08:00:40 #startmeeting Sailfish OS, open source, collaboration -- 20th January 2022 08:00:40 Meeting started Thu Jan 20 08:00:40 2022 UTC. The chair is flypig. Information about MeetBot at http://wiki.debian.org/MeetBot. 08:00:40 Useful Commands: #action #agreed #help #info #idea #link #topic. 08:00:49 #info Meeting information and agenda can be found here: 08:00:53 #link https://forum.sailfishos.org/t/community-meeting-on-irc-20th-january-2022/9549 08:01:01 I am the meeting's chairperson today, and will be doing my best to keep time and order. Please respect the timings. As an "NQT", please also go gentle on me today, try not to get too rowdy. 08:01:14 It's my first time :) 08:01:20 It's my first time :)#topic Brief introduction (5 min). Please prefix your name/handle with #info 08:01:27 As you can tell. 08:01:30 #topic Brief introduction (5 min). Please prefix your name/handle with #info 08:01:34 i don't think i've seen a meeting get rowdy 08:01:52 Let's hope this isn't the first then! 08:02:17 #info Nico, community/dev who successfully pushed for a close button 08:02:25 #info Otto Mäkelä, community 08:02:42 #info Lukáš Karas, community, developer 08:03:02 #info Joona Petrell, sailor at Jolla 08:03:18 #info Simonas Leleiva -- privateer for Jolla 08:03:19 #info Simo Piiroinen, sailor at Jolla 08:03:29 #info David Llewellyn-Jones, sailor @ Jolla 08:04:44 #info Björn Bidar, sailor @ Jolla 08:07:08 It's nice to see everyone. Let me also take this opportunity to thank sledges for his superb and tireless chairing of the community meetings over the last two years. I hope you'll join me in sharing your appreciation. Thank you sledges! 08:07:26 Hurray, sledges! <3 08:07:48 take it away, flypig! :)) 08:07:58 #topic Open the source code of the entire system (10 minutes -- asked by ddobrev) 08:08:06 First the question that was asked. 08:08:12 #info Some parts of the system, such as the GUI (Silica) are still proprietary. 08:08:16 #info This repels many users and contributors - some of the latter have explicitly stated this and the old Qt as the reasons they left Sailfish for. 08:08:21 #info I'm not talking about the Android layer the opening of which while still useful it seems to me is legally impossible. 08:08:24 #info I only mean the OS itself, and perhaps the built-in applications. 08:08:35 And here is the answer we prepared earlier, before we continue the discussion. 08:08:42 #info Jolla is an advocate of open source. We benefit from it, we contribute to it and we have an open development model for our open source components (we invite PRs, we invite anyone to comment on our PRs). 08:08:50 #info We aim to fulfil both the letter and the spirit of the open source licences we work with. Internally, we often have discussions about open-sourcing components. 08:08:57 #info That's the context. However Jolla doesn't work in a vacuum. We have a business model which funds the development of Sailfish OS, and right now that business model relies on some proprietary components (I'll share a link on this below). 08:09:03 #info So the answer is that we have no short-term plans to release Silica as open source. In the longer term this could change. 08:09:08 #info I cannot emphasise enough that we open up components whenever we can. 08:09:12 #info For example, recent new components have been released as open source: WebView/MPL-2 and WebAuth/BSD. We also acknowledge the importance of open source to our community; we do not underestimate it. 08:09:16 #link https://techcrunch.com/2021/08/25/jolla-hits-profitability-ahead-of-turning-ten-eyes-growth-beyond-mobile/ 08:09:39 A bit of a long answer, but hopefully clear. 08:10:14 #info fridlmue - community (little late, sorry) 08:10:30 I don't see ddobrev here, but maybe others have comments. 08:10:37 #info Damien Caliste, community 08:10:58 well its a subject that has been discussed foa ages 08:11:03 I think it would be great to have a few of the more visible part open. Those are usually the most accessible (fixing call stuff is hard, fixing a button much easier) and they are often what people have the most opinions about. For example it is really awesome the browser is open, because I could just patch it to have a close button for the last few months and even upstream that :D 08:11:28 But maybe they are already, I always have a hard time telling what is open and what is not 08:12:25 I understand, why some parts are closed, so no need to discuss that I guess, but having more stuff open is of course appreciated <3 08:12:38 As a side note on the topic, https://github.com/sailfishos/mapplauncherd-booster-silica was published recently, while it was proprietary before. Not a big deal, because not very useful stand-alone, but looking at the git history (because it came with its full history), show some background about silica. 