1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
App\Entity\Entry {#1769
+user: Proxies\__CG__\App\Entity\User {#1392 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1845 …}
+image: null
+domain: App\Entity\Domain {#278 …}
+slug: "Fedora-Discusses-Optimized-Binaries-For-The-AMD64-Architecture"
+title: "Fedora Discusses Optimized Binaries For The AMD64 Architecture"
+url: "https://fedoraproject.org/wiki/Changes/Optimized_Binaries_for_the_AMD64_Architecture"
+body: "> Additional paths will be inserted into the search path used for executables on systems which have a compatible CPU. Those additional paths will mirror the AMD64 / x86_64 “microarchitecture levels” supported by the glibc-hwcaps mechanism: x86-64-v2, x86-64-v3, x86_64-v4. Systemd will be modified to insert the additional directories into the $PATH environment variable (affecting all programs on the system) and the equivalent internal mechanism in systemd (affecting what executables are used by services). Individual packages can provide optimized libraries via the glibc-hwcaps mechanism and optimized executables via the extended search path. This optimized code will be used if the CPU supports it. Which packages provide the optimized code and at which level will be made by individual package maintainers based on benchmark results."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1703959295 {#2435
date: 2023-12-30 19:01:35.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1367 …}
+votes: Doctrine\ORM\PersistentCollection {#1376 …}
+reports: Doctrine\ORM\PersistentCollection {#60 …}
+favourites: Doctrine\ORM\PersistentCollection {#1923 …}
+notifications: Doctrine\ORM\PersistentCollection {#1542 …}
+badges: Doctrine\ORM\PersistentCollection {#1538 …}
+children: []
-id: 25955
-titleTs: "'amd64':7 'architectur':8 'binari':4 'discuss':2 'fedora':1 'optim':3"
-bodyTs: "'-64':39,42 '64':28,45 'addit':1,21,54 'affect':61,74 'amd64':26 'base':129 'benchmark':131 'code':103,117 'compat':18 'cpu':19,109 'directori':55 'environ':59 'equival':69 'execut':12,76,95 'extend':98 'glibc':35,90 'glibc-hwcap':34,89 'hwcap':36,91 'individu':81,126 'insert':5,52 'intern':70 'level':30,121 'librari':86 'made':124 'maintain':128 'mechan':37,71,92 'microarchitectur':29 'mirror':24 'modifi':50 'optim':85,94,102,116 'packag':82,113,127 'path':2,9,22,58,100 'program':63 'provid':84,114 'result':132 'search':8,99 'servic':80 'support':31,110 'system':14,66 'systemd':47,73 'use':10,78,106 'v2':40 'v3':43 'v4':46 'variabl':60 'via':87,96 'x86':27,38,41,44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704013295
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/8524047"
+editedAt: null
+createdAt: DateTimeImmutable @1703959295 {#1814
date: 2023-12-30 19:01:35.0 +01:00
}
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
App\Entity\Entry {#1769
+user: Proxies\__CG__\App\Entity\User {#1392 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1845 …}
+image: null
+domain: App\Entity\Domain {#278 …}
+slug: "Fedora-Discusses-Optimized-Binaries-For-The-AMD64-Architecture"
+title: "Fedora Discusses Optimized Binaries For The AMD64 Architecture"
+url: "https://fedoraproject.org/wiki/Changes/Optimized_Binaries_for_the_AMD64_Architecture"
+body: "> Additional paths will be inserted into the search path used for executables on systems which have a compatible CPU. Those additional paths will mirror the AMD64 / x86_64 “microarchitecture levels” supported by the glibc-hwcaps mechanism: x86-64-v2, x86-64-v3, x86_64-v4. Systemd will be modified to insert the additional directories into the $PATH environment variable (affecting all programs on the system) and the equivalent internal mechanism in systemd (affecting what executables are used by services). Individual packages can provide optimized libraries via the glibc-hwcaps mechanism and optimized executables via the extended search path. This optimized code will be used if the CPU supports it. Which packages provide the optimized code and at which level will be made by individual package maintainers based on benchmark results."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1703959295 {#2435
date: 2023-12-30 19:01:35.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1367 …}
+votes: Doctrine\ORM\PersistentCollection {#1376 …}
+reports: Doctrine\ORM\PersistentCollection {#60 …}
+favourites: Doctrine\ORM\PersistentCollection {#1923 …}
+notifications: Doctrine\ORM\PersistentCollection {#1542 …}
+badges: Doctrine\ORM\PersistentCollection {#1538 …}
+children: []
-id: 25955
-titleTs: "'amd64':7 'architectur':8 'binari':4 'discuss':2 'fedora':1 'optim':3"
-bodyTs: "'-64':39,42 '64':28,45 'addit':1,21,54 'affect':61,74 'amd64':26 'base':129 'benchmark':131 'code':103,117 'compat':18 'cpu':19,109 'directori':55 'environ':59 'equival':69 'execut':12,76,95 'extend':98 'glibc':35,90 'glibc-hwcap':34,89 'hwcap':36,91 'individu':81,126 'insert':5,52 'intern':70 'level':30,121 'librari':86 'made':124 'maintain':128 'mechan':37,71,92 'microarchitectur':29 'mirror':24 'modifi':50 'optim':85,94,102,116 'packag':82,113,127 'path':2,9,22,58,100 'program':63 'provid':84,114 'result':132 'search':8,99 'servic':80 'support':31,110 'system':14,66 'systemd':47,73 'use':10,78,106 'v2':40 'v3':43 'v4':46 'variabl':60 'via':87,96 'x86':27,38,41,44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704013295
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/8524047"
+editedAt: null
+createdAt: DateTimeImmutable @1703959295 {#1814
date: 2023-12-30 19:01:35.0 +01:00
}
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
App\Entity\Entry {#1769
+user: Proxies\__CG__\App\Entity\User {#1392 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1845 …}
+image: null
+domain: App\Entity\Domain {#278 …}
+slug: "Fedora-Discusses-Optimized-Binaries-For-The-AMD64-Architecture"
+title: "Fedora Discusses Optimized Binaries For The AMD64 Architecture"
+url: "https://fedoraproject.org/wiki/Changes/Optimized_Binaries_for_the_AMD64_Architecture"
+body: "> Additional paths will be inserted into the search path used for executables on systems which have a compatible CPU. Those additional paths will mirror the AMD64 / x86_64 “microarchitecture levels” supported by the glibc-hwcaps mechanism: x86-64-v2, x86-64-v3, x86_64-v4. Systemd will be modified to insert the additional directories into the $PATH environment variable (affecting all programs on the system) and the equivalent internal mechanism in systemd (affecting what executables are used by services). Individual packages can provide optimized libraries via the glibc-hwcaps mechanism and optimized executables via the extended search path. This optimized code will be used if the CPU supports it. Which packages provide the optimized code and at which level will be made by individual package maintainers based on benchmark results."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1703959295 {#2435
date: 2023-12-30 19:01:35.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1367 …}
+votes: Doctrine\ORM\PersistentCollection {#1376 …}
+reports: Doctrine\ORM\PersistentCollection {#60 …}
+favourites: Doctrine\ORM\PersistentCollection {#1923 …}
+notifications: Doctrine\ORM\PersistentCollection {#1542 …}
+badges: Doctrine\ORM\PersistentCollection {#1538 …}
+children: []
-id: 25955
-titleTs: "'amd64':7 'architectur':8 'binari':4 'discuss':2 'fedora':1 'optim':3"
-bodyTs: "'-64':39,42 '64':28,45 'addit':1,21,54 'affect':61,74 'amd64':26 'base':129 'benchmark':131 'code':103,117 'compat':18 'cpu':19,109 'directori':55 'environ':59 'equival':69 'execut':12,76,95 'extend':98 'glibc':35,90 'glibc-hwcap':34,89 'hwcap':36,91 'individu':81,126 'insert':5,52 'intern':70 'level':30,121 'librari':86 'made':124 'maintain':128 'mechan':37,71,92 'microarchitectur':29 'mirror':24 'modifi':50 'optim':85,94,102,116 'packag':82,113,127 'path':2,9,22,58,100 'program':63 'provid':84,114 'result':132 'search':8,99 'servic':80 'support':31,110 'system':14,66 'systemd':47,73 'use':10,78,106 'v2':40 'v3':43 'v4':46 'variabl':60 'via':87,96 'x86':27,38,41,44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704013295
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/8524047"
+editedAt: null
+createdAt: DateTimeImmutable @1703959295 {#1814
date: 2023-12-30 19:01:35.0 +01:00
}
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\Entry {#1530
+user: Proxies\__CG__\App\Entity\User {#1392 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1845 …}
+image: null
+domain: App\Entity\Domain {#278 …}
+slug: "Fedora-40-Will-Enable-Systemd-Service-Security-Hardening"
+title: "Fedora 40 Will Enable Systemd Service Security Hardening"
+url: "https://fedoraproject.org/wiki/Changes/SystemdSecurityHardening"
+body: """
Summary\n
=======\n
\n
Improve security by enabling some of the high level systemd security hardening settings that isolate and sandbox default system services.\n
\n
Benefit to Fedora\n
=================\n
\n
Fedora services will get a significant security boost by default by avoiding or mitigating any unknown security vulnerabilities in default system services.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 12
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1702643082 {#1534
date: 2023-12-15 13:24:42.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1536 …}
+votes: Doctrine\ORM\PersistentCollection {#1539 …}
+reports: Doctrine\ORM\PersistentCollection {#1541 …}
