Deutsch   English   Français   Italiano  
<vmrca2$98b$1@nnrp.usenet.blueworldhosting.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: Marion <marion@facts.com>
Newsgroups: comp.mobile.android,uk.telecom.mobile
Subject: Re: NewPipe retry anomaly in version 0.27.4
Date: Wed, 22 Jan 2025 18:10:10 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <vmrca2$98b$1@nnrp.usenet.blueworldhosting.com>
References: <vmm83g$mri$1@nnrp.usenet.blueworldhosting.com> <vmp1t2$9jme$1@solani.org> <vmpk2i$1arp$1@nnrp.usenet.blueworldhosting.com> <vmqcu2$tavd$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 22 Jan 2025 18:10:10 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
	logging-data="9483"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: tin/1.6.2-20030910 ("Pabbay") (UNIX) (CYGWIN_NT-10.0-WOW/2.8.0(0.309/5/3) (i686)) Hamster/2.0.2.2
Cancel-Lock: sha1:uM/WoyFP41LicTSo8/7BEjgn838= sha256:0rSmbjXgxus1ZugfptVn+j8ARuYYcAAhuMIoIYqiCMM=
	sha1:9tTCz9XCTuzbl1Z3IyR3fZn4oP4= sha256:jyobh/PwbBl8tjdlGQL8Zehrk+z5fOjRowF3MfiQbSc=
Bytes: 5801
Lines: 117

On Wed, 22 Jan 2025 17:14:41 +0800, Edward.C wrote :


>> That NewPipe debug version 0.27.2 worked just now in my first test:
>> <https://i.postimg.cc/vT2wZhxf/20250122-newpipe-debug.jpg>
> 
> litextex posted the debug version under this comment:
> https://github.com/TeamNewPipe/NewPipe/issues/11934#issuecomment-2605756655
> 
> Nothing flagged as malicious:
> https://www.virustotal.com/gui/file/9694b02e5c6b042076b0c8d434995162aba0b53eded089ef0fcc5f3ee6388fd7
> 
> But I'm not comfortable installing a debug version - will wait for a 
> release.

To always strive to kindheartedly add additional value in every post... 

Thanks for the data as together we can help each other much better than any
one of us, all alone, can figure out what works versus what doesn't work.

Whenever this happens again, it's worthwhile to test the similar YouTube
replacements, which are, to my knowledge, at least some of the following:
 FreeTube
 <https://github.com/MarmadileManteater/FreeTubeAndroid>
 <https://freetubeapp.io>

 PipePipe
 <https://github.com/InfinityLoop1308/PipePipe>
 <https://f-droid.org/en/packages/InfinityLoop1309.NewPipeEnhanced/>

 SkyTube
 <https://github.com/SkyTubeTeam/SkyTube/releases>
 <https://f-droid.org/en/packages/free.rm.skytube.oss/>

 YouTube Vanced/Revanced
 <https://revanced.net>

 Invidious/Clipious
 <https://invidious.io>
 <https://github.com/iv-org/invidious/releases>
 <https://sourceforge.net/projects/invidious.mirror/>

 <https://github.com/lamarios/clipious>
 <https://f-droid.org/en/packages/com.github.lamarios.clipious/>
 
 
For Android TV, which I know little about, there seems to be these???
 SmartTube
 <https://smarttubeapp.github.io>
 <https://github.com/yuliskov/SmartTube>
 <https://smarttube.app>
 
 SmartTubeNext???
 <https://smarttubenext.com> ???
 <https://smarttubenext.org> ???

See also other options such as GrayJay & PeerTube, which I don't know much
about, as they're not strictly a one-to-one YouTube APK replacement:
 GrayJay
 <https://grayjay.app>
 <https://github.com/futo-org/Grayjay.Desktop>

 PeerTube
 <https://joinpeertube.org>
 <https://peertube.tv>

But for downloading YouTube videos, these use yt-dlp clipgrab code:
 Seal
 <https://github.com/JunkFood02/Seal>
 <https://f-droid.org/en/packages/com.junkfood.seal/>

I'm striving to add additional value so please help me & everyone here!
Any other Android privacy-aware YouTube replacements that folks know of?

Back to the debug version, there seems to be an official fix for you, 
which I found in that link you kindly provided to the litextex post on the
11934 bug report which was opened 5 days ago (when I started seeing random
recoverable errors - but then about yesterday my errors were no longer
recoverable).

From reading that report, others reported similar randomness in the errors.

There is internal code, which (unfortunately) is termed the IOS client
(although it has nothing that I know of to do with Apple's similarly named
OS) which seems to be faulting recently, which is causing the problems.

Apparently 7 hours ago they released v0.27.5 with the fix to this issue:
 <https://github.com/TeamNewPipe/NewPipe/releases/tag/v0.27.5>
 <https://github.com/TeamNewPipe/NewPipe/releases/download/v0.27.5/NewPipe_v0.27.5.apk>
 Name: NewPipe_v0.27.5.apk
 Size: 11833333 bytes (11 MiB)
 SHA256: BE4DE6C74E197396013E28647F0C52ED6D996945B6C51595B34476CCC6AB7C07

EDITORIAL on PRIVACY:

Most people don't know anything about Android and yet most of them errantly
complain to the tune of "there is no privacy on Android". There is privacy
on Android (paradoxically it's actually iOS that has no hope of privacy).

It's my humble opinion that those who complain there is no privacy on
Android, and who deprecate those of us who do have privacy, are simply
whining that the real problem is that they are afraid to have privacy.

These two steps, for example, on unrooted Android, provide some privacy:
 1. Install any one of the many privacy-aware FOSS YouTube clients
    (for example: <https://newpipe.net>)
 2. Delete the Google YouTube client the instant you get your phone
    C:\> adb shell pm uninstall -k --user 0 com.google.android.youtube
         (keeps youtube's data/cache)
    C:\> adb shell pm uninstall --user 0 com.google.android.youtube 
         (deletes youtube's data/cache)
-- 
Those who complain about privacy are those who know the least about it.