1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1378
+user: Proxies\__CG__\App\Entity\User {#1371 …}
+entry: App\Entity\Entry {#1849 …}
+magazine: App\Entity\Magazine {#312
+icon: Proxies\__CG__\App\Entity\Image {#293 …}
+name: "linux@lemmy.ml"
+title: "linux"
+description: """
From Wikipedia, the free encyclopedia\n
\n
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).\n
\n
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.\n
\n
### Rules\n
\n
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.\n
- No misinformation\n
- No NSFW content\n
- No hate speech, bigotry, etc\n
\n
### Related Communities\n
\n
- [!opensource@lemmy.ml](https://lemmy.ml/c/opensource)\n
- [!libre_culture@lemmy.ml](https://lemmy.ml/c/libre_culture)\n
- [!technology@lemmy.ml](https://lemmy.ml/c/technology)\n
- [!libre_hardware@lemmy.ml](https://lemmy.ml/c/libre_hardware)\n
\n
Community icon by [Alpár-Etele Méder](https://www.iconfinder.com/pocike), licensed under [CC BY 3.0](https://creativecommons.org/licenses/by/3.0/)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 1406
+entryCommentCount: 28632
+postCount: 6
+postCommentCount: 214
+isAdult: false
+customCss: null
+lastActive: DateTime @1729583542 {#320
date: 2024-10-22 09:52:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#284 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#280 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#269 …}
+entries: Doctrine\ORM\PersistentCollection {#227 …}
+posts: Doctrine\ORM\PersistentCollection {#185 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#247 …}
+bans: Doctrine\ORM\PersistentCollection {#164 …}
+reports: Doctrine\ORM\PersistentCollection {#150 …}
+badges: Doctrine\ORM\PersistentCollection {#128 …}
+logs: Doctrine\ORM\PersistentCollection {#118 …}
+awards: Doctrine\ORM\PersistentCollection {#107 …}
+categories: Doctrine\ORM\PersistentCollection {#94 …}
-id: 73
+apId: "linux@lemmy.ml"
+apProfileId: "https://lemmy.ml/c/linux"
+apPublicUrl: "https://lemmy.ml/c/linux"
+apFollowersUrl: "https://lemmy.ml/c/linux/followers"
+apInboxUrl: "https://lemmy.ml/inbox"
+apDomain: "lemmy.ml"
+apPreferredUsername: "linux"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729583596 {#321
date: 2024-10-22 09:53:16.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1698929468 {#315
date: 2023-11-02 13:51:08.0 +01:00
}
}
+image: null
+parent: null
+root: null
+body: """
Wayland is Wayland. If you use a Wayland compositor, you’re getting a lot of security by virtue of design alone. Things like keyloggers and screenrecorders will not be able to intrude on your session barring vulnerability exploits. I’m not going to touch on the relative vulnerability risk of each environment since **a)** they’re all relatively new & **b)** I’ve never implemented Wayland myself\n
\n
With that being said, here’s what’s *not* protected by Wayland regardless of the chosen compositor: microphones, webcams, keyrings, and files.\n
\n
For microphones & webcams, any distro which rolls Pipewire in combination with Wayland will be sufficient to secure these. Pretty much all Wayland environments roll Pipewire so this is only important to consider if you’re running your own customized environment (*be sure to disable any pre-existing PulseAudio daemon after setting up Pipewire to close this security hole*)\n
\n
For keyrings, these are handled by your environment’s polkit implementation. Much like Wayland, there are several implementations of polkit and they’re all just about equally secure barring any potential vulnerabilities… Just make sure that you’re using an encrypted database (usually on by default) *and* that you have it configured to always relock & properly prompt for the unlock key.\n
\n