08:13:03 personally i don't mind closed stuff as long as they get improved and bugs are fixed. 08:13:33 many of the close jolla apps need some love and care 08:13:39 The mapplauncher-booster could probably use some docs or at least a description, what it is :3 08:13:49 #info mapplauncerd-booster-silica was open sourced recently, with interesting silica history 08:13:52 #link https://github.com/sailfishos/mapplauncherd-booster-silica 08:14:17 Email app would be great to have open :3 08:14:24 Nico: it is a booster for mapplaucherd specific to silica apps 08:14:31 I fully agree with Nico about the browser being open source and the work done by Jolla to "librify" xulrunner and gecko so one can freely play with QML text files and change the browser layout. 08:14:35 I think mapplauncherd needs more docs 08:14:48 Thaodan: I see, ty! Someone should add that to the github description :3 08:15:37 the other issue how willing is jolla to accept modifications by the community. ie the brower design is a bit bad to put it mildly 08:15:45 email, accounts are also asking for being open. but it is clear that the current business model requires some components to be closed 08:16:03 and damien wrote some patches for it 08:16:11 ApB, we just accepted a community PR to the browser yesterday, I believe. 08:16:14 ApB: They merged one contribution at least after some discussion. It just takes a while :3 08:16:20 Personally I think it really depends on what a customer wants, if there's a customer want wants invest into foss apps that will change. The person that pays has the say. 08:16:25 flypig: Yes, mine! <3 08:16:28 didn't notice that. appologies 08:16:29 Thats not really specific to this case thou. 08:16:34 Ah, nice, thanks Nico! 08:16:45 flypig, indeed, see https://forum.sailfishos.org/t/browser-redesign-in-sailfish-4-2-feedback-thread/7867/105 08:16:57 Thaodan: I did pay a few bucks at least :3 08:17:14 How much would I need to pay per app to have it open? ;p 08:17:20 Thank you Nico for your devotion to push this patch forward by the way ! 08:17:25 #info Nico's recent PR accepted to the browser. 08:17:28 #link https://forum.sailfishos.org/t/browser-redesign-in-sailfish-4-2-feedback-thread/7867/105 08:17:29 I remember how one of the most impressive parts of my first impression of Sailfish was that all the different communications channels (phone, text, email, chats,...) got integrated into the same UI. 08:17:29 This seems to have fallen somewhat onto the wayside as things have progressed, and eg. chat protocols don't have such OS support any longer. 08:17:29 Is this a matter of people just not doing this, or are there some closed-source hurdles on the OS side? 08:17:30 Thaodan: can you find a customer that will demand newer QT :P 08:17:44 Just a minute to go on this topic. 08:18:02 dcaliste: No worries, I was tired of having to reapply the patch anyway. Now I just need to reapply yours every time :3 08:18:11 ApB: I think never QT would be more problematic than just paying customer 08:18:34 Time to move on I'm afraid. Let's continue the discussion in General later! 08:18:40 ApB: I think new customers are always nicer so please do ;) 08:18:53 #topic lowmemory killer and memory state reporting (10 minutes -- asked by Karry) 08:19:03 Again, here's some more info about the topic. 08:19:10 #info Sailfish OS has mechanism for notifying applications when system has not enough memory (by mce daemon, via D-Bus api). 08:19:15 #info Together with lowmemory killer (kernel module) that kills applications when memory is under pressure, it maintain free memory reserve. 08:19:18 #info It is good idea. But it is not working properly on Sony mobiles without memnotify api. 08:19:23 #info Mce is counting free memory wrongly with cgroup api. And kernel lowmemory killer has multiple downsides. See: 08:19:28 #link https://forum.sailfishos.org/t/4-1-0-24-xperia-10-ii-unknown-memory-level-reported-by-mce/6856 08:19:31 #info and my blog post: 08:19:34 #link https://www.karry.cz/en/karry/blog/2021/11/07/sailfishos_memory. 