Is there a way to encrypt or password-protect part of a video?
Is there a way to encrypt or password-protect part of a video?
My & Your journey for Ideal RSS Readers for Android & W10?
Windows 10 I started my journey with Thunderbird (Windows 10): -No feature configuration options -No full text option -Dropped Then I discovered the Raven Reader: -Best interface -No longer maintained -No full text feature -Dropped Next, I found RSSGuard: -Provides the “full text” feature which is a must for me -More configurable features -Regularly maintained -Still the best option for me for now --------------------------------------------- Android I started with FocusReader: -Full text feature, which is a must for me -Many other features -Regularly maintained -Still the best option for me for now I also discovered the RSS Reader feature of a podcast player (PodcastRepublic): -Always provides the “full text” function which is a must for me -No options to configure the RSS Reader or add features -As an RSS feed reader, it has no updates or configuration options -I have been using it primarily as a podcast player, with the RSS Reader as a bonus -I wish the RSS Reader configuration could be added to accommodate additional features YOUR ideal RSS Readers ? and why?
The Best RSS Reader I have discovered the other day: Handy News Reader
Handy News Reader it’s totally free and open-source (FOSS), so you can snag it from F-Droid . It’s loaded with many features I have never heard of before * Filter Your Sources: pick and choose your news sources, * Offline Reading: No Wi-Fi? No worries! You can read articles offline * Light/Dark Themes * Sync Options: Sync your articles with or without images—totally up to you! * Smart Link Handling: Click a link in an article, and it’ll ask if you wanna add it to your reading list One of the best parts? It gives you full articles instead of those lame RSS snippets. It automatically kicks out ads and all that other junk like “related stories” and social media buttons, so you can just focus on the good stuff. scroll through new ones, mark the ones you wanna read later, and it’ll even ditch them automatically when you’re done. Plus, you can tweak the brightness to your liking and get notifications for the important stuff Handy News Reader also lets you read non-RSS websites and back up blog posts from them. It’s ready for offline use, and you can set data limits and load images only when you feel like it. the best part: ad-free! You can enjoy your reading without annoying pop-ups, and if ads ever sneak in, anyone with a bit of coding know-how can fix that up. https://github.com/yanus171/Handy-News-Reader/releases [https://github.com/yanus171/Handy-News-Reader/releases] https://handynewsreader.blogspot.com/ [https://handynewsreader.blogspot.com/]
Made Little Progress in Switching from Google, But Stuck on the root of the problem
cross-posted from: https://lemmy.world/post/27977693 [https://lemmy.world/post/27977693] > Hey everyone! > > So, I’ve made some small progress in switching things up on my Android: > > Replaced Gmail app with Thunderbird > Replaced Google Calendar with FOSSify Calendar > Replaced Google Play Store with Aurora & F-Droid > Replaced Android file manager with FOSSify File Manager > > But now I’m hitting a wall trying to find free alternatives on 2: > free replacement for Gmail > free Google Calendar alternative that works well > on both Android and via Thunderbird Windows > > Self-hosting isn’t really an option for me, so I’d love to hear your suggestions! > > If you’ve found something you really like, please share your experiences. > > Thanks!
Made Little Progress in Switching from Google, But Stuck on the root of the problem
Hey everyone! So, I’ve made some small progress in switching things up on my Android. Here’s what I’ve done so far: Replaced Gmail app with Thunderbird Replaced Google Calendar with FOSSify Calendar Replaced Google Play Store with Aurora & F-Droid Replaced Android file manager with FOSSify File Manager But now I’m hitting a wall trying to find free alternatives for a couple of things: free replacement for Gmail free Google Calendar alternative that works well on both Android and via Thunderbird Windows Self-hosting isn’t really an option for me, so I’d love to hear your suggestions! If you’ve found something you really like, please share your experiences. Thanks!
Take Open Source with a Grain of Salt: The Real Trust Dilemma In the age of open-source software, there is a growing assumption that transparency inherently guarantees security and integrity. The belief is that anyone can check the code, find vulnerabilities, and fix them, making open-source projects safer and more reliable than their closed-source counterparts. However, this belief is often oversimplified, and it’s crucial to take open-source with a grain of salt. Here’s why.
The Trust Dilemma: Can We Really Trust Open Source Code? There’s a famous story from the world of open-source development that highlights the complexity of this issue. Linus Torvalds, the creator of Linux, was once allegedly asked by the CIA to insert a backdoor into the Linux kernel. His response? He supposedly said, “No can do, too many eyes on the code.” It seems like a reassuring statement, given the vast number of contributors to open-source projects, but it doesn’t fully account for the subtleties of how code can be manipulated.
Not long after Torvalds’ alleged interaction, a suspicious change was discovered in the Linux kernel—an “if” statement that wasn’t comparing values but instead making an assignment to user ID 0 (root). This change wasn’t a mistake; it was intentional, and yet it slipped through the cracks until it was discovered before going live. The question arises: who had the power to insert such a change into the code, bypassing standard review processes and security protocols? The answer remains elusive, and this event highlights a critical reality: even the open-source community isn’t immune to vulnerabilities, malicious actors, or hidden agendas.
Trusting the Maintainers In the world of open-source, you ultimately have to trust the maintainers. While the system allows for community reviews, there’s no guarantee that every change is thoroughly vetted or that the maintainers themselves are vigilant and trustworthy. In fact, history has shown us that incidents like the XZ Utils supply-chain attack can go unnoticed for extended periods, even with a large user base. In the case of XZ, the malware was caught by accident, revealing a stark reality: while open-source software offers the potential for detection, it doesn’t guarantee comprehensive oversight.
It’s easy to forget that the very same trust issues apply to both open-source and closed-source software. Both models are prone to hidden vulnerabilities and backdoors, but in the case of open-source, there’s often an assumption that it’s inherently safer simply because it’s transparent. This assumption can lead users into a false sense of security, which can be just as dangerous as the opacity of closed-source systems.
The Challenge of Constant Auditing Let’s be clear: open-source code isn’t guaranteed to be safe just because it’s open. Just as proprietary software can hide malicious code, so too can open-source. Consider how quickly vulnerabilities can slip through the cracks without active, ongoing auditing. When you’re dealing with software that’s updated frequently, like Signal or any other open-source project, it’s not enough to have a single audit—it needs to be audited constantly by developers with deep technical knowledge with every update
Here’s the catch: most users, particularly those lacking a deep understanding of coding, can’t assess the integrity of the software they’re using. Imagine someone without medical expertise trying to verify their doctor’s competence. It’s a similar situation in the tech world: unless you have the skills to inspect the code yourself, you’re relying on others to do so. In this case, the “others” are the project’s contributors, who might be few in number or lack the necessary resources for a comprehensive security audit.
Moreover, open-source projects don’t always have the manpower to conduct ongoing audits, and this becomes especially problematic with the shift toward software-as-a-service (SaaS). As more and more software shifts its critical functionality to the cloud, users lose direct control over the environment where the software runs. Even if the code is open-source, there’s no way to verify that the code running on the server matches the open code posted publicly.
The Reproducibility Issue One of the most critical issues with open-source software lies in ensuring that the code you see matches the code you run. While reproducible builds are a step in the right direction, they only help ensure that the built binaries match the source code. But that doesn’t guarantee the source code itself hasn’t been altered. In fact, one of the lessons from the XZ Utils supply-chain attack is that the attack wasn’t in the code itself but in the build process. The attacker inserted a change into a build script, which was then used to generate the malicious binaries, all without altering the actual source code.
This highlights a crucial issue: even with open-source software, the integrity of the built artifacts—what you actually run on your machine—can’t always be guaranteed, and without constant scrutiny, this risk remains. It’s easy to assume that open-source software is free from these risks, but unless you’re carefully monitoring every update, you might be opening the door to hidden vulnerabilities.
