• 0 Posts
  • 121 Comments
Joined 10 months ago
cake
Cake day: July 15th, 2024

help-circle
  • rottingleaf@lemmy.worldtoPolitical Memes@lemmy.worldOnly The Best People
    link
    fedilink
    arrow-up
    1
    arrow-down
    8
    ·
    edit-2
    2 hours ago

    Choosing a photo with unattractive faces is not an argument.

    I don’t think I’ve ever seen political activism which wouldn’t show the same.

    But - it’s a bit like that joke, bow your head down and say, looking at your boots, - “life is wonderful”, then raise your head up and say looking at the sky, - “life is shit”, which one do you like more? I think the latter is less shit.

    So - Trump supporters are people who are used to seeing shit first around them, but that doesn’t mean they are all bad people because of this. Yes, they are mostly conscious in aggressive skepticism, one can say trolling, of politics, but maybe that’s good. Yes, it’s a bit like a kid having tantrum messing with other kid’s toys. But - those things they are not treating seriously, are those things really serious? Those institutions they are harming, how much of those was real and how much just a respectable appearance?

    Crash tests are useful, and disagreement is useful, and messing things up is useful. It’s a crisis, not a catastrophe.


  • Let’s look at a scenario where there’s an exploit that requires a change to an API.

    To the plugin API, you mean? Yes, that’s the borderline case of added complexity of having modularity.

    But in that case it’ll work similarly to browser APIs fo JS being fixed. In one case browser devs break plugins, in another they break JS libraries.

    Some plugin vendors will be slower than others, so the whole thing will see massive delays and end users are more likely to stick to insecure browser versions.

    How is this different from JS libs? Except for power imbalance.

    Just - if we are coming to Chrome devs being able to impose their will on anyone, let’s be honest about it. It has some advantages, yes. Just like Microsoft being able to impose Windows as the operating system for desktop users. Downsides too.

    Plugin vendors are going to demand the same API surface as current web standards and perhaps more, so you’re not saving anything by using plugins, and you’re dramatically increasing the complexity of rolling out a fix.

    Well, I described before why it doesn’t seem so for me.

    What I meant is that the page outside of a plugin should be static. Probably even deprecate JS at all. So - having static pages with some content in them executed in a sandbox by a plugin. Have dynamic content in containers inside static content, from user’s perspective. Like it was with Flash applications except NPAPI plugins weren’t isolated in a satisfactory manner.

    I like some things of what we have now. Just - drop things alternative browsers can’t track, and have in the browser a little standardized VM, inside which plugins (or anything) are executed. Break the vertical integration. It’s not a technical problem as much as social.

    With the web being a “platform for applications” now, as opposed to year 1995, that even makes more sense.

    I think the current web is a decent compromise. If you want your logic in something other than JavaScript, you have WebAssembly, but you don’t get access to nearly as many APIs and need to go through JavaScript. You can build your own abstraction in JavaScript however to hide that complexity from your users. The browser vendor retains the ability to fix things quickly, and devs get flexibility.

    We should have the ability to replace the browser vendor.

    Yes, WebAssembly is good, it would be even better were it the only layer for executable code in a webpage.


  • The modularization was a security nightmare. These plugins needed elevated privileges, a d they all needed to handle security themselves, and as I hope you are aware, Flash was atrocious with security.

    Those - yes. But generally something running on a page receiving keystrokes when selected and drawing in a square and interpreting something can be done securely.

    And modern browsers have done a pretty good job securing the javascript sandbox.

    One can have such a sandbox for some generic bytecode separated from everything else on the page. Would be “socially” same as then, technically better.



  • Not exactly what I said. I think these two were bad, but the idea of plugins was good.

    Especially the uncertainty of whether a user has a plugin for the specific kind of content.

    One could use different plugins, say, that plugin to show flash videos in mplayer under Unices.

    It’s worse when everyone uses Chrome or something with modern CSS, HTML5 etc support.

    The modularization was good. The idea that executable content can be different depending on plugins and is separated from the browser. I think we need that back.

    And in some sense it not being very safe was good too. Everyone knew you can’t trust your PC when it’s connected to the Interwebs, evil haxxors will pwn you, bad viruses will gangsettle it, everything confidential you had there will turn up for all to see. And one’s safety is not the real level of protection, but how it relates to perceived level of protection. That was better back then, people had realistic expectations. Now you still can be owned, even if that’s much harder, but people don’t understand in which situations the risk is more, in which less, and often have false feeling of safety.

    One thing that was definitely better is - those plugins being disabled by default, and there being a gray square on the page with an “allow content” or something button. And the Web being usable in Lynx.




