this post was submitted on 17 Jul 2025
129 points (99.2% liked)
Fediverse memes
1685 readers
48 users here now
Memes about the Fediverse.
Rules
General
- Be respectful
- Post on topic
- No bigotry or hate speech
Specific
- We are not YPTB. If you have a problem with the way an instance or community is run, then take it up over at !yepowertrippinbastards@lemmy.dbzer0.com.
- Addendum: Yes we know that you think ml/hexbear/grad are tankies and or .world are a bunch of liberals but it gets old quickly. Try and come up with new material.
Elsewhere in the Fediverse
Other relevant communities:
- !fediverse@lemmy.world
- !yepowertrippinbastards@lemmy.dbzer0.com
- !lemmydrama@lemmy.world
- !fediverselore@lemmy.ca
- !bestofthefediverse@lemmy.ca
- !fedigrow@lemmy.zip
founded 10 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I gotta admit, I just don't trust github apks.
Yeah F-Droid isnt perfect, but it does list what liberties an app takes up front
What I appreciate about F-Droid is how many eyes are on the same repository. Yes there are bad entries, but, having a million people refreshing six of the most popular repos is still a better scenario for people flagging and yanking bad apps than everybody and their mother offering an APK as an individual fork of a GitHub project.
It took me a while to get into
brew
on MacOS, but once I did, I wondered to myself why I spent so long just downloading random binaries from the Internet and running them? Life before a good package manager seems so quaint.Exactly, the extra eyes makes all the difference
yeah. in the "obtainium is more trustworthy because it distributes trust" vs "f-droid is more trust worthy because it reduces attack vectors" i tend to fall in the latter camp. sure, if f-droid is pwned, nearly your entire phone is pwned, but with obtainium you're more at risk for death by a thousand papercuts.
i'm not expert enough to speak authoritatively between the two stances, but i know enough people who are split between the two to say there's compelling arguments on both sides, i just picked what matched my understanding of my vulnerabilities best