Imagine a program so bad that instead of displaying an area with 4 columns in 1 row, each cell has its own row with literally random left-right alignment.

I believe hell is the place where each column of a grid or table gets its own line.

I just opened one of the websites I'm the admin of in Internet Explorer. Worst thing I've ever done.

Nothing, literally nothing, works. Grid? No chance. Table? Don't even try. Padding? Dream on. Icons? Only when up for it.

So... I guess... Anyone still using IE deserves that!

Pixelcode boosted

CloudFirewall 2.0.0 and what we've done to get there

About one month ago we released the first very big update for our #CloudFirewall #Firefox add-on.
We decided to wait some time with writing this post as many sad things happened with Firefox in recent times and we have to respond to that somehow,more on that later.
The biggest change with the new Cloud Firewall version is that it does now support translations into multiple languages. Very big thanks to @pixelcode@social.tchncs.de for implementing all code needed for supporting translations as well as writing the first translation.
With version 2.0.0 Cloud Firewall already supports the languages English,German and French and we're sure that there will be even more in future versions.
You can help translating Cloud Firewall on our translations platform - If your language isn't available,just contact us anywhere and we'll add it.
The previous Cloud Firewall version unfortunately had some bugs which we didn't notice for a quite long time - That's now all fixed.
It wasn't possible to change the settings in the last version: While the page was displayed correctly,the Javascript event listener which should have listened on user input wasn't setup correctly so no changes were stored and after reloading the page,everything was reset to the default values.
The only thing which could be changed was which cloud providers should be blocked as global default.
Another problematic thing was that predefined rules for well-known sites were ignored.
Normally pages get blocked based on the owner of their IP address which will be detected correctly even if the predefined rules don't work and you'll see no wrong behavior here.
Unfortunately some pages are a special case,for example Discord which rents their origin servers at Google Cloud but proxies every request through CloudFlares network.
So Discord should be blocked for both Google Cloud and CloudFlare as they're using both services.
Unluckily the IP detection code will block it only for CloudFlare as the origin servers are hidden and no Google IP is ever seen but we know that they're using it from their status page.
Similar things happen for example for Instagram: It belongs to the Facebook company but the servers are hosted on Amazon - The IP detection would only block it for Amazon but it should be blocked for Facebook,too.
You see that the missing predefined rules lead to a lot of false-negatives which resulted in less privacy and we're very sorry that that happened.
A non-privacy-related but still annoying bug was that you couldn't set exceptions for pages if they are directly affected and not only their subressources.
I don't have any idea how I should explain the reason as the internal logic of Cloud Firewall is very complicated but it's fixed now.
Let's have a quick look on the next version
Thanks to a contribution by @pixelcode@social.tchncs.de the next version will get a completely new design.
It will work without Bootstrap and therefore reduce the size of the add-on.
Along with that we'll try to heavily improve the structure of the pages to make it easier to understand and look less buggy.
There will be many small optimizations which should lead to a cleaner overall experience.
We don't have any date planned for the next release and it may take some weeks or even a few months as there's much to do in other projects and the current Cloud Firewall version does its job pretty good.
What the hell happened with Mozilla?!?!
Maybe that's what many of you thought when reading about mass layoffs at #Mozilla and no,we don't have a answer to that question,too.
Other alarming developments in the Firefox world are the lack of a working extension support in the new Firefox for #Android and a new big deal with #Google ,the worlds largest threat against privacy.
There are many reasons why we find it important to expand support for Cloud Firewall to other browsers while,of course,still maintaining Firefox support as main priority.
Maybe the current version 2.0.0 will already arrive in some other browsers.
We'll have a look at what needs to be done to support Firefox forks like #Waterfox which already support the modern #WebExtensions and how much we'll have to rewrite to support Firefox forks on a older code base which stick to the old extension format like #PaleMoon or #Basilisk
The latter will be harder to support but if it's not impossible,we'll think about the question if it's worth it as these browsers are a important contributor to diversity in a browser-world where nearly everything runs on top of the same code base written by the worlds biggest privacy threat.
And for those who prefer browsers based on #Chromium we even see a chance of bringing Cloud Firewall to the #Opera add-ons store which would effectively make it available to every user of Opera and #YandexBrowser
This won't be so easy as the API which is responsible for the core functionality of Cloud Firewall is only available on Firefox but maybe we can workaround that somehow by directly throwing HTTPS requests to any DoH (DNS over HTTPS) server but we'll have to see how much of an impact this will have to performance.
My personal guess is that it will be much slower than using the native DNS API in Firefox.
On the other hand,Yandex Browser for Android still has unlimited support for extensions while the new Firefox hasn't so that might be the only chance to continue Cloud Firewall support on the Android platform.
Developing decent support for multiple browsers will be one of the hardest changes that can be done to Cloud Firewall but we feel that it's needed so we'll look what can be done as soon as possible.