08:19:36 #info So my question is, what are Jolla's plan in this area? Specifically: 08:19:39 #info - do Jolla want to use lowmemory killer in kernel in future, or migrate to user-space daemon, similar as Android does? 08:19:41 Thaodan: if i start an automotive company i'll be more than pleases to get jolla to help with the SW in the car. its just that i am missing a few billions :P 08:19:44 #info - do you agree with my conclusion that mce computes memory incorrectly? :-) what api to use, when memnotify 08:19:47 #info is not available? Cgroup don't provides enough details. I can imagine just parsing `/proc/meminfo`... 08:19:56 And the answer we prepared in advance. 08:20:00 #info We read your blog post on the topic with interest back in July and we're grateful for your work on this. 08:20:07 #info Your post did trigger us to look in to this in more detail, but work on this is still ongoing and we have made changes as a result. The latest situation is that it is still unclear if there is actually an issue on X10II after all of the current PRs are taken into use. 08:20:12 #info So in short, we are studying the issue, but it's too early to say anything about what we eventually end up doing. 08:20:16 #info To try to answer your ancillary questions directly: 08:20:23 #info 1. Since there might not be an android low memory killer in future kernels as an oom-killer, we are looking in to the latter. For example systemd-oomd and Androd lmkd are options for userspace oom killers, but we're also considering others. 08:20:28 #info 2. We agree with your conclusions, yes, but haven't yet come to a conclusion about what API is going to work best. 08:20:39 #info To add some context the lowmemory killer is a kernel module from Android that is an implementation of an oom-killer that was maintained by Google but replaced with the userspace oom-killer lmkd. We'll provide some links at the end. 08:20:42 #info We are actively working on it and we'd welcome more discussion on the topic. 08:20:48 #link https://source.android.com/devices/tech/perf/lmkd 08:20:52 #link https://man.archlinux.org/man/systemd-oomd.8 08:21:22 The answers this time are lengthy, I like it :D 08:21:53 That's good Nico, it just takes a while to get through :) 08:21:57 That's the answer. karry feel free to elaborate on your original point. 08:22:18 Thanks for the answers! 08:23:06 Great to hear that you are evaluating it. Is the discussion public somewhere? Or it was internal? 08:24:03 I think the answer is talking about internal discussion, but it can be discussed more on the forum, and here of course. 08:24:14 I will look to systemd-oomd, I am not aware of that... The key from my point is to use the same metrics in mce (memory reporting) and low-memory-killer... 08:25:21 Low-memory-killer is an Android thing we just reused that. 08:26:57 karry: same metric would be nice, but basically memory pressure metric just needs to be good enough that sailfish userspace memory hoggers have a chance to flush out stuff before oom killer gets triggered 08:26:57 IMHO the whole terminology is confusing since the kernel still has an oom-killer. 08:27:47 Thaodan: I understand it. It is good to have such mechanism even on Sailfish. The basic idea is simple. 08:27:59 I'd say PSI is quite good for that given that Android and systemd both use it. 08:28:00 isn;t systemd-oomd in a version much newer than what is used in the phone? 08:28:03 Is there a way for apps to get notified, when memory is low, so that they can drop caches? 08:28:08 #link https://www.kernel.org/doc/html/latest/accounting/psi.html 08:28:14 i think it was in 247 and the phone is on 238 08:28:50 ApB: Yes that's true but I think that's better than developing something new. 08:29:12 A couple of minutes to go on this. 08:29:13 an undate to systemd i believe will be more than welcome 08:29:54 Nico: there is https://docs.sailfishos.org/Reference/Core_Areas_and_APIs/Device_Management/Mce/, but the problem is that like karry says measuring/tracking status via cgroups has issues 08:29:56 Nico, there is "memory leve" api: https://docs.sailfishos.org/Reference/Core_Areas_and_APIs/Device_Management/Mce/ 08:30:12 I see, thanks! 