Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)M
Posts
7
Comments
709
Joined
3 yr. ago

  • Deleted

    Permanently Deleted

    Jump
  • It sure would be a shame if his software was covered by the gpl because it's statically linked against Qt or FFMpeg or any other library... 👀

  • 👀 *could be running a cryptominer

  • In 2025 we boot a whole Linux system to display a logo.

    Does it run Wayland? :P

  • My only input is gitlab is very complicated, never used the others

  • pegged

    Jump
  • Beer nog is where it's at

  • My bios doesn't need to know what year it is

  • For all of my personal machines secure boot is disabled.

    The main benefit is enabling signature checks on every piece of code that runs to start your machine. This is a good idea to prevent direct modification of the binaries involved. This will work as far up the chain as software supports, even to userland code although I don't know of any Linux distros do that.

    However, if you occasionally rebuild any of that software and can sign it yourself secure boot just moves the attack surface from the binaries into the build process. Any modifications made to the kernel, bootloader, or firmware before signing are included as trusted code and are vulnerable to malicious modification.

    Since I don't / can't verify every piece of code on my system, and rebuild Linux occasionally, and people have demonstrated secure boot bypass flaws, I prefer to disable secure boot entirely for convenience. Also, in a roundabout way this increases the security of my system because I won't get locked out for misconfiguring an update.

  • Finally an air gapped machine I can trust

  • Lol too bad they only wrote it in English

  • Yeesss come to the dark side

  • It's terribad, the only glimmer of hope is web assembly and the related apis, but ultimately it's just adding another layer to the onion that will eventually have sensitive data and important interfaces to protect and require yet another layer on top.

    Also it's a sneaky way of exploiting foss without contributing back.

  • Maybe there are no hackers, just calculated leaks

  • The Android way to do this is to open the file from some sort of file browser app and select Firefox from the list of apps that registered for that file type. Unfortunately it looks like Firefox doesn't register itself for html files.

  • Deleted

    Permanently Deleted

    Jump
  • Wtf kind of article is this? This would be a great example of sampling bias.

  • Heeby deeby what about the various ways to build fhs environments in nix. My largest complaint is actually that the nix ecosystem has disjointed, incomplete, and incorrect documentation. You can get through it, but it's often best to try reading the code in nixpkgs when things aren't working like the docs say. I've been getting by for a few years now and I don't really even know the nix language, I really should put the time in to learn it but I will when I need to.

    I'm very happy with how much nixos just works and doesn't let me break the whole os just because I want to try the latest version of blender 😅

  • 🤣 wtf did I just read

    Is this why C++ will never die?

  • Nope. I bailed when I read the words NFS and kerberos in the same sentence.