Also, if anyone needs an APK, I could extract it and send it.
On Tue, Apr 7, 2020, 05:31 Samuel Sloniker <scoopgra...@gmail.com> wrote:

> I personally like 1 or 4. Also, I think this is a good opportunity to use
> Material Design.
>
> On Tue, Apr 7, 2020, 02:44 Tino Didriksen <m...@tinodidriksen.com> wrote:
>
>> Well, that makes sense from a security point of view. And that is a good
>> reason to revive the native port, which I talked about on IRC but never
>> wrote about to the mailing list.
>>
>> IRC logs:
>>
>> https://tinodidriksen.com/pisg/freenode/logs/%23apertium/search.php?q=TinoDidriksen+Android
>>
>> On 2015-11-25, I started seriously looking into getting all the C++ tools
>> running natively on Android. Two weeks later (2015-12-07), everything
>> worked - I had the Simpleton UI running on Android, with the native tools
>> run as-is in the well-known pipes, with data files compiled on Debian.
>>
>> At the time, I did not go further with it. There were some random crashes
>> due to memory corruption bugs, which I think have all been ironed out by
>> now.
>>
>> So what we need is an app that ships with the released binaries and
>> downloads language data from us ( https://apertium.projectjj.com/pkgs.php
>> ).
>>
>> -- Tino Didriksen
>>
>>
>> On Tue, 7 Apr 2020 at 10:57, Jacob Nordfalk <jacob.nordf...@gmail.com>
>> wrote:
>>
>>> Hi there,
>>>
>>> It seems that, for security reasons, its not permitted anymore for apps
>>> to download executable code from unknown sources and execute it.
>>>
>>>
>>> So, Apertium_Android <http://wiki.apertium.org/wiki/Apertium_Android> is
>>> currently unavialable
>>> https://play.google.com/store/apps/details?id=org.apertium.android
>>>
>>> Same goes for Mikel Artetxe's Mitzuli version
>>> https://play.google.com/store/apps/details?id=com.mitzuli
>>>
>>> They are both using Lttoolbox-java
>>> <http://wiki.apertium.org/wiki/Lttoolbox-java>.
>>> Google probably found out as we use .jar file format (which is
>>> essentially a ZIP file) as distribution mechanism (see
>>> Language_pair_packages
>>> <http://wiki.apertium.org/wiki/Language_pair_packages>) - here is an
>>> example
>>> <https://svn.code.sf.net/p/apertium/svn/builds/apertium-eo-en/apertium-eo-en.jar>
>>> .
>>>
>>> While I totally agree with the principle of not downloading code from
>>> unknown sources, I recon that this is essentially what the
>>> Bytecode_for_transfer
>>> <http://wiki.apertium.org/wiki/Bytecode_for_transfer> - is:  Java
>>> bytecode representing the transfer stage downloaded and executed with no
>>> security measures.
>>>
>>> I can see the following options:
>>> 1) Change the distribution mechanism to be via Google Play
>>> 2) Distribute the transfer files as XML and generate the bytecode
>>> on-device
>>> 3) Give up on bytecode for tranfer (transfer will be much slower)
>>> 4) Try to make C++ version of lttoolbox, apertium (CG, HFS,...) usable
>>> in Android
>>> 5) Give up on offline functionality
>>>
>>> While 3) was really terribly slowing transfer down 10 years ago, our
>>> computers have got faster. And most pairs are using constraint
>>> grammar which is also very slow, compared to the rest of the pipeline, so
>>> it might not be an issue anymore.
>>>
>>> I like 2) the most - moving the transfer compilation to the device
>>> wouldnt be that hard, and I'd be happy to take part of it.
>>> But the community was never very positive to the idea of Java/cross
>>> platform, and Im not very active anymore, so perhaps 4) or 5) would be best.
>>>
>>> What do you think?
>>>
>>>
>>> Yours,
>>> Jacob
>>>
>>>
>>> ---------- Forwarded message ---------
>>> Fra: Google Play Support <no-reply-googleplay-develo...@google.com>
>>> Date: tor. 26. mar. 2020 kl. 12.49
>>> Subject: Notification from Google Play about Apertium offline translator
>>> To: <jacob.nordf...@gmail.com>
>>> Cc: <jacob.nordf...@gmail.com>
>>>
>>>
>>> Hi Developers at Jacob Nordfalk,
>>>
>>> After a recent review, Apertium offline translator,
>>> org.apertium.android, has been removed from Google Play due to a policy
>>> violation. This app won’t be available to users until you submit a
>>> compliant update.