For file access, this is actually a core probelm with Linux as a whole – any unsandboxed application you run will be able to read any file that you can read. The solution is to use sandboxed applications whenever possible. The easiest way to achieve this is through using flathub/flatpak applications, since they will always list out and enforce their required permissions on a per-application basis. For non-flatkpak applications, you’ll need to use “jail” environments (e.g.: bubblejail, firejail) in order to artificially restrict application permissions by hand.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 14
+score: 0
+lastActive: DateTime @1701403514 {#1769
date: 2023-12-01 05:05:14.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@Pantherina@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1375 …}
+nested: Doctrine\ORM\PersistentCollection {#1400 …}
+votes: Doctrine\ORM\PersistentCollection {#2428 …}
+reports: Doctrine\ORM\PersistentCollection {#1904 …}
+favourites: Doctrine\ORM\PersistentCollection {#60 …}
+notifications: Doctrine\ORM\PersistentCollection {#2487 …}
-id: 156995
-bodyTs: "'abl':30,230 'access':211 'achiev':252 'actual':214 'alon':21 'alway':201,262 'applic':225,245,258,274,280,296 'artifici':294 'b':60 'bar':36,176 'basi':275 'bubblejail':289 'chosen':82 'close':144 'combin':98 'compositor':9,83 'configur':199 'consid':120 'core':216 'custom':127 'daemon':138 'databas':189 'default':193 'design':20 'disabl':132 'distro':93 'e.g':288 'easiest':249 'encrypt':188 'enforc':266 'environ':52,111,128,155,287 'equal':174 'exist':136 'exploit':38 'file':88,210,234 'firejail':290 'flathub/flatpak':257 'flatkpak':279 'get':12 'go':42 'hand':299 'handl':152 'hole':147 'implement':64,158,165 'import':118 'intrud':32 'jail':286 'key':208 'keylogg':24 'keyr':86,149 'like':23,160 'linux':219 'list':263 'll':282 'lot':14 'm':40 'make':181 'microphon':84,90 'much':108,159 'need':283 'never':63 'new':59 'non':278 'non-flatkpak':277 'order':292 'per':273 'per-appl':272 'permiss':269,297 'pipewir':96,113,142 'polkit':157,167 'possibl':247 'potenti':178 'pre':135 'pre-exist':134 'pretti':107 'probelm':217 'prompt':204 'proper':203 'protect':76 'pulseaudio':137 're':11,56,123,170,185 'read':232,238 'regardless':79 'relat':47,58 'relock':202 'requir':268 'restrict':295 'risk':49 'roll':95,112 'run':124,227 'said':70 'sandbox':244 'screenrecord':26 'secur':16,105,146,175 'session':35 'set':140 'sever':164 'sinc':53,259 'solut':240 'suffici':103 'sure':130,182 'thing':22 'touch':44 'unlock':207 'unsandbox':224 'use':6,186,243,256,285 'usual':190 've':62 'virtu':18 'vulner':37,48,179 'way':250 'wayland':1,3,8,65,78,100,110,161 'webcam':85,91 'whenev':246 'whole':222"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.sdf.org/comment/5772772"
+editedAt: DateTimeImmutable @1701316390 {#1969
date: 2023-11-30 04:53:10.0 +01:00
}
+createdAt: DateTimeImmutable @1700789277 {#1399
date: 2023-11-24 02:27:57.0 +01:00
}
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
App\Entity\EntryComment {#1378
+user: Proxies\__CG__\App\Entity\User {#1371 …}
+entry: App\Entity\Entry {#1849 …}
+magazine: App\Entity\Magazine {#312
+icon: Proxies\__CG__\App\Entity\Image {#293 …}
+name: "linux@lemmy.ml"
+title: "linux"
+description: """
From Wikipedia, the free encyclopedia\n
\n
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).\n
\n
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.\n
\n
### Rules\n
\n
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.\n
- No misinformation\n
- No NSFW content\n
- No hate speech, bigotry, etc\n
\n
### Related Communities\n
\n
- [!opensource@lemmy.ml](https://lemmy.ml/c/opensource)\n
- [!libre_culture@lemmy.ml](https://lemmy.ml/c/libre_culture)\n
