Markaos

joined 1 year ago
[–] Markaos@lemmy.one 3 points 3 weeks ago

It’s likely the same sensor that is included in ~~the rest of~~ the Pixel 9 Pro Fold.

I see proofreading the first paragraph is too hard these days.

[–] Markaos@lemmy.one 10 points 3 weeks ago

Don't know about the rest, but...

Does reflashing a ROM fix it?

The phones appear to be simply dead with no response to anything. No way to connect ADB, no way to connect fastboot, nothing.

Also the bootloader allows flashing over the cable only when it's unlocked (at least on Pixels; I couldn't find anything relevant in the Android documentation). The vast majority of Pixels should have their bootloaders locked, and it is only possible to unlock it through the system settings, so it's pretty safe to say that most Pixels cannot be recovered if Android fails to boot because you cannot unlock the bootloader if you can't get into settings.

[–] Markaos@lemmy.one 2 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

That depends a lot on how the license gets interpreted and how license violations are handled by the local law. The argument for why the end user cannot do anything about GPL violation is that the violated contract is between upstream and the "bad" developer - the upstream project gave the bad developer access to their source code under the condition that the license stays the same. You as the end user only get exposed to the bad developer's license, so you can't do anything. It's the upstream who must force them to extend a proper license to you.

However there was also a case recently where the FSF argued that this interpretation / handling of the situation is against the spirit of GPL and I think they won, so... Yeah, it's just unclear. Which is normal for legal texts (IMHO intentionally, but I'm not here to rag on lawyers, so I'll leave it at that).

[–] Markaos@lemmy.one 33 points 3 weeks ago

While I agree with your view (at least when it comes to firmware, especially given that hardware that doesn't require a firmware upload on boot generally just has the very same proprietary firmware on a built-in memory, so the only difference is that you don't get to even touch the software running on it), the point of this project is to remove non-libre components from coreboot/libreboot.

It doesn't differentiate itself from upstream in any other way, so if it fails to do the one thing it was made to do, then that's in fact a newsworthy fact.

[–] Markaos@lemmy.one 2 points 4 weeks ago (1 children)

I don't think it supports displaying HDR at all? The GitHub issue regarding HDR is still open and it definitely doesn't switch to HDR mode when I open HDR photos with it.

[–] Markaos@lemmy.one 2 points 1 month ago

The hardware supported it ever since adaptive charging was introduced, so that's not surprising.

[–] Markaos@lemmy.one 2 points 1 month ago

The work profile seems like a better place for that, and it was available since Android 5

[–] Markaos@lemmy.one 4 points 1 month ago (1 children)

I do not know of any such dongle, but I'd like to ask you a question if you don't mind: are you looking for a dongle with open-source firmware, or would a dongle that has its (proprietary) firmware stored in some onboard memory be acceptable?

The second option wouldn't require you to install any proprietary firmware on your computer, but you'd still rely on the proprietary firmware for the device to run. And it might also exist, unlike a dongle with FOSS firmware.

[–] Markaos@lemmy.one 3 points 1 month ago

Maybe developers will finally start implementing predictive back now that it's not hidden behind developer options. It's kinda nice when you can just peek at where the app wants to take you when you go back, and it currently ironically tends to be implemented only by apps that already have decently made navigation.

Also private space seems nice, finally a way to use the work profile sandbox natively without having to install third party apps that pretend to be work profile managers.

[–] Markaos@lemmy.one 1 points 1 month ago (4 children)

I know this isn't Reddit, but r/peopleliveincities... When 90% of desktop users use Windows, it's going to both be the most targeted by malware developers and have the highest chance of being operated by someone who doesn't understand enough about computers to recognize that the shiny calculator app that just popped up after visiting a very legit Nigerian prince's crowdfunding page probably shouldn't need admin access.

And speaking of user error, I'm willing to bet that basic security practices like using full disk encryption, SecureBoot, some MAC layer (provided by antivirus on Windows, AppArmor/SELinux on Linux) and regularly applying security updates are way more common over in the Windows land - if I was in a situation where there was one completely randomly selected Windows PC and one also completely randomly selected Linux PC, and my life depended on being able to gain access to either of them (some kind of really messed up Saw trap? idk), I would definitely bet my life on the Linux one being misconfigured.

Don't get me wrong, Linux can make for a very secure and private OS, but most installs most definitely cannot be described as such - just look at the popularity of random unverified PPAs on Ubuntu derivatives or AUR packages on Arch.

[–] Markaos@lemmy.one 1 points 1 month ago

A reasonable build of the kernel optimized for virtualization won't take more than a few tens of megabytes of RAM (and it will have support for memory ballooning, so the virtualized kernel will give the memory it doesn't need back to the host), and the userspace will need to be separate anyway due to how different Android is to normal Linux distros.

Containers are nice when you want to run dozens of separate services on the same server or want to get the benefits of infrastructure as code, but in this case they would provide minimal benefits at the cost of having no way of loading any kernel modules not built into whatever ancient kernel version your SoC manufacturer decided you have to use on your phone. Also, container escape vulnerabilities are still a bit more common than full VM escape, so this is also good for security on top of being more useful.

[–] Markaos@lemmy.one 11 points 1 month ago

box86/box64, and there's also FEX-emu which is used by the Asahi Linux project (Linux on Apple Silicon macbooks).

view more: ‹ prev next ›