Hacker Newsnew | past | comments | ask | show | jobs | submit | uallo's commentslogin



Settings => Search for "Autoplay" => Click "Settings..." => For "Default for all websites" select "Block Audio and Video".


Thank you, I could have sworn I had that active, but for some reason it was "audio only".


The about:config settings which you can look up:

    media.autoplay.blocking_policy
    media.autoplay.default
I have mine set to 2 and 5 respectively.


FWIW, blocking policy on 2 blocks (at least some, Qobuz for me) streaming sites and bandcamp (bandcamp being the more problematic one as every band is on their own subdomain and you can’t (I think) just allow all of them).


I seem to have no problems streaming from either Bandcamp or Qobuz, the latter which I'd never heard of before. (or as far as I'm aware any other site) I intentionally want to click-to-play on every site out there, so perhaps you mean "blocks autoplay" or somesuch?


I want to always play full albums, the way 2 is implemented seems to require a click for every track


nod We have different use cases, for my browser use I'm using it as described mainly for one-off playing of content (think like watching a single video from a hotlink, checking out a single track or two from a new band, etc.). For streaming I'm a shoutcast/icecast oriented person, tried and true. :)


Thanks, I also noticed they allowlisted the FF about page...which is a bit cheeky.


> If you need true end-to-end encryption where the provider can't see plaintext, you lose search, real-time collaboration, most of the AI features everyone's been bolting on lately, etc.

Proton has all of these features, despite being end-to-end encrypted. Search works well with their Mail and Calendar solutions, real-time collaboration is a core offering of their Document editor. It surely is harder to implement, but not impossible for many use cases.


And proton is a Swiss company operating under the Swiss Jurisdiction too.


The funny thing is that Proton is considering moving our of Switzerland, because of the new proposed surveillance laws...

https://www.swissinfo.ch/eng/ai-governance/proton-does-not-t...


The funnier thing is that they opted for Germany which as I understand have similar laws.


How do they do that? Either they 1) transfer your entire data to your system before searching, 2) use shoddy cryptography, or 3) you have to expose your private key to them. I doubt it's 1).


Apparently, it's (1): https://proton.me/support/search

There are obvious UX/performance issues, but it's an honest approach.


Based on link below:

> Click Enable to confirm. Your messages will then be downloaded from Proton Mail’s servers, decrypted, and indexed locally in an encrypted state.

They just download your emails into your browser and make them locally searchable.

I battled the same issue, in the end I have unencrypted data for fulltext search. But none of these are sensitive. I was thinking that maybe with AES, which is just a XOR, you could do search if you have the key as you just need to know how to XOR the search query and which phrases you can include. So instead of "hello" the XOR would yield "arpe5," and you just look for that in the db. But this could only work with exact matches or prefixes, it would not allow elastic search or anything complex like that.



Also https://nodeweekly.com.

Checked my emails, turns out I've been subscribed to ES News from the first issue in 2016.


Anyone have any recommendations that aren't run by Cooper? All of the suggestions so far are run by the same person and while I don't have anything against them personally, a bit of diversity wouldn't hurt :)



I like bytes.dev

https://bytes.dev/


This also gave me an "invalid request" response.


These both gave me an "invalid request" when I tried to sign up. I'm on my cell phone so I can't debug further.


Unfortunately we've had endless waves of botnets attempting to subscribe thousands of fake email addresses to us over the years, and while our IP reputation system helps keep this at bay, it's also catching quite a lot of legitimate users now thanks to the prevalance of VPNs. So we'll need to come up with a new approach. (And no, even Cloudflare Turnstile isn't enough to keep them away, sadly, as there are plenty of human-backed adversarial networks too trying to make scam Gmail addresses look legit by subscribing them to newsletters.)

However, we do subscribe many people manually, and we also have RSS - http://javascriptweekly.com/rss - so you don't have to deal with email at all if you don't want to. There are also numerous other options out there, which I've linked in a sibling comment.


Awesome, I just added your feeds to my RSS reader. I appreciate you offering that option.

Thanks for the prompt response. Keep up the good work! :)


I get the same overall FTA score of 7 for both of your examples. When omitting the return type (which can be inferred), you get the exact same scores. Not just the same FTA score. Also note that `Return<User>` should be just `User` if you prefer to specify the return type explicitly. That change will improve several of the scores as well.


> Also note that `Return<User>` should be just `User` if you prefer to specify the return type explicitly.

No? first_user = data[0] assigns User | undefined to first_user, since the list isn't guaranteed to be non-empty. I expect Return to be implemented as type Return<T> = T | undefined, so Return<User> makes sense.


You are correct if `noUncheckedIndexedAccess` is enabled. It is off by default (which is a pity, really).

I assumed `Return<User>` was a mistake, not a custom type as you suggest. But your interpretation seems more likely anyway.


Both score 7 now though.

This scores 6: function a(b) { return b[0]; }

This scores 3: const a = (a) => a;




The example does not use an importmap attribute.

Overall, the example does not seem like something that is supposed to run directly in the browser without some kind of intermediate step.

That is why I asked what the minimal number of steps would be to download the example and have it work locally.


Complain to them, give them a bad rating in the Play Store. This is likely caused by using the obsolete SafetyNet Attestation API as outlined here: https://grapheneos.org/articles/attestation-compatibility-gu...



I got the Australian one by replacing `cn` with `au` in the link.

https://apps.apple.com/au/app/ublock-origin-lite/id674534269...


You can share it simply as https://apps.apple.com/app/id6745342698, no region required


Thank you for the link. Can some moderator please update the link? Thanks in advance.


Update the link to what?


I meant to the one in the reply, but it looks like someone already did.


Updated, thanks!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: