• bug@lemmy.one
    link
    fedilink
    English
    arrow-up
    77
    arrow-down
    1
    ·
    10 months ago

    Can we move away from the habit of just copy-pasting clickbait video titles with no information as to what they’re actually about? Lemmy gives you a description field, you have the power to summarise videos which should really be blog posts!

  • Moonrise2473@feddit.it
    link
    fedilink
    English
    arrow-up
    30
    arrow-down
    1
    ·
    10 months ago

    I’m not watching a video for something that can be 3 lines of text.

    I’m supposing this is some speech to text? It’s completely on device? If it’s not on device, i don’t see many difference between giving data to google and giving the same exact data to somebody else.

  • Cris@lemm.ee
    link
    fedilink
    English
    arrow-up
    22
    ·
    edit-2
    10 months ago

    I’m using it to type this comment and I REALLY like it! But I will say it tries to do punctuation for me, and that drives me nuts.

    (Video is about an open source voice to text, input method for Android, by the way.)

      • Cris@lemm.ee
        link
        fedilink
        English
        arrow-up
        12
        ·
        10 months ago

        Futo Voice Input, and there are links in the post ☺️ Weirdly, it doesn’t seem to be on Fdroid (yet?), but you can install it as an APK from their website.

        • SatyrSack@lemmy.one
          link
          fedilink
          English
          arrow-up
          7
          ·
          edit-2
          10 months ago

          I’m going with yet. They do mention an F-Droid build on GitLab.

          There are four build flavors:

          • dev - for development, includes Play Store billing and all payment methods, auto-update, etc
          • playStore - Play Store build, does not include auto-update and only includes Play Store billing
          • standalone - does not include Play Store billing library, includes auto-update
          • fDroid - does not include Play Store billing nor auto-update
          • Cris@lemm.ee
            link
            fedilink
            English
            arrow-up
            1
            ·
            10 months ago

            Gotcha. I missed that on their GitLab page, Thank you for pointing it out to me!

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    22
    arrow-down
    1
    ·
    edit-2
    10 months ago

    Section 4: Termination, suspension and variation

    We may suspend, terminate or vary the terms of this license and any access to the code at any time, without notice, for any reason or no reason, in respect of any licensee, group of licensees or all licensees including as may be applicable any sub-licensees.

    The license isn’t exactly giving me warm fuzzies, the source is available, but it isn’t GPL.

    https://gitlab.futo.org/alex/voiceinput/-/blob/master/FTL_LICENSE.md?ref_type=heads

    Reading through their license, it appears that people may only distribute the code, and the binaries non-commercially. There’s nothing in there allowing people to modify in the distribute the modification. But I’m not a law talking person so maybe I got that wrong

    • smileyhead@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      7
      ·
      10 months ago

      Oh no :(. Another cool project being ruined by trying to invent it’s own licence.

      If they want to not make it free of price, they could make payments for model download or just do a paywall screen. Most people would prefer to pay some bucks for not having to compile app themselfs or having to get it from shady sources.

  • Melco@lemmy.world
    link
    fedilink
    English
    arrow-up
    23
    arrow-down
    3
    ·
    edit-2
    10 months ago

    This fdroid repo version of this this “privacy respecting” app contains user tracking telemetry spyware as reported by exodus.

    The app is not transparent about it as it is not listed in the credits section with all their other components. There is no way to opt-out or turn it off in the settings.

    Be aware.

    • hummingbird@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      10 months ago

      The reported tracker is ACRA, a crash report library (https://github.com/ACRA/acra).

      I digged a bit into the source code and the apk. From looking at the code alone one can’t tell if the crash report is actually enabled, the build configuration depends on some unpublished file. But looking into the apk allows to reconstruct it. These are my findings:

    • smileyhead@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      8
      ·
      10 months ago

      Unfortunetly they go with their own custom licence and AFAIK it’s not open source as it does not allow commercial use.

    • hummingbird@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      10 months ago

      Can you give more details of the scan result? Exodus only lists the Play store version. I installed the F-Droid version but Exodus app reports it as “same version” and just shows the clean Google Play Store results. This is obviously wrong, the SHA1 listed for the Play Store version on the Exodus website is different compared to the F-Droid .apk I have installed. Sadly the Exodus website does not support scanning F-Droid apps from third-party repos so I have no idea how to scan it.

      That being said, according to the privacy policy (https://voiceinput.futo.org/VoiceInput/PrivacyPolicy), the F-Droid .apk version should have some kind of crash report build-in. So I could imagine that this might get flagged.

      • Melco@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        10 months ago

        Sure, there is a Google developer tool called classyshark which scans the code of any installed Android app and reports every class which you can view.

        There is a version on fdroid which uses the exodusprivacy database, version (eof443) to highlight any classes which match their tracking database. If you install the fdroid version of classyshark then install the Google play or fdroid version of this app you will see the telemetry framework they added plus you can look at every class and see exactly what it does and what data it is collecting and leaking.

        In this case there is a lot of telemetry code in this app. The issue is that it appears to be opt-in and the app itself does not contain any warning or setting to allow the user to disable it. This is disappointing for an app which is advertised as being privacy respecting.

        Regarding why exodus does not show the tracking on their website, I believe the exodus website is manually maintained. 3 times in the past I found trackers in apps that were listed on exodus as being clean. The exodus guys said this typically happens when a developer adds telemetry to a new version and the site was not updated yet. Each of the 3 times they updated their website to include the trackers after I found them with classyshark and reported it.

        Anyway with classyshark you don’t need to take anyone’s word for it, you can scan your apps yourself and it works offline too so you don’t even need to send hashes to the web to check your stuff.

      • Melco@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        10 months ago

        I installed the version from the repo on their website: app.futo.org/fdroid/repo

        It contains trackers: 1 tracker = 266 classes.

        I also downloaded the Google play version. It also contains the same spyware:

        1 tracker = 266 classes.

  • speck@kbin.social
    link
    fedilink
    arrow-up
    7
    ·
    10 months ago

    I figure if I lurk here someone will come along and breakdown whether this is legit to install or not

    • ElPussyKangaroo@lemdro.idOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 months ago

      I tried it on my device… Works great!

      But it’s just a Voice to Text utility at the moment, so only where there’s a mic icon for said VTT applications. But they’re working on integration with open source keyboards and also suggested the possibility that they’d make one of their own keyboards.

    • Melco@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      2
      ·
      edit-2
      10 months ago

      It is if you don’t care about your privacy, this app contains user tracking telemetry with no way to disable or opt-out. I downloaded it, scanned it with exodus and deleted it afterwards.

      I didn’t expect much considering he works for this company and this click baity post is a paid advertisement.

        • Melco@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          10 months ago

          Its no work, it only takes a second. Download Googles classyshark app. The fdroid version contains the embedded exodusprivacy database.

          Whenever you install a new app scan it with classyshark and you will instantly know if the app will be tracking you or not.

          This way you don’t have to believe strangers on the internet: trust but verify for yourself.

          Of course in this case you didn’t even really need to do that. The link is to a YouTube influencer who is pushing a “privacy app” by a company he works for…

        • darklordcrouton@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          10 months ago

          From reading other posts it sounds like it is only for crash reporting and that the user has to click to provide the report in the event of a crash. It also appears to be documented in their policy docs so it’s not exactly like it’s anything underhanded.

          If the user doesn’t trust that their data will be safe, couldn’t the domain attached to the tracker found by Classyshark be blocked using something like NextDNS or RethinkDNS to prevent any data from connecting to said domain?