Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)P
Posts
0
Comments
86
Joined
3 yr. ago

  • Whoops

    Jump
  • RIP BOZON

  • I'm so confused by these. They look giant! But I feel like it's a perspective thing. Looks good, like a ciabata

  • ┐⁠(⁠´⁠ー⁠`⁠)⁠┌

  • Use KDE, especially Plasma 6. Hasn't been an issue for me FW13 12Gen Intel since the last few Plasma 5 releases. I tried GNOME for a while but it can go pound sand.

  • As a nevernude I prefer no holes bared

  • I currently use gandi but I'm planning on moving to cloudflare. Not in too much of a rush since I did a 10 year lease.

  • Yeah I upgraded my Odroid and ran into some issues with Armbian but I was able to work through it thanks to this post. I guess Armbian broke the repos a little and it prevented OMV from cleanly auto updating with the script.

  • Ah, good to know.

  • IIRC and I may be wrong here the drive stays encrypted in sleep. Decryption is done in real time via your CPU. However the encryption key is stored in unencrypted RAM. Which is why the other comment suggests encrypting swap and hibernating, this writes RAM to disk.

  • To be fair there are probably many different ways to solve the problem. I'm somewhat experienced with Linux and I've attempted seeing up TPM LUKS decryption on boot. It's certainly not easy or at least wasn't when I tried. For non experienced people it's easier to just enter the password at boot and enable auto login. Then you get the security, software, ethics, or licensing debates that accompany most Linux discussions.

  • They do understand the point. The problem is that if you use TPM to unlock on boot it is slightly self defeating. Now the attacker has access to your display manager or TTY. They can guess passwords, try to bypass the biometric checks, or find an exploit. But that does indicate a higher tech level that your average thief.

  • The common way to do it with LUKS2 and TPM as detailed on the Arch wiki. Not sure if that'll apply at all to ZFS and Zorin though

    It is less secure though. What I do is set my computer to log in on start and I set up fingerprint auth. So I only need to login once on startup with the drive decryption.

    Here's a reddit post on using clevis, TPM, and ZFS to decrypt.

    You should also know that if you're mobo dies so does your data.

  • Ah I missed the partitions part

  • I use kopia, it's more automated and deduplicates snapshot.

  • Yeah, shutdown /s /t $time_seconds

  • I think it does. If you make the choice to poorly manage your distro's tools/website it shows that you aren't responsible enough to manage the distro. They also had the laptop purchasing issue.

    I'm not saying every distro needs to be super organized and testing shit but they should be before I recommend it to someone. Especially when there are other Arch based distros that don't have the issues.

    The newbie stuff is fair enough. I do think they get extra flak here because the distro was marked as Arch for noobs.

    I don't think that would be the case. The AUR helper would pull the updated dependencies from the Arch repos which would not be available in Manjaro's repos

    They're valid arguments and people should be informed about it mainly because of how it was recommended a lot for beginners.

  • It ships with some gaming stuff, uses zen kernel, has some performance mods (I guess), and a theme as ugly as sin. But you can make any distro do what it does. I'm sure it's in the same territory as Nobara.

  • Do you have proof of Manjaros usual arguments being unrelated or false? The things I've read over the years seem like valid criticism.

  • Putin's done some plastic surgery so that might be part of it.