As did Pleroma and several other fedi servers — that’s not really innovation, it’s something simple that Mastodon devs deliberately avoided implementing.
As did Pleroma and several other fedi servers — that’s not really innovation, it’s something simple that Mastodon devs deliberately avoided implementing.
The best I can think of would be tmux/screen with khal running in a pane beside todoman; sorry. :o
For calendar, I use khal, which offers a TUI (ikhal
command) and a non-captive UI that can print a simple list like you might want (khal
command). It supports multiple calendars, ical, recurring events, etc. Since it support ical, you can add locations, times, dates, alarms, pretty much anything you want. No database required, each event is saved into a seperate ical file (easy to import into another program, if you wanna switch someday).
I also use todoman for to-do lists, which is pretty similar to khal in terms of interface — having both a captive TUI and a non-captive UI.
I realize this doesn’t interest you, but as a side-note: Both of these use portable file-formats that can be synced with any pretty much any calendar-syncing service using vdirsyncer, which I use to sync my events and todo-lists and address book using Posteo.
For somewhat larger projects, I think the OS Haiku is a perfect example. It isn’t a benevolent dictatorship, there is no single leader — there are just long-time contributors. If you send in contributions substantive or regular enough, there’s a good chance you’ll get push access. Patches generally are accepted with open arms, and devs with push access give constructive criticism on patches kindly. The OS is better for it!
Better yet, check out NewPipe on F-Droid. :^)
It’ll try to render it, even if just as markup (like if you try using and Latex markup for math).
The federation with Mastodon is mostly one-way: We can’t see or comment on Mastodon posts, but Mastodon users can see and comment on Lemmy posts.
Mastodon’s like Twitter… its posts wouldn’t fit in the Lemmy UI well. Though I hear kbin works well with both Mastodon-style and Lemmy-style posts.
A community-driven hyper-hackable text-editor
Ah, so it’s Emacs :^)
Thanks!
Would you mind sharing the link/author of the extension? I tried searching on Firefox’es site, but only found spammy-looking unrelated add-ons.
I’ve been wondering about this, too! It might be nice for hash-tags to somehow be invisible to Lemmy (so as to not be intrusive or annoying), but visible during federation to non-Lemmy/Kbin servers? Without hash-tags, discoverability of Lemmy posts on Mastodon & friends is pretty much DOA, unless they’re actively sought out.
Missed the chance for the title “There will never be a second Second Life,” real shame.
Your redirect idea would probably work excellently as a browser extension — there are are redirect extensions like that for Mastodon already, actually.
As for the domain… the only thing I can think of would be, like you said, a Lemmy instance.
This is dishonest framing. From what I understand, Red Hat’s patches haven’t become proprietary, they’rejust not publically available to non-subscribers. Of course, subscribers could share the code with others — as it is libre. That is not what “closed source” means, not at all!
want censorship of not allowing any proprietary software to be mentioned
I personally haven’t run into this, though I have seen people immediately hop into a conversation to say, “You shouldn’t use X! It’s proprietary!” Worst-case scenario, I’ve seen social shaming for using proprietary software. Which I think is to some degree OK? Encouraging and advertising proprietary software is unethical, and I think it’s fine to annoy people into not advertising things like Discord. That’s not censorship, it’s just how relationships work, it’s how people associate.
don’t allow any critiques of the software they use because it’s libre software so there are no faults or bad designs.
Again, I haven’t run into this. I have seen people defend even garbage libre software on the basis that half-broken free code is better (ethically) than wonderful non-free code — which is true!
My attitude is if someone changes my code and doesn’t give back, it does not harm me or injury me in any way.
It only hurts the people that use the proprietary software that was made; now they don’t have control over their PC, and are at the mercy of the developer. Really, all they can do is cross their fingers and hope the dev is friendly and not up to anything unscrupulous. Speaking of which…
I also believe libre software can be used for the surveillance of other people, libre software does not be default mean privacy
Not inherently, obviously! No one actually thinks that free software is a magical silver bullet that vanquishes any possibility of malware, spyware, or anything of the sort. The argument is that these sorts of things are, compared to proprietary software, significantly easier to identify and remedy.
For instance, let’s say you find through some network analysis that a program phones home with suspiciously large payloads. You can’t actually see the contents of the packets as they’re encrypted in some weird format you can’t make heads or tails of. With a proprietary program, you’ve hit a brick wall that’s very hard to climb — you can’t find out what the program is sending, not easily. Your only hope is some back-breaking reverse-engineering work, which probably isn’t feasible unless you’re a professional security researcher. With a libre program, though, you could snoop through the code for anything net-related, and discover much more easily that it’s sending your private keys to the project’s server. Heck, with the libre program you could even remove the malware code and use the program again!
One is leaps and bounds more amicable to privacy and security.
It looks real slick, but there is one note-worthy bit:
- Does Kera Desktop only support web apps?
For now, yes. Support for Linux apps is perfectly possible and on the roadmap. For other platforms, we will see what’s possible.
I’m not a fan of web-apps generally, but the transparency sure is pretty! @o@
… it’s not a downside of the protocol, it’s just a literal impossibility. Once someone’s downloaded something, you can’t do a thing to take it back.