The first beta of #Mastodon 4.2.0 is now available for testing! There are too many improvements to count. See the extensive changelog and upgrade instructions here:

https://github.com/mastodon/mastodon/releases/tag/v4.2.0-beta1

Release v4.2.0-beta1 · mastodon/mastodon

⚠️ This is a beta release! This is primarily aimed at server administrators who are willing to report issues, and may be less reliable than stable releases, although it is still tested on mastodon....

GitHub

@MastodonEngineering

Coming soon in #Mastodon v4.2.0:

👀 3rd-party JavaScript spyware loaded without users' consent.

#MastoAdmin #privacy #SurveillanceCapitalism

https://github.com/mastodon/mastodon/pull/25019

Add optional hCaptcha support by ClearlyClaire · Pull Request #25019 · mastodon/mastodon

Add optional hCaptcha support based on glitch-soc#1665 and glitch-soc#1667, largely rewriting prior work at glitch-soc#1323 Whenever the environment variables HCAPTCHA_SECRET_KEY and HCAPTCHA_SITE_...

GitHub
@[email protected] @[email protected]

Looks like this is a privacy issue and it may not even be legal... right?

@nick

Well the devs aren't known for pausing anything to deal with objections or concerns ... so, screw the privacy rights violations for users and legal problems for admins!

@downey so this is required now? I thought the PR said optional? Why did this change?
@KuJoe because the BDFL insists on running and growing a server that shouldn't exist.
@downey that doesn't answer my question, why isn't it optional anymore?

@downey @MastodonEngineering I thought hCaptcha was the good one. Disappointing.

Adblockers will always be a necessity.

@lasombra @downey @MastodonEngineering it's made by the Brave guy so it can't be that good
@lasombra @downey @MastodonEngineering no, they (Cloudflare/hCaptcha) are really really bad. I contacted them on behalf of several blind #lynx users and they refused to even understand the problem.
@downey @MastodonEngineering weird that they went for a proprietary solution instead of something like mosparo
@downey @MastodonEngineering I said, they don't really care about us anymore.
@downey @MastodonEngineering but it's true we could argue about DeepL translation feature too, if we take this as we take it.
@gmate8 Somewhat. We use a self-hosted LibreTranslate but AFAIK content is only sent to the translation server when the user clicks the "Translate" link right? At least there is a bit of user autonomy there, as opposed to this new captcha that records PII automatically without warning or affirmative steps by users.
@downey LibreTranslate's cool, wish it was available in hu
But even lingva could be an option somewhat
@downey checked LibreTranslate again and it seems like now it has 🇭🇺! Cool.
@gmate8 Idő telepíteni!
@downey you have always wholesome replies

@gmate8 if you're saying Hungarian, it's already in the argos language models used by LT. Élvezze!

https://github.com/argosopentech/argos-translate

GitHub - argosopentech/argos-translate: Open-source offline translation library written in Python

Open-source offline translation library written in Python - argosopentech/argos-translate

GitHub
@downey @gmate8 Not really in my opinion, the user who write something is not the one who'll press the translate button, you can't control if and when someone will send your stuff to deepl.
mastodon/config/settings.yml at 8257cb314d62a740fd1f1bf76fd64f8168a11863 · ClearlyClaire/mastodon

A GNU Social-compatible microblogging server. Contribute to ClearlyClaire/mastodon development by creating an account on GitHub.

GitHub
@aka_dude Users can't set that, but thanks for misrepresenting my comment.
@downey @MastodonEngineering oh Jesus, is that real?! That sucks, but sadly that's true 😔
@downey @MastodonEngineering
I wonder: would informing or otherwise notifying the user that the sign up process includes a third-party captcha - before even signing up - be a reasonable compromise here? This way, they can choose a different instance should they wish to avoid the captcha.
@opalium Yes, consent is what was raised in May and ignored by the devs since then.
@downey @MastodonEngineering to add insult to injury, hCaptcha/Cloudflare actively refuse to support a11y, e.g. for lynx users. They ought to be boycotted, even if GDPR etc. weren’t an issue already.
@downey @MastodonEngineering not that it matters much for your instance, since floss.social already violates the GDPR by illegally loading content from shields.io and masto.host without obtaining prior user consent…
@downey My instance delivers right now: "content-security-policy: script-src 'self' https://chaos.social 'wasm-unsafe-eval'". This was not changed, visibly, in this commit. How does it load that 3rd-party stuff?
chaos.social

chaos.social – a Fediverse instance for & by the Chaos community

Mastodon hosted on chaos.social