If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Rate Thread | Display Modes |
#61
|
|||
|
|||
What free Android emulator do YOU use on Windows for running F-Droid APKs?
On Sat, 6 Jan 2018 17:03:17 -0000 (UTC), Joe Scotch wrote:
It seems the quirks are similar between VirtualBox and VMWare. In VirtualBox, the mouse is so hellish that it's the *major* flaw in the setup, unless there's a trick to get the mouse to behave. It takes *dozens* of steps to get past a multiple-click screen, such as the Android setup screens are. It just does. It defies comprehension, and it certainly defies an easy description. The hellish mouse cursor works, but it's quirky as all hell. It will select the wrong things so many times that it's not funny. You have to hold down the left mouse button but the range of motion of the cursor is only one small area on the Android screen - maybe 1/5th or 1/6th of the screen. So you're constantly moving the mouse and then lifting up and then moving it. That wouldn't be so bad if the cursor would start the second time where you put it, but it doesn't. It's only sort of kind of in that spot you last left it. That too wouldn't be so bad if a scroll screen didn't occur - but when they do, you end up constantly scrolling incorrectly, and selection buttons go on and off because the mouse seems to start pseudo randomly on the screen. So you move the mouse cursor constantly, where a multi-click screen takes at least ten times the minimum clicks, and often twenty times that, depending on the complexity of the screen. There *must* be a trick to this mouse inside the Android window inside of VirtualBox on Windows, because it's completely unusable as it stands. Certainly the VirtualBox mouse additions is not the trick. Maybe the guest additions ISO will solve it - but I can't get it to install. In VMware it is still quite usable without mouse guest additions. Your experience with VirtualBox sounds far worse than mine with VMware. In VMware you just have to remember that, without mouse guest additions, the mouse operates in two different modes: (1) The mouse is owned by the host. (2) The mouse is owned by the guest. If the mouse is owned by the host and you want to click on something in the guest, it takes two clicks like so 1. You click the _host's_ mouse pointer in the VM client window. 2. Then you move the _guest's_ mouse pointer to the guest thing you want to click on, ands click. The Windows (host) mouse pointer is white with a black border, while the Android (guest) mouse pointer is black with a white border. So it is easy to see which mouse pointer you are working with. -- Kind regards Ralph |
Ads |
#62
|
|||
|
|||
What free Android emulator do YOU use on Windows for running F-Droid APKs?
Wolf K wrote:
No, they (or the proxy server between them and you) has your IP, else you won't get the movie. And to serve up the movie you're watching, they must pass one your request, which translates into some ID for that movie. So.... Just WHERE do you find NewPipe described as a proxy service provider? Their own description is as a local client that scrapes the web pages and parses elements out of them. There is no description of a proxy. https://f-droid.org/en/packages/org.schabi.newpipe/ https://f-droid.org/wiki/page/org.schabi.newpipe "NewPipe only parses the YouTube website in order to gain the information it needs." From their description, NewPipe is no different than any other webcentric client, like a lightweight web browser, but has a special purpose of parsing the web pages it retrieves from Youtube (rather than use Google's API - which does NOT mandate tracking or even logging in). The author has yet to qualify why using the YouTube API is more evil than his app parsing Youtube's pages (which is unreliable and will fail when Google changes elements in their pages or the nav between them). Screen scrapers or web page parses are unreliable. This isn't the first author that tried this very old scheme (which was primarily used when the service provide an API or target program did not provide a CLI). Operation is dependent on the site not changes the critical content of the documents (web pages) that it delivers. Yeah, like that never happens at any Google site, uh huh. NewPipe is just a webcentric frontend app. It is NOT a proxy service. In fact, only the element parsing of the web page delivered by Youtube is unique to this app. All thei video functions are borrowed from other open source projects. It is a *player* that uses document parsing (rather than use the Youtube API). https://newpipe.schabi.org/ "without annoying ads" Never seen any (of THOSE type of "page ads" which are NOT within the video stream). I use a web browser (Firefox) to visit Youtube. uBlock Origin is used in Firefox (on my Android phone and in both Firefox and Google Chrome on my desktop PC) to get rid of page ad content not just at YouTube but elsewhere, too. Inline/instream ads (part of the video stream) will NOT be eliminated by NewPipe or any adblocker in a web browser nor by NewPipe that is merely displaying the video stream that Youtube found for that client's request. Where do *you* see that NewPipe is operating a proxy server? |
#63
|
|||
|
|||
What free Android emulator do YOU use on Windows for running F-Droid APKs?
Joe Scotch wrote:
All that matters to me, from a privacy standpoint, is only what the NewPipe people get and what Google get by way of my information. EVERY webcentric program you run results in the other endpoint knowing your IP address. Even if you use a VPN, the VPN provider knows your IP address. Your web browser, e-mail client, telnet client, FTP client, VPN client, and anything else connecting out results in the target server getting your IP address. All the NewPipe site can see, and only if you download from their site, is your IP address when you downloaded their file. Obviously they need your IP address to know where to deliver the file. Am I correct that the NewPipe site gets nothing whatsoever There is no "NewPipe site" regarding your traffic. The site is to only provide a download of a file (NewPipe). Read the F-Droid and author's site and even the GitHub repository. You will find NO MENTION of any proxy service operated by NewPipe. It is just a local client, like any other player. It parses the web pages delivered by Youtube and then retrieves the stream that Youtube found. The parsing code is the author's work in this app. The player components are borrowed from other open source projects. |
#64
|
|||
|
|||
What free Android emulator do YOU use on Windows for running F-Droid APKs?