08:30:36 #link https://docs.sailfishos.org/Reference/Core_Areas_and_APIs/Device_Management/Mce/ 08:31:12 Sounds like something neat to play around with, if it becomes reliable enough at some point :3 08:31:13 it was working fine with memnotify on Jolla 1 and Jolla C, but this is not upstream kernel api 08:31:34 Okay, time is up I'm afraid. Do you need more time karry? 08:31:47 Here are Fedoras docs on moving to Systemd-oomd those also can help to explain the situation 08:31:57 #link https://fedoraproject.org/wiki/Changes/EnableSystemdOomd#Can_we_integrate_this_with_GIO.27s_GMemoryMonitor_API.3F 08:32:02 no... the topic is complex. There is not enough time on the meeting... 08:32:30 Yes, sorry, it is complex. I hope you can continue in the forum, or post-meeting IRC. 08:32:35 Let's move on. 08:32:36 #topic better phone lock (10mins -- asked by lolek) 08:32:45 #info We finally get encryption even tho it's bad right now but there has been information that it will be improved which is great! 08:32:54 #info So I'd like to get back to the old idea of the picture password, more about this can be read here: 08:32:58 #link https://forum.sailfishos.org/t/picture-password/9834 08:33:10 #link https://forum.sailfishos.org/t/picture-password/9834 08:33:13 #info A special warning, please do not confuse this with Android picture password which is very very weak, it's totally different thing. 08:33:24 And our prepared answer. 08:33:38 #info This is an interesting idea, and we're always looking for ways to improve Sailfish OS security and authentication. 08:33:49 #info This particular approach has been patented by Blackberry, which would complicate it's use in Sailfish OS. 08:33:54 #info Most phones nowadays come with fingerprint support, which (when it works reliably enough) can speed up unlocking of the device a lot already. 08:34:04 #link https://patents.google.com/patent/US9064104B2/en 08:34:09 #info There are also many other approaches and there's been a lot of work done on evaluating authentication. Here are some links on the topic. 08:34:12 #link https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-817.pdf 08:34:15 #link https://www.flypig.co.uk/papers/sa-cd-gj-kk-dlj-tm-fs-2020.pdf 08:34:19 #info As well as the factors mentioned in these, another important consideration is that any alternative must fit with the existing authentication components and UI. 08:34:24 #info So please do share your ideas, we'd love to hear them, but be aware that making any change like this requires a great deal of care. One good step forward would be to provide a better mechanism in the OS for installing additional authentication methods and letting users choose what they prefer. 08:34:50 lolek, please feel free to expand on your question. 08:35:48 Maybe lolek isn't around right now. Any other comments? 08:35:50 Yeah this is what I was afraid of course that they did patent it, so maybe there would be an option to expose an api so someone could make their own unlocking screen/method. Right now I found some old app that adds android picture password but it just "press numbers in the background" 08:36:52 so your idea with providing the mechanism so someone could actually handcraft it is imho fine enough. Also please keep in mind that fringerprint unlock is generally considered as unsafe. You can even see this info on fresh android instalation. 08:37:01 (I've found that I'm getting old enough that when I do heavy work with my hands my fingerprints go missing, so I can't use them to unlock the phone) 08:37:35 ExTechOp: Don't worry, Sailfish forgets about the fingerprints sometimes too :3 08:37:57 ExTechOp: that's obvious and perfectly normal, yet right now SFOS doesn't have any safe and strong unlocking mechanism, pin/fingerprint are not. 08:38:30 lolek, so your main concern is security? 08:38:32 Probably ties in with the next question :3 08:38:38 alphanumeric -that is coming- will be good enough i think 08:38:44 (I know it's a matter of worn fingertips, since after a couple of days of just office work they start working again) 08:39:11 ExTechOp: wear gloves to protect them maybe? 