Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)H
Posts
2
Comments
46
Joined
8 mo. ago

  • UAC on Linux would require an almost fundamental architecture change, in a way contrary to most of how Linux is used now.

    I would say the challenge is not in the architecture, but in the general fragmentation of the ecosystem. PolicyKit is basically an equivalent to UAC, but it's not used universally by everything that needs elevated access.

  • I think the basic premise of this question, that Windows and Linux somehow have a different foundational security model that is or isn't based on passwords, is not really true. Passwords play more or less the same role for any modern operating system -- be it Linux, MacOS, Android, iOS, etc.

    The only major difference is that instead of UAC, Linux has a variety of options (sudo, policykit, run0), which are implemented differently across different distributions. If your privileged user doesn't have a password, in some cases this could lead to any program being able to elevate their privilege quietly, unlike UAC.

    However, in many distributions you can set up a user with a password and enable passwordless local login, which would be almost equivalent to windows with no password.

    Answering your question directly, the major threat to most consumer users is physical compromise or theft of device. Your statement that "physical access is game over" is not entirely accurate: disk encryption with a password is a very strong protection against unauthorized data access, but you need to use a password (doesn't matter if it's Linux or Windows).

  • Kibty

    Jump
  • tick... tock... tick... tock...

  • I agree with other comments here, but, to be honest, this year has been really good! Expedition 33, Silksong, Hades, The Alters, Nightreign, Blue Prince, Dispatch, to name just a few.

  • Think about it this way: you're downloading someone else's code and running it on your system. The OS doesn't care: it will give it access to everything your user has access to, but won't give access to anything else.

    So (under the caveat below) the software won't be able to mess with your system because your user generally can't mess with your system. However, you still need to trust the software, since it will be able to access e.g. your saved passwords, SSH keys, install a keylogger, etc. In comparison, the binary packages can be seen as safer, because they have more "eyes" on them, and there is more time between the code being published and you running that code on your system.

    Caveat: if you run something like sudo make install, then, of course the risk is way higher, and the package definitely will be able to mess with your system up to and including destroying it.

  • Micah's talks are always worth

  • Can you modify the script to release the lock after the process has started?

  • At least train drivers in Japan can read.

  • This is not entirely correct. Many distributions do enable encryption by default. Also, encrypting the /boot partition does not guarantee the integrity of the boot sequence, you need to enable and correctly configure Secure Boot for that.

  • If it wasn't for the regulators forcing their hand, they would still have their proprietary cables to this day.

  • Alyx

  • To save you 50 clicks required to get through to the t-shirt content, it said: "god (Allah)" followed by "is lesbian".

  • Deleted

    Permanently Deleted

    Jump
  • flipping a coin fails spectacularly at making any decisions other than what to have for dinner

  • Dune Awakening. Not the best game in the world, but I have a group of friends and it's fun to hang out and try to survive the desert together.

  • You're definitely not alone. The rift caused by the so called "AI" is hard to cross with any sort of rational argument, it seems to be based largely on emotions, hype and herd mentality (which, some may say, is how top managers usually operate, see e.g. [1]).

    My personal principle for a very long time has been to choose my battles, as in, trying to not get involved in causes that are not worth it based on perceived impact, required effort and chances of good outcome. The "AI" bubble has been especially frustrating, as it inhabits an extremum of the "very important, very low chances of success" quadrant.

    Nevertheless, if you're a hired employee or a contractor, it may be prudent to be pragmatic. How likely is it that you will be rewarded for doing something good for the company, such as convincing to change the stance on "AI"? How likely is it that instead you will be blamed for the inevitable fallout of the bubble, or just become a collateral, get laid off in the middle of what might be the biggest economic crash since 2008?

    [1] https://www.wheresyoured.at/the-era-of-the-business-idiot/

  • Does zsh count?

  • Finished it a couple of weeks ago. Really good game, might be a contender for game of the year for me!

  • Yeah so I've struggled with warping too and for me by far the best bang for the buck was alcohol. I've never tried glue or hairspray or any actual adhesives.

  • Have you cleaned the bed with alcohol or a similar solvent before printing?