Apple Mail and Hidden Tracking Images

John Gruber, writing at DaringFireball: In my piece yesterday about email tracking images (“spy pixels” or “spy trackers”), I complained about the fact that Apple — a company that rightfully prides itself for its numerous features protecting user privacy — offers no built-in defenses for email tracking. A slew of readers wrote to argue that Apple Mail does offer such a…

Firefox 85 Isolated Supercookies, But Dropped Progressive Web App Support

Tech blogger Paul Thurrott writes:
Firefox 85 now protects users against supercookies, which Mozilla says is “a type of tracker that can stay hidden in your browser and track you online, even after you clear cookies. By isolating supercookies, Firefox prevents them from tracking your web browsing from one site to the next.” It also includes small improvements to bookmarks and password…

Wasmer 1.0 Can Run WebAssembly ‘Universal Binaries’ on Linux, MacOS, Windows, Android, and iOS

The WebAssembly portable binary format will now have wider support from Wasmer, the server-side runtime which “allows universal binaries compiled from C++, Rust, Go, Python, and other languages to run on different operating systems and in web browsers without modification,” reports InfoWorld: Wasmer can run lightweight containers based on WebAssembly on a variety of platforms — Linux, MacOS, Windows, Android, iOS…

Flash Is About To Die, But Classic Flash Games Will Live On

Fast Company’s technology editor harrymcc writes:
After years of growing technical irrelevance and security concerns, the Flash browser plug-in will reach the end of the road on January 12 when Adobe blocks its ability to display content. The web will survive just fine. But there’s a huge library of old Flash games — some of them quirky, interesting, and worth preserving. Over…

It’s Game Over For FarmVille, as Flash Also Buys the Farm

The last day of the year was also the last day for FarmVille, one of the original addictive Facebook games. From a report: FarmVille, which allowed players to cultivate colorful cartoonish farms by tending crops and caring for livestock, had 30 million daily players at its peak. But game developer Zynga announced in September it would shut down the game on…

So How Good Is Edge on Linux?

“No one asked Microsoft to port its Edge browser to Linux,” writes Steven J. Vaughan-Nichols at ZDNet, adding “Indeed, very few people asked for Edge on Windows. “But, here it is. So, how good — or not — is it..?” The new release comes ready to run on Ubuntu, Debian, Fedora, and openSUSE Linux distributions… Since I’ve been benchmarking web browsers…

How to Play Chrome’s Hidden ‘Dinosaur Game’ and Firefox’s ‘Unicorn Pong’

How-To Geek has discovered three of the world’s most popular web browsers contain Easter Eggs:
It seems like every browser has a hidden game these days. Chrome has a dinosaur game, Edge has surfing, and Firefox has . . . unicorn pong? Yep, you read that right — here’s how to play it. First, open Firefox. Click the hamburger menu (the three…

Microsoft’s ‘Patch Tuesday’ Includes 129 Security Updates, Mostly to Windows

This week Krebs on Security reported that Microsoft “released updates to remedy nearly 130 security vulnerabilities in its Windows operating system and supported software.” None of the flaws are known to be currently under active exploitation, but 23 of them could be exploited by malware or malcontents to seize complete control of Windows computers with little or no help from users….

‘If Everyone Hates Object-Oriented Programming, Why Is It Still So Widely Spread?’

Object-oriented programming “has been wildly successful. But was the success just a coincidence?” asks Stack Overflow’s blog: Asking why so many widely-used languages are OOP might be mixing up cause and effect. Richard Feldman argues in his talk that it might just be coincidence. C++ was developed in the early 1980s by Bjarne Stroustrup, initially as a set of extensions to…

Some Email Clients Are Vulnerable To Attacks Via ‘mailto’ Links

A lesser-known technology known as “mailto” links can be abused to launch attacks on the users of email desktop clients. From a report: The new attacks can be used to secretly steal local files and have them emailed as attachments to attackers, according to a research paper published last week by academics from two German universities. The “vulnerability” at the heart…