Thanks for the confirmation!
andreluis034
I think bitwarden fills all of your requirements.
If you use [email protected] to link a user, lemmy will instead create a link for the instance you are currently using.
GrapheneOS uses exec spawning by default, but it’s pretty trivial to disable and it does speed things up (at a slight cost to security).
Even with that option disabled the slow down was significant enough. Maybe the mid-range chip used in the Pixel 5 wasn't helping, but still... Overall the phone felt significantly quicker when switching back to stock.
I think using AOT rather than JIT compiling might be the cause of the slow installs, but I’m not sure (and I’ve not really noticed a problem myself).
That's it, I remember reading in their forums one of the mods(or devs?) mentioning this.
In Europe I would say debit cards are way more common than credit cards. It's very rare to see someone paying with a credit card.
I ran GrapheneOS on a pixel 5 but ultimately went back to stock.
GrapheneOS was considerably slower on my phone. Apps took a bit longer to loader, but the worst was installing APKs, it takes so much longer compared to stock. Some apps (e.g. revolut) took more than 5 minutes to install, it was crazy.
I think I figured out the reason. Thumbnail previews are generated by your local instances, in the first post I've linked, the meme is actually a link to https://i.imgflip.com/7rgf1k.jpg which the instance downloads and generates a thumbnail for.
On posts that are actual images uploaded to the instance (e.g. the second link I posted), it looks like that lemmy just reuses the URLs.
I’d know if someone had any access to my phone
This is really a bold claim. How or why makes you so sure of that?
If the attacker/app manages to get some application running in the background as root, how would you know that they had access to your phone?
Am I naïve for thinking that manufacturers stopping support for devices, then claiming it affects your safety, is just to sell more phones?
Yes you are.
Vulnerabilities are constantly being found in the software stack used by Android, if you are running vulnerable software you're increasing the likelihood of some malicious app (or website, file, etc...) taking advantage of the vulnerability. The consequences of vulnerability vary from being able to fingerprint your device when it's not supposed, to escalateling privileges to root or even kernel mode. Although the later are significantly rarer.
and had zero security issues in a dozen years
That you know of... If the vulnerability is successfully exploited, the likelihood of you noticing are close to zero.
You could always flash a custom ROM to install the latest security patches, but you would still be missing the security updates for all the closed source components (such as the bootloader, device drivers, etc...). Not to mention all the security implications (good or bad) that comes with installing custom ROMs.
What kind of "control" do you mean? Your posts/comments get replicated across all the other instances. You can't really "guarantee" a delete, since the other instances might just ignore your request for delete.
Considering how big and relevant YouTube is, I don't see it getting replaced by PeerTubr. The alternative at the moment are apps like ViewTube which is a custom front-end for YouTube that removes all the ads and tracking
And now it's not working, I think.