Skip to content

Fairphone announces the €599 Fairphone 6, with a 6.31" 120Hz LTPO OLED display, a Snapdragon 7s Gen 3 chip, and enhanced modularity with 12 swappable parts

Technology
555 240 260
  • 67 Stimmen
    1 Beiträge
    2 Aufrufe
    Niemand hat geantwortet
  • No JS, No CSS, No HTML: online "clubs" celebrate plainer websites

    Technology technology
    205
    2
    770 Stimmen
    205 Beiträge
    62 Aufrufe
    R
    Gemini is just a web replacement protocol. With basic things we remember from olden days Web, but with everything non-essential removed, for a client to be doable in a couple of days. I have my own Gemini viewer, LOL. This for me seems a completely different application from torrents. I was dreaming for a thing similar to torrent trackers for aggregating storage and computation and indexing and search, with search and aggregation and other services' responses being structured and standardized, and cryptographic identities, and some kind of market services to sell and buy storage and computation in unified and pooled, but transparent way (scripted by buyer\seller), similar to MMORPG markets, with the representation (what is a siloed service in modern web) being on the client native application, and those services allowing to build any kind of client-server huge system on them, that being global. But that's more of a global Facebook\Usenet\whatever, a killer of platforms. Their infrastructure is internal, while their representation is public on the Internet. I want to make infrastructure public on the Internet, and representation client-side, sharing it for many kinds of applications. Adding another layer to the OSI model, so to say, between transport and application layer. For this application: I think you could have some kind of Kademlia-based p2p with groups voluntarily joined (involving very huge groups) where nodes store replicas of partitions of group common data based on their pseudo-random identifiers and/or some kind of ring built from those identifiers, to balance storage and resilience. If a group has a creator, then you can have replication factor propagated signed by them, and membership too signed by them. But if having a creator (even with cryptographically delegated decisions) and propagating changes by them is not ok, then maybe just using whole data hash, or it's bittorrent-like info tree hash, as namespace with peers freely joining it can do. Then it may be better to partition not by parts of the whole piece, but by info tree? I guess making it exactly bittorrent-like is not a good idea, rather some kind of block tree, like for a filesystem, and a separate piece of information to lookup which file is in which blocks. If we are doing directory structure. Then, with freely joining it, there's no need in any owners or replication factors, I guess just pseudorandom distribution of hashes will do, and each node storing first partitions closest to its hash. Now thinking about it, such a system would be not that different from bittorrent and can even be interoperable with it. There's the issue of updates, yes, hence I've started with groups having hierarchy of creators, who can make or accept those updates. Having that and the ability to gradually store one group's data to another group, it should be possible to do forks of a certain state. But that line of thought makes reusing bittorrent only possible for part of the system. The whole database is guaranteed to be more than a normal HDD (1 TB? I dunno). Absolutely guaranteed, no doubt at all. 1 TB (for example) would be someone's collection of favorite stuff, and not too rich one.
  • 123 Stimmen
    11 Beiträge
    18 Aufrufe
    D
    Clear copyright over reach. News titles or tiny excerpts should not copyrightable - that's just idiotic. If thag stops readers from reading your article then it was never good enough to begin with.
  • Best MS Office 365 Services in Saudi Arabia for Businesses

    Technology technology
    1
    2
    0 Stimmen
    1 Beiträge
    8 Aufrufe
    Niemand hat geantwortet
  • 308 Stimmen
    23 Beiträge
    40 Aufrufe
    G
    I spent way too long researching the morning. That industry implies a much greater population that is attracted to children. Things get more nuanced. People are attracted to different stages, like prebubesant, early adolescence, and mid to late adolescence. It seems like an important distinction because this is a common mental disorder. I was ready to write this comment about my fear that there's a bunch of evil pedophiles living among us who are simply deterred by legal or social pressures. It seems more like the extreme stigma of pedophilia has prevented individuals from seeking assistance and has resulted in more child sexual abuse. This sort of disorder can be caused by experiencing this abuse at a younger age. When I was religious, we worked closely with an organization to help victims of trafficking. We had their stories. They entered our lives. I took care of some of these kids. As a victim of sexual abuse when I was kid, I had a hatred for these kinds of people. I feel like my brain is melting seeing how there is a high chance of people in my life being attracted to children. This isn't really to justify the industry. I'm just realizing that general harassing people openly about it might not be helping the situation.
  • Covert Web-to-App Tracking via Localhost on Android

    Technology technology
    2
    42 Stimmen
    2 Beiträge
    13 Aufrufe
    M
    Thanks for sharing this, it is an interesting read (though an additional comment about what this about would have been helpful). I want to say I am glad I do not use either of these services but Yandex implementation seems so bad that it does not matter, as any app could receive their data
  • X/Twitter Pause Encrypted DMs.

    Technology technology
    52
    2
    257 Stimmen
    52 Beiträge
    30 Aufrufe
    L
    There may be several reasons for this. If I had to guess, they found a critical flaw and had to shut it down for security reasons.
  • A Presence-sensing Drive For Securely Storing Secrets

    Technology technology
    9
    1
    18 Stimmen
    9 Beiträge
    18 Aufrufe
    D
    Isn't that arguably the nature of encryption, though? If you lose the key, you're SOL by design.