pimterry

@pimterry@lemmy.world

This profile is from a federated server and may be incomplete. Browse more on the original instance.

pimterry,

Hahaha, that might be British-specific I guess? I always assumed it was universal. Just means “a long time”.

www.merriam-webster.com/…/donkey's years

pimterry,

Previously any user could modify these certs directly, even on vanilla OS images from Google themselves, without installing Magisk or any tools at all, just by writing to disk. Right now, that’s widely used and included in the setup guides for lots & lots of tools. All of that will start breaking for users when Android 14 arrives.

I totally agree it is possible to work around this restriction, but it’s going to be significantly more complicated, and those changes will only be required because the OS used to let you read & write these files all by yourself, and now it doesn’t.

I don’t think Android should move further in a direction where it’s impossible to directly control anything unless you install a 3rd party modification to the root daemon. That’s not a good result. These are important settings and the OS itself should allow you to control them (behind reasonable safeguards & warnings, but still).

pimterry,

This is modifying system CA certs on your own device, with root access. There’s plenty of examples in the article, but most commonly you’d want to add your own CAs so that you can intercept and inspect your own network traffic. There’s a wide world of developer/researcher/reverse engineering tools that do exactly that, there’s a demo here: httptoolkit.com/android/

It could plausibly be malicious, but it requires direct root access on the device, and if somebody has root access there’s already far more malicious options available to them so it’s not a meaningful threat in any sense.

pimterry,

To be clear - even in that world, not having WEI would make you much more suspicious than a ‘normal’ user, so you’re effectively describing every Firefox and/or Linux (etc) user seeing captchas all the damn time. If Cloudflare used this as a signal, that’d be a captcha for 20% of websites.

Try using Tor today and see how inconvenient the web becomes. Just ‘not blocked’ doesn’t mean you get a reasonable experience.

The only healthy route for the web is fair access and free competition between clients. WEI sets that on fire.

pimterry,

I’m the maintainer of HTTP Toolkit - it’s not a Postman alternative (it’s an open source project focused on intercepting & debugging traffic, not sending it) but I’m actually working on building a UI for exactly this right now, so this thread is perfectly timed!

Is there anything that any of you really love or hate about any of the tools suggested here?

What core features beyond just “edit method+URL+headers+body, send, view the response status+headers+body” are essential to you?

Anything you wish these tools could do better?

I’m planning on taking the client functionality live within a few weeks max, so if you want to help your perfect Postman alternative come to life now’s the moment 😁

pimterry,

Do you have a reference for that? From all the documentation I've seen elsewhere, that's not true. There's no exclusion for waterproof devices, and everything has to be possible with tools a normal person can buy (you might need to go to a local hardware store, but no unique specialist expensive kit).

The full law is here: https://www.europarl.europa.eu/RegData/docs_autres_institutions/commission_europeenne/com/2020/0798/COM_COM(2020)0798_EN.pdf. It only mentions 'water' 3 times and none of them relate to waterproof phones (they're talking about batteries of waterbourne transport & environmental impact of water use) so I don't know where that's coming from.

It's totally possible to make waterproof phones with removable batteries - Samsung did it with the Galaxy S5 (IP67 - 1 meter under water for 30 minutes) way back in 2014 and there's lots of other examples. It's just not quite as cheap as glueing everything together.

pimterry,

Thanks! That's interesting to see, looks like this is an amendment? I'm not totally sure how that bit of the legal process works here.

I'd be surprised if this is intended to apply to mobile phones though - very few phones are used primarily in an environment of water immersion. They're designed for incidental protection, but the regular day-to-day use case is pretty dry! I'd read that as intended for things like watersports & diving equipment.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • khanakhh
  • InstantRegret
  • GTA5RPClips
  • magazineikmin
  • thenastyranch
  • rosin
  • Youngstown
  • tacticalgear
  • slotface
  • ngwrru68w68
  • Durango
  • kavyap
  • DreamBathrooms
  • Leos
  • osvaldo12
  • everett
  • cubers
  • mdbf
  • cisconetworking
  • tester
  • normalnudes
  • anitta
  • ethstaker
  • modclub
  • megavids
  • provamag3
  • lostlight
  • All magazines