>>>
>>> *Issue: Violation of Malicious Behavior policy*
>>>
>>> An app distributed via Google Play may not modify, replace, or update
>>> itself using any method other than Google Play's update mechanism.
>>> Likewise, an app may not download executable code (e.g. dex, JAR, .so
>>> files) from a source other than Google Play.
>>>
>>> *Next steps: Submit your updated app for another review*
>>>
>>>    1. Read through the Malicious Behavior
>>>    
>>> <https://www.google.com/appserve/mkt/p/AMJ1musJKr8qkMQakDDQcP85Ci30Th_7hJC34WsK2Gdcj4f-KbpeccyeErPwHguYvtDp63WELMB5k5HZMMCySYstp9rFX8BMfktKghIYcDkgvhBozFMUroqRsjvL5hNxMA6CV4lunQ>
>>>    policy for more details.
>>>    2. Make changes to bring your app into compliance.
>>>    3. Make sure that your app is compliant with all other Developer
>>>    Program Policies
>>>    
>>> <https://www.google.com/appserve/mkt/p/AMJ1mutzZL69jSgYNey4hex2X3HD4hMEJKguGicoYy08auSz6n1DVAH9YG-_22nzNmsO6gazq7a2TG88FLbFsB3I0fNWLqVxk92FDS4LmwP4kQnlldtk1udf9VG6Dqgz>.
>>>    Additional enforcement could occur if there are further policy 
>>> violations.
>>>    4. Sign in to your Play Console
>>>    
>>> <https://www.google.com/appserve/mkt/p/AMJ1muvx6ujxOuQ7_cAP1tltq6YzgCj5E3BtjfgXD4Mus1cx6mVL22NS_i2n4MzbdbW_jwcyjShpYOK8lFS_qEC3KxOweo0tJQ>
>>>    and submit the policy compliant update.
>>>
>>> You may also be interested in exploring Dynamic Delivery
>>> <https://www.google.com/appserve/mkt/p/AMJ1mute3oPIh_9GS4yOYSgipgMFxkWDaGTJCjH061wskPVXSGOGvJRrSEZ2y-0fvgyZEz7D5Yqco0upDfQ8Ig4ax_7ezY19BzvFWkdLGGc2DrISwNtbu2dGJMqK>
>>> as an alternative implementation.
>>>
>>> If approved, your app will again be available with all installs,
>>> ratings, and reviews intact.
>>>
>>> If you’ve reviewed the policy and feel this decision may have been in
>>> error, please reach out to our policy support team
>>> <https://www.google.com/appserve/mkt/p/AMJ1mutEUzx4qAR8EYpzTyoWLfOhZFtbpmFZFQlu400WKR5iaAJrwdv_kJg0h-AntjCshx0I8Q3vwJk8iReGNCC7Qdbd3FdQlrgolB-QWesSfDBvvRG3hlmr9FRnCkM3fWbzIQcwB0w-qNR0wQ-NG5TJ90bdZ9yzoptmq23JsZe224OaE8GRj9EPdO3fL3nNFyS2p9KasMsLyJXqFevdcvwtrsfbASpzwZMu4B2PXQg6FGCosFU2beUAeWYCi0j4BNGsb8bdl-nBN1U>.
>>> We’ll get back to you within 2 business days.
>>>
>>> Please help us improve the developer experience by completing this two
>>> question survey
>>> <https://www.google.com/appserve/mkt/p/AMJ1muv5MM8tBYHJaXG840897eGG7cMYJRA7xr_ksR9QjdkFp1hNWFSr2eyLBYSdsVqQycz-CooPRnCsZBPM9s3UxihjsE6U089lNGBrFHpnb_30elOXtNxBeR3cFk601t-yNplhCEBW9sDFdgM1afDZkB7voYKH_3jk1Mf_zUju2Oguo_zyF9Nkj3wJ3XNHY8gk9IrVkSkBmzSgZmnFBCI>
>>> .
>>>
>>> Regards,
>>>
>>> The Google Play Team
>>>
>>>
>>> --
>>> Jacob Nordfalk <http://profiles.google.com/jacob.nordfalk>
>>> Androidudvikler og -underviser på DTU
>>> <http://www.dtu.dk/service/telefonbog/person?id=78778&tab=7#tabs>
>>> Tlf 26206512 - javabog.dk
>>> _______________________________________________
>>> Apertium-stuff mailing list
>>> Apertium-stuff@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/apertium-stuff
>>>
>> _______________________________________________
>> Apertium-stuff mailing list
>> Apertium-stuff@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/apertium-stuff
>>
>
_______________________________________________
Apertium-stuff mailing list
Apertium-stuff@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/apertium-stuff

Reply via email to