Hacker Newsnew | past | comments | ask | show | jobs | submit | penchant's commentslogin

In Polish it's called małpa (monkey). I always thought of this as weird — turns out the Poles were not alone in noticing the resemblance :D


In Romanian we used to call it literally "monkey's tail", but most people now just use "at" instead.


Also “apenstaartje” in Dutch (monkey’s tail)


Zavináč in Slovak (like the fish, sprat, curled into small ball)


German: “Klammeraffe” (literally: “bracket monkey”)


Klammeraffe is a genus of monkey, called spider monkeys [0] in English. “Klammer” here means “clinging”, because these monkeys use their long tail similar to their arms to hold on to branches. “Klammeraffe” has no relation to brackets.

[0] https://en.wikipedia.org/wiki/Spider_monkey


I wonder why some people that are aware of how detrimental social media are blame all the evil on "algorithms" instead of just… ceasing to use social media at all? Seriously, you are not FORCED to use social media unless it's a part of your job (and even then nobody can make you use them in your free time). Portaying yourself as a martyr who's helpless when trying to escape from all of these vile big companies when doing nothing to get yourself out of this is hilarious. Gizmondo also has written about it: https://gizmodo.com/the-gizmodo-guide-to-stopping-algorithms...


The thing is, Gecko is really insecure when compared to Chromium. Its sandboxing is asinine. Additionally, due to lack of WebView implementation, on mobile you have to use Chromium either way, leaving you with two completely separate attack surfaces.

Quoting GrapheneOS developers[1]:

> Avoid Gecko-based browsers like Firefox as they're currently much more vulnerable to exploitation and inherently add a huge amount of attack surface. Gecko doesn't have a WebView implementation (GeckoView is not a WebView implementation), so it has to be used alongside the Chromium-based WebView rather than instead of Chromium, which means having the remote attack surface of two separate browser engines instead of only one. Firefox / Gecko also bypass or cripple a fair bit of the upstream and GrapheneOS hardening work for apps. Worst of all, Firefox does not have internal sandboxing on Android. This is despite the fact that Chromium semantic sandbox layer on Android is implemented via the OS isolatedProcess feature, which is a very easy to use boolean property for app service processes to provide strong isolation with only the ability to communicate with the app running them via the standard service API. Even in the desktop version, Firefox's sandbox is still substantially weaker (especially on Linux) and lacks full support for isolating sites from each other rather than only containing content as a whole. The sandbox has been gradually improving on the desktop but it isn't happening for their Android browser yet.

IronFox (an FF fork) developers[2]:

> While we do as much as possible to improve the situation, it should be noted that Firefox-based web browsers, including IronFox, have security deficiencies when compared to Chromium. This is especially notable on Android.

[1] https://grapheneos.org/usage#web-browsing

[2] https://gitlab.com/ironfox-oss/IronFox/-/blob/dev/docs/Limit...

An in-depth examination of this topic and a plethora of other sources can also be found here: https://madaidans-insecurities.github.io/firefox-chromium.ht...


The thing is, Gecko is really insecure when compared to Chromium. Its sandboxing is asinine. Additionally, due to lack of WebView implementation, on mobile you have to use Chromium either way, leaving you with two completely separate attack surfaces.

Quoting GrapheneOS developers[1]:

> Avoid Gecko-based browsers like Firefox as they're currently much more vulnerable to exploitation and inherently add a huge amount of attack surface. Gecko doesn't have a WebView implementation (GeckoView is not a WebView implementation), so it has to be used alongside the Chromium-based WebView rather than instead of Chromium, which means having the remote attack surface of two separate browser engines instead of only one. Firefox / Gecko also bypass or cripple a fair bit of the upstream and GrapheneOS hardening work for apps. Worst of all, Firefox does not have internal sandboxing on Android. This is despite the fact that Chromium semantic sandbox layer on Android is implemented via the OS isolatedProcess feature, which is a very easy to use boolean property for app service processes to provide strong isolation with only the ability to communicate with the app running them via the standard service API. Even in the desktop version, Firefox's sandbox is still substantially weaker (especially on Linux) and lacks full support for isolating sites from each other rather than only containing content as a whole. The sandbox has been gradually improving on the desktop but it isn't happening for their Android browser yet.

IronFox (an FF fork) developers[2]:

> While we do as much as possible to improve the situation, it should be noted that Firefox-based web browsers, including IronFox, have security deficiencies when compared to Chromium. This is especially notable on Android.

[1] https://grapheneos.org/usage#web-browsing

[2] https://gitlab.com/ironfox-oss/IronFox/-/blob/dev/docs/Limit...

An in-depth examination of this topic and a plethora of other sources can also be found here: https://madaidans-insecurities.github.io/firefox-chromium.ht...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: