[-] refalo@programming.dev 1 points 1 hour ago

anonymized

why is this a concern again?

[-] refalo@programming.dev 0 points 1 hour ago

"checking" does not prevent anything bad from happening. and if that file were read by a malicious actor, it would likely be immediate and you'd never even notice.

[-] refalo@programming.dev 5 points 6 hours ago

I assume this is directly due to the recent repeal of Chevron.

[-] refalo@programming.dev 3 points 6 hours ago

Correlation is not causation.

[-] refalo@programming.dev 3 points 6 hours ago
[-] refalo@programming.dev 3 points 9 hours ago

That depends on your threat model. What are you worried about?

[-] refalo@programming.dev 3 points 10 hours ago* (last edited 10 hours ago)

It’s really not a big deal

For most casual users, it is a deal-breaker. And it's hard to get everyday people to use your software with roadblocks like that.

every time I open my email client.

You must not get email very often, this is absolutely a non-starter for me.

[-] refalo@programming.dev 5 points 10 hours ago* (last edited 10 hours ago)

How do you know?

[-] refalo@programming.dev 4 points 10 hours ago* (last edited 10 hours ago)

For gamers, it’s likely a 1-5 FPS loss

I highly doubt it... would love to see some hard data on that. Most algorithms used for disk encryption these days are already faster than RAM, and most games are not reading gigabytes/sec from the disk every frame during gameplay for this to ever matter.

[-] refalo@programming.dev 10 points 10 hours ago* (last edited 10 hours ago)

How in the fuck are people actually defending signal for this

Probably because Android (at least) already uses file-based encryption, and the files stored by apps are not readable by other apps anyways.

And if people had to type in a password every time they started the app, they just wouldn't use it.

[-] refalo@programming.dev 5 points 11 hours ago* (last edited 11 hours ago)

98% of desktop apps (at least on Windows and Linux) are already broken by design anyways. Any one app can spy on and keylog all other apps, all your home folder data, everything. And anyone can write a desktop app, so only using solutions that (currently) don't have a desktop app version, seems silly to me.

-8
submitted 1 week ago by refalo@programming.dev to c/privacy@lemmy.ml
6
403 on API endpoints (lemmy.readme.io)

Tried to use several different API endpoints as described in the link, but they all return 403 with a cloudflare "Just a moment..." html reply. Even tried copying an existing jwt token from a working logged-in browser but the same thing still happens.

Any idea what I could be doing wrong?

curl -v --request POST \
     --url https://programming.dev/api/v3/user/login \
     --header 'accept: application/json' \
     --header 'content-type: application/json' \
     --data '{"username_or_email": "redacted", "password": "redacted"}'
...
< HTTP/2 403
...
<!DOCTYPE html><html lang="en-US"><head><title>Just a moment...</title>
...
23
submitted 2 months ago* (last edited 2 months ago) by refalo@programming.dev to c/meta@programming.dev

I am noticing that some comments, which are coming from users on other verified (via /instances) federated instances, do not show up on a post. For example: https://programming.dev/post/13648105

Does not show this comment on it: https://lemmy.ml/comment/10803786

Any ideas why? I checked the modlog and the comment wasn't removed, and their post history to me does not look like someone that is likely to be banned from the instance, so I'm not sure what else it could be.

11

My lemmy account is on the programming.dev instance but I use newsboat for RSS reading of some lemmy.ml communities, along with browsing the local homepage of lemmy.ml and some other instances in a regular browser. Is there a way to do either of these things from the programming.dev instance so that I can easily comment on posts without having to manually locate the same post by browsing to /c/foo@lemmy.ml on my own instance?

view more: next ›

refalo

joined 2 months ago