On Wed, 10 Jan 2018 12:16:53 -0600, VanguardLH wrote:
Joe Scotch wrote: All that matters to me, from a privacy standpoint, is only what the NewPipe people get and what Google get by way of my information. EVERY webcentric program you run results in the other endpoint knowing your IP address. Even if you use a VPN, the VPN provider knows your IP address. Your web browser, e-mail client, telnet client, FTP client, VPN client, and anything else connecting out results in the target server getting your IP address. I know you know this topic, but I don't think it was written clearly enough above, which could lead to some confusion. The following is more or less directed to the OP. *** Without a VPN or proxy: The remote endpoint obviously needs to know your IP address so that it can reply to you. You send a request directly to the remote endpoint; the remote endpoint sends a response directly to you. *** With a VPN or proxy: The VPN or proxy provider needs to know your IP address, but the remote endpoint only needs to know the VPN or proxy IP. You attempt to send a request to a remote endpoint. The request is intercepted and sent to the VPN or proxy instead. On your behalf, the VPN or proxy sends a separate request to the remote endpoint. The remote endpoint responds back to the VPN or proxy, and in turn, the VPN or proxy responds back to you. *** I lump VPN and proxy together because when they're used this way, they are almost identical to each other. If the goal is to remain anonymous to the remote endpoint, then VPN and proxy are indeed identical, and that seems to be more and more how people are looking at a VPN. That's not at all the traditional use or purpose of a VPN, but it's becoming a popular new use case in recent years. |
#65
|
|||
|
|||
What free Android emulator do YOU use on Windows for runningF-Droid APKs?
On 10/01/2018 21:40, Char Jackson wrote:
On Wed, 10 Jan 2018 12:16:53 -0600, VanguardLH wrote: Joe Scotch wrote: All that matters to me, from a privacy standpoint, is only what the NewPipe people get and what Google get by way of my information. EVERY webcentric program you run results in the other endpoint knowing your IP address. Even if you use a VPN, the VPN provider knows your IP address. Your web browser, e-mail client, telnet client, FTP client, VPN client, and anything else connecting out results in the target server getting your IP address. I know you know this topic, but I don't think it was written clearly enough above, which could lead to some confusion. The following is more or less directed to the OP. *** Without a VPN or proxy: The remote endpoint obviously needs to know your IP address so that it can reply to you. You send a request directly to the remote endpoint; the remote endpoint sends a response directly to you. *** With a VPN or proxy: The VPN or proxy provider needs to know your IP address, but the remote endpoint only needs to know the VPN or proxy IP. You attempt to send a request to a remote endpoint. The request is intercepted and sent to the VPN or proxy instead. On your behalf, the VPN or proxy sends a separate request to the remote endpoint. The remote endpoint responds back to the VPN or proxy, and in turn, the VPN or proxy responds back to you. *** I lump VPN and proxy together because when they're used this way, they are almost identical to each other. If the goal is to remain anonymous to the remote endpoint, then VPN and proxy are indeed identical, and that seems to be more and more how people are looking at a VPN. That's not at all the traditional use or purpose of a VPN, but it's becoming a popular new use case in recent years. That is *EXACTLY* as *I* see it! :-) -- “Men occasionally stumble over the truth, but most of them pick themselves up and hurry off as if nothing ever happened.” (Winston S. Churchill) |
#66
|
|||
|
|||
What free Android emulator do YOU use on Windows for running F-Droid APKs?
"David B."
Wed, 10 Jan 2018 23:27:18 GMT in alt.comp.freeware, wrote: On 10/01/2018 21:40, Char Jackson wrote: On Wed, 10 Jan 2018 12:16:53 -0600, VanguardLH wrote: Joe Scotch wrote: All that matters to me, from a privacy standpoint, is only what the NewPipe people get and what Google get by way of my information. EVERY webcentric program you run results in the other endpoint knowing your IP address. Even if you use a VPN, the VPN provider knows your IP address. Your web browser, e-mail client, telnet client, FTP client, VPN client, and anything else connecting out results in the target server getting your IP address. I know you know this topic, but I don't think it was written clearly enough above, which could lead to some confusion. The following is more or less directed to the OP. *** Without a VPN or proxy: The remote endpoint obviously needs to know your IP address so that it can reply to you. You send a request directly to the remote endpoint; the remote endpoint sends a response directly to you. *** With a VPN or proxy: The VPN or proxy provider needs to know your IP address, but the remote endpoint only needs to know the VPN or proxy IP. You attempt to send a request to a remote endpoint. The request is intercepted and sent to the VPN or proxy instead. On your behalf, the VPN or proxy sends a separate request to the remote endpoint. The remote endpoint responds back to the VPN or proxy, and in turn, the VPN or proxy responds back to you. *** I lump VPN and proxy together because when they're used this way, they are almost identical to each other. If the goal is to remain anonymous to the remote endpoint, then VPN and proxy are indeed identical, and that seems to be more and more how people are looking at a VPN. That's not at all the traditional use or purpose of a VPN, but it's becoming a popular new use case in recent years. That is *EXACTLY* as *I* see it! :-) What exactly do you see? In your own words, if you can. I sniff an effort to hijack a thread... But, I'll humour you if you can answer my question. -- To prevent yourself from being a victim of cyber stalking, it's highly recommended you visit he https://tekrider.net/pages/david-brooks-stalker.php ================================================== = Don't let the computer bugs bite! |
Thread Tools | |
Display Modes | Rate This Thread |
|
|