Long time Android user, switched to iPhone when I broke the screen of my Google-gifted Nexus 3a. Final straw was the latest update. Every widget became bigger, with a border radius taking way too much space on the screen. Some widgets (e.g.: calendar) had part of the text hidden by the round edges. On top of that, I had a black-ish/brown-ish background and after the update all the UI was brown.
I honestly don't know what Google designers/engineers get paid to do if they can't even QA the software of one of their main devices.
I don't like Apple but I'm way happier now. Main complaint is the stupid photo/file separation. Just give me a normal filesystem please.
I did some research on PII being harvested by Android apps.
TL;DR: The EU could pay a couple of reverse engineers for 2 months and print money out of fines.
I was shocked to discover that (back then?) apps could just straight up read the list of user accounts on the phone without any special permission... Which is mostly fine, except many apps use your email/phone-number as account name or description. Same goes for Wi-Fi SSID and other things.
Bash is a godsend for quick debugging and I can see the temptation to start writing production code using bash. It basically boils down to a few things IMO:
- large bash scripts are hard to read/maintain
- complex modelling chains need intermediary points in the processing
On the latter point I can't count the amount of times where being able to query an athena database has saved a lot of headaches. The overhead from parquet and AWS bills pales in comparison. I'm sure almost everyone already agrees with me here but it's a classic case of the whole being more than the sum of its parts.
Then I'll get ready to get off the internet. Most of the internet is already unusable without allowing metric tons of questionable JavaScript. And to be honest, I'm not missing out on anything by not going to those places.
Any service willing to be that user hostile will already be telling people they can only view content in the app. IE stuff you can comfortably live without.
Honestly, that might be a good thing. Make the web too painful to use (with some cookie popups we are almost there) and I might spend my time doing more productive things.
If that's a thing, I'll just end up treating them the same way I do now with sites who don't make GDPR consent easy to deny : blacklist them forever regardless of content.
TL;DR: Router-based blocking is fairly effective for now, but not guaranteed.
Host-based adblocking works if advertising delivery comes from servers distinct from content, and is delivered directly to the client (that is, the end-user's web browser) rather than "rendered" on the server side.
There are reasons the independent ad hosting solution's come about, not a few of which revolve around measurement and fraud --- a freestanding ad infrastructure gives metrics independent of the ads venue. In a world in which trustworthy data are hard to come by, this had been strongly embraced.
The rise and success of host-based adblocking creates an evolutionary arms race between advertisers and ads-averse publics. There are several possible countermeasures:
- Advertising can be intermixed with content, either with ads coming from content servers, or content coming from ads servers.
- Ad payload and content bait can be pre-rendered on the content delivery site. The user no longer has a separately-identifiable data stream to discriminate the advertising content.
There are other adblocking methods. Some rely on determining what parts of a web page (the "DOM", or document object model) correspond to advertising. Typically, dimensions (ads are sold in standard sizes), element names (usually HTML attributes including CSS class and ID values), or display attributes (fixed or floating elements especially) are used. The story's complicated. Browser-based adblocking typically includes several of these heuristics, in addition to host-based blocking.
And there are new technologies which will make even those methods less effective. (Look up direct canvas rendering as a leading option.)
Router-based blocking is virtually always to determining the source of a data stream, but not its content (thanks in part to the security and encryption now part of most Web traffic, thanks to HTTPS and SSL/TLS security protocols). PiHole and its equivalents have been largely effective to date, but still leak some ads, and may be less effective in future.