General aviation airports often have little or no staff and only rudimentary access controls. People walking around aircraft are expected to be responsible for their own safety.
General aviation airports often have little or no staff and only rudimentary access controls. People walking around aircraft are expected to be responsible for their own safety.
Maybe, but the archetypal non-technical user, my mother does want to run a third-party ROM. Her phone is out of its official support period, and she knows that security updates are important and would like a way to get them. Most people, at least in wealthy countries do have a technical person in their lives they can ask things like that. She doesn’t want to buy a new phone because it would be too big and lack a headphone jack, a position I share.
I had to recommend against running what I run (LineageOS, Magisk, Play Integrity Fix). Without PIF, too many apps will refuse to run on LineageOS. She doesn’t need root for much else (maybe adblocking) and doesn’t have the knowledge to make good decisions about whether to grant root permissions to an app that asks (Magisk doesn’t have an allowlist-only mode, but it should). Finally, keeping root through an update is fussy. It’s not hard, but it’s an extra step that has to be done in the right order every week or two.
Unlike Firefox in 2024, a third-party Android build that’s easy enough to install and isn’t sabotaged by Safetynet would something many non-technical users care about: an extended useful life for their devices.
Last time I used one was because I forgot my physical wallet and needed to pay for something. I don’t want to tell Google about my shopping habits, but I like to have options in case of emergency.
I’m running LineageOS (with GMS), Magisk, and Play Integrity Fix.
Can you cite examples of rooted smartphones leading to significant data breaches or financial losses? When the topic comes up, I always see hypotheticals, never examples of it actually happening.
It seems to me a good middle ground would be to make it reasonably easy (i.e. a magic button combination at boot followed by dire warnings and maybe manually typing in a couple dozen characters from a key signature) for users to add keys so that they can have a verified OS of their choice. Of course, there’s very little profit motive to do such a thing.
Google doesn’t want distributions of open source Android without Google services to be a viable option for mainstream users because that would reduce their ability to extract profits from the Android ecosystem.
While the focus is surely more on OEMs than end users at this point, I’m sure Google wants to keep the difficulty level for end users high enough that it remains niche.
I think the main reason third-party ROMs aren’t more popular is that Google and certain app developers fuck with people who use them. The article addresses the difficulties later on, but comes up short in my view on just how much of a hassle it is for someone who isn’t a tech enthusiast who wants, for example to keep an older phone up to date for security reasons.
I think the main motivation for Google is limiting user control over the experience. More user control leads to unprofitable behaviors like blocking ads and tracking, which is also the motivation for recent changes to the Chrome web browser that make content blocking extensions less effective. In all cases, companies that try to take away user control claim the motivation is security, usually for the benefit of the user.
Even if you did (don’t eat batteries), the voltage range is much lower and you probably wouldn’t feel anything.
Now if it was added to rechargeable batteries, it would be pretty useful
I think the reason we haven’t seen that is that NiMH rechargeables have fairly stable voltage during discharge while alkalines don’t.
There are better ways to assess the legitimacy of a media outlet than critiquing its web design. The Wikipedia page might be a good start.
I don’t like the loginwall, but it doesn’t require payment.
The biggest reason is most likely that the cases had different judges.
My initial reading of the reporting on this ruling suggests it won’t do that. App developers can opt out of most of the provisions, but Google may not pressure them to do so.
Why would someone own 8 vehicles?
Car collectors exist, and I have the impression quite a few of them are among the Cybertruck’s early adopters.
I remember getting a boarding pass from an airline that was only offered in their app or printed at the airport, no email/download image/PDF option. I didn’t have to install their app, but I would have had to waste time at the airport otherwise. I removed it when I was done and left it a negative review.
The number I remember seeing was that on average, app users are seven times more profitable than web users. Sorry, no citation.
I suspect there’s some selection bias in that regular/loyal users of a particular product or service are more likely to install the app, but it also affords the company greater access to send notifications and collect data. On the rare occasion that I install some random company’s app for a specific benefit, I remove it when I’m done.
It’s likely the harassers can be prosecuted for false imprisonment, a misdemeanor. It is illegal to use deadly force such as hitting people with cars to prevent/terminate a misdemeanor.
here’s not really anything of that nature for tech stuff
The Magnuson-Moss Warranty Act does not exclude tech stuff. The problem is that it’s a lot harder to work on tech stuff without insider information than 1970s cars.
He can’t. He’s paralyzed and his exoskeleton is broken.
On a more serious note, the 404media article (login wall) reports the problem was that the wristwatch controller for the exoskeleton had its battery wire’s solder joint break. They seem to be trying to frame it as a right to repair issue, but that’s a trivial repair for anyone with basic electronics experience.
If I feel threatened in my car, I am not allowed to run over the person
You are not allowed to run people over merely because you feel threatened.
You are allowed to use deadly force, in the USA when you reasonably believe that it is necessary to prevent someone from unlawfully killing, causing serious physical injury, or committing a short list of violent felonies. The harassment described in the article probably does not rise to that level, though an ambitious lawyer might try to describe intentionally causing the car to stop as carjacking or kidnapping.
There was a recent related discussion on Hacker News and the top comment discusses why this sort of solution is not likely to be the best fit for smaller organizations. In short, doing it well requires time and effort from someone technically sophisticated, who must do more than the bare minimum for good results, as you just learned.
Even then, it’s likely to be less reliable than solutions hosted by big corporations and when there’s a problem, it’s your problem. I don’t want to discourage you, but understand what you’re committing to and make sure you have adequate buy-in in your organization.
That’s not quite true, though in that case it’s about the service provider being unable to verify that the user isn’t running a operating system configured or modified to work against the interests of the service provider.