Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

Uncategorized
32 18 0
  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin And how do you block all that in uBlock? Thanks.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin What about Mistral ? This is the one I use.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 I get no trackers and no fees with KoboldCPP. 🤪

  • @k3ym0 @ublockorigin And how do you block all that in uBlock? Thanks.

    @dancingtreefrog @ublockorigin download the browser extension! it will work with the default config :)

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 oh man, is all of this just in the js console? i wanna see :D

  • @k3ym0 oh man, is all of this just in the js console? i wanna see :D

    @Viss ask and you shall receive.

  • @k3ym0 @ublockorigin What about Mistral ? This is the one I use.

    @OlivierBurnier @ublockorigin

    Mistral: two blocked requests.

    Cloudflare Insights ("is the site up") and a single Intercom beacon POST that didn't even retry.

    that's it. no Statsig. no tracking GIFs. no Google Analytics. no distributed tracing. no proof-of-work challenge. no KETCHUP_DISCOVERY_CARD. nothing.

    a French AI company nobody talks about is running the cleanest frontend in the entire field by a factor of roughly 150x and we're all sleeping on it

    les français ont tout compris

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin
    I don't understand all of that but it sounds worse than what Snowden told us!

  • @dancingtreefrog @ublockorigin download the browser extension! it will work with the default config :)

    @k3ym0 @ublockorigin I have uBlock Origin, been using it for many years. I didn't know it blocked all that LLM stuff. Thanks.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0

    I use Claude Code, which runs outside the browser. Do you think pihole can block disproportionate requests as well as uBlock blocks browser requests?

  • @k3ym0

    I use Claude Code, which runs outside the browser. Do you think pihole can block disproportionate requests as well as uBlock blocks browser requests?

    @siklist pihole can block requests by fqdn, but as you’ll notice, a lot of the third-party tracking infra was being proxied through other non-tracking infra to get around this. If Claude code is somehow loading in JS artifacts (idk if it can or not) it could bypass pihole.

  • @k3ym0 @ublockorigin I have uBlock Origin, been using it for many years. I didn't know it blocked all that LLM stuff. Thanks.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin
    > Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.

    I was working on an internal analytics dashboard at some other Very Large Company What Competes With Google and someone pushed a change to fetch and run an analytics package directly from Google servers. I had to spend almost a week ripping out their changes and redoing the analytics using a lib that wasn't directly sourced from our primary competition (also I'm pretty sure the way it was used violated it's license).

    So yea my lack of surprise is palpable.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 can you translate for us older genx non computer folks? thanks

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin lowkey curious about lumo ai by proton

  • @k3ym0 can you translate for us older genx non computer folks? thanks

    @sergiodomeyko every time you open one of these AI chat websites, before you type a single word, the website is secretly making hundreds of connections to other companies’ servers in the background.

    those connections are sending those companies information about you — what browser you use, what computer you have, your screen size, your timezone, sometimes a unique digital fingerprint that can identify you specifically.

    you’re paying a monthly subscription for these AI tools, and they’re ALSO selling information about how you use them to analytics companies, ad companies, and in Google’s case, adding it to the giant file they already have on you from Gmail, Search, Maps, and everything else.

    uBlock Origin is a free browser extension that blocks all of this. it’s like a bouncer for your browser. Lmk if you want some help installing it :)

    hope that helps. welcome to the modern internet - it’s a mess out here.

  • @cloud @k3ym0 @OlivierBurnier @ublockorigin

    Huh, free-online Mistral handles COBOL requests better than free-online Claude. At least the code is complete and compiles.

  • @sergiodomeyko every time you open one of these AI chat websites, before you type a single word, the website is secretly making hundreds of connections to other companies’ servers in the background.

    those connections are sending those companies information about you — what browser you use, what computer you have, your screen size, your timezone, sometimes a unique digital fingerprint that can identify you specifically.

    you’re paying a monthly subscription for these AI tools, and they’re ALSO selling information about how you use them to analytics companies, ad companies, and in Google’s case, adding it to the giant file they already have on you from Gmail, Search, Maps, and everything else.

    uBlock Origin is a free browser extension that blocks all of this. it’s like a bouncer for your browser. Lmk if you want some help installing it :)

    hope that helps. welcome to the modern internet - it’s a mess out here.

    @k3ym0 thank you. For your explanation. I will look into it.

  • @cloud @k3ym0 @OlivierBurnier @ublockorigin

    Huh, free-online Mistral handles COBOL requests better than free-online Claude. At least the code is complete and compiles.

    @jakebrake @cloud @OlivierBurnier @ublockorigin i’m fucking terrified to ask why you know that.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin Fascinating and worrisome. For the less technically adept… would uMatrix be as effective? Or are these specific capabilities of uBO?


Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • 0 Votes
    12 Posts
    0 Views
    @ohir I do fear you are right.Right now it's quite some muddy waters, where several forks appearing. And some have even disappeared. These muddy waters need to calm down at some point.For a fork to be sustainable, it need to have enough contributors and users. Contributors need to cover development, needed infrastructure, support and (what you mention) finances to keep things rolling.I don't think it's sustainable that we have so many forks appearing these days. The strongest ones of them should unite and setup a non-profit organisation, which others could join as well. Perhaps using a similar model as Codeberg.With such a joint effort, the marketing towards end users can be much more uniform and targetted, which would be easier for users to relate to. Just as Firefox managed to take over the position of Netscape (even though Firefox was spun out of Netscape, so not directly comparable).I would truly encourage @librewolf, @zenbrowser, @Waterfox, @konform and other forks to get together and look at the possibilities to collaborate on a broader scale. I don't say they should abandon their own "uniqueness", but that they can find a way to help contribute to a more healthy and sustainable environment for important forks to actually survive and be sustainable. Have something "shared" at the core across all forks, where they can build their own uniqueness from. Have a shared vision and mission statement, have a united front for a privacy respecting browser family.
  • 0 Votes
    2 Posts
    13 Views
    and it's already in Debian!Thanks @play0ad and thanks Debian Games Team!and goodbye everybody else, it was nice knowing you :D
  • 0 Votes
    2 Posts
    11 Views
    Read more and how you can get involved to stop this here: https://www.patrick-breyer.de/en/chat-control-2-0-through-the-back-door-breyer-warns-the-eu-is-playing-us-for-fools-now-theyre-scanning-our-texts-and-banning-teens/
  • 0 Votes
    1 Posts
    11 Views
    Many things happening in #LibreOffice right now! Markdown support is coming, we've had events in Italy, Cuba and the Czech Republic, and the software is being updated: https://blog.documentfoundation.org/blog/2025/10/31/libreoffice-project-and-community-recap-october-2025/ #foss #OpenSource #freesoftware