“sink Twitter and we’ll give you some preferential deals”
“sink Twitter and we’ll give you some preferential deals”
Home Assistant, school gestapo edition?
I try to find uses for ours where we can. I have a BBQ with a dead sparker so I usually use a half-tube which I light on fire and drop by the burner before turning on the gas
Be realistic. The background should contain Putin, Xi, and various others
That was my first thought. Stopping that flow is what your want the damn tampon for
15-16 kids, probably starting from when she was 15-16yo which was normal in those days…
Yeah, we’ve gotten over 30°c and mine has never overheated
That’s because you’re using LVM though. In most distros you could also use something like:
/dev/vg/root
Mine was, as is my P7, especially compared to a lot of competing devices from Samsung etc
Yeah, I’d tend to agree on that. Even beyond the security issues, nuclear has the potential to be a safe, but it also has the potential to be disastrous if mis-managed.
We see plenty of issues like this already, including what occurred here: https://world-nuclear.org/information-library/safety-and-security/safety-of-plants/fukushima-daiichi-accident
Now imagine a plant in Texas, where power companies response to winter outages has basically been “sucks to be you, winterizing is too costly”.
Or maybe we’d like to go with a long-time trusted company, who totally wouldn’t throw away safety and their reputation for a few extra bucks. Boeing comes to mind.
I like nuclear as a power source, but the absolutely needs to be immutable rules in place to ensure it is properly managed and that anyone attempting to cut corners to save costs gets slapped down immediately. Corporate culture in North America seems to indicate otherwise.
Anyone pushing you to do something you don’t understand, or understand poorly. I could see an actual security researcher pushing for a code update to fix a vulnerability.
Heck, even as an occasional contributor I take some pride in seeing my fixes etc make it into the mainline codestream.
But yeah, you definitely need to be wary of somebody you only know from online pushing a change that doesn’t make sense or you don’t understand.
Shouldn’t that be
hdX, sdX, and nvmewtfisthisp1
Oh yeah I forgot to mention that. It’s important when using wildcards or recursive permissions!
Tip: you can also use chmod u+rwx,g+rx,o+rx etc to add permissions
With the initial letters corresponding to “user”, “group” and “other”, and ®was, (w)rite, e(x)ecute for the rest.
In the case of directories, x specifies access to files/etc within the directly (read just let’s you see them)
You can also use i.e “o-rw” etc etc to remove existing permissions
I have similarly annoying issues when one of monitors is turned off. It collapses everything back onto the other display and doesn’t reset when I turn it back on.
So maybe an issue with the display going to sleep?
On Linux, you don’t download random stuff from the internet, e.g. a new browser. You get it from a central source, usually package manager, where it is verified and secure
Devs tend to make strong use of packages on GitHub, PyPi etc which have been targeted quite a bit with malware. Malicious snaps and
Linux software is written to need only as many permissions as needed, but not much more.
Hooboi. Depends on who writes the software. There are plenty of dumb devs for either OS, and I’ve had to yell at many for requiring their commercial software (built in Java with an X11/web front-end and exposed listening ports) run as root, usually because they didn’t want to figure out the permissions needed to access a device. There’s a surprisingly narrow intersection of devs who understand OS security and networking.
Linux is usually always updated because of the central update mechanism, so that vulnerabilities are fixed very quick
For OS packages, sure, but are all your Docker containers, snaps, flatpaks, and appimages updated whenever one of the underlying libraries had a significant vulnerability? How about that PPA, or the stuff you compiled from source a year ago?
Because people are increasingly using those for software not available on the base repositories
Linux users often have a false sense of security that leads them towards insecure practices, often for the same reasons as Windows users (I just want it to do X and work). While traditional signature-based antivirus doesn’t help much for either OS, there are plenty of other controls to fill the space that most people/organizations can - but don’t - implement on either OS.
On Linux, that includes strict management/review of software+code sources, SElinux/AppArmor enforcement, remote logging+review, and much more. These often conflict with Linux devs idea of “freedom” and thus area a hard sell.
I see you noted how you’re running gnome and what video card, but not how you’re running Steam, so I’ll ask:
How is Steam installed on your system? I know some people use a flatpak-based install but one of the potential issues with Flatpak (also Snap) is permissions to certain locations or devices can sometimes require extra config.
If you’re currently running from Flatpak, perhaps try the direct install from .DEB instead
It depends on where the encryption data is stored. If the bootloader and bios/efi are locked down and the data to unlock is stored in an encrypted enclave or one is using a TPM (and not an external chip one that can be sniffed with a pi), that’s a reasonable protection for the OS even if somebody gains physical access.
You could also store the password in the EFI, or on a USB stick etc. It doesn’t help you much against longer-term physical access but it can help if somebody just grabs the drive. It’s also useful to protect the drive if it’s being disposed of as the crypto is tied to other hardware.
Even just encrypting the main OS with the keys in the boot/initrd has benefit, as ensuring that part is well-wiped makes asset disposal safe®. Some motherboards have an on-board SDCard or USB slot which your can use for the boot partition. It means I don’t have to take a drill to my drives before I dispose of them
Not too many users, but an ever changing variety of devices and services :-)
Yeah, I’m generally ok if somebody is charging a reasonable rent which covers their reasonable mortgage, so long as they’re still taking care of all the other stuff (repairs, city taxes, etc).
What burns me is people who either a) knowingly buy in a hot, excessively priced market with full intent to charge excessive rents while providing absolutely minimal service or support
b) bought 10+ years ago but have pumped up rents to the same as those who bought at mortgages 2-3x the rate, citing “market rates” and often doing sketchy things to raise rents including renovictions etc, while being shitty - often absentee - slumlords
Maybe I’m showing my age, but there did used to be quite a good number of mom & pop type landlords who weren’t shit, and while the commercial ones cost a bit more there was a decent mix.
Now, the commercial ones are actually mostly a safer bet in small cities. They’ll raise rent every year but consistently, and the decent ones are pretty prompt about repairs and not fucking people over deposits etc. There are bad ones but it’s pretty easy to tell which are which. The problem is of course that availability at the good ones is lower and they do cost more.
Good private landlords are increasingly hard to come by, as the best ones generally end up quitting after either getting too old or after a bad tenant experience, while the slumlords have leveraged their existing properties to finance buying more and more, leading to a market full of increasingly overpriced mould-monsters.