That's a pretty good explanation about. Care if you reply the source of your information? I'd wanna keep it as reference <3
Thank you!
That's a pretty good explanation about. Care if you reply the source of your information? I'd wanna keep it as reference <3
Thank you!
Lmao Hope you're not right (I mean, I hope no telemetry is imposed on my favorite programming language). But as you said, Google tracking/survillance history say that people privacy really don't concerns him
So, that means telemetry is optional? How I ensure is currently active or not? Just wanna an explanation. I (as I said) searched about this thing and got almost nothing :(
it’s where all of the mod version is cached, so any time anyone builds a Go package from source, calls are made to the mother ship.
I don't understand it at all. Why I'll need something like that?
Thank you for your response!
I searched A LOT about this information and got no information (but misinformation) about. Plus just look at this decision.
What that means? I need to do a torsocks
to every single command I type? (That last is just sarcasm. Please, I'm not so paranoid (by now))
Yeah! You see it? At the end of the day, everyone, even if they want to become independent from these invasive policies, must accept and eat these policies.
edit: a single web search reveals that Flutter has indeed Google telemetry enabled by default. developing your web searching skills is a good habit for developers.
I already know this, just flutter config --disable-analytics
solve this problem.
But there are more than this. For example, Flutter itself doesn't work correctly. It needs the Android SDK (that is installed separately). And with this you need to accept the licenses and other stuff. That's the point.
compile the most basic of flutter apps or some demo and see if the app makes any kind of request to the internet.
How can I intercept this traffic quickly?
Fully based
I forgot Firejail and Bubblejail. These are good tools. I mean, only need to learn use it xd But actually sounds good.
These are pretty good news! Thank you for explain in a better form the context of situation.
Actually, sounds cool. Now feel sure I can run cs1.6 no steam with 18 trojans detected by VirusTotal from a pakistani server and don't scare me because I will use Bottles into a Arch Linux Virtual Machine lmao (this is just a sarcasm, in any case, I also bought cs1.6. I think there are only hackers anyways)
Because Bottles is distributed via Flatpak, which is...
Safe. Sandboxed.
Because...
Your bottles are isolated from the system and will only hit your personal files when you decide.
The full-sandbox is provided and pre-configured only using the Flatpak package (highly recommended).
All other packages still have access to the partial sandbox which isolates the bottle files and prevents them from accessing your homedir.
(This is a extract from the official homepage in the last section)
I don't trust in any Windows Application at all, but I think this doesn't mean I need to live under a rock. This is the reason because I open this Post. So thank you for you help and your time :) You are very cool.
I think is a good option play videogames in a Virtual Machine when is possible. But I just want to feel "more secure" when I need to play in my host machine, for example, using sandboxing.
Rust is my "alternative". But I see Rust pretty hard (is a system level programming language lol) and differently scoped.
I like some Go characteristics like garbage collection, simpler syntax, crossplatform, 1 second C bindings, and so on.