I’m a computer and open source enthusiast from Toronto, Ontario, Canada.

  • 1 Post
  • 47 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle




  • If it is indeed a boneheaded mistake, then it’s probably because of over reliance on RPC-type calls from the front-end that displays the data, to the back-end that actually handles the data. User deletes photo, and the front-end, instead of actually deleting it, tells the backend to do it… and then hides the photo from view, maybe updates its index of photos marking them as “deleted” regardless of whether the backend actually deleted the photo.

    Then an OS update comes along, and rescans the filesystem, and report a bunch of new photos to the front-end, that then happily add them to the GUI to the user’s surprise.

    Modern APIs and software architectures are a bloated, unnecessarily complex mess, and this is the result.











  • krnl386@lemmy.catoPrivacy@lemmy.mlSchool Spyware
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    1 year ago

    I’m guessing this is a school and not a university? At a university students have more clout/rights, at least on paper.

    In any case, getting your own machine is the way to go. You can run whatever you want on it. You could still (cautiously) use the school network, as long as you use a VPN; basically treat the school network as a “hostile” environment. That’s assuming VPN use is not against the school rules. :)


  • krnl386@lemmy.catoPrivacy@lemmy.mlSchool Spyware
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    1 year ago

    Is there an IT policy at your school? I suggest perusing it for 2 reasons:

    1. Understanding the consequences of tampering/tinkering with the spyware.
    2. Understanding how much authority the IT department really has, and whether or not what they’re doing with the spyware constitutes overreach.

    #2 in particular is for your own knowledge/benefit. Since you’re not an employee, but a student, you may have some inherent rights under this policy, which the IT department may be violating.