Yeah they can both get fucked. Cheers
bluejay
Was it Facebook that killed xmpp or Google? Legitimately asking because I've always seen that blamed on Google.
That's a very narrow definition of self hosting. Do you also not consider it self hosting if you use a cloud provider VPS? It relies on a 3rd party so I'd love to see the gymnastics that keep stuff on a VPS as self hosted but not Plex. If you don't consider things on a VPS as self hosted then I'm not sure what to say other than I disagree.
Also Plex is a staple of the self hosted community (though I prefer Jellyfin.) I'm wondering if they've confused self hosting and FOSS somehow
The apk isn't always what f-droid compiles. There's two scenarios where they publish the apk signed by the developer.
https://f-droid.org/docs/Reproducible_Builds/
It's one added layer of security to you, but to others it's a man in the middle that could be an extra attack vector.
If you don't trust the dev to put out an apk that's compiled from their public source why are you trusting any of your data with them?
How does f-droid solve this problem? From my understanding they confirm that the .apk
provided by the dev matches what compiles from source and run it through Virus Total. Those are trivial steps for a malicious dev to take to slip in something nefarious.
At that point you're relying on the community to check every commit for nefarious code $x. Not to mention they could simply build up community trust for some time before slipping in the code, since they'd effectively be burned once (if?) their very first shady code commit is found.
I can't imagine f-droid would go on the hook and say everything they build is also code reviewed for malicious stuff, right?
Fair point. I guess it boils down to if you prefer speed of update (obtainium) or the extra checks f-droid has in place and if you continue to trust that f-droid's stuff doesn't get compromised.
It's also worth mentioning f-droid's workflow far from guarantees there's nothing nefarious in a package. The bar looks to be passing virus total and then ensuring the provided apk matches source. If nobody reviews the source each time then every release could be the one that gets a nasty surprise.
Which developer?
E: Lol @ the ninja edit.
That's hardly a meaningful advantage for f-droid and the whole man in the middle risk you're exposing yourself to there. If you don't trust the developer to do the bare minimum of providing a release that matches source then why are you even installing their app? Satyr's response about developers getting compromised has way more weight in that conversation, but still falls short IMO.
Making sure the apk matches public source and running it through VT aren't going to catch a malicious apk that has the nasty bits buried in various commits but checks out in VT and matches the public source code. Sure, it'll burn them as a developer if/when they get caught, but how often does the community truly do code reviews on one-off Android apps? Not often enough to catch that kinda thing before it spreads without getting insanely lucky.
The developer of obtainium or the packages we're installing? I'll assume the former. If you're skeptical about obtainium you could still use it as a source to monitor && notify and then do your install manually.
Am I missing something? In my experience using Obtainium it pulls apks from sources I tell it to, usually the developers git releases and even sometimes f-droid repos. This app doesn't compile anything.
The main benefit is watching for updates directly from developers which, again in my experience, has been quicker than waiting on f-droid. You could even have it do just the notification and you can manually go download and install if you're the cautious.
My work has IMAP shut off and we can only use MAPI. There's a paid thunderbird plugin that adds MAPI support, which is likely what this person is hoping for natively 👍