Hacker Newsnew | past | comments | ask | show | jobs | submit | orkj's commentslogin

> what is an auth description?

They are probably referring to the text in the basic auth "pop-up" which is usually set like

WWW-Authenticate: Basic realm="my text"


Yep!



Yeah. This and GShock Move. IMO pretty low effort, I'd want basic smart watch / band functions like full sensor suite, notifications, nfc. Literally just need Casio to copy a miband (which goes on sale for like <30 USD) / or fitbit and slap it in affordable f91w style body. TBH part of me feels sad / thinks JP electronic decline = they're simply not capable. Fingers crossed for day Casio figures out f91w shaped smartband/watch where the buttons can control media or be programmable like pebble. I'd pay 200+ for fancier housing, but not watch+pedometer.


This sounds like a great idea for a feature for the OP. Cool feature to kickstart the database. Take a photo. Something something AI. 150 rows filled in


Seems like general good advice, but for me it was simply a matter of `atuin import auto`. The initial response was similar (as in, here is no history, where is my history, this is useless). Then I read this page where it said to import, which seemed relevant:

https://docs.atuin.sh/

Not sure if that was the missing case for you, but just in case someone reads this and gets the same feeling as me


The description of the repo is "A compendium of absurd "open-source" licenses." Which I think is relevant to change the title to (the addition of the word "absurd" specifically.

The word "bad" is also used several times, and can be argued is also useful to put in the title


I believe I wrote the title verbatim when submitting. Admittedly, that was a few days ago so I'm not entirely sure.


I think adjectives like that are often filtered out of the title automatically, and take dang or someone else's intervention to put back in


Tangentially related: I have been having a ton of fun programming for the sensor watch lately: https://www.sensorwatch.net/

Granted it's far from as smart as pebble, but that battery life... ♥


Built https://violinist.io, a PHP / composer update service in 2017 and it passed that figure probably something like 2021?


Does something like this exist for my phone, android specifically? Any good recommendations?


There's netguard[1], although most of the convenience features are behind a small payment.

[1] https://netguard.me


I have heard good things about this one. But i think this one of those no root firewalls that uses the vpn, so I figure this means I can't use a VPN at the same time.

An alternative android root only option is afwall+ which allows blocking on lte, WiFi, lan, and VPN separately, and script access to iptables. Not sure how actively developed it is, but it seems to work ok.

*edit: Seems to still be active, open source, and available on fdroid too.

https://github.com/ukanth/afwall


Another issue I have with using the VPN in general is that it breaks Android Auto for me.


Netguard is fantastic, although it takes a while to get a safe setup working. I'm blocking traffic by default and get to see all the blocked connection attempts - the extent to which apps transmit data to various parties is depressing. Netguard should be a standard OS feature.


I didn't want to pay without testing the features first, so I have rebuilt the app (it is opensource) with Pro enabled, so I guess that's an option if you want to avoid payment. Updates are a problem then though. Once I tested it I gladly paid (more than requested) to support the development. I never got around to reinstalling it though, so I'm still on an older version.

NetGuard is simply awesome. The piece of mind when I know which servers the apps are contacting, and being able to block their access to the net by default, is just great. The rules could be made a bit more easily adjustable (it would be nice if I could block `*.firebaseinstallations.googleapis.com` everywhere, even if other traffic is allowed for the app), but I'm just nitpicking now. Highly recommend it.


"Small payment" is an understatement :)

"You can get all current and future NetGuard pro features (including updates) without Google Play services for the GitHub or F-Droid version by a one time donation of € 0.10 or more. If you donate 7 euros or more, you can activate the pro features on all Android devices you personally own, else you can activate the pro features one time only."


Can confirm that after donating > 7€ I am still able to unlock pro features on new devices 8 years later


And it is also opensource, so you can install it by yourself. But it is worth it (for me) to pay something to support the developer.


GrapheneOS can at least block internet traffic for specific apps. But can't do it for port ranges or specific domains.


Sadly all real firewalls need root. I was using AFWall+ for a long time it has neat controls for every app to allow or deny Wifi, Cell or LAN (if you have). It is a iptables/nftables frontend so you can customize the rules to your heart's content: https://github.com/ukanth/afwall Works from Android 2+

Without root only VPN solutions like Adguard are available.

