moonpiedumplings

joined 2 years ago

My recommendation is meetup and a website for advertising purposes. Meetup is frustrating, yes, but at the same time it's where I have found almost all the linux and tech groups near me.

[–] moonpiedumplings@programming.dev 6 points 3 days ago (1 children)

Familiarity instead of compatibility.

This piece of documentation from forgejo, about how their actions are mostly github actions compatible is how I feel about this or similar endeavors.

I really like KDE, because it's familiar enough to Windows users that they can just kinda use it. Many of the shortcuts are the same. But I've had a bad experience with things that try to emulate Windows more completely, because people begin to expect some windows idiosyncracy or some other thing to be there. And then they get frustrated when it's not the same.

KDE manages to be "close enough", which results in a better experience.

Yes. My high school used to do this. UDP blocked except for DNS to some specific servers, and probably some other needed things.

Gnome used to much worse when it comes to ram usage, so the inertia of those sentiments still carry.

Kde used to be much worse, using what gnome uses now, but now kde has similar ram usage to xfce last time I tested. CPU wise it's still much worse though.

[–] moonpiedumplings@programming.dev 3 points 1 week ago (1 children)

I’ve heard of thumbnails being used to deliver malware.

You've heard of critical vulnerabilities in media processing applications that mean that thumbnails can theoretically be used to be spread malware. That is not the same as "this issue was being actively exploited in the wild and used to spread malware before it was found and patched".

These vulnerabilities, (again, cost money), and are fixed rapidly when found. Yes, disabling thumbnails is more secure. But I am of the belief that average users should not worry about any form of costly zero day in their threat model, because they don't have sensitive information on their computers that makes them a target.

[–] moonpiedumplings@programming.dev 2 points 1 week ago* (last edited 1 week ago) (3 children)

less distro-dependent like a privilege escalation attack

These also are valuable. Less valuable than browser escapes IMO though.

A keylogger is more likely, and it's just as possible with sudo as it is with run0. They would replace sudo, run0, doas, etc with a fake command (since that only require access to the user), that either keylogs, or inserts a backdoor while it does the other sudo things.

I’ve heard a fair few times about thumbnailer attacks, but no real detail from KDE about what if any mitigations they have in place.

Please ignore the entire cybersecurity hype news cycle about images being used to spread malware. They often like to intentionally muddy the waters, and not clearly explain the difference between a malformed file being used as a vulnerability to exploit a code execution exploit, and an image file being used as a container for a payload (steganography). The former is a big deal, the latter is a non issue because the image is not the issue, whatever means the malware actually used to get onto the systems is.

Here's a recent example of me calling this BS out. The clickbait title implies that users got pwned by viewing a malicious image, when in actually it was a malicious extension that did the bad things.

Unless you are using windows media player, the microsoft office suite, or adobe acrobat, code execution from loading a media file is a really big deal and fixed extremely quickly. Just stay updated to dodge these kind of issues.

As for zero days, unknown and unpatched vulnerabilities, again, that's a different threat model because those exploits cost money to execute. Using an existing known (but fixed in updated versions of apps) is free.

[–] moonpiedumplings@programming.dev 2 points 1 week ago* (last edited 1 week ago) (5 children)

If I uninstall sudo and switch to run0 (

Sudo and run0 are both problematic. Sudo is a setuid binary, which is problematic, but run0 is not much better. It works by making calls to systemd/polkit/dbus, services that constantly run as root, and they themselves expose a massive attack surface. Many privilege escalation CVE's similar to sudo have been released that exploit that attack surface.

When it comes to actually being secure, systemd somewhat screws you over, due to having a massive attack surface, a way to run things as root, and the interesting decision to have polkit parse and run javascript in order to handle authorization logic (parsing is a nightmare to do securely).

The other thing, is that the browser sandbox is much, much stronger than the separation of privileges between users in Linux. Browser sandbox escapes (because they work the same on windows or Linux) are worth immense amounts of cash, and are the kinds of exploits that are used in targeted manners against people who have information on their computer worth that much. If you don't have information worth millions of dollars on your computer, you shouldn't worry about browser sandbox escape exploits.

The reality is that any attacker who is willing and able to pierce through a browser sandbox, will probably also have a Linux privilege escalation vulnerability on hand. In my opinion, trying to add more layers to security is pointless unless you are adding stronger layers. If your attacker has a stronger "spear", it doesn't matter how many weak "shields" you try to put in front to stop it.

If the million dollar industry of browser escapes is in your threat model, I recommend checking out the way that Openbsd's sandboxing interacts with chromium. Or check out google's gvisor sandbox and see if you can run a browser in there.

[–] moonpiedumplings@programming.dev 7 points 1 week ago (1 children)

The backdoor of the xz utils program(s) was in the tarball release, but not the main source code:

https://en.wikipedia.org/wiki/XZ_Utils_backdoor

If debian had dodged the upstream tarball, then they wouldn't have been affected by this.

[–] moonpiedumplings@programming.dev 8 points 1 week ago* (last edited 1 week ago) (3 children)

Is this because of the xz utils thing? The backdoor was included into the tarball, but it wasn't in the git repo.

By switching away from tarballs they pribably hope to prevent that, although this article doesn't mention that. It's possible this shift has been happening since before the xz utils.

[–] moonpiedumplings@programming.dev 2 points 1 week ago (1 children)

Did you post this right as I edited the title? Lol.

[–] moonpiedumplings@programming.dev 2 points 1 week ago* (last edited 1 week ago)

Late reply but I also recommend going through flathub for screenwriting apps if you want more. I saw some options that looked pretty good, although many were proprietary.

[–] moonpiedumplings@programming.dev 2 points 1 week ago (2 children)

Not really? From this page, all it looks like you need is a salsa.debian.org account. They call this being a "Debian developer", but registration on Debian Salsa is open to anybody, and you can just sign up.

Once you have an account, you can use Debian's Debusine normally. I don't really see how this is any different from being required to create an Ubuntu/Launchpad account for a PPA. This is really just pedantic terminology, Debian considers anybody who contributes to their distro in any way to be a "Debian Developer", whereas Ubuntu doesn't.

If you don't want to create an account, you can self host debusine — except it looks like you can't self host the server that powers PPA's. I consider this to be a win for Debusine.

 

Nixgl: https://github.com/nix-community/nixGL

Also, it seems like this requires the latest "stateversion", since this is a new feature.

This is pretty big, because it makes it easy to use applications that use the GPU from nixpkgs on non Nixos systems.

 

cross-posted from: https://programming.dev/post/32779890

I want to like, block interaction with a window that I am keeping on top of other windows so I can see it but still click to stuff behind it.

It turns out mpv already has this implemented. https://github.com/mpv-player/mpv/pull/8949

Technically no windows or mac support (presumably it's possible there; dunno), but OP only asked for linux stuff so I'll close this

And then I could remove the title bar if I really don't want to interact with the app.

 

I want to like, block interaction with a window that I am keeping on top of other windows so I can see it but still click to stuff behind it.

It turns out mpv already has this implemented. https://github.com/mpv-player/mpv/pull/8949

Technically no windows or mac support (presumably it's possible there; dunno), but OP only asked for linux stuff so I'll close this

And then I could remove the title bar if I really don't want to interact with the app.

 

Older article (2019), but it introduced me to some things I didn't know. Like I didn't know that cockpit could manage Kubernetes.

 

See title

 

See title

 

I find this hilarious. Is this an easter egg? When shaking my mouse cursor, I can get it to take up the whole screens height.

This is KDE Plasma 6.

 

I find this hilarious. Is this an easter egg? When shaking my mouse cursor, I can get it to take up the whole screens height.

This is KDE Plasma 6.

 

Incus is a virtual machine platform, similar to Proxmox, but with some big upsides, like being packaged on Debian and Ubuntu as well, and more features.

https://github.com/lxc/incus

Incus was forked from LXD after Canonical implemented a Contributor License Agreement, allowing them to distribute LXD as proprietary software.

This youtuber, Zabbly, is the primary developer of Incus, and they livestream lots of their work on youtube.

 

Source: https://0x2121.com/7/Lost_in_Translation/

Alt Text: (For searchability): 3 part comic, drawn in a simple style. The first, leftmost panel has one character yelling at another: "@+_$^P&%!. The second comic has them continue yelling, with their hands in an exasperated position: "$#*@F% $$#!". In the third comic, the character who was previously yelling has their hands on their head in frustration, to which the previously silent character responds: "Sorry, I don't speak Perl".

Also relevant: 93% of paint splatters are valid perl programs

view more: next ›