Here’s a good reason why you should run an ad blocker. Block the Google Analytics script from loading entirely.
- 3 Posts
- 39 Comments
Google Analytics gives you insights on what pages people visit, how long they spend, what kind of browsers and devices they use. That can give them data on what pages are important to customers and what screen sizes to support
I’d rather they self host this data vs use Google Analytics, but there are benefits.
chaospatterns@lemmy.worldto Technology@lemmy.world•Firefox, VLC, Gimp, KeePass, LibreOffice among open source software endorsed by French GovernmentEnglish6·8 days agoThey started charging money for Docker Desktop for companies and they have been adding pull limits on Docker Hub.
chaospatterns@lemmy.worldOPto Games@lemmy.world•Cozy video games can quell stress and anxietyEnglish16·9 days agoPersonally, I’ve been enjoying cozy games like Dorfromantik, Rail Route, or even Transport Fever 2 (I just play with unlimited money and build great transit networks that I wish existed in my home country.)
chaospatterns@lemmy.worldto Technology@lemmy.world•Framework Laptop 12 is now available for pre-order for €569 and up (but not in the US)English37·19 days agoThe laptops are manufactured in Taiwan. There’s so much unpredictability in the tariffs so they’re delaying until it settles down. Tariffs are going to impact US companies and US residents.
chaospatterns@lemmy.worldto Selfhosted@lemmy.world•New Jellyfin Server/Web release: 10.10.7English2·22 days agoOh that would be nice. I would use that to just go into the database and fix all my broken music metadata which I can’t see to fix any other way.
chaospatterns@lemmy.worldto Selfhosted@lemmy.world•Plex is locking remote streaming behind a subscription in AprilEnglish3·1 month agoYou’re right. Unfortunately, open-source has proven time and time again to be unsustainable and burn maintainers out
chaospatterns@lemmy.worldto Selfhosted@lemmy.world•Plex is locking remote streaming behind a subscription in AprilEnglish10·1 month agoThat’s a good reason for people to take the money they would have spent buying a proprietary solution and instead donate that money to an open source project. For me it’s not always about the cost, but what I get out of it. I’d rather the money go to the community and better it.
chaospatterns@lemmy.worldto Fediverse@lemmy.world•Why Isn't the "All" Feed Different for Each Instance?English61·2 months agoIts only everything from other instances and communities that the current instance subscribes to. It doesn’t subscribe to the full pipe of everything.
What’s likely happening is people in aggregate generally subscribe to the most popular communities and those communities have the most upvoted posts.
I stopped using it to pay because then I’d have to set up a PIN, and then type in the PIN every time I want to use it
This shocked me when I went from my Galaxy Watch 3 to a Galaxy Watch 6. I used to only have to put a PIN when I wanted to pay, but now it’s anything on the watch?
Because of that, I also disabled the payment app.
chaospatterns@lemmy.worldto Technology@lemmy.world•Undocumented "backdoor" found in Bluetooth chip used by a billion devicesEnglish14·2 months agobut completely backwards in thinking that an undocumented bluetooth backdoor is worse than the worst vulnerability found since the invention of the internet
Right HeartBleed was way worse than this, not on the same level. I wasn’t claiming the opposite.
I was responding to the comment that appeared to suggest they were on the same level.
chaospatterns@lemmy.worldto Technology@lemmy.world•Undocumented "backdoor" found in Bluetooth chip used by a billion devicesEnglish211·2 months agoNo way they’re on the same level. Heartbleed allowed for remote memory reads. This requires you to have access to change the firmware and just gives you some more APIs to control the WiFi system and possibly bypass firmware verification.
Back in early 2024, I got a survey asking me why I chose to cancel my prime membership and I gave them multiple reasons.
chaospatterns@lemmy.worldOPto Technology@lemmy.ml•Losing a 5-year-long Illinois FOIA lawsuit for database schemasEnglish9·2 months agoThe companion post, I Went To SQL Injection Court, goes into detail about the court process and witness testimony. One of the interesting things is just how different computer people think about security vs lawyers. Somebody might say that having a schema would help a malicious actor a small amount, and a lawyer will jump on that to deny the request. The idea that the schema would help a malicious actor is the same as a map helping a bank robber. The vault security and security guards are the relevant factors for this, not the map.
I’ll keep this in mind the next time I’m an expert witness in a computer case (based on this, I hope I’m not.)
chaospatterns@lemmy.worldto Technology@lemmy.world•Framework’s first desktop is a strange—but unique—mini ITX gaming PCEnglish171·2 months agoIn this context, SKU refers to a variant of this product. That is the correct acronym as I understand
chaospatterns@lemmy.worldto Selfhosted@lemmy.world•Jellyfin is not just good... but *better* than Plex now?!English31·2 months agoI use Jellyfin for music mostly and it struggles with metadata. For example, if a song has two artists on it and I edit to correct it, it won’t update correctly and I’ll edit up with the artist “Artist A; Artist B”.
chaospatterns@lemmy.worldto Selfhosted@lemmy.world•Ghost blog adding activitypubEnglish6·3 months agoI’m working on adding ActivityPub to my Hugo blog right now. I support RSS, but I figured AP support means that you can get it into your Mastodon feed or even Lemmy feed making it easy to follow. Additionally, commenting (assuming it doesn’t get taken over by spammers.)
Which stops malicious usage, but doesn’t stop cases where web pages over use pushState as users move around instead of replaceState. I’ve seen maps that would add to the history every time a user moves around the map.
Past vulnerabilities doesn’t mean there is active mpdern vulnerabilities especially ones in widely tested operating systems that’s exploited by as many apps as people claim are listening when security researchers also regularly reverse engineer and analyze the source code of popular apps to figure out what they’re doing. You can decompile Android apps pretty easily to see what they’re doing. Some are obfuscated so it takes some effort.
Its one thing to claim there’s some a system level bypass for the icon that the NSA uses to spy on its enemies, it’s another thing to claim that it’s being exploited on a wide scale by a tech companies on different apps, iOS and Android, multiple versions/devices.
The reality is that we leak tons of info through other mediums that are easier and cheaper to collect than through microphones.