Me, when I wonder why my new style doesn't get applied on localhost but I realize that I didn't save style.css:

position: sticky;

– the greatest CSS feature of all time!

Pixelcode boosted

Als mich heute leute fragten , wo es brauchbare #firefox #addons gibt , habe ich die von

@rugk

und von

@pixelcode

weiterempfohlen.

Das Firefox-Addon Privacy Redirect leitet Anfragen von Datenkraken wie YouTube, Instagram, Twitter oder Google Maps zu datenschutzfreundlichen Alternativen wie Invidious, Bibliogram, Nitter oder OpenStreetMap weiter. Mittlerweile gibt's das sogar auf deutsch (dank mir, hehe😜).

addons.mozilla.org/de/firefox/

Pixelcode boosted
Pixelcode boosted

@kuketzblog Wir von @digitalcourage tun, was irgendwie geht. In ein paar Tagen kommt zB unser Ratgeber „Datenschutz in der Schule durchsetzen“ raus (siehe shop.digitalcourage.de) - Und auf unserer Themenwebsite git‘s auch 'ne Menge.

Pixelcode boosted

Gibt es eigentlich schon einen Verein, der die Interessen von datenschutzsensiblen Eltern, Schüler und Lehrer vertritt, die einfach keine Lust mehr auf die weitere Digital-Verödung der Schulen haben? Microsoft, Google und Co. sind keine keine Lösungen für eine Gesellschaft, die sich (digital) frei entfalten möchte.

StackOverflow ist down. Oder wie Programmierer sagen: Feierabend.

@nipos Der rote Farbverlauf soll dabei das "Fire" repräsentieren.

Show thread

@nipos Ich habe mal nachgedacht und Folgendes festgestellt: Das Cloud-Firewall-Logo ist ja "nur" dieses Stock-Icon (iconfinder.com/icons/2739111/p). Ich fände es besser, wenn es ein Logo hätte, das es wirklich repräsentiert. Also irgendeine Kombi eines Schildes, einer Wolke (Cloud) und ggf. einer Flamme (Firewall). Ich habe also mal ein bisschen rumexperimentiert und präsentiere folgende *Ideen*, vielleicht gefällt dir ja eine. Wenn du einen andere Einfall hast, kann ich auch versuchen, den umzusetzen.

Pixelcode boosted

Die neue #CloudFirewall version ist jetzt online 🎉 Ihr koennt das Addon hier herunterladen,wenn ihr das noch nicht getan habt: addons.mozilla.org/en-US/firef Wer bereits eine alte Version installiert hat,bekommt das Update automatisch.Den Quellcode gibts hier: notabug.org/nipos/cloud-firewa Wer Fehler findet oder Vorschlaege hat,darf das auch dort melden oder einfach hier,wobei ich hoffe,dass die groebsten Fehler jetzt behoben sind.

Pixelcode boosted

@nipos Ach, das kommt auch von der DOMUpdater.js. Ich hasse diese beschissene Datei!!!!!!! Ständig finde ich neue Sachen, die noch ergänzt werden müssen 🤬🤦‍♂️🤦‍♂️🤦‍♂️

Show thread

@nipos Ich habe mich mal an ein neues Bootstrap-freies Design gewagt. Ich habe keine Ahnung, wie ich das mit der Android-Stats-Tabelle bewerkstelligen soll, aber ich finde, so sieht es schon mal ganz gut aus. Problem: Ich habe festgestellt, dass doch noch ein paar Strings fehlen, aber ich weiß nicht, woher die kommen.

@nipos Wo kommt eigentlich dieses "Global default rules" im Cloud-Firewall-Popup her? Ich habe mir mal per Rechtsklick den Quelltext angeschaut, das aber nirgendwo gefunden. Muss halt noch übersetzt werden.

Show more
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!