- [!technology@lemmy.ml](https://lemmy.ml/c/technology)\n
- [!libre_hardware@lemmy.ml](https://lemmy.ml/c/libre_hardware)\n
\n
Community icon by [Alpár-Etele Méder](https://www.iconfinder.com/pocike), licensed under [CC BY 3.0](https://creativecommons.org/licenses/by/3.0/)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 1406
+entryCommentCount: 28632
+postCount: 6
+postCommentCount: 214
+isAdult: false
+customCss: null
+lastActive: DateTime @1729583542 {#320
date: 2024-10-22 09:52:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#284 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#280 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#269 …}
+entries: Doctrine\ORM\PersistentCollection {#227 …}
+posts: Doctrine\ORM\PersistentCollection {#185 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#247 …}
+bans: Doctrine\ORM\PersistentCollection {#164 …}
+reports: Doctrine\ORM\PersistentCollection {#150 …}
+badges: Doctrine\ORM\PersistentCollection {#128 …}
+logs: Doctrine\ORM\PersistentCollection {#118 …}
+awards: Doctrine\ORM\PersistentCollection {#107 …}
+categories: Doctrine\ORM\PersistentCollection {#94 …}
-id: 73
+apId: "linux@lemmy.ml"
+apProfileId: "https://lemmy.ml/c/linux"
+apPublicUrl: "https://lemmy.ml/c/linux"
+apFollowersUrl: "https://lemmy.ml/c/linux/followers"
+apInboxUrl: "https://lemmy.ml/inbox"
+apDomain: "lemmy.ml"
+apPreferredUsername: "linux"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729583596 {#321
date: 2024-10-22 09:53:16.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1698929468 {#315
date: 2023-11-02 13:51:08.0 +01:00
}
}
+image: null
+parent: null
+root: null
+body: """
Wayland is Wayland. If you use a Wayland compositor, you’re getting a lot of security by virtue of design alone. Things like keyloggers and screenrecorders will not be able to intrude on your session barring vulnerability exploits. I’m not going to touch on the relative vulnerability risk of each environment since **a)** they’re all relatively new & **b)** I’ve never implemented Wayland myself\n
\n
With that being said, here’s what’s *not* protected by Wayland regardless of the chosen compositor: microphones, webcams, keyrings, and files.\n
\n
For microphones & webcams, any distro which rolls Pipewire in combination with Wayland will be sufficient to secure these. Pretty much all Wayland environments roll Pipewire so this is only important to consider if you’re running your own customized environment (*be sure to disable any pre-existing PulseAudio daemon after setting up Pipewire to close this security hole*)\n
\n
For keyrings, these are handled by your environment’s polkit implementation. Much like Wayland, there are several implementations of polkit and they’re all just about equally secure barring any potential vulnerabilities… Just make sure that you’re using an encrypted database (usually on by default) *and* that you have it configured to always relock & properly prompt for the unlock key.\n
\n
For file access, this is actually a core probelm with Linux as a whole – any unsandboxed application you run will be able to read any file that you can read. The solution is to use sandboxed applications whenever possible. The easiest way to achieve this is through using flathub/flatpak applications, since they will always list out and enforce their required permissions on a per-application basis. For non-flatkpak applications, you’ll need to use “jail” environments (e.g.: bubblejail, firejail) in order to artificially restrict application permissions by hand.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 14
+score: 0
+lastActive: DateTime @1701403514 {#1769
