Oh sorry its duckduckgo https://f-droid.org/en/packages/com.duckduckgo.mobile.android/ Its mostly a search engine app and browser. But if you go into settings under "More from DuckDuckGo there is a "App Tracking Protection" option. While this is on it will block and list out any trackers and what they were trying to do.
Thunder but it was the version off the google play store. Darklightxi was going to check to make sure the version up there was the version without Sentry which was a debugging tool for error logging.
Looks like "Functional Software" from the screenshot is sentry so that makes sense then. Is the version up on the play store an older release than v0.2.1+12?
Also those permissions are fine and totally make sense.
I haven't either, so not sure if it does or not. However see my edit. The apk doesn't have any trackers on it as far as I can tell so far.
Oh you know what its in the google play store version. I switched over when it became available. Welp going back to the apk lol.
I get apps aren't free but I would have gladly paid for the app to not have to deal with this type of thing.
Edit: Ok reinstalled the github version v0.2.1+12 and not seeing any trackers. Thanks yamapikariya, very good suggestion with the difference being the github vs playstore.
Yea its pure insanity and greed. This is just one of many examples of why I have dual piholes on top of ad blocking extensions.
Examples: I turned on the duckduckgo protection, opened the official app and visited a couple posts.
https://files.catbox.moe/sqbg87.jpg https://files.catbox.moe/nj7y8d.jpg
DROP TABLE USERS;
LOL I always used a picture of Nicholas Cage. Troll face should have been obvious.
My nuts would like to disagree with you.
Welcome to selenium. Hopefully your automation ran during a check in.....
Yes but think of it as a company with mostly infinite resources to infinity shitify
Bluewashed was a IBM term. Since IBMs main color is blue it went with everything. Bluetape, bluewash, blueshit, etc. Bluewashing to them was taking a program/app and doing a series of things to fuck it up.
- Strip out any code that might get them sued.
- Strip out any "bad" or "funny" comments in the code.
- If easily possible replace things like Apache for IBM HTTP server. Wildfly/Tomcat for IBM Websphere.
- Product must have an installer even if you have a product that the customer doesn't install. There's probably more that I blocked out but thats the tl;dr of it.
Oh speaking of Blueshit. If you wanted to order something like say a laptop dock for your new laptop. Try to order it through their "buy on demand" system.
Me: Ok its for my laptop so I can get work done.
Them: (Some asshat in Denmark) Denied, workstations are not allowed docking stations, mice, additional monitors etc.
Me: "hold my beer" Resubmit request: Lab equipment for the REDACTED lab, to support multiple monitors in the test environment.
Them: (Someone in France) Approved! You should see your equipment in 2-3 weeks.
Me: WTF??
undefined> When we got home, my dad was so upset that he beat me unmercifully with a set of jumper cables to teach me a lesson - you shouldn’t expose the family to such nonsense he said. Needless to say I will never rely on online bots for movie times with my family again.
LMAO you bastard!
One that inserts a comment randomly about jumper cables or the lochness monster
This right here. When the company I worked for got bought by them our code got "blue washed" by a team of....lawyer/dev hybrids for lack of a better term. They ripped the shit out of our code. It took us years to unshitify it.
I'm using a self hosted installation using docker thats not open to the internet. Its only open to my internal network. I would strongly suggest not making it public. Especially if you have datacaps on your ISP.
However being paranoid about being IP banned by Google I took it a step further. I'm using Gluetun https://github.com/qdm12/gluetun to host a docker container that runs proton vpn and allows other docker containers to connect to it and use the vpn connection. Also has the benefit of being a http proxy.