[-] [email protected] 5 points 2 years ago

Where are these OEMs that allow proper bootloader unlocking on most of their range?

Google, Sony ...? Huawei stopped doing it, Oppo & Samsung doesn't last I checked.

[-] [email protected] 4 points 2 years ago* (last edited 2 years ago)

It means that if someone breaks out of your container, they can only do things that user can do.

Can that user access your private documents (are these documents in a container that also runs under that user)?

Can that user sudo?

Can that user access SSH keys and jump to other computers?

Generally speaking, the answer to all of these should be "no", meaning that each group of containers (or risk levels etc) get their own account.

[-] [email protected] 4 points 2 years ago

(If you buy a suitable device) You don't have to use the preloaded OS (see Graphrne, Lineage etc).

[-] [email protected] 4 points 2 years ago* (last edited 2 years ago)

I have a Windows AD domain and have my preferences and some apps as GPOs.

In the server world we use Ansible, or in some cases maybe PowerShell DSC.

Ansible is much more focused on Linux and orchestration, but does have some support for Windows, and DSC is for Windows Servers.

Both use YAML or similar structured config to impart a state, e.g.

- name: Install Firefox
  Ansible.builtin.package:
    name: firefox
    state: present

Meaning that ansible does the legwork to make sure FF is installed.

[-] [email protected] 16 points 2 years ago

No, this is

  • buying a surface from Microsoft
  • immediately wiping it and installing Linux
  • Microsoft then forcing you to authenticate using the device that is only tied to your account via purchase, and NOT login records, AND disabling other forms of auth
[-] [email protected] 4 points 2 years ago

gedit in native Linux or WSL2. use it for Ansibke, python, C, bash, basically anything I need to edit. Has a git plugin, bottom terminal pane, left open files / current folder pane. Does all I need it to do, and it's not a huge fuckoff electron app.

[-] [email protected] 4 points 2 years ago

I'm pretty certain that the USB IF decided to use the max possible Gbps as the cable rating, rather than the mess that was

USB 3.0 USB 3.1 USB 3.1 (Gen 1) USB 3.1 (Gen 2) ...

So it's more likely apple are just being specific in the type of cable you need.

[-] [email protected] 14 points 2 years ago

Landing gears are usually designed to drop by gravity (or manual hand cranking) alone if there's a hydraulic failure.

[-] [email protected] 13 points 2 years ago

The linked article — and others — explain that in Android 10+, (a) executable binaries can no longer reside in a read/write directory, and (b) access to /sdcard will go away. Simply put, these changes destroy my application's ability to function, and that of Termux as well.

That sounds like proper security to me? Inability to access the user's storage is a bit lame, but they've been moving to nicer APIs for that anyway.

Android is a mobile phone OS, not desktop / embedded Linux.

[-] [email protected] 17 points 2 years ago* (last edited 2 years ago)

One thing that people miss - either out of ignorance, or because it goes against the narrative - is that systemd is modular.

One part handles init and services (and related things like mounts and sockets, because it makes sense to do that), one handles user sessions (logind), one handles logging (journald), one handles networking (networkd) etc etc.

You don't have to use networkd, or their efi bootloader, or their kernel install tool, or the other hostname/name resolution/userdb/tmpfiles etc etc tools.

[-] [email protected] 10 points 2 years ago

I'm going to agree with Burstar here - if you're setting out to prove that something is possible, you're going to give it the best chance you can. Once you know its possible (whether its something like using an arduino to simulate an old price of hardware, or if a compound can cause cancer), you go and refine it down.

[-] [email protected] 9 points 2 years ago

So allowing any random, possibly compromised, possibly installed by malware, add-on to run during the Firefox account login pages (see the list of URLs in this thread) isn't a security concern to you?

view more: next ›

NRoach44

0 post score
0 comment score
joined 2 years ago