EDIT: if you want neat stats: Glasswire has an Android version. I have only used the beta so I have no idea about its current state. Might be worth checking out though.


ex-AOSP and rethink dns+firewall dev here

> Sadly all real firewalls need root

What do you mean by a "real" firewall? It is very much possible to build a userspace firewall in Android using the VPN APIs.

On Android, ROMs like GrapheneOS, Lineage, and CalyxOS have firewalls built-in.

> Glasswire has an Android version

Note though, Glasswire was recently acquired by another company: https://archive.is/KW2R3


I thought parts of the Android OS can by-pass the VPN so the firewall becomes ineffective against blocking Google, OEMs, and others that have root. Wouldn't the VPN API being used as a firewall also prevent one to use a VPN client at the same time?


for the latter, Rethink can be configured to work with eg. a wireguard VPN because it has a built-in wireguard client.


> Note though, Glasswire was recently acquired by another company

Ah that's why the premium stuff is now free. I was wondering. Let's hope it's not the first sign of enshittification.

> What do you mean by a "real" firewall?

In my experience the "block all non VPN traffic" options in Android don't work reliably. iptables does however.

It's a sad state that you cannot even set a static IPv6 on Android without root.


> In my experience the "block all non VPN traffic" options in Android don't work reliably. iptables does however.

Both (iptables/nftables and VPN APIs) have to be enforced by the Linux Kernel, which is subject to the same "Androidisms", if that makes sense.

root, in fact, opens up a gaping hole in that, it totally compromises Android's security model. IMO, it isn't worth to root Android just to run iptables (just because it seems like iptables is what makes a firewall).


IMHO Android's security model is incredibly flawed anyways. I don't even need root to access stuff I shouldn't have access to on my Mediatek based phone because the firmware has tons of gaping security holes anyways.

I think device you don't have root on isn't really yours and should be treated as a lease.

But you are right, when Wifi/Data is on at boot even the -tables might not get updated fast enough so stuff might get through.


The app "Rethink: DNS + Firewall + VPN" has similar features.


I really like Rethink DNS. I have learned many things from watching it (such as I think Signal is compromised by some five-eyes "crossing the border" fuckery.)


I agree with the first sentence. I cannot even begin to comprehend what semantics you were trying to convey with the second sentence however. I am also lacking all context to be able to understand (compromised in what sense, by whom and to what degree? which border? what is "fuckery" defined as?).

I appreciate you trying to add to the discussion but in this case you leave me with way more questions than I started out with which I personally perceive as an unwanted mental overhead.


Sorry I don't check HN very often these days.

What I mean is by watching the IPs, I see a lot of cross-border ingress/egress when it shouldn't be necessary. It's not proof, but an indicator of probability to me, that echelon style mechanisms are being used.

If you are unaware of echelon and related programs, essentially, since it's illegal for the US (officially at least) to spy on it's own citizens without a warrant, instead they let an "ally" country like the UK spy on Americans and then "share the data", essentially another abuse of third party doctrine.

I hope that helps clarify.


> such as I think Signal is compromised by some five-eyes "crossing the border" fuckery

Would you mind elaborating?


TrackerControl is great too. Both are FOSS and can be used in the backgroud for using a custom DNS server and blocking certain categories of domains.


AFWall+

Switched to it from NetGuard mentioned above.


My non-root solution is to use NextDNS or ControlD with "private DNS" (DNS over TLS).

Doesn't stop direct IP connections, but it's good enough.

I also have the CLI installed on OpnSense so DoH is enforced for all devices on my LAN as well.


It's mentioned in one of the first references in this article:

https://boehs.org/node/everything-i-know-about-the-xz-backdo...

IRC activity


This made me think of http://prose.io which I remember was a thing 10 years ago. Pleasantly surprised it still is a website, not sure if it still works. But I remember the basic idea being similar, except Jekyll only.


Oh yeah, I loved Development Seed (the team that created prose.io) back in the day. They went on to create Mapbox.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: