• Ludicrous0251@piefed.zip
    link
    fedilink
    English
    arrow-up
    40
    arrow-down
    1
    ·
    16 hours ago

    Signal already has a setting that blocks message content from displaying in push notifications; the case highlights why such a feature might be important for some users to turn on.

  • stoly@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    10 hours ago

    The real question is why Apple isn’t doing cleanup of their logs. There’s no reason to maintain that information after a notification has been acknowledged.

  • rhubarbe@tarte.nuage-libre.fr
    link
    fedilink
    Français
    arrow-up
    10
    arrow-down
    1
    ·
    15 hours ago

    Why would any phone / desktop keep notification history? I already don’t get the notification feature in default KDE Plasma desktop.

    • frongt@lemmy.zip
      link
      fedilink
      English
      arrow-up
      10
      ·
      13 hours ago

      If you accidentally dismiss a notification, you can go back in the history to see it. Or if you dismiss a message notification that you want to respond to later. Or if a notification keeps popping up and disappearing and you want to investigate.

        • frongt@lemmy.zip
          link
          fedilink
          English
          arrow-up
          3
          ·
          12 hours ago

          Debatable. But I have it enabled on my Android phone, it and indeed only shows me the last 24 hours.

    • psycotica0@lemmy.ca
      link
      fedilink
      English
      arrow-up
      6
      ·
      13 hours ago

      Sometimes I try to swipe up and the phone interprets it as a sideways swipe and dismisses something I hadn’t read. So I’ve hit the history feature to see what that might have been.

      Now, what I’d prefer is an undo button, and I wouldn’t have expected that history to persist more than 10 minutes, but it’s not 100% useless.

    • Ziglin (it/they)@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      14 hours ago

      Dunst has one by default. I have used it twice. Once when I was very tired and couldn’t output something into a file for some reason (I think it was a full disk) and piped it into a notification instead and once when a program put some error message in there and the notification expired before I read it.

      It can also be fun for seeing how your perception of notifications compares to the ones that actually show up. It is however important to remember that it exists and to not let important data end up there.

  • Skyrmir@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    13 hours ago

    We’re going to need phone cases that require a password, and destroy the phone if tampered with. And a signal blocking bag for occasions.

      • Skyrmir@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        11 hours ago

        They can’t extract anything from a device that’s no longer a device. Even if the defendant is required to hand over passwords, there is opportunity to eliminate the device before it’s out of control of the defendant, prior to receiving a legal order to preserve it, or the execution of a search.

        Basically make a burner phone that’s literally a burner.

        • Luffy@lemmy.ml
          link
          fedilink
          English
          arrow-up
          2
          ·
          11 hours ago

          A case wont get to the Emmc. You know what will do the same without being explosive whatsoever? Using something secure.

          Look at the duress options on GrapheneOS for example.

          • Skyrmir@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            10 hours ago

            GrapheneOS is limited to specific hardware. And a strip of thermite will absolutely end any flash memory, while being stable and safe to handle. 300c isn’t that hard to reach.

            Legally the problem becomes the existence of data. If it exists, it can be subpoenaed, and you can rot in jail until you comply. Destruction has a simpler hurdle of making sure it happens due to others negligence or before it’s under other jurisdiction.