@fribbledom How else would you generate assembly code?
Why is it important to control your own computers?
One more reason: https://www.theregister.co.uk/2019/10/02/apple_hong_kong/
The world clearly needs more "smart" devices, as indicated by this factory reset procedure for GE light bulbs:
Buying home routers for OpenWRT is annoying. The used market especially can result in getting some weird stuff. I just spent like three days figuring out how Shaw had messed up the firmware on my newly acquired refurb Netgear WNDR3700.
Luckily, sometimes the world gets a VW Bus and a video camera into the right hands. https://www.youtube.com/watch?v=ByRKF1INOcU
What are you worried about with Tor browser on android?
Mozilla: The problem wasn't that you couldn't push updates fast enough, the problem is that you built an innately broken system. If you cease to exist, my browser should still work in five years. And you shouldn't be preventing users from running software of their choice to begin with.
Eben Moglen in his keynote at #republica:
"The federation of all services is not an inconceivable idea....This is the intended goal of the little gesture I call #FreedomBox: the manufacture of simple, inexpensive, self-administrating servers that we can hold in the palm of our hands and distribute throughout the world like apple seeds."
VIDEO: "Why Freedom of Thought Requires Attention"
Good job Mozilla. Not only did you foist this addon signing bullshit on #firefox users and then forget to renew your signing cert, you made your broken browser continuously check for certificate validity and disable already installed and working addons.
Someone really needs to put in the effort to maintain a de-crapified Firefox fork designed to keep working even if Mozilla and all the companies who give them money cease to exist.
@purism Are you going to support custom email domains? How about custom domains for social and chat?
Switzerland is planning to run an election over the internet. Turns out their software has a backdoor that would allow the election administrators to undetectably alter votes.
The security requirements for an election are pretty straightforward. The #1 threat is the people running the elections. Anyone running an election who downplays that point should be treated as actively engaged in election fraud.
The reason to use a cryptographic hash function like MD5 over a non-cryptographic hash is so that you can write code that ignores the possibility of collisions. Once the cryptographic hash function is broken - as with MD5 and SHA1 - that's no longer true. That broken assumption almost certainly creates bugs, and they're probably security bugs that allow users to at least corrupt your data.
@xj9 CouchDB is awfully sketchy with their continued use of MD5.
Here's why the gun debate isn't just about guns. Making guns isn't that hard, and any regulation that effectively prevented it would also necessarily ban any sort of useful home workshop. This very quickly becomes an issue impacting the right to repair, and more importantly the freedom to tinker.
Great. Apparently the New England Journal of Medicine can't even meet their own commitments on handling statistical cheating in papers they've published.
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!