🚀 Seen my posts and want more? Dive deep into the issues with Big Tech at Escape Big Tech!

💡 Need FOSS-focused software solutions? Reach out on Matrix at @dannym:balooga.xyz!

  • 2 Posts
  • 33 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle





  • In general I agree with you. I find that most FOSS software is more polished than proprietary software, and it is generally more powerful.

    However, I think that one problem that people somehow overlook in my opinion is that the financial side of the issue is also extremely important. I want more people to work on quality FOSS software, and I want it to become socially acceptable to work on FOSS as your main job. For that one thing is needed in my opinion: we as users of FOSS software need to give developers the financial incentives to work on what they love the whole time. In fact I want it to reach the point where immoral, non FOSS companies struggle to find developers because they’re all working on FOSS.




  • Danny M@lemmy.escapebigtech.infoOPtoLemmy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    2
    ·
    9 months ago

    Didn’t know about mitra, thanks for sharing!

    Regarding Linus’s quote, I completely agree with him and that’s mostly why I asked for feedback; I don’t have the time to work on this myself at the moment, and even if I did I want to hear conflicting opinions on the implementation before I did anything



  • Danny M@lemmy.escapebigtech.infoOPtoLemmy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    3
    ·
    9 months ago

    I really don’t want to turn this into a crypto discussion, if you think there are better alternatives I’m open to hearing about them; I’m mostly interested in rewarding people for their content and paying for instance admins and lemmy developers. You’d be surprised how much you and I probably agree on regarding crypto









  • Quick aside, there won’t be a USB D (unless the USB people change their mind yet again), it will be something different from USB. The idea was to have USB A be what you plug on your source and B on your destination and was designed as a way to avoid power surges in the original 1.0 spec because the A side was physically different from the B side you weren’t ever going to plug in something that sends power to something that receives power (basically it prevented users from breaking their devices on accident). USB C changed that with a chip on each cable that handles negotiation before agreeing on a power spec


  • The concept of competition among tech companies has done a complete 180 on its original meaning. It’s no longer predominantly about crafting superior products; rather, it’s become a race to secure the largest amount of investor funding.

    In this transformed landscape, the product itself and revenue generation often take a backseat, or at best, hold a tertiary importance. The heart of customer-centric ethos, especially crucial elements like data security, are now distressingly overlooked. What matters is getting the next investment to become the next “unicorn” and be acquired for billions of dollars. Silicon Valley Companies want the easy way out, do only a fraction of the work for an exponential amount of the benefits.

    Don’t get me wrong, there are reasons to seek investment, getting a good product built is actually complex and you actually need a lot of different people working on it. The alternative is losing years of your life on a sisyphean ordeal of soul-crushing, hundred-hour work weeks (and that’s real work, not “let me check twitter” work), making you question your life choices and whether you should just throw it all away, abandon technology, become a hermit and move to a shed in the mountains.

    The problem is that the EXPECTATION today is that you’re gonna build a third of a product, care about 1% of the actual business behind it and then pivoting exclusively to the pursuit of investment, letting everything else rot


  • It was encrypted and only decrypted on the user’s machine. It’s called TLS.

    How is TLS relevant in this discussion? In this specific case TLS only solves MiTM, that’s it.

    Well of course I did - all you said was “use encryption” like that meant anything specific.

    It was an offhand comment in a lemmy post, of course I’m not gonna go into details… but fair enough

    […] isn’t materially more secure than properly implementing WebAuthn or even requiring MFA.

    This is a bit disingenuous, don’t you think? To be clear I like WebAuthn, I think it’s a great technology that I’ve been evangelizing about it to coworkers and friends for years, it’s definitely the future of authentication, but that’s only marginally relevant, in the case of sensitive data like this you want the data to be both encrypted at rest and during transmission, with a unique pre-generated key, otherwise a rogue employee or in general someone with access to the database can see everything, regardless of anything else.