• 0 Posts
  • 18 Comments
Joined 2 years ago
cake
Cake day: June 7th, 2023

help-circle
  • In other words, your post may still be visible on, say, a linked Mastodon server, even if you decide to delete it with Threads.

    “I think this is a downside of the protocol that we use today, but I think it’s important to let people know that if you post something and another server grabs a copy, we can’t necessarily enforce it,” Cottle says.

    … it’s not a downside of the protocol, it’s just a literal impossibility. Once someone’s downloaded something, you can’t do a thing to take it back.




  • For calendar, I use khal, which offers a TUI (ikhal command) and a non-captive UI that can print a simple list like you might want (khal command). It supports multiple calendars, ical, recurring events, etc. Since it support ical, you can add locations, times, dates, alarms, pretty much anything you want. No database required, each event is saved into a seperate ical file (easy to import into another program, if you wanna switch someday).

    I also use todoman for to-do lists, which is pretty similar to khal in terms of interface — having both a captive TUI and a non-captive UI.

    I realize this doesn’t interest you, but as a side-note: Both of these use portable file-formats that can be synced with any pretty much any calendar-syncing service using vdirsyncer, which I use to sync my events and todo-lists and address book using Posteo.


  • For somewhat larger projects, I think the OS Haiku is a perfect example. It isn’t a benevolent dictatorship, there is no single leader — there are just long-time contributors. If you send in contributions substantive or regular enough, there’s a good chance you’ll get push access. Patches generally are accepted with open arms, and devs with push access give constructive criticism on patches kindly. The OS is better for it!




  • jadedctrl@sopuli.xyztoFediverse@lemmy.worldSubscribing to Mastadon
    link
    fedilink
    English
    arrow-up
    25
    ·
    edit-2
    1 year ago

    The federation with Mastodon is mostly one-way: We can’t see or comment on Mastodon posts, but Mastodon users can see and comment on Lemmy posts.

    Mastodon’s like Twitter… its posts wouldn’t fit in the Lemmy UI well. Though I hear kbin works well with both Mastodon-style and Lemmy-style posts.










  • want censorship of not allowing any proprietary software to be mentioned

    I personally haven’t run into this, though I have seen people immediately hop into a conversation to say, “You shouldn’t use X! It’s proprietary!” Worst-case scenario, I’ve seen social shaming for using proprietary software. Which I think is to some degree OK? Encouraging and advertising proprietary software is unethical, and I think it’s fine to annoy people into not advertising things like Discord. That’s not censorship, it’s just how relationships work, it’s how people associate.

    don’t allow any critiques of the software they use because it’s libre software so there are no faults or bad designs.

    Again, I haven’t run into this. I have seen people defend even garbage libre software on the basis that half-broken free code is better (ethically) than wonderful non-free code — which is true!

    My attitude is if someone changes my code and doesn’t give back, it does not harm me or injury me in any way.

    It only hurts the people that use the proprietary software that was made; now they don’t have control over their PC, and are at the mercy of the developer. Really, all they can do is cross their fingers and hope the dev is friendly and not up to anything unscrupulous. Speaking of which…

    I also believe libre software can be used for the surveillance of other people, libre software does not be default mean privacy

    Not inherently, obviously! No one actually thinks that free software is a magical silver bullet that vanquishes any possibility of malware, spyware, or anything of the sort. The argument is that these sorts of things are, compared to proprietary software, significantly easier to identify and remedy.

    For instance, let’s say you find through some network analysis that a program phones home with suspiciously large payloads. You can’t actually see the contents of the packets as they’re encrypted in some weird format you can’t make heads or tails of. With a proprietary program, you’ve hit a brick wall that’s very hard to climb — you can’t find out what the program is sending, not easily. Your only hope is some back-breaking reverse-engineering work, which probably isn’t feasible unless you’re a professional security researcher. With a libre program, though, you could snoop through the code for anything net-related, and discover much more easily that it’s sending your private keys to the project’s server. Heck, with the libre program you could even remove the malware code and use the program again!

    One is leaps and bounds more amicable to privacy and security.