date: 2023-12-01 05:05:14.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@Pantherina@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1375 …}
+nested: Doctrine\ORM\PersistentCollection {#1400 …}
+votes: Doctrine\ORM\PersistentCollection {#2428 …}
+reports: Doctrine\ORM\PersistentCollection {#1904 …}
+favourites: Doctrine\ORM\PersistentCollection {#60 …}
+notifications: Doctrine\ORM\PersistentCollection {#2487 …}
-id: 156995
-bodyTs: "'abl':30,230 'access':211 'achiev':252 'actual':214 'alon':21 'alway':201,262 'applic':225,245,258,274,280,296 'artifici':294 'b':60 'bar':36,176 'basi':275 'bubblejail':289 'chosen':82 'close':144 'combin':98 'compositor':9,83 'configur':199 'consid':120 'core':216 'custom':127 'daemon':138 'databas':189 'default':193 'design':20 'disabl':132 'distro':93 'e.g':288 'easiest':249 'encrypt':188 'enforc':266 'environ':52,111,128,155,287 'equal':174 'exist':136 'exploit':38 'file':88,210,234 'firejail':290 'flathub/flatpak':257 'flatkpak':279 'get':12 'go':42 'hand':299 'handl':152 'hole':147 'implement':64,158,165 'import':118 'intrud':32 'jail':286 'key':208 'keylogg':24 'keyr':86,149 'like':23,160 'linux':219 'list':263 'll':282 'lot':14 'm':40 'make':181 'microphon':84,90 'much':108,159 'need':283 'never':63 'new':59 'non':278 'non-flatkpak':277 'order':292 'per':273 'per-appl':272 'permiss':269,297 'pipewir':96,113,142 'polkit':157,167 'possibl':247 'potenti':178 'pre':135 'pre-exist':134 'pretti':107 'probelm':217 'prompt':204 'proper':203 'protect':76 'pulseaudio':137 're':11,56,123,170,185 'read':232,238 'regardless':79 'relat':47,58 'relock':202 'requir':268 'restrict':295 'risk':49 'roll':95,112 'run':124,227 'said':70 'sandbox':244 'screenrecord':26 'secur':16,105,146,175 'session':35 'set':140 'sever':164 'sinc':53,259 'solut':240 'suffici':103 'sure':130,182 'thing':22 'touch':44 'unlock':207 'unsandbox':224 'use':6,186,243,256,285 'usual':190 've':62 'virtu':18 'vulner':37,48,179 'way':250 'wayland':1,3,8,65,78,100,110,161 'webcam':85,91 'whenev':246 'whole':222"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.sdf.org/comment/5772772"
+editedAt: DateTimeImmutable @1701316390 {#1969
date: 2023-11-30 04:53:10.0 +01:00
}
+createdAt: DateTimeImmutable @1700789277 {#1399
date: 2023-11-24 02:27:57.0 +01:00
}
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1378
+user: Proxies\__CG__\App\Entity\User {#1371 …}
+entry: App\Entity\Entry {#1849 …}
+magazine: App\Entity\Magazine {#312
+icon: Proxies\__CG__\App\Entity\Image {#293 …}
+name: "linux@lemmy.ml"
+title: "linux"
+description: """
From Wikipedia, the free encyclopedia\n
\n
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).\n
\n
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.\n
\n
### Rules\n
\n
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.\n
- No misinformation\n
- No NSFW content\n
- No hate speech, bigotry, etc\n
\n
### Related Communities\n
\n
- [!opensource@lemmy.ml](https://lemmy.ml/c/opensource)\n
- [!libre_culture@lemmy.ml](https://lemmy.ml/c/libre_culture)\n
- [!technology@lemmy.ml](https://lemmy.ml/c/technology)\n
- [!libre_hardware@lemmy.ml](https://lemmy.ml/c/libre_hardware)\n
\n
Community icon by [Alpár-Etele Méder](https://www.iconfinder.com/pocike), licensed under [CC BY 3.0](https://creativecommons.org/licenses/by/3.0/)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 1406
+entryCommentCount: 28632
+postCount: 6
+postCommentCount: 214
+isAdult: false
+customCss: null
+lastActive: DateTime @1729583542 {#320
date: 2024-10-22 09:52:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#284 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#280 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#269 …}
+entries: Doctrine\ORM\PersistentCollection {#227 …}