  • those could easily be authenticated with a key provided at signup both to make filtering and easier and to be able to revoke authentication

    That’s what Tox links had for spam protection, an identifier of user plus an identifier of a permission. Agree on this.

    More structured … I’m not sure, maybe a few types (not like MIME content type, but more technical, type not of content, but of message itself) of messages would be good - a letter, a notice, a contact request, a hypertext page, maybe even some common state CRUD (ok, this seems outside of email, I just aesthetically love the idea of something like an email collaborative filesystem with version control, and user friendly at the same time), a permission request/update/something (for some third resource).

    Where a letter and a hypertext page would be almost open content as it is now, and a notice would have notice type and source, similarly with contact request (permission to write to us, like in normal Jabber clients, also solves those unannounced emails problem, sort of), and permission requests.

    If so, then the password reset and such fit in well enough. Spam problem would be no more, at the same time all these service messages could be allowed, and having only ID and basic operational information wouldn’t be used for spam.


  • You would be delusional to think a web browser should be worth as much as an IMAP client.

    This is a problem with web browsers and that set of protocols, not with my comparison.

    You still ultimately run networked sandboxed applications in a web browser and view hypertext, it’s an unholy hybrid between two things that should be separated.

    And it was so 20 years ago.

    For the former Java applets and Flash were used a lot, as everyone remembers. The idea of a plugin was good. The reality was kinda not so much because of security and Flash being proprietary, but still better than today. For the latter no, you don’t need something radically more complex than an IMAP client.

    I think Sun and Netscape etc made a mistake with JavaScript. Should have made plugins the main way to script pages.


  • Speaking of such things, an email client or an email server are never as monopolistic as Chrome.

    So maybe email is a good candidate for something that should be torn down and built anew right after the Web.

    Also email doesn’t have to be destroyed entirely, it’s very modular.

    Where they had UUCP paths, and now have addresses in some services, just need to have John Doe <3cec7f8c438fa578dbd3a1557b822df469490a12>, with 3cec7f8c438fa578dbd3a1557b822df469490a12 being a hash of “johndoe” here and a hash of his pubkey in reality, and his pubkey can be retrieved from some public directory.

    And have the letter signed by it (and encrypted possibly, though this of course would hurt server-side solutions of spam problem).

    Frankly they can have a common replacement, in my humble opinion. When separating identities from servers, one can do the same with websites. How is a newsgroup fundamentally different from a replicated website collaboratively edited? If a letter can have a universal identifier, what prevents one to put a hyperlink to it? If we need scripts, what prevents us from having them in a letter’s content? If we need to reach a server by hostname and IP, what prevents us from doing just that from a letter, just the letter being the primary point of entry?

    I just think that the old “vector hypertext Fidonet” joke is not so dumb, if you think what it could literally mean.




  • Do not collapse.

    No. That sentence you wrote doesn’t take any effort. While “enlightening someone on *” takes a lot, especially with such attitude.

    How they surely don’t work is by “collecting of wealth”, because only real things are wealth. Production in the real world, assets in the real world, means to exchange those, mechanisms, agreements. The more removed it is from real things, the less it’s worth, when nominally it’s measured in the same amount of money. These are not interchangeable, they are parts of the same system.





  • Typical.

    Especially when that ad was released, nobody considered piracy a crime seriously then.

    Those making the ad could probably be thinking like: something business-made, with workhours put into it, shouldn’t be pirated, that’s theft, but something made by enthusiasts can, it’s taking what doesn’t have an owner, just toys in the Internet, and also GPL is dishonest for having rules, it’s cheating and poison, it’s ownerless too, only companies doing business should be able to sue for IP violations.



  • You can, you also can have very seamless and unnoticeable surveillance over those few who would put effort into protecting their privacy.

    There’s a rule of the thumb here: if someone with power doesn’t yet do what’s clearly unacceptable and outrageous, but does painful things which are not but on the fringe, this means you just don’t know what they are really doing. It’s the same with Russia, its state security services were never hindered by any laws, but less visibility of that helps reduce public pressure.

    When someone even approaches backdoors, surveillance, nothing to hide nothing to fear, we know better, we can’t have direct democracy here, we have institutions and rules, all that, - even in words, - then you should start killing them. Immediately.

    It only seems to have many years to have totalitarianism and mafia rule all together. In reality this happens in a few weeks. You had transparency and rules and responsible citizens and democracy, a week passes, and you have undocumented prisons where people die without being convicted, surveillance of anyone even to walk near something of interest, “politicians” all knowing each other for decades, no real grassroot movements at all, even fake grassroot movements’ leaders being murdered in plain sight and never properly investigated. All this happens momentarily. The slow transition is only in appearance and only to reduce effort spent on damage control.