• 4 Posts
  • 79 Comments
Joined 10 months ago
cake
Cake day: September 7th, 2023

help-circle

  • No matter how you extract the code, this will be hacky. The problem with this approach is that you are entirely dependent on the YouTube backend. They will not notify you when they change their code/API. They will not comment their code.

    In the past, this has led to a considerable development investment of projects like NewPipe where they have to fix somethong every few months as there is a backend change.

    I am still thinking about your problem, but I am unsure whether the approach of extracting from JS works (mid term).

    Why not do the steps you outlined above as a macro on your keyboard? This eliminates the need for JS. To extract the video URL, you could use some RegEx automatically or Ctrl+F. Just some thoughts. I am still invested into this weird request :)














  • Cool idea! THis should be more broadly discussed. After some discussion here, where could we share it with the F-Droid community? Is there a forum or such?

    My five cents: The problem I see is account stuff. You can use F-Droid without an account, and do not want to require an account for ratings. Yet, having no accounts, it is incredibly easy to manipulate votings.

    I would probably prefer a “Git Issue”-like thread for every app, where you have to register. This allows for

    • Deeper conversation, more insightful reviews, instead of “3 starts, UI ugly” (let’s face it, this is not the reason why we use F-Droid)
    • Pointing out code lines in the source code. This could help with bug fixes, malicious stuff, etc.


  • I guess it is somewhat like paying in cash for your groceries: While anonymous, only you buy at this time of the day your favourite 3 food products, a cup of gluten-free instant ramen and a period product.

    I would be concerned about this scenario:

    • Company X has your TV data (but doesn’t know your name, etc)
    • Company Y, Z, … know your name and have data on you.
    • They buy/share/whatever data and intersect it. Now they can probably connect the data they have on you.