• 1 Post
  • 91 Comments
Joined 24 days ago
cake
Cake day: September 14th, 2025

help-circle
  • tal@olio.cafetoTechnology@lemmy.worldThe Web is Going to Die
    link
    fedilink
    English
    arrow-up
    1
    ·
    16 minutes ago

    That depends on how you define the web

    Wikipedia:

    https://en.wikipedia.org/wiki/Gopher_(protocol)

    The Gopher protocol (/ˈɡoʊfər/ ⓘ) is a communication protocol designed for distributing, searching, and retrieving documents in Internet Protocol networks. The design of the Gopher protocol and user interface is menu-driven, and presented an alternative to the World Wide Web in its early stages, but ultimately fell into disfavor, yielding to Hypertext Transfer Protocol (HTTP). The Gopher ecosystem is often regarded as the effective predecessor of the World Wide Web.[1]

    gopher.floodgap.com is one of the last running Gopher servers, was the one that I usually used as a starting point when firing up a gopher client. It has a Web gateway up:

    https://gopher.floodgap.com/gopher/

    Gopher is a well-known information access protocol that predates the World Wide Web, developed at the University of Minnesota during the early 1990s. What is Gopher? (Gopher-hosted, via the Public Proxy)

    This proxy is for Gopher resources only – using it to access websites won’t work and is logged!



  • tal@olio.cafetoTechnology@lemmy.worldThe Web is Going to Die
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    5 hours ago

    How many of you out there are browsing the web using Gofer?

    Gopher predated the Web.

    I do agree that there have been pretty major changes in the way websites worked, though. I’m not hand-coding pages using a very light, Markdown-like syntax with <em></em>, <a href=""></a>, and <h1></h1> anymore, for example.


  • It’s been a long time, but IIRC Windows’s file dialog also remembers your recently-used files for quick access in the file dialog, and I assume that Explorer has a thumbnail cache.

    It looks like GTK 3 has a toggle for recently-used files:

    https://linux.debian.user.narkive.com/m7SeBwTP/recently-used-xbel

    While the guy sounds kinda unhinged, I do think that he has a point — he doesn’t want activity dumping breadcrumbs everywhere, unbeknownst to him. That’s a legit ask. Firefox and Chrome added Incognito and Private Browsing mode because they recorded a bunch of state about what you were doing for History, and that’s awkward if it suddenly gets exposed. There should really be a straightforward way to globally disable this sort of thing, even if logged history can provide for convenient functionality.

    Emacs has a lot of functionality, but I don’t think anything I use actually retains state. If emacs can manage that so can oyher stuff. Hmm. Oh, etags will store a cached TAGS file for a source tree.

    thinks

    Historically, bash defaulted to saving ~/.bash_history on disk. Don’t recall if that changed at any point.

    There’s ccache, which caches binary objects from gcc compilations persistently.

    Firefox can persistently cache data in the disk cache or for LocalStorage or cookies.

    System logfiles might record some data baout the system though they generally get rotated out.

    Most of the time though, I don’t have a lot of recorded persistent state floating around.








  • I believe that the point of the Czechia situation was that it was a modification to the constitution; this will have a higher bar to change than would be the case for simply enacting an ordinary law. The idea was to entrench the status quo behind the bar for constitutional modification.

    kagis

    Looks like it’s a 60% supermajority in each legislative house:

    https://en.wikipedia.org/wiki/Constitution_of_the_Czech_Republic#Amending_the_Constitution

    With reference to the provision of the article 39, paragraph 4 of the Constitution, which states that “for the enactment of a constitutional act, 3/5 of all deputies must agree, and 3/5 of senators present”, changing the constitution is a more difficult procedure than changing an ordinary statute, making it an entrenched constitution in the typology of constitutions. Despite the tradition of entrenched constitutions throughout Czech history, some voiced the opinion, during the preparation of the Constitution of the Czech Republic, that this one should be flexible.

    So to produce such an effect, if there are laws that would prohibit bans on end-to-end encryption, say, those laws would need to be constitutional law or similar in an EU member state where such a law has a higher-than-ordinary bar to change.


  • linux phone

    I know that given this community, a lot of people are going to be on a Linux phone already.

    But there are some very real drawbacks to Linux phones in 2025. It won’t be a practical replacement for most people.

    • The hardware is not remotely-competitive with high-end hardware that Android can run on.

    • Everything I’ve seen has suggested that power usage isn’t as good, probably because Android has had shit-tons of engineers working on cutting power usage for many years.

    • Some of the reason that I’d want to use a phone in the first place is for access to the Android app ecosystem. Like, that one app that your employer or bank insists you use or you want to use to update firmware on some Bluetooth device because the vendor doesn’t support fwupd. Maybe it’s possible to use Waydroid and a Linux machine for some of that; I don’t know about all.

    • GNU/Linux has a large software library, but a lot of it is not designed around a touch UI.

    • One major benefit of Android is that it does a lot to help eliminate a couple things that the general population has had trouble with. The harm from installing malware is mitigated by more-or-less isolating apps. A lot of users just don’t understand the concept of managing memory usage; Android just suspends apps transparently. A lot of users apparently don’t have a great understanding of a filesystem, and the Android app ecosystem tends to hide the filesystem.

    And you may not care for your own use, but without scale, it’s hard to get support from hardware vendors and such.

    That being said, I remember 25 years back or so when Linux was “never going to be a real server OS”, when it was never going to have games, when it was never going to make it big in the embedded world, and so forth. It often took time, but it inexorably showed up. And the kernel, at least, made it big on smartphones. GNU/Linux can be pretty hard to stop in new markets. But…it can also take a while to get there.



  • I don’t see why it would need to be affected.

    The constraint to require a valid signing isn’t something imposed by the license on the Android code. If you want to distribute a version of Android that doesn’t check for a registered signature, that should work fine.

    I mean, the Graphene guys could impose that constraint. But they don’t have to do so.

    I think that there’s a larger issue of practicality, though. Stuff like F-Droid works in part because you don’t need to install an alternative firmware on your phone — it’s not hard to install an alternate app store with the stock firmware. If suddenly using a package from a developer that isn’t registered with Google requires installing an alternate firmware, that’s going to severely limit the potential userbase for that package.

    Even if you can handle installing the alternate firmware, a lot of developers probably just aren’t going to bother trying to develop software without being registered.



  • The Czechs got upset at EU-level efforts on gun control — Czechia has permissive firearm law — and passed an amendment to Czechia’s constitution in 2021 guaranteeing certain firearm rights in Czechia. If the EU passed a directive that conflicted with it after that point without getting Czechs to approve an amendment to their constitution, Czechia would immediately begin violating the directive, which raises the stakes for people who wanted additional restrictions EU-wide.

    One imagines that the same tactic could be used in other areas; if one or more EU members prohibited restrictions on end-to-end encryption or the like, it’d create a legal bar that would first need to be undone to create a restriction EU-wide.

    That being said, if this sort of hardball tactic gets done too frequently, it’d make it really difficult to legislate at the EU level, because you’d have one state or another creating legal landmines all over.

    And any other individual member could still impose their own state-level restrictions on end-to-end encryption in such a scenario — it’d only create an impediment to EU-wide restrictions.