• 4 Posts
  • 122 Comments
Joined 1 year ago
cake
Cake day: July 4th, 2023

help-circle
  • Yeah, I’m generally ok if somebody is charging a reasonable rent which covers their reasonable mortgage, so long as they’re still taking care of all the other stuff (repairs, city taxes, etc).

    What burns me is people who either a) knowingly buy in a hot, excessively priced market with full intent to charge excessive rents while providing absolutely minimal service or support

    b) bought 10+ years ago but have pumped up rents to the same as those who bought at mortgages 2-3x the rate, citing “market rates” and often doing sketchy things to raise rents including renovictions etc, while being shitty - often absentee - slumlords

    Maybe I’m showing my age, but there did used to be quite a good number of mom & pop type landlords who weren’t shit, and while the commercial ones cost a bit more there was a decent mix.

    Now, the commercial ones are actually mostly a safer bet in small cities. They’ll raise rent every year but consistently, and the decent ones are pretty prompt about repairs and not fucking people over deposits etc. There are bad ones but it’s pretty easy to tell which are which. The problem is of course that availability at the good ones is lower and they do cost more.

    Good private landlords are increasingly hard to come by, as the best ones generally end up quitting after either getting too old or after a bad tenant experience, while the slumlords have leveraged their existing properties to finance buying more and more, leading to a market full of increasingly overpriced mould-monsters.











  • Yeah, I’d tend to agree on that. Even beyond the security issues, nuclear has the potential to be a safe, but it also has the potential to be disastrous if mis-managed.

    We see plenty of issues like this already, including what occurred here: https://world-nuclear.org/information-library/safety-and-security/safety-of-plants/fukushima-daiichi-accident

    Now imagine a plant in Texas, where power companies response to winter outages has basically been “sucks to be you, winterizing is too costly”.

    Or maybe we’d like to go with a long-time trusted company, who totally wouldn’t throw away safety and their reputation for a few extra bucks. Boeing comes to mind.

    I like nuclear as a power source, but the absolutely needs to be immutable rules in place to ensure it is properly managed and that anyone attempting to cut corners to save costs gets slapped down immediately. Corporate culture in North America seems to indicate otherwise.





  • Tip: you can also use chmod u+rwx,g+rx,o+rx etc to add permissions

    With the initial letters corresponding to “user”, “group” and “other”, and ®was, (w)rite, e(x)ecute for the rest.

    In the case of directories, x specifies access to files/etc within the directly (read just let’s you see them)

    You can also use i.e “o-rw” etc etc to remove existing permissions



  • phx@lemmy.catoLinux@lemmy.mlDesktop Security
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    7 months ago

    On Linux, you don’t download random stuff from the internet, e.g. a new browser. You get it from a central source, usually package manager, where it is verified and secure

    Devs tend to make strong use of packages on GitHub, PyPi etc which have been targeted quite a bit with malware. Malicious snaps and

    Linux software is written to need only as many permissions as needed, but not much more.

    Hooboi. Depends on who writes the software. There are plenty of dumb devs for either OS, and I’ve had to yell at many for requiring their commercial software (built in Java with an X11/web front-end and exposed listening ports) run as root, usually because they didn’t want to figure out the permissions needed to access a device. There’s a surprisingly narrow intersection of devs who understand OS security and networking.

    Linux is usually always updated because of the central update mechanism, so that vulnerabilities are fixed very quick

    For OS packages, sure, but are all your Docker containers, snaps, flatpaks, and appimages updated whenever one of the underlying libraries had a significant vulnerability? How about that PPA, or the stuff you compiled from source a year ago?

    Because people are increasingly using those for software not available on the base repositories

    Linux users often have a false sense of security that leads them towards insecure practices, often for the same reasons as Windows users (I just want it to do X and work). While traditional signature-based antivirus doesn’t help much for either OS, there are plenty of other controls to fill the space that most people/organizations can - but don’t - implement on either OS.

    On Linux, that includes strict management/review of software+code sources, SElinux/AppArmor enforcement, remote logging+review, and much more. These often conflict with Linux devs idea of “freedom” and thus area a hard sell.


  • phx@lemmy.catoLinux@lemmy.mlIssue with Valve Index
    link
    fedilink
    arrow-up
    1
    ·
    7 months ago

    I see you noted how you’re running gnome and what video card, but not how you’re running Steam, so I’ll ask:

    How is Steam installed on your system? I know some people use a flatpak-based install but one of the potential issues with Flatpak (also Snap) is permissions to certain locations or devices can sometimes require extra config.

    If you’re currently running from Flatpak, perhaps try the direct install from .DEB instead


  • It depends on where the encryption data is stored. If the bootloader and bios/efi are locked down and the data to unlock is stored in an encrypted enclave or one is using a TPM (and not an external chip one that can be sniffed with a pi), that’s a reasonable protection for the OS even if somebody gains physical access.

    You could also store the password in the EFI, or on a USB stick etc. It doesn’t help you much against longer-term physical access but it can help if somebody just grabs the drive. It’s also useful to protect the drive if it’s being disposed of as the crypto is tied to other hardware.

    Even just encrypting the main OS with the keys in the boot/initrd has benefit, as ensuring that part is well-wiped makes asset disposal safe®. Some motherboards have an on-board SDCard or USB slot which your can use for the boot partition. It means I don’t have to take a drill to my drives before I dispose of them