A False Sense of Security The allure of open-source software lies in its transparency, but transparency alone doesn’t ensure security. Much like closed-source software, open-source software can be compromised by malicious contributors, dependencies, or flaws that aren’t immediately visible. As the XZ incident demonstrated, even well-established open-source projects can be vulnerable if they lack active, engaged contributors who are constantly checking the code. Just because something is open-source doesn’t make it inherently secure.
Moreover, relying solely on the open-source nature of a project without understanding its review and maintenance processes is a risky approach. While many open-source projects have a strong track record of security, others are more vulnerable due to lack of scrutiny, poor contributor vetting, or simply not enough people actively reviewing the code. Trusting open-source code, therefore, requires more than just faith in its transparency—it demands a keen awareness of the process, contributors, and the ongoing review that goes into each update.
Conclusion: Take Open Source with a Grain of Salt At the end of the day, the key takeaway is that just because software is open-source doesn’t mean it’s inherently safe. Whether it’s the potential for hidden backdoors, the inability to constantly audit every update, or the complexities of ensuring code integrity in production environments, there are many factors that can undermine the security of open-source projects. The fact is, no system—open or closed—is perfect, and both models come with their own set of risks.
So, take open source with a grain of salt. Recognize its potential, but don’t assume it’s free from flaws or vulnerabilities. Trusting open-source software requires a level of vigilance, scrutiny, and often, deep technical expertise. If you lack the resources or knowledge to properly vet code, it’s crucial to rely on established, well-maintained projects with a strong community of contributors. But remember, no matter how transparent the code may seem, the responsibility for verification often rests on individual users—and that’s a responsibility that’s not always feasible to bear.
In the world of software, the real question is not whether the code is open, but whether it’s actively maintained, thoroughly audited, and transparently reviewed
AFTER EVERY SINGLE UPDATE.
Until we can guarantee that, open-source software should be used with caution, not blind trust.
Trusting Open Source: Can We Really Verify the Code Behind the Updates?
Trusting Open Source: Can We Really Verify the Code Behind the Updates?
cross-posted from: https://lemmy.world/post/27544951 [https://lemmy.world/post/27544951] > Trusting Open Source: Can We Really Verify the Code Behind the Updates? > > In today’s fast-paced digital landscape, open-source software has become a cornerstone of innovation and collaboration. However, as the FREQUENCY and COMPLEXITY of UPDATES increase, a pressing question arises: how can users—particularly those without extensive technical expertise—place their trust in the security and integrity of the code? > > The premise of open source is that anyone can inspect the code, yet the reality is that very few individuals have the time, resources, or knowledge to conduct a thorough review of every update. This raises significant concerns about the actual vetting processes in place. What specific mechanisms or community practices are established to ensure that each update undergoes rigorous scrutiny? Are there standardized protocols for code review, and how are contributors held accountable for their changes? > > Moreover, the sheer scale of many open-source projects complicates the review process. With numerous contributors and rapid iterations, how can we be confident that the review processes are not merely cursory but genuinely comprehensive and transparent? The potential for malicious actors to introduce vulnerabilities or backdoors into the codebase is a real threat that cannot be ignored. What concrete safeguards exist to detect and mitigate such risks before they reach end users? > > Furthermore, the burden of verification often falls disproportionately on individual users, many of whom may lack the technical acumen to identify potential security flaws. This raises an essential question: how can the open-source community foster an environment of trust when the responsibility for code verification is placed on those who may not have the expertise to perform it effectively? > > In light of these challenges, it is crucial for the open-source community to implement robust mechanisms for accountability, transparency, and user education. This includes fostering a culture of thorough code reviews, encouraging community engagement in the vetting process, and providing accessible resources for users to understand the software they rely on. > > Ultimately, as we navigate the complexities of open-source software, we must confront the uncomfortable truth: without a reliable framework for verification, the trust we place in these systems may be misplaced. How can we ensure that the promise of open source is not undermined by the very vulnerabilities it seeks to eliminate?"
