website Development: Building Your Digital Presence

    Technology technology
    1
    2
    1 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • Why do AI company logos look like buttholes?

    Technology technology
    5
    1
    36 Stimmen
    5 Beiträge
    58 Aufrufe
    ivanafterall@lemmy.worldI
    It's a nascent industry standard called The Artificial Intelligence Network Template, or TAINT.
  • You're not alone: This email from Google's Gemini team is concerning

    Technology technology
    298
    1
    838 Stimmen
    298 Beiträge
    3k Aufrufe
    M
    My understanding is that, in broad strokes... Aurora acts like a proxy or mirror that doesn't require you to sign in to get Google Play Store apps. It doesn't provide any other software besides what you specifically download from it, and it doesn't include any telemetry/tracking like normal Google Play Store would. microG is a reimplementation of Google Play services (the suite of proprietary background services that Google runs on normal Android phones). MicroG doesn't have the bloat and tracking and other closed source functionality, but rather acts as a stand-in that other apps can talk to (when they'd normally be talking to Google Play services). This has to be installed and configured and I would refer to the microG github or other documentation. GrapheneOS has its own sandboxed Google Play Services which is basically unmodified Google Play Services, crammed into its own sandbox with no special permissions, and a compatibility layer that retains some functionality while keeping it from being able to access app data with high level permissions like it would normally do on a vanilla Android phone.
  • 15 Stimmen
    1 Beiträge
    17 Aufrufe
    Niemand hat geantwortet
  • 6 Stimmen
    9 Beiträge
    57 Aufrufe
    blue_berry@lemmy.worldB
    Cool. Well, the feedback until now was rather lukewarm. But that's fine, I'm now going more in a P2P-direction. It would be cool to have a way for everybody to participate in the training of big AI models in case HuggingFace enshittifies
  • 228 Stimmen
    10 Beiträge
    95 Aufrufe
    Z
    I'm having a hard time believing the EU cant afford a $5 wrench for decryption
  • 0 Stimmen
    2 Beiträge
    31 Aufrufe
    P
    It's a shame. AI has potential but most people just want to exploit its development for their own gain.