Not included in the above, but handy is also an alternative web UI for Reuters news: https://neuters.de
Not included in the above, but handy is also an alternative web UI for Reuters news: https://neuters.de
Good question! Sorry if this answer is weird :)
For me, I don’t actually interact from Mastodon per se. I wrote a couple of read-only Lemmy & Mastodon clients. One for a weird text editing environment I use (https://lemmy.sdf.org/post/1035382) and via email (https://gts.olowe.co/@o/statuses/01HMQ9N4HQ2ETGZWJS49K5NG5Y). To reply to or create posts, I use a write-only Mastodon client I wrote.
My idea is to exercise the fediverse. In principal I don’t think I should need separate accounts for Lemmy, PeerTube, Mastodon, Kbin, Akkoma, etc.
Right now I’m replying from an account on lemmy.sdf.org as I can’t reply from GoToSocial (Lemmy and GoToSocial don’t work well together right now) and my Mastodon server (hachyderm.io) has a post limit of 500 characters.
Thought that’s already supported? e.g. https://gitlab.com/diasporg/diaspora.atom
I suppose it’s a call to arms - the intended audience is those who are familiar with all those acronyms. It’s meant to ignite a fire in the belly to spur individual action against the proposed Chat Control legislation.
I know what you mean though. The reality of “resisting” is actually kinda messy. Using all the mentioned tooling is exhausting. Much like I don’t think that consumer recycling is going to save humanity, I don’t think that if everyone “made the little effort required to secure their data and their communications” it would end crazy proposals like Chat Control. TLS is so common now (in HTTPS) and WhatsApp (implementing e2ee) is incredibly popular. Yet here we are.
The article briefly mentions open-source software. To me this is where I see more private & secure by design stuff like you mention. I’m happy that things like Lemmy exist making countermeasures like 3rd party cookie blocking sand URL cleansing irrelevant.
deleted by creator
They don’t necessarily need to; hopefully we can help people install uBlock Origin which removes tracking query parameters from URLs. See privacy.txt
Is it? Found this setting: https://forums.macrumors.com/attachments/img_1639-png.2219522/
Not sure what the default is and I don’t have iOS 17 yet.
Thankfully uBlock Origin removes those parameters for us.
The default filters include a whole bunch of removeparam
filters; e.g. privacy.txt
See also removeparam.
Maybe you could help your friends and family install Firefox and/or uBlock Origin? Every little bit helps :)
Probably not; userChrome.css
just modifies the local user interface of Firefox, right? I don’t think any of this information is ever transmitted to servers, nor is it available from Javascript.
Custom user styles however could probably be used for fingerprinting.
Related interesting article from Mozilla: Privacy and the :visited selector
Does this sound like what you’re after? https://www.onaudience.com/resources/how-to-buy-audience-data/ Let us know how you go.
I would never use anything like this. But I want it to exist. Wobbly windows got me into Linux back in 2006. Compiz, Beryl… so cool, so stupid… keep us updated!
But seldom in the motorbike space, I think?
I’m still not sure whether the post is just spam.
I agree. ActivityPub messages are not necessarily public information; implementations like Mastodon and Lemmy just assume it - and there’s nothing stopping the services relaying the messages elsewhere afterwards.
Actually in my fiddling with ActivityPub I’ve made some posts and comments to a Lemmy instance which were not relayed to other instances, even though they would have been if I made them using Lemmy. So there’s definitely opportunity for systems to implement features inbetween “totally public” and “single recipient”.
This was the provider I went with after self-hosting my mail for 7+ years on an OpenBSD VPS. I feel like Migadu is an honest and good-value service.
Yeah I’ve always found that AllowedIPs
name a little bit misleading. It is mentioned in the manpage:
A comma-separated list of IP (v4 or v6) addresses with CIDR masks from which incoming traffic for this peer is allowed and to which outgoing traffic for this peer is directed.
But I think it’s a little funny how setting AllowedIPs
also configures how packets are routed. I dunno.
You could start troubleshooting by manually executing DNS queries from mainDesktop.lan
, and watching the DNS server logs.
Not sure what OS the desktop is running, but assuming Windows you could run:
nslookup -type=A pihole.example.duckdns.org.
On macOS/Linux/etc.:
dig -t A pihole.example.duckdns.org.
This could rule out behaviour from the proxy or applications.
You can be polite about it and not confrontational.
Really important. Coming from a place of mutual respect is a really nice - even underrated - way to make progress in the privacy space!
Depends how you look at it! Here’s me accessing Mastodon and the fediverse via email: https://lemmy.world/post/11020167 I’ve written a a couple more prototypes to connect one to the other. If anyone is interested I could write up more about how it works or do a more public demo