+favourites: Doctrine\ORM\PersistentCollection {#1520 …}
+notifications: Doctrine\ORM\PersistentCollection {#1632 …}
+badges: Doctrine\ORM\PersistentCollection {#1631 …}
+children: []
-id: 22335
-titleTs: "'40':2 'enabl':4 'fedora':1 'harden':8 'secur':7 'servic':6 'systemd':5"
-bodyTs: "'avoid':36 'benefit':22 'boost':32 'default':19,34,44 'enabl':5 'fedora':24,25 'get':28 'harden':13 'high':9 'improv':2 'isol':16 'level':10 'mitig':38 'sandbox':18 'secur':3,12,31,41 'servic':21,26,46 'set':14 'signific':30 'summari':1 'system':20,45 'systemd':11 'unknown':40 'vulner':42"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1702694070
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/7809185"
+editedAt: null
+createdAt: DateTimeImmutable @1702607670 {#1505
date: 2023-12-15 03:34:30.0 +01:00
}
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\Entry {#1530
+user: Proxies\__CG__\App\Entity\User {#1392 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1845 …}
+image: null
+domain: App\Entity\Domain {#278 …}
+slug: "Fedora-40-Will-Enable-Systemd-Service-Security-Hardening"
+title: "Fedora 40 Will Enable Systemd Service Security Hardening"
+url: "https://fedoraproject.org/wiki/Changes/SystemdSecurityHardening"
+body: """
Summary\n
=======\n
\n
Improve security by enabling some of the high level systemd security hardening settings that isolate and sandbox default system services.\n
\n
Benefit to Fedora\n
=================\n
\n
Fedora services will get a significant security boost by default by avoiding or mitigating any unknown security vulnerabilities in default system services.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 12
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1702643082 {#1534
date: 2023-12-15 13:24:42.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1536 …}
+votes: Doctrine\ORM\PersistentCollection {#1539 …}
+reports: Doctrine\ORM\PersistentCollection {#1541 …}
+favourites: Doctrine\ORM\PersistentCollection {#1520 …}
+notifications: Doctrine\ORM\PersistentCollection {#1632 …}
+badges: Doctrine\ORM\PersistentCollection {#1631 …}
+children: []
-id: 22335
-titleTs: "'40':2 'enabl':4 'fedora':1 'harden':8 'secur':7 'servic':6 'systemd':5"
-bodyTs: "'avoid':36 'benefit':22 'boost':32 'default':19,34,44 'enabl':5 'fedora':24,25 'get':28 'harden':13 'high':9 'improv':2 'isol':16 'level':10 'mitig':38 'sandbox':18 'secur':3,12,31,41 'servic':21,26,46 'set':14 'signific':30 'summari':1 'system':20,45 'systemd':11 'unknown':40 'vulner':42"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1702694070
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/7809185"
+editedAt: null
+createdAt: DateTimeImmutable @1702607670 {#1505
date: 2023-12-15 03:34:30.0 +01:00
}
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\Entry {#1530
+user: Proxies\__CG__\App\Entity\User {#1392 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1845 …}
+image: null
+domain: App\Entity\Domain {#278 …}
+slug: "Fedora-40-Will-Enable-Systemd-Service-Security-Hardening"
+title: "Fedora 40 Will Enable Systemd Service Security Hardening"
+url: "https://fedoraproject.org/wiki/Changes/SystemdSecurityHardening"
+body: """
Summary\n
=======\n
\n
Improve security by enabling some of the high level systemd security hardening settings that isolate and sandbox default system services.\n
\n
Benefit to Fedora\n
=================\n
\n
Fedora services will get a significant security boost by default by avoiding or mitigating any unknown security vulnerabilities in default system services.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 12
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1702643082 {#1534
date: 2023-12-15 13:24:42.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1536 …}
+votes: Doctrine\ORM\PersistentCollection {#1539 …}
+reports: Doctrine\ORM\PersistentCollection {#1541 …}
+favourites: Doctrine\ORM\PersistentCollection {#1520 …}
+notifications: Doctrine\ORM\PersistentCollection {#1632 …}
+badges: Doctrine\ORM\PersistentCollection {#1631 …}
+children: []
-id: 22335
-titleTs: "'40':2 'enabl':4 'fedora':1 'harden':8 'secur':7 'servic':6 'systemd':5"
-bodyTs: "'avoid':36 'benefit':22 'boost':32 'default':19,34,44 'enabl':5 'fedora':24,25 'get':28 'harden':13 'high':9 'improv':2 'isol':16 'level':10 'mitig':38 'sandbox':18 'secur':3,12,31,41 'servic':21,26,46 'set':14 'signific':30 'summari':1 'system':20,45 'systemd':11 'unknown':40 'vulner':42"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1702694070
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/7809185"
+editedAt: null
+createdAt: DateTimeImmutable @1702607670 {#1505
date: 2023-12-15 03:34:30.0 +01:00
}
} |
|
Show voter details
|