08:39:54 flypig: long story short - yes. Since our mobile devices have access to our mail accounts and so on, it's important to be able to sleep well having in mind no one can spot how to unlock your phone. Also maybe that's a bit funny but a real world scenario. With fingerprint, your kid can take your phone and unlock it with your finger while you sleep to access your bank account to buy some game. 08:40:07 flypig: and with the pin code it's the same, the kid can spot it 08:40:32 Thanks for clarifying and for the examples; I was curious. 08:40:41 flypig: I'm not saying this is important as it's just matter of rising the kid but it's just to show the general problem 08:41:29 Understood. Phones are very personal devices, and different auth mechanisms have different pros and cons, for sure. 08:41:32 flypig: and imho providing some api/authentication mechanism that can be used by developer to write an app for this would probably help a lot 08:42:18 flypig: but I also do understand that for this we still need to wait first for the new implementation of encryption. I think someone from Jolla already mentioned that on the forum when I gave link to rinigus solution 08:42:55 It's convenient that we have this topic coming up :) 08:43:09 We have a couple more mins on this topic first though. 08:44:02 well from my point of view, ifJolla is willing/planning and will provide auth mechanism to allow crating apps that will unlock the phone i.e. replace the built in solutions, I think the only question is when we can see it say that, this year, or next year or even longer? 08:44:40 I don't think there's any timeline to provide right now, I'm afraid. 08:44:41 For my pov the issue is the UI side, from the backend side there's pam which can be extended. 08:44:55 And of course planing everything. 08:45:21 Time is up. Since the next topic is related, I suggest we move directly on. 08:45:35 #topic Use of FOSS storage encryption solution as a base for official storage encryption on SFOS (15 min -- asked by rinigus) 08:45:38 This is the final topic for the meeting today. Some more detail. 08:45:39 flypig: ok let's do this... consider this topic has been handled and I'll remind it in the next few months if this has been on the agenda - i.e. there are some estimations when we can see this. 08:45:50 Thanks lolek! 08:45:55 #info There is an open source storage encryption solution that has been enrolled on some unofficial ports. 08:46:01 #link https://github.com/sailfishos-open/sailfish-device-encryption-community 08:46:09 #info It has support for plain LUKS alphanumeric passwords, passwords backed up by Android HW security solutions, integration with SFOS Settings, to name the few. 08:46:13 #info The license has been selected to allow such integration (GPLv2). 08:46:17 #info So, I wonder whether Jolla would consider joining forces and develop its future alphanumeric solution using our code for it as a base. 08:46:27 And this is the answer we prepared. 08:46:32 #info Sailfish Device Encryption has been in use since Sailfish 3, integrated to our Settings, Startup Wizard flow, multi-user flows, minui-based unlock UI shown in the boot sequence, etc. 08:46:40 #info Replacing it now partially or fully with another solution (which lacks these integrations) would not be a small undertaking. 08:46:48 #info In comparison the alphanumeric support is smaller, much more incremental addition that we have already developed (unfortunately in parallel to the community work), and are now finishing up. 08:46:55 #info The community implementation uses hardware-assisted encryption using the Android Keymaster API, which is a nice improvement over the original solution, but unfortunately seems to only use non-authenticated keys. 08:46:59 #info Further getting the Keymaster API is often complicated due to the varying support and closed nature of vendor TEE implementations. 08:47:05 #info We do follow these activities with a lot of interest, e.g. if there are different ways to extend the usage of TEE further in the OS as improving the security is a very important goal for us. 08:47:21 Do we have rinigus here? 08:47:26 yes 08:47:44 Great. Please do feel free to expand, etc. 08:48:10 well, I would say community version has all the same integrations (settings, wizard is separate as you have it closed source) 08:48:37 minui is not used for simple reason - you need android layer booted up to use hw integration 08:49:04 so, you can get already full silica stack for UI 08:49:37 I don't understand what you mean by "unfortunately seems to only use non-authenticated keys" 08:50:18 jpetrell, is that something you could expand on? 08:51:17 also, how is encryption related to multi-user flows? there is a settings module that should work for all users. in addition, it actually allows each user to have their own LUKS password 08:51:22 afaik you need to use GateKeeper with KeyMaster to use authenticated keys 08:52:46 you can bootup to silica UI for unlocking encryption, but that is slower 08:53:17 jpetrell: the used key mechanism as done in community edition would work even if the phone is cracked in root access mode. such as if someone boots into recovery. as LUKS key is available via signing by RSA (same mechanism as used by Android btw) and that is done in rate limited manner, it is not relying on any android extra protection to keep you safe 08:53:30 not sure I replied to your gatekeeper concern 08:53:35 hopefully I did 08:54:43 as for use of silica for unlocking being slower - well, how many times do you boot in practice? this allows you to have proper security (due to TEE involvement), something that you cannot do early in the boot 08:55:11 Don't you need to fully boot the OS in the end anyway? 08:55:25 yeah it is definitely not _the reason_, but one concern 08:55:33 it = performance 08:55:43 what I would argue is that just having alphanumeric pwd is insufficient and you need some hw backing anyway 08:56:15 jpetrell: note that UI can be redone in minui, I just didn't see a reason for it 08:56:28 I've understood that the protection you get from TEE can be compromised if others can get access to the key, which is a risk with non-authenticated keys 08:56:55 Since bootloader are mostly unlocked keymaster is affected or is it? 08:57:41 unless you break into TEE, that signing key sits there and allows you to sign once in 3 or 5 seconds. that key is not really available outside device for cracking, if it is what you mean 08:58:11 Just for info, we have another 5 mins on this topic. 08:58:14 so, if you are limited to one try in 3 seconds, on the phone only, your alphanumeric pwd becomes way stronger 08:58:39 true 08:58:56 jpetrell: what I have seen from Android APIs was that key protection assumes that root is protected. which we don't have in recovery 08:59:20 hence the solution was to rely on something that can withstand root 09:00:35 any other concerns preventing the switch? 09:00:59 Could you elaborate on how the signing is turned into the LUKS key? 09:00:59 well I'm voting for what rinigus done if I may add cause only adding alphanumerics to current solution is improvement for sure but imho still not enough 09:01:07 as far as I understand, you prefer to continue using closed source implementation 09:01:32 (or maybe you have a good link on the topic) 09:01:41 you said community version has all the same integrations, and then listed settings, wizard, boot flow not being integrated, which was kind of the main points 09:02:08 One more minute on this topic. Time to wrap up I'm afraid. 09:02:11 Hm it does have those 09:02:17 flypig: your password that you enter is salted by argon first. result is signed by RSA and that is used for LUKS 09:02:24 only wizard is separate 09:02:28 since its closed source 09:02:34 Perfect, thank you rinigus. 09:03:03 settings is there; wizard had to be separate as yours is closed source; boot flow is integrated 09:03:21 Okay, let's move on to general discussion. You're welcome to continue with this topic there of course. 09:03:36 #topic General discussion (20 min) 09:04:05 bonus, in addition to hw keys support, is ability to have encryption for ports that have /home together with /. this is via loopback device that is encrypted and used to provide /home for such ports 09:04:18 in addition, you can switch off encryption if you wish 09:04:37 jpetrell: reply above 09:05:51 I look at the two implementations and no migrating to community version is not trivial. and we have alphanumeric encryption done in parallel already so it would be hard to justify the switch 09:05:53 (unrelated to the encryption) sfos as a distro feels more cluttered and complex than that of my normal pc. granted a phone is different but is it only me that feels that or its because things have pilled up and dragged along since its begining 09:06:29 jpetrell: But the community version has a lot more features, is open source and works on ports! 