• 0 Posts
  • 11 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle


  • rekabis@lemmy.catoLinux@lemmy.mlProjects To Watch Out For: Ladybird Browser
    link
    fedilink
    arrow-up
    20
    arrow-down
    6
    ·
    edit-2
    1 month ago

    We don’t have anyone actively working on Windows support, and there are considerable changes required to make it work well outside a Unix-like environment.

    We would like to do Windows eventually, but it’s not a priority at the moment.

    This is how you make “critical mass” adoption that much more difficult.

    As much as I love Linux, if you are creating a program to be used by everyone and anyone, you achieve adoption inertia and public consciousness penetration by focusing on the largest platform first. And at 72% market share, that would be Windows.

    I hope this initiative works. I really do. But intentionally ignoring three-quarters of the market is tantamount to breaking at least one leg before the starting gate even opens. This browser is likely to be relegated to being a highly niche and special-interest-only browser with minuscule adoption numbers, which means it will be virtually ignored by web developers and web policy makers.


  • Any brands protected by American law must be independently-owned, with full transfer of all branding, patents, trade secrets, intellectual assets and physical assets.

    So, for example, for even a single bottle of Perrier to be sold in America, it needs to have been made by a company registered with the brand name of Perrier, with exclusive use of that name within the country, independently owned and under zero control by Nestle, being manufactured using the exact same process with the exact same ingredients, and having control of the exact same patents and American-side infrastructure.

    America is such a large marketplace that it would be impossible to split a company like this. Patents alone would prevent this, forcing Nestle to divest themselves of each individual subsidiary.




  • His router is tri-band though meaning it has 2 5ghz transceivers.

    Unfortunately, for many models - like the Linksys WRT 3200ACM - that second antenna (technically the third one if you include the 2.4Ghz one) doesn’t function at all without the manufacturer’s firmware. It’s a dead stick with any third-party firmware, and is 100% software-enabled.

    I have found this fact to be reliable whether it is DD-WRT or OpenWRT, and across several different manufacturers including Asus and D-Link.


  • What makes the built-in database easier to attack than a separate one?

    For performance reasons, early versions weren’t even encrypted, and later versions were encrypted with easily-cracked encryption. Most malware broke the encryption on the password DB using the user’s own hardware resources before it was even uploaded to the mothership. And not everyone has skookum GPUs, so that bit was particularly damning.

    Plus, the built-in password managers operated within the context of the browser to do things like auto-fill, which meant only the browser needed to be compromised in order to expose the password DB.

    Modern password managers like BitWarden can be configured with truly crazy levels of encryption, such that it would be very difficult for even nation-states to break into a backed-up or offline vault.