Ah alright, then they must have changed it since I last added a new app. The last few years I just published updates and they all went through almost immediately.
Ah alright, then they must have changed it since I last added a new app. The last few years I just published updates and they all went through almost immediately.
I doubt that. From what he said somewhere on Pixelfed, the beta is only on Android right now and you don’t need approval to publish something on the Play Store. From personal experience, apps appear within a couple of minutes. On iOS, the usual approval time would be 3-4 days.
For those who want the old tabs back: under settings -> appearance, you can set the ui density to compact (sorry, can’t tell you the exact name, I have my system set to German)
Honestly, this whole thing is a mess… first a countdown, then a website with basically no information and that’s only the start.
More than 24 hours after signing up, I finally got an email with just about zero information:
Hi @dfyx,
We’re thrilled to welcome you to Loops.video!
We’re in the process of onboarding all our new users, and we can’t wait for you to experience the magic of short looping video.
Keep an eye out for another email from us later tonight or tomorrow (depending on when you signed up). It will have all the details you need to get started, including how to create your first Loop.
Welcome to the Loops community!
Regards, The Loops Team
And from some random comment that dansup made on pixelfed I found out that this beta is only for Android. Apparently, iOS will come later and there is no info on a browser-based version. That info should have been on the website. Also, what about selfhosting? This is the fediverse after all…
Kind of. All it shows for me is a registration form. When I submit it, they promise me to send an email with further instructions. So far, I didn’t get anything. Honestly, they wouldn’t have needed a countdown for that.
Seems to be a framework to build your own custom fediverse stuff.
As far as I know, ActivityPub only applies to server to server communication. Still, many applications that implement ActivityPub (for example Mastodon) do use push notifications for their clients.
One more difference is that RSS is polling based, meaning that subscribers have to actively ask every hour or so if thre is new content.
On the other hand, ActivityPub knows who is subscribed and can actively distribute new content to other servers who can in turn send push messages to their users, letting you know about new content within seconds.
Can confirm that it doesn’t load on iOS but loads fine on desktop.
I just made it 62.
I came into this discussion from the technical perspective (of which I’ve done plenty of research, both in university and in my job) that commercial VPNs don’t do what most ads want you to think they do. Your ISP sees a lot less than they want you to think, VPNs use just the same encryption algorithms as everyone else and while public WiFi isn’t great security-wise it’s not as if anyone will read your bank password the second you connect. I still stand by those claims.
Then, the discussion drifted towards who you’d rather trust with the things that aren’t encrypted (mostly DNS and connection metadata. Someone has claimed that many messengers are unencrypted but I think they have confused a lack of user-to-user encryption with user-to-server encryption), your ISP or some VPN provider. That’s the point where we diverged: as I had no need for a VPN myself (because of the reasons mentioned above), I had not researched individual VPN providers and was not aware that Mullvad apparently has a strong track record. For that I apologize. Still, in a thread that started out with someone not knowing if they need a VPN at all and most discussion has been very general, I would not assume that anyone who comments is familiar with a specific provider without them being named explicitly. Also, I’ve stated in at least three places that I was explicitly talking about VPN providers like NordVPN and Surfshark that are prominently (mis-)advertised. Those I still would not trust further than I can throw them.
But I guess that’s online discussions. We’ve talked about two different things and took a while to notice. I’m thankful for the correction and I hope you can understand where I came from.
I checked and there is only a single comment that mentions Mullvad (other than yours that I’m replying to right now) that’s visible on my instance with no specific explanation why it’s better than other offers other than that you can pay with cash. If I’ve missed something, I promise you that it’s not in bad faith, it’s just that this distinction didn’t come through clearly.
I hadn’t heard about Mullvad before today and a quick look at their website made it look not very different from the fear-mongering you see with the others. Only after your comment I noticed the Why Mullvad VPN link at the very bottom that explains what they do differently. I’m still skeptical about some of the claims and especially of audits that they themselves requested but I’m happy to see that there are providers that seem to be more trustworthy than the ones that are constantly shoved down our throats and I’m definitely happy to have learned something new.
May I suggest that you write a top level comment that explains in detail why Mullvad is better than other services so OP (and others who stumble over this thread) has an easier time finding it?
Edit: minor typos and grammar
Oh I most certainly don’t have much faith in my local ISP. But I have even less faith in some VPN startup funded by venture capitalists who may or may not be cutting corners on security to save a few bucks on their ends even if they’re not actively malicious. At least my local ISP has been around for decades and is closely monitored by both a government agency and independent customer protection groups.
And yes, I do live in a place with a very strong regulatory framework. Our ISPs are bound by the EU GDPR and our highest federal court has confirmed multiple times that even saving connection metadata without a case-specific court order is illegal. Sure, they could break those laws but a commercial VPN provider can do just the same with the difference that not as many people would notice.
Sure, if you know that your ISP abuses your data, go ahead and do something. Though I would recommend changing ISPs before you give even more money to some other company who may or may not do the exact same thing to your data. I’m specifically not talking about TOR or some VPN that you host on your own. I’m talking about companies like NordVPN and Surfshark.
The analogy of locking your door doesn’t quite fit. Locking your door doesn’t cost you 10 dollars per month and doesn’t require you to hand your keys to the guy who sold you the lock.
A commercial VPN provider is just another random third party.
If you’re using a commercial VPN from a provider who can legally operate in your country, your national government can just as easily get that information from them as from your ISP.
While my threat model is not universal, it comes close, at least for the average user which OP seems to be from their question. In practice, there is very little unencrypted traffic these days and in the case of that traffic you will have to ask yourself if your (commercial) VPN provider is more trustworthy than your ISP.
If you need to ask if you need a VPN there’s a 99% chance that you don’t. There are certainly a few use cases for both commercial VPNs and TOR (see my other comment) but to even be aware that those apply to you, you probably already have enough technical knowledge to approach the question from the direction “I want to do XYZ, how can I be more secure?” and not “I’ve heard of VPNs, do I need one?”
Please note that the comment you’re replying to is leaving out a crucial piece of information: if your VPN provider is legally allowed to operate where you live, your government or law enforcement can get your data from them just as easily as they can get it from your ISP.
(Sorry for repeating myself but security is an important topic so I’d rather correct incomplete or misleading information in multiple comments than have someone miss the crucial part because they read only one sub-thread)
Your provider will just see encrypted traffic (mostly) anyway, so no it will not provide protection. The only thing that you’re now hiding from your provider is which servers you’re connecting to. Instead you’re showing that info to a VPN company whose main business practice is scaring people into buying a product they probably don’t need. Think about who you would trust more.
タイッツー is definitely taittsuu. Twitter doesn’t seem to use a katakana spelling. Your proposal of “tsuittaa” would be ツイッター. Same katakana but different order. There would be no reason to read Japanese from right to left. Might be an intentional pun though.
Edit: it’s https://taittsuu.com