moonpiedumplings

joined 2 years ago
[–] moonpiedumplings@programming.dev 2 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

Care to elaborate? Proxmox's paid tier is long term support for their older releaes, and paid support. The main code is entirely free, with no features gated behind paywalls or anything like that.

Check out turbowarp, an ultra fast reimplementation of scratch.

I've seen games that only worked in turbowarp.

Custom editors are probably needed.

[–] moonpiedumplings@programming.dev 8 points 3 weeks ago (1 children)

Kde's spectacle (screenshot utility) does this by default now.

[–] moonpiedumplings@programming.dev 17 points 3 weeks ago (2 children)

I don't see any mention of games so far.

A minecraft server is always a good time with friends, and there are hundreds of other game servers you can self host.

[–] moonpiedumplings@programming.dev 3 points 3 weeks ago* (last edited 3 weeks ago) (4 children)

Syd3, and gvisor, a similar project in go aren't really sandboxes but instead user mode emulation of the linux kernel. I consider them more secure than virtual machines because code that programs run is not directly executed on your cpu.

Although syd3 doesn't seem to emulate every syscall, only some, I know rhat gvisor does emulate every syscall.

If you compare CVE's for gvisor and CVE's for xen/kvm, you'll see that they are worlds apart.

Xen has 25 pages: https://app.opencve.io/cve/?vendor=xen

Gvisor has 1: https://app.opencve.io/cve/?q=gvisor

Now, gvisor is a much newer product, but it is still a full 7 years old compared to xen's 22 years of history. For something that is a third of the age, it has 1/25th of the cve's.

There is a very real argument to be made that the hardened openbsd kernel, when combined with openbsd's sandboxing, is more secure than xen, which you brought up.

[–] moonpiedumplings@programming.dev 7 points 3 weeks ago* (last edited 3 weeks ago)

I don't know what the commenter you replied to is talking about, but systemd has it's own firewalling and sandboxing capabilities. They probably mean that they don't use docker for deployment of services at all.

Here is a blogpost about systemd's firewall capabilities: https://www.ctrl.blog/entry/systemd-application-firewall.html

Here is a blogpost about systemd's sandboxing: https://www.redhat.com/en/blog/mastering-systemd

Here is the archwiki's docs about drop in units: https://wiki.archlinux.org/title/Systemd#Drop-in_files

I can understand why someone would like this, but this seems like a lot to learn and configure, whereas podman/docker deny most capabilities and network permissions by default.

[–] moonpiedumplings@programming.dev 6 points 3 weeks ago (1 children)

99.9999% of freecell games are winnable. Very nice, and one of the reasons I preferred freecell.

[–] moonpiedumplings@programming.dev 5 points 4 weeks ago* (last edited 4 weeks ago) (1 children)

https://opensource.google/documentation/reference/using/agpl-policy/

WARNING: Code licensed under the GNU Affero General Public License (AGPL) MUST NOT be used at Google.

https://alfredvalley.itch.io/diedream

Designed to be played before falling asleep,

I like to play chess in my head.

[–] moonpiedumplings@programming.dev 3 points 4 weeks ago* (last edited 4 weeks ago) (1 children)

I understand the technical challenges with running x86 apps on arm... but multiple wrappers that do something similar to proton have already been released.

If you follow the r/emulationonandroid subreddit, they have gotten PC games working on android for a while now. One of the wrappers, gamehub, has made it to the playstore. You can just sign in to your steam account (don't do that gamehub is sketchy af, proprietary, and by a company that stole gpl code fro, yuzu and didn't release a derivative product), download games, and play them.

The current concern is performance, but most lower and midrange games run just fine.

[–] moonpiedumplings@programming.dev 2 points 1 month ago* (last edited 1 month ago)
  1. Corporations really, really love being admin on everybody elses devices. See kernel level anticheat.

  2. I feel like people have gotten zero trust (I don't need to trust anybody) confused with "I don't trust anybody".

  3. I was listening to a podcast by packet pushers and they were like "So you meet a vendor, and they are like, 'So what do you think zero trust means? We can work with that'".

view more: ‹ prev next ›