09:06:56 Apb, could you elaborate on what you mean by "cluttered"? The UI, the package structure, the filesystem? 09:07:09 Nico: it has other features, not much more features. open source and ports are sure nice :) 09:07:48 Fair 09:08:08 let me ask in relation to encryption - do you now unbind /home LUKS key from PIN? 09:08:19 in future? 09:08:20 I think community encryption has more features regarding security like locking / and the salting and signing of the password 09:08:22 flypig: the filesytem. it seems like we have a million different conf files compared to my pc 09:09:13 Thanks for the clarification. 09:09:18 as for transition from closed source to community implementation: it is all packaged and in use already. I can tell you which package to replace in your package list :) 09:09:22 Apb: Its very similar some packages have workarounds for sandboxing or use older style of config files (like shipping default config fikles into /etc). 09:10:39 I've been thinking about the hardware officially supported for Sailfish by Jolla. Could there be devised a process (likely involving money) where a community port for some device could be transformed into a part of the "core" Jolla-supported devices? 09:11:00 Thaodan: to me it feels kind of different TBH. even the whole multi user thing feels different to what i do on a normal pc. (that might be related to the gui thouhg) 09:11:08 I'd say switching between community encryption is quite easy for ports. I didn't replaced an existing install but using it in a port is easy. I use official encryption and another one that works on kumano ports (voidanix) switch to community encryption in one commit. 09:11:13 ExTechOp, I feel like having a way to get jolla apps on it is more important 09:11:22 Like Android support :3 09:11:40 Apb: That's mostly ui stuff which is different, the rest is quite similar. 09:11:40 Although Jolla adopting popular ports could be interesting 09:11:41 Nico Well, yes, this is kinda what I was thinking of when I said "Jolla-supported" 09:11:49 regarding more features: well, it is done till the last step taking into account HW integration. also knowing that you can examine security related code in open is an important aspect. something that your company customers can, but not the end users of them 09:12:12 ExTechOp: Afaik there were some plans for that, but they probably happen in Jolla time 09:12:20 ie. i create users with systemd-homed but writing a gui around that should be easy probably 09:12:40 (assuming systemd was new enough) 09:12:41 jpetrell: to my understanding, Jolla's alphanumeric will be just that without HW backed keys 09:13:59 as said in the intro we are looking at utilizing TEE more 09:14:36 Nico What I kinda was thinking of was the Fairphone4 09:15:28 ExTechOp: The FPs are certainly far too undersupported :3 09:16:11 And now for something completely different: are there any dates yet for the Xperia 10 III support (I think SFOS 4.4)? 09:16:25 fairphones (from a hw pov) don't compliment sfos 09:16:32 but nothing does sadly 09:16:55 Er, what does "don't compliment" mean? 09:17:01 ExTechOp: I feel like Jolla hates giving dates, but it was mentioned early 2022 in the community news, afaik 09:17:04 sie wise 09:17:07 size 09:17:21 ExTechOp, I don't think we have *new* info to share on 10 III release dates. Some broad times were already mentioned elsewhere. 09:17:27 and specs but i can live with tht 09:17:45 ExTechOp: you can build it yourself already :) https://github.com/sailfishos/docs.sailfishos.org/blob/aed11a16662f1e76b9be9d9e5b2e20b9394ada46/Develop/HW_Adaptation/Sailfish_X_Xperia_Android_11_Build_and_Flash/README.md 09:18:04 (PR will be merged RSN https://github.com/sailfishos/docs.sailfishos.org/pull/21 ) 09:18:33 sledges There is a reason why I'm "community" and not "developer", I have too many things going on as it is :-/ 09:18:37 Also, now that the first browser patches have been merged, Jolla should take a look at the other ones :3 09:18:37 well, in the end, it is Jolla's choice regarding encryption implementation. before I started working on it, everyone were tight-lipped and did not reply on official forum regarding any alphanumeric plans. so, I managed to implement and roll it out and only after that some noises from Jolla camp arrived that you have it in works. fortunately, implementation is quite complete and I can use it as long as I wish despite official SFOS 09:18:37 decision 09:18:46 The ones from dcaliste look great! 