Trusting Open Source: Can We Really Verify the Code Behind the Updates?
cross-posted from: https://lemmy.world/post/27544951 [https://lemmy.world/post/27544951] > Trusting Open Source: Can We Really Verify the Code Behind the Updates? > > In today’s fast-paced digital landscape, open-source software has become a cornerstone of innovation and collaboration. However, as the FREQUENCY and COMPLEXITY of UPDATES increase, a pressing question arises: how can users—particularly those without extensive technical expertise—place their trust in the security and integrity of the code? > > The premise of open source is that anyone can inspect the code, yet the reality is that very few individuals have the time, resources, or knowledge to conduct a thorough review of every update. This raises significant concerns about the actual vetting processes in place. What specific mechanisms or community practices are established to ensure that each update undergoes rigorous scrutiny? Are there standardized protocols for code review, and how are contributors held accountable for their changes? > > Moreover, the sheer scale of many open-source projects complicates the review process. With numerous contributors and rapid iterations, how can we be confident that the review processes are not merely cursory but genuinely comprehensive and transparent? The potential for malicious actors to introduce vulnerabilities or backdoors into the codebase is a real threat that cannot be ignored. What concrete safeguards exist to detect and mitigate such risks before they reach end users? > > Furthermore, the burden of verification often falls disproportionately on individual users, many of whom may lack the technical acumen to identify potential security flaws. This raises an essential question: how can the open-source community foster an environment of trust when the responsibility for code verification is placed on those who may not have the expertise to perform it effectively? > > In light of these challenges, it is crucial for the open-source community to implement robust mechanisms for accountability, transparency, and user education. This includes fostering a culture of thorough code reviews, encouraging community engagement in the vetting process, and providing accessible resources for users to understand the software they rely on. > > Ultimately, as we navigate the complexities of open-source software, we must confront the uncomfortable truth: without a reliable framework for verification, the trust we place in these systems may be misplaced. How can we ensure that the promise of open source is not undermined by the very vulnerabilities it seeks to eliminate?"
Trusting Open Source: Can We Really Verify the Code Behind the Updates?
Trusting Open Source: Can We Really Verify the Code Behind the Updates? In today’s fast-paced digital landscape, open-source software has become a cornerstone of innovation and collaboration. However, as the FREQUENCY and COMPLEXITY of UPDATES increase, a pressing question arises: how can users—particularly those without extensive technical expertise—place their trust in the security and integrity of the code? The premise of open source is that anyone can inspect the code, yet the reality is that very few individuals have the time, resources, or knowledge to conduct a thorough review of every update. This raises significant concerns about the actual vetting processes in place. What specific mechanisms or community practices are established to ensure that each update undergoes rigorous scrutiny? Are there standardized protocols for code review, and how are contributors held accountable for their changes? Moreover, the sheer scale of many open-source projects complicates the review process. With numerous contributors and rapid iterations, how can we be confident that the review processes are not merely cursory but genuinely comprehensive and transparent? The potential for malicious actors to introduce vulnerabilities or backdoors into the codebase is a real threat that cannot be ignored. What concrete safeguards exist to detect and mitigate such risks before they reach end users? Furthermore, the burden of verification often falls disproportionately on individual users, many of whom may lack the technical acumen to identify potential security flaws. This raises an essential question: how can the open-source community foster an environment of trust when the responsibility for code verification is placed on those who may not have the expertise to perform it effectively? In light of these challenges, it is crucial for the open-source community to implement robust mechanisms for accountability, transparency, and user education. This includes fostering a culture of thorough code reviews, encouraging community engagement in the vetting process, and providing accessible resources for users to understand the software they rely on. Ultimately, as we navigate the complexities of open-source software, we must confront the uncomfortable truth: without a reliable framework for verification, the trust we place in these systems may be misplaced. How can we ensure that the promise of open source is not undermined by the very vulnerabilities it seeks to eliminate?"