Linked by joekiser on Fri 3rd Mar 2017 22:24 UTC
Mozilla & Gecko clones

So I'd like to tell you my version of the story of Firefox OS, from the birth of the Boot to Gecko open source software project as a mailing list post and an empty GitHub repository in 2011, through its commercial launch as the Firefox OS mobile operating system, right up until the "transition" of millions of lines of code to the community in 2016.

During this five year journey hundreds of members of the wider Mozilla community came together with a shared vision to disrupt the app ecosystem with the power of the open web. I'd like to reflect on our successes, our failures and the lessons we can learn from the experience of taking an open source browser based mobile operating system to market.

Thread beginning with comment 641596
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[3]: It's depressing
by daveak on Sun 5th Mar 2017 00:00 UTC in reply to "RE[2]: It's depressing"
Member since:

"Apple or Google, yes. 3rd party? They cannot monitor what you don't give them access to (unless they have some secret deal with Apple/Google or are exploiting a security hole)."

Not really true. On mobile, as a general rule, the cell company can monitor every thing you do, use, and communicate with unless you're using strong end to end encryption they can't MitM. Not only can they, they regularly do so, at least in the US and probably most of the rest of the world as well.

Cell company can only monitor anything that goes over their network. A cell company is also not a third party with regards to software, at least not on an iPhone where Apple do not allow them to install crapware. They cannot MitM anything on an iPhone, so yet again, just like the poster I replied to with regards to apps requesting all permissions, you are talking about an Android problem.

Reply Parent Score: 2

RE[4]: It's depressing
by Gargyle on Wed 8th Mar 2017 12:14 in reply to "RE[3]: It's depressing"
Gargyle Member since:

They cannot MitM anything on an iPhone

How do you know? You cannot know which connections anything possibly makes on an iphone, nor wether or not those connections are secured using a certificate and a key-pair.

Edited 2017-03-08 12:14 UTC

Reply Parent Score: 1