09:18:53 Nico, we will! 09:18:58 ExTechOp: you as in plural, also one doesn't need to be developer to build this one (that's why porters community is that big:) 09:19:05 flypig: FASTERRRRR! <3 09:19:16 Also its helpful to look into the upstream bugtracker for issues. https://github.com/sonyxperiadev/bug_tracker/issues 09:19:38 most of the relevant bugs linked in the PR 09:19:47 "need to reflash every 7 boots" o: 09:20:00 that has a fix already 09:20:02 Nico, I know, it's taken a while. I'm afraid that is the nature of the process as you know. But we will try, and thanks for the prod :) 09:20:14 Nico: and, reflash only boot partition btw 09:20:37 We have 5 more mins of general discussion. 09:20:50 flypig: No worries, I've got time. I'm mostly just joking around at this point. I am still super hyped my patch got merged after all 09:21:25 Nico, it's good on many levels :) 09:21:27 flypig: I think the PR on long press to close is less controversial than the pull down menu to add a new tab ;) 09:21:27 sledges: That sounds fun :D 09:21:43 How is the VoLTE/VoNR proceeding? Is Jolla happy with the progress? ;-P 09:21:46 what rinigus said about the info on the encryption is the only sad part. its bad to have people working on the same thing in parallel 09:22:14 Having a way to trigger pulleys on long phones would be great .-. 09:22:20 Or in long lists 09:22:25 rather 09:22:40 Nico: like i said, fix was found 09:22:44 dcaliste, yes, I agree :) They're nice changes, but all design changes require careful consideration... of course! 09:22:51 08:17 < ExTechOp> This seems to have fallen somewhat onto the wayside as things have progressed, and eg. chat protocols don't have such OS support any longer. 09:23:07 there was a community effort, search web for "08:17 < ExTechOp> This seems to have fallen somewhat onto the wayside as things have progressed, and eg. chat protocols don't have such OS support any longer. 09:23:18 *"build.sailfishos.org kaffeine telepathy" 09:23:37 in hopes that it could be picked up again by someone 09:23:51 Just 2 more mines on this now. 09:24:18 flypig, sure, there is no hurry. While looking a bit less consistent the current behaviour is in my opinion quite alright already anyway.. 09:24:21 mines? o.o 09:24:30 Yet another different question: has anyone built a camera app for the multi-camera hardware like Xperia 10 devices to trigger cameras simultaneously, so as to produce pictures at multiple zoom levels? 09:24:45 sledges ExTechOp: Kaffeine did spend some time into pushing those but he could not do it alone. 09:25:15 dcaliste, I appreciate you saying so, and it's also good to have your changes. It certainly generates discussion. 09:25:17 ExTechOp: from community i bet it's piggz who could implement in this advanced camera app 09:25:36 There was also work into using a newer connection manager for tel:// calls that is already used by ubports. 09:25:50 We're wrapping up now I'm afraid. Final words? 09:26:05 And does anyone want any conclusions logged to the minutes? 09:26:05 will something break bad in the OS if i modify the defaultuser name to something else? 09:26:09 In general it requires more manpower. 09:27:00 Alright, time to wrap up. Thanks for all the excellent discussion today. 09:27:06 #topic Next meeting time and date (5 min) 09:27:08 Final words for flypig: Thank you and everyone else for the meeting. It was a very enjoyable experience! 09:27:18 Nico, great, thank you! 09:27:19 Proposing Thursday 3rd February at 08:00am UTC 09:27:26 Any objections? 09:27:31 flypig: see. we were cool. we didn't start a fight or something :P 09:27:43 Hit us up in #sailfishos or #sailfishos-porters if you want to contribute 09:27:52 PRs always welcome 09:28:06 Apb, thank you for the orderly behaviour :) Everyone here gets gold stars! 09:28:13 2022-02-03T08:00Z works for me! 09:28:21 Thaodan, link me the email app repo please for my PRs ;p 09:28:45 Alright, we're going for the 3rd then. 09:28:49 #info Next meeting will be held on Thursday 3rd February 2022 at 08:00am UTC: 2022-02-03T0800Z 09:29:00 That's it. Have a good fortnight everyone! 09:29:02 #endmeeting