+posts: Doctrine\ORM\PersistentCollection {#185 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#247 …}
+bans: Doctrine\ORM\PersistentCollection {#164 …}
+reports: Doctrine\ORM\PersistentCollection {#150 …}
+badges: Doctrine\ORM\PersistentCollection {#128 …}
+logs: Doctrine\ORM\PersistentCollection {#118 …}
+awards: Doctrine\ORM\PersistentCollection {#107 …}
+categories: Doctrine\ORM\PersistentCollection {#94 …}
-id: 73
+apId: "linux@lemmy.ml"
+apProfileId: "https://lemmy.ml/c/linux"
+apPublicUrl: "https://lemmy.ml/c/linux"
+apFollowersUrl: "https://lemmy.ml/c/linux/followers"
+apInboxUrl: "https://lemmy.ml/inbox"
+apDomain: "lemmy.ml"
+apPreferredUsername: "linux"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729583596 {#321
date: 2024-10-22 09:53:16.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1698929468 {#315
date: 2023-11-02 13:51:08.0 +01:00
}
}
+image: null
+parent: null
+root: null
+body: """
Wayland is Wayland. If you use a Wayland compositor, you’re getting a lot of security by virtue of design alone. Things like keyloggers and screenrecorders will not be able to intrude on your session barring vulnerability exploits. I’m not going to touch on the relative vulnerability risk of each environment since **a)** they’re all relatively new & **b)** I’ve never implemented Wayland myself\n
\n
With that being said, here’s what’s *not* protected by Wayland regardless of the chosen compositor: microphones, webcams, keyrings, and files.\n
\n
For microphones & webcams, any distro which rolls Pipewire in combination with Wayland will be sufficient to secure these. Pretty much all Wayland environments roll Pipewire so this is only important to consider if you’re running your own customized environment (*be sure to disable any pre-existing PulseAudio daemon after setting up Pipewire to close this security hole*)\n
\n
For keyrings, these are handled by your environment’s polkit implementation. Much like Wayland, there are several implementations of polkit and they’re all just about equally secure barring any potential vulnerabilities… Just make sure that you’re using an encrypted database (usually on by default) *and* that you have it configured to always relock & properly prompt for the unlock key.\n
\n
For file access, this is actually a core probelm with Linux as a whole – any unsandboxed application you run will be able to read any file that you can read. The solution is to use sandboxed applications whenever possible. The easiest way to achieve this is through using flathub/flatpak applications, since they will always list out and enforce their required permissions on a per-application basis. For non-flatkpak applications, you’ll need to use “jail” environments (e.g.: bubblejail, firejail) in order to artificially restrict application permissions by hand.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 14
+score: 0
+lastActive: DateTime @1701403514 {#1769
date: 2023-12-01 05:05:14.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@Pantherina@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1375 …}
+nested: Doctrine\ORM\PersistentCollection {#1400 …}
+votes: Doctrine\ORM\PersistentCollection {#2428 …}
+reports: Doctrine\ORM\PersistentCollection {#1904 …}
+favourites: Doctrine\ORM\PersistentCollection {#60 …}
+notifications: Doctrine\ORM\PersistentCollection {#2487 …}
-id: 156995
