• @Zeon
    link
    -18 months ago

    Agreed, users do sign off on some data collection. However, this consent doesn’t extend to all the app’s actions, especially the undisclosed ones. That’s precisely where access to source code becomes critical. It allows us to identify any hidden, potentially harmful features that could breach privacy or security—issues that go beyond what users have signed up for. Full transparency in source code is vital to ensure that an app fully respects user agreements and trust.

    • @[email protected]
      link
      fedilink
      English
      08 months ago

      apps can’t use hardware features without requesting permissions. it’s a security measure that both iOS and Android enforce. I know this because I develop apps. you don’t have to look at the source code for this.

      time to stop arguing with an expert on the matter. you really just don’t know what you’re talking about.

      • @Zeon
        link
        08 months ago

        Expertise is one thing, but assuming permissions make source code access irrelevant? That’s a stretch. Real tech pros know layers of security are what keep us safe, not just gatekeeping features. If that’s your expert take, I’m skeptical.

        • @[email protected]
          link
          fedilink
          English
          08 months ago

          ok buddy. you’re basically just spouting tech terms like you have any clue. the evidence that you have absolutely none is your insistence in arguing with an expert in their field. you can’t get any more dunning Kruger than this.

          good job being a textbook example of one of the world’s biggest problems: dummies thinking they know better than actual experts.

          • @Zeon
            link
            0
            edit-2
            8 months ago

            Expert or not, the point stands that open source helps everyone check what’s really going on. That’s not Dunning-Kruger; it’s common sense. You’re not an expert if you don’t understand these basic concepts.

            • @[email protected]
              link
              fedilink
              English
              08 months ago

              you’ve strayed from your original argument. the context is that you’re supporting a lunatic because he thinks that looking at source code is somehow better than banning foreign apps outright. we already know what these apps are doing and source code doesn’t give any further insight.

              • @Zeon
                link
                08 months ago

                Just banning foreign apps? That’s a knee-jerk reaction, not a solution. We need to know what’s in the code, not just where an app’s made. Security comes from transparency, not blind bans. Let’s not mix xenophobia with tech policy.

                • @[email protected]
                  link
                  fedilink
                  English
                  1
                  edit-2
                  8 months ago

                  Are you daft? Yes. We know what they are doing. Apps inherently have access to a lot of user data. It’s not about trust in the code, it’s about trust in the company. No amount of looking at TikTok’s source code changes what the company may or may not do with all that data it is absolutely collecting.

                  If you examine the source code of all popular apps you will find that they all collect and send home as much user data as the user has permitted, which is usually a lot. This information accomplishes nothing. The reason that some apps should be banned is because of what the company does with that data and how it doesn’t comply with laws from the banning country.

                  This all stems from a useless talking point made by a politician which sounds great but doesn’t actually accomplish anything. Feel free to keep arguing, but at this point you’re basically just telling me that the internet is a series of tubes.

                  • @Zeon
                    link
                    08 months ago

                    Trust in the company is important, but it’s not the whole picture. Reviewing source code can reveal how data is handled on the front end, which is our first line of defense. If the front-end code is designed to collect more data than it should, that’s a problem, regardless of the company’s reputation.