I did nothing and I’m all out of ideas!

  • 1 Post
  • 25 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle







  • disable this system security feature temporarily,

    This should be - if I’m not mistaken - possible using the pip env var I posted about earlier, like this:

    PIP_BREAK_SYSTEM_PACKAGES=1 sudo apt install howdy

    Or exporting it for the current shell, before running the installation

    export PIP_BREAK_SYSTEM_PACKAGES=1

    But I personally highly discourage it, because - AFAIK - if it even works it will mess up the deps in your system.


  • I’m no python expert but reading around it seems your only real solution is using a virtual environment, through pipx or venv as you already had found out, or using the

    --break-system-packages
    
    * Allow pip to modify an EXTERNALLY-MANAGED Python installation
    
      (environment variable: `PIP_BREAK_SYSTEM_PACKAGES`)
    

    pip flag which, as the name suggest, should be avoided.

    EDIT: After rereading I got your problem better and I was trying to read the source for Howdy to see how to do it, so far no luck.





  • Mechanize@feddit.ittoLinux@lemmy.mlproton VPn
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    6 months ago

    Considering you are not using the Flatpak anymore it is, indeed, strange. The only reasons I can think of are: your network manager is using the wrong network interface to route your traffic ( if you go on an ip checking site like for example ipinfo do you see yours or the VPN’s IP?) or that you have WebRTC enabled and the broadcaster is getting your real ip through that.

    For the first case it can get pretty complicated, but it is probably an error during the installation of the VPN app or you set up multiple network managers and it gets confused on which one to configure. You should also enable the Advanced Kill Switch in the configuration.

    For the second case you could try adding something like the Disable WebRTC add-on for firefox and check if it works. Remember to enable it for Private Windows too.

    The last thing I can think of is that you allowed the broadcaster to get your real geolocation (in firefox it should be a small icon on the left of the address bar), or you are leaking some kind of information somewhere: there are a bunch of site that check for ip leak, but I don’t know if that goes too deep for you.
    If you want to check anyway the first two results from DDG are browserleaks and ipleak. Mullvad offered one too but it is currently down.

    EDIT: If you enable the Advanced Kill Switch, and the app is working correctly, internet will not work while you are not connected to a VPN server or until you disable the switch again, so pay attention to that.






  • Because, as pointed in the page, Servo is being developed as a(n embeddable) Rendering Engine, not as a full blown end user Browser.
    Its alternatives are not Chrome, Safari or Firefox, but Webkit, Blink and Gecko

    There’s an example GUI called Servoshell, but it is more of a testing ground and example on how to embed the engine in an app than a serious alternative to anything currently in the market.

    Already this kind of work is difficult and daunting. Adding to it a full GUI would make it completely impossible for the current size and financial backing Servo has.

    Big words aside it just means that Servo wants to be only one of the parts that compose a real browser: the one that takes HTML, Javascript, WASM and translates them into the things you see on your monitor. All the user facing functionality are left to the devs of the app that embed it.


  • Yeah. GDPR should have been implemented as a mandatory part of HTML or even HTTP that interacts with a builtin browser feature.

    Well, it kind of is. The Do Not Track header has recently seen a court win in Germany (source):

    It turned out that the judge agreed with vzbv, ruling that the social media giant is no longer allowed to warn users it doesn’t respect DNT signals. That’s because, under GDPR, the right to opt out of web tracking and data collection can also be exercised using automated procedures.

    And it is basically the same in California too Source

    GPC is a valid do-not-sell-my-personal-information signal according to the California Consumer Privacy Act (CCPA), which stipulates that websites are legally required to respect a signal sent by users who want to opt-out of having their personal data sold.