• piyuv@lemmy.world
    link
    fedilink
    arrow-up
    29
    arrow-down
    3
    ·
    8 months ago

    Imo its fine if they open source it when they decide to end support. The fact that app has a pristine privacy record is good enough

    • spez_@lemmy.world
      link
      fedilink
      arrow-up
      16
      arrow-down
      30
      ·
      8 months ago

      Is it? Closed source means it’s probably listening and recording and selling

        • OsrsNeedsF2P@lemmy.ml
          link
          fedilink
          arrow-up
          1
          ·
          8 months ago

          I mean if you’re using something like Firebase on Android, the network calls get bundled with Google Play Services and you have no idea what that’s sending up

          • randombullet@programming.dev
            link
            fedilink
            arrow-up
            1
            ·
            8 months ago

            But if you have a DNS intercepter/redirect like RethinkDNS or DDG, it should show which queries are coming from which profile

          • B0rax@feddit.de
            link
            fedilink
            arrow-up
            4
            arrow-down
            5
            ·
            8 months ago

            You don’t know what DNS is, do you?

            Basically your device (for example your phone) needs to know the ip adress of any service it wants to connect to. As you may know these services usually use addresses like Lemmy.org or google.com or whatever.

            To know what IP adres is behind these addresses, you device needs to ask a dns server, in a local network (like your own WiFi) this is usually your router, but you can set it to any arbitrary device you want. This way you can see what addresses are being asked for by your device.

            So if the app want to send data to some server, it usually needs to resolve the adress first. And you can see that.

            • Aria@lemmygrad.ml
              link
              fedilink
              arrow-up
              1
              ·
              8 months ago

              If a device makes an encrypted connection to a server the device makers own, there’s nothing further you can gleam from studying the DNS lookups. They can route traffic through the first server, and they can resolve any IPs through the first server. And since you insist the person you’re replying to doesn’t know what DNS is because they said it’s encrypted, I feel you might also not know that DNS can be encrypted. In that case, the network owner can see that a device makes a connection to the nameserver, but they can’t see which addresses the nameserver was asked to resolve. And similarly, the device can refuse a connection to the wrong nameserver.