• 1 Post
  • 36 Comments
Joined 11 months ago
cake
Cake day: June 8th, 2025

help-circle
  • tl;dr

    • CNC aluminum Chassis (matte black)
    • 74wh battery
    • wildly-efficient Panther Lake chips
    • Ubuntu available pre-installed
    • 20hr. battery life.

    Another interesting bit from the presentation: Framework revenue is steadily-growing, in a market where many consumer OEMs may not exist much longer due to AI scams and razor thin profit margins. Maybe they can see the writing on the wall and pivot into this “niche” market as well? Increased revenue is allowing them to invest more in development, including the first custom-made display explicitly for Framework devices.

    Overall excellent advancements, and a promising future for the company, despite market conditions.






  • I’m yet to find a web-based RSS reader that’s not terrible. NewsFlash for Linux and NetNewsWire for Mac are the best I’ve seen but both are local. They both also support syncing to a FreshRSS server but I’ve never had success.

    FreshRSS has a horrendous interface, IMO. Can be fixed but it is way way more complicated than it should be.

    Currently I’m running Miniflux but it doesn’t seem to be able to refresh itself or sort articles chronologically.

    Edit: MiniFlux seems to have fixed itself somehow. I’m using FluxNews on Android. But it doesn’t support “reader” mode, which I find to be a vital part of any RSS service.








  • Halfway through you shifted to encrypted local backups

    I never shifted anything. I was talking about encrypted backups on a server. These can be encrypted locally before being synced to a server.

    you first called ‘single-party encryption’

    Nope, you literally just made that up. I didn’t say that and I don’t even know what that means.

    I said it wasn’t realistic in the context of the selfhosted backends we were discussing.

    …but it is.

    And yes, lots of apps do encrypted backups because they are backup apps. Colota isn’t.

    My suggestion was that it could be

    The existing export is for tools like QGIS or selfhosted backends and encrypting that data would break that use case entirely.

    You already have local backups that could be encrypted and then synced to a general storage server.

    Encrypted import/export for backup is a separate feature that doesn’t exist yet, so there’s nothing here that’s badly implemented.

    I said literally nothing about your implementation. You’re imagining things. Please read more attentively.








  • If a server gets hacked where a user sent data from Colota there is nothing the app can do about it or to prevent it

    It can’t prevent the hack, it absolutely can protect the data, and make it useless. That’s the entire purpose of encryption.

    I don’t think it’s the job of an Android app to protect a server from government hacking attacks.

    Again, it’s not supposed to.

    Also the app is offline-first. There is no server needed unless the user specifically configures that.

    The server is needed for the same reason a server is needed for anything: to back up the data.

    If you don’t want to implement it, that’s fine, I respect your decision, but there’s no reason to come here pretending not to understand its purpose.