-bodyTs: "'abl':30,230 'access':211 'achiev':252 'actual':214 'alon':21 'alway':201,262 'applic':225,245,258,274,280,296 'artifici':294 'b':60 'bar':36,176 'basi':275 'bubblejail':289 'chosen':82 'close':144 'combin':98 'compositor':9,83 'configur':199 'consid':120 'core':216 'custom':127 'daemon':138 'databas':189 'default':193 'design':20 'disabl':132 'distro':93 'e.g':288 'easiest':249 'encrypt':188 'enforc':266 'environ':52,111,128,155,287 'equal':174 'exist':136 'exploit':38 'file':88,210,234 'firejail':290 'flathub/flatpak':257 'flatkpak':279 'get':12 'go':42 'hand':299 'handl':152 'hole':147 'implement':64,158,165 'import':118 'intrud':32 'jail':286 'key':208 'keylogg':24 'keyr':86,149 'like':23,160 'linux':219 'list':263 'll':282 'lot':14 'm':40 'make':181 'microphon':84,90 'much':108,159 'need':283 'never':63 'new':59 'non':278 'non-flatkpak':277 'order':292 'per':273 'per-appl':272 'permiss':269,297 'pipewir':96,113,142 'polkit':157,167 'possibl':247 'potenti':178 'pre':135 'pre-exist':134 'pretti':107 'probelm':217 'prompt':204 'proper':203 'protect':76 'pulseaudio':137 're':11,56,123,170,185 'read':232,238 'regardless':79 'relat':47,58 'relock':202 'requir':268 'restrict':295 'risk':49 'roll':95,112 'run':124,227 'said':70 'sandbox':244 'screenrecord':26 'secur':16,105,146,175 'session':35 'set':140 'sever':164 'sinc':53,259 'solut':240 'suffici':103 'sure':130,182 'thing':22 'touch':44 'unlock':207 'unsandbox':224 'use':6,186,243,256,285 'usual':190 've':62 'virtu':18 'vulner':37,48,179 'way':250 'wayland':1,3,8,65,78,100,110,161 'webcam':85,91 'whenev':246 'whole':222"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.sdf.org/comment/5772772"
+editedAt: DateTimeImmutable @1701316390 {#1969
date: 2023-11-30 04:53:10.0 +01:00
}
+createdAt: DateTimeImmutable @1700789277 {#1399
date: 2023-11-24 02:27:57.0 +01:00
}
} |
|
Show voter details
|
5 |
DENIED
|
edit
|
App\Entity\Magazine {#312
+icon: Proxies\__CG__\App\Entity\Image {#293 …}
+name: "linux@lemmy.ml"
+title: "linux"
+description: """
From Wikipedia, the free encyclopedia\n
\n
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).\n
\n
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.\n
\n
### Rules\n
\n
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.\n
- No misinformation\n
- No NSFW content\n
- No hate speech, bigotry, etc\n
\n
### Related Communities\n
\n
- [!opensource@lemmy.ml](https://lemmy.ml/c/opensource)\n
- [!libre_culture@lemmy.ml](https://lemmy.ml/c/libre_culture)\n
- [!technology@lemmy.ml](https://lemmy.ml/c/technology)\n
- [!libre_hardware@lemmy.ml](https://lemmy.ml/c/libre_hardware)\n
\n
Community icon by [Alpár-Etele Méder](https://www.iconfinder.com/pocike), licensed under [CC BY 3.0](https://creativecommons.org/licenses/by/3.0/)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 1406
+entryCommentCount: 28632
+postCount: 6
+postCommentCount: 214
+isAdult: false
+customCss: null
+lastActive: DateTime @1729583542 {#320
date: 2024-10-22 09:52:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#284 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#280 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#269 …}
+entries: Doctrine\ORM\PersistentCollection {#227 …}
+posts: Doctrine\ORM\PersistentCollection {#185 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#247 …}
+bans: Doctrine\ORM\PersistentCollection {#164 …}
+reports: Doctrine\ORM\PersistentCollection {#150 …}
+badges: Doctrine\ORM\PersistentCollection {#128 …}
+logs: Doctrine\ORM\PersistentCollection {#118 …}
+awards: Doctrine\ORM\PersistentCollection {#107 …}
+categories: Doctrine\ORM\PersistentCollection {#94 …}
-id: 73
+apId: "linux@lemmy.ml"
+apProfileId: "https://lemmy.ml/c/linux"
+apPublicUrl: "https://lemmy.ml/c/linux"
+apFollowersUrl: "https://lemmy.ml/c/linux/followers"
+apInboxUrl: "https://lemmy.ml/inbox"
+apDomain: "lemmy.ml"
+apPreferredUsername: "linux"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729583596 {#321
date: 2024-10-22 09:53:16.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1698929468 {#315
date: 2023-11-02 13:51:08.0 +01:00
}
} |
|
Show voter details
|