★ 𝐑𝐮𝐢𝐤𝐤𝐚𝐚𝐏𝐫𝐮𝐬 ★

Web & Software developer. I also love pizza🍕, cats🐱, and computers🖥️.

The Astolfo pfp is just temporal!

🎵 𝘖𝘯𝘦 𝘥𝘢𝘺, 𝘐 𝘩𝘰𝘱𝘦 𝘐’𝘮 𝘴𝘰𝘮𝘦𝘰𝘯𝘦 𝘺𝘰𝘶’𝘥 𝘮𝘪𝘴𝘴. 🎶

  • 5 Posts
  • 21 Comments
Joined 1Y ago
cake
Cake day: Nov 14, 2023

help-circle
rss

This proposal is meaningless bullshit. I can’t believe we are one of the the oldest species on earth and they keep coming up with such ridiculous ideas. This is a NO from me for this ridiculous proposal.


This is the sad true. Nowdays, sdk haves tons of these analytics and telemetry. According to Dart documentation we can disable its analytics. And the first time the CLI is executed, this analysis is not used (respecting the opt-out concept). Is at your discretion trust Google’s words (or investigate Dart’s source code to find out if it is true or not, or if there are even other unethical means, although I find it a bit unlikely). If you wanna do the second, You can use something like CatFish to help you.


You’re right. Maybe I should have put more information about it. The idea was perhaps to find out what information the Lemmy community could share. I would like to be as experienced as other community members, but I’m not very expert yet :(


I think C and C++ are safer options, because GNU doesn’t use this technology in particular. But Dart are obviously using opt-out telemetry. You should disable it manually. Idk the case of Ruby, sorry :(



That’s true (also with other software that isn’t for development). But this is not the only tool there. Just see crates.io and pkg.go.dev registries.

I think the only way to get “anonymously” some modules, libraries and frameworks is trough Tor.



Debate: Go vs Rust (Toolchain Privacy Practices)
This post [is not related other previously published posts](https://lemmy.ml/post/10395140). But I want to know **your opinions**. This debate does not focus on _"which technology is better"_ or _"which has better support"_, rather it focuses on which of these two technologies seems more acceptable in terms of **privacy policy** and **user information management** (on his respective toolchain, compiler, etc). * [Golang homepage](https://go.dev/). * [Rust homepage](http://rust-lang.org/).
fedilink


Sorry my english spell is a shees.

I corrected my post


Rust is my “alternative”. But I see Rust pretty hard (is a system level programming language lol) and differently scoped.

I like some Go characteristics like garbage collection, simpler syntax, crossplatform, 1 second C bindings, and so on.


That’s a pretty good explanation about. Care if you reply the source of your information? I’d wanna keep it as reference <3

Thank you!


Lmao Hope you’re not right (I mean, I hope no telemetry is imposed on my favorite programming language). But as you said, Google tracking/survillance history say that people privacy really don’t concerns him


So, that means telemetry is optional? How I ensure is currently active or not? Just wanna an explanation. I (as I said) searched about this thing and got almost nothing :(

it’s where all of the mod version is cached, so any time anyone builds a Go package from source, calls are made to the mother ship.

I don’t understand it at all. Why I’ll need something like that?

Thank you for your response!


I searched A LOT about this information and got no information (but misinformation) about. Plus just look at this decision.

What that means? I need to do a torsocks to every single command I type? (That last is just sarcasm. Please, I’m not so paranoid (by now))


Golang telemetry (again)
There are no "news", but I'm worried about this business actually. I'm in knowledge [that post already exists](https://lemmy.ml/post/749690) but I'm not clear at all. Resuming: Google is trying to add telemetry to Go's toolchain (such as .NET and Dart/Flutter). It also added the `GOPROXY` environment variable that uses the Google's Go proxy to... Just collect more user data? I'm a pretty beginner Go dev, but I'd like a toolchain without these telemetry or at least some instruction of how to opt out this thing. > Sorry for repost, but I don't find enough information in any other place. :(
fedilink

Yeah! You see it? At the end of the day, everyone, even if they want to become independent from these invasive policies, must accept and eat these policies.


Privacy Practices in public registries for developers
Okay, it may sound like a personal issue, but I disagree with the privacy practices in developer tools. And I'm not talking about [VSCode issue](https://github.com/Microsoft/vscode/issues/60#issuecomment-161792005), but about other more _elemental_ development tools. For example, the privacy policy of [npmjs.com](https://docs.npmjs.com/policies/privacy/), [pkg.go.dev](https://policies.google.com/privacy) (Google's privacy policy lol), [hub.docker.com](https://www.docker.com/legal/privacy), and these public registries for developers, have some **questionable privacy practices** as well. I wanna know your opinions about.
fedilink

edit: a single web search reveals that Flutter has indeed Google telemetry enabled by default. developing your web searching skills is a good habit for developers.

I already know this, just flutter config --disable-analytics solve this problem.

But there are more than this. For example, Flutter itself doesn’t work correctly. It needs the Android SDK (that is installed separately). And with this you need to accept the licenses and other stuff. That’s the point.

compile the most basic of flutter apps or some demo and see if the app makes any kind of request to the internet.

How can I intercept this traffic quickly?


Telemetry in Flutter?
Yeah, I'm sure this is a pretty newbie question, but here I go: What ammount of telemetry have **Flutter** by default? And there is a way to deactivate it? I wanna learn this technology to develop some Mobile Applications, but I'm (honestly) worried about this, because you know, _Google dirty techniques_, etc.
fedilink

I forgot Firejail and Bubblejail. These are good tools. I mean, only need to learn use it xd But actually sounds good.


These are pretty good news! Thank you for explain in a better form the context of situation.

Actually, sounds cool. Now feel sure I can run cs1.6 no steam with 18 trojans detected by VirusTotal from a pakistani server and don’t scare me because I will use Bottles into a Arch Linux Virtual Machine lmao (this is just a sarcasm, in any case, I also bought cs1.6. I think there are only hackers anyways)


Because Bottles is distributed via Flatpak, which is…

Safe. Sandboxed.

Because…

Your bottles are isolated from the system and will only hit your personal files when you decide.

The full-sandbox is provided and pre-configured only using the Flatpak package (highly recommended).

All other packages still have access to the partial sandbox which isolates the bottle files and prevents them from accessing your homedir.

(This is a extract from the official homepage in the last section)


I don’t trust in any Windows Application at all, but I think this doesn’t mean I need to live under a rock. This is the reason because I open this Post. So thank you for you help and your time :) You are very cool.

I think is a good option play videogames in a Virtual Machine when is possible. But I just want to feel “more secure” when I need to play in my host machine, for example, using sandboxing.


So… That means the current only way to keep the main system is through Virtual Machines?


I already have heared about Bottles sandboxing capabilities, but, how this differs from standard Flatpak sandboxing system? Is really secure execute **any** Windows Software using Bottles? (yes, _every machine have his vulnerabilities_ blah blah)
fedilink