Lucky for me I accidentally double tapped when trying to move the zoomed in image only to see this waiting for me
bluejay
I'm another Alacritty user. It's been my daily driver for years at this point and I have no complaints
Just ran into this myself. Gotta love betas 😜
IT FEELS SO GOOD TO BE HOME
Thanks for this. I've been using it for almost 2 weeks and aside from having to manually tell Lasts/AntennaPod to sync it's been a seamless replacement for pocket casts. Well, once I figure out how to get the f-droid version of AntennaPod to play nice with Android auto (a problem I only came across yesterday)
That's again for the recommendation.
Any chance you also listen to them on PC? I'm looking to move away from Pocket Casts to Antennapod but haven't looked into desktop players yet (web/win&lin)
Also Plex is a staple of the self hosted community (though I prefer Jellyfin.) I'm wondering if they've confused self hosting and FOSS somehow
The apk isn't always what f-droid compiles. There's two scenarios where they publish the apk signed by the developer.
https://f-droid.org/docs/Reproducible_Builds/
It's one added layer of security to you, but to others it's a man in the middle that could be an extra attack vector.
If you don't trust the dev to put out an apk that's compiled from their public source why are you trusting any of your data with them?
How does f-droid solve this problem? From my understanding they confirm that the .apk
provided by the dev matches what compiles from source and run it through Virus Total. Those are trivial steps for a malicious dev to take to slip in something nefarious.
At that point you're relying on the community to check every commit for nefarious code $x. Not to mention they could simply build up community trust for some time before slipping in the code, since they'd effectively be burned once (if?) their very first shady code commit is found.
I can't imagine f-droid would go on the hook and say everything they build is also code reviewed for malicious stuff, right?
Fair point. I guess it boils down to if you prefer speed of update (obtainium) or the extra checks f-droid has in place and if you continue to trust that f-droid's stuff doesn't get compromised.
It's also worth mentioning f-droid's workflow far from guarantees there's nothing nefarious in a package. The bar looks to be passing virus total and then ensuring the provided apk matches source. If nobody reviews the source each time then every release could be the one that gets a nasty surprise.
Which developer?
E: Lol @ the ninja edit.
That's hardly a meaningful advantage for f-droid and the whole man in the middle risk you're exposing yourself to there. If you don't trust the developer to do the bare minimum of providing a release that matches source then why are you even installing their app? Satyr's response about developers getting compromised has way more weight in that conversation, but still falls short IMO.
Making sure the apk matches public source and running it through VT aren't going to catch a malicious apk that has the nasty bits buried in various commits but checks out in VT and matches the public source code. Sure, it'll burn them as a developer if/when they get caught, but how often does the community truly do code reviews on one-off Android apps? Not often enough to catch that kinda thing before it spreads without getting insanely lucky.
Pin-al