linux

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

UnfortunateShort, in Manjaro OS

Besides the points made - using their own repos. It kind of defeats an important point of using Arch, if you don’t use the official repos as your main source of packages imo.

It’s a rolling release. You have to let it roll. Arch already has testing repos, there is zero need to test outside of them.

interceder270,

there is zero need to test outside of them.

Then how do you explain Arch users have to deal with breakages Manjaro users do not because the Manjaro team doesn’t push updates as quickly?

UnfortunateShort,

Because they don’t push updates as quickly, which reduces the chances of something slipping through, be it their merit or not. This comes at the expense that it sometimes breaks dependencies and still has close to zero real benefits:

  1. You are better off simply using snapshots. Then you don’t depend on the testing of either party.
  2. Even if the Manjaro devs do to find bugs, they could have found them in Arch Testing as well, which benefits everyone.

I stand by my point that the update strategy is not a feature.

interceder270, (edited )
  1. I have snapshots included as well.
  2. Bugs found even in Testing and Stable can be prevented from entering Manjaro repos!

I stand by my point that the update strategy is a feature. You might not understand this, but my experience speaks for itself!

Pantherina, in 7 Ways to Tweak Sudo Command in Linux

I.e. how malware could easily catch your Sudo password without root access.

Peeps, bad news, Linux is damn insecure.

By simply placing an alias in your bashrc they could already grab your sudo password.

Another bad news, this Windows “okay” Button without any password is actually more secure.

digdilem,

Either you’re trolling - in which case, sod off back to Reddit - or you have a woeful misunderstanding of how Linux user permissions work.

Please explain how someone might “simply change” someone else’s .bashrc without either already having access to that user account, or root access on the whole machine?

IAm_A_Complete_Idiot, (edited )

The idea is malware you installed would presumably run under your user account and have access. You could explicitly give it different UIDs or even containerize it to counteract that, but by default a process can access everything it’s UID can, which isn’t great. And even still to this day that’s how users execute a lot of processes.

Windows isn’t much better here, though.

Pantherina,

Regarding Windows all I read is that this “admin permission dialog” is launched in some form of sandbox where no software can access it. Not sure about faking input devices though, and I am also not promoting Windows for Security

IAm_A_Complete_Idiot, (edited )

True, but that doesn’t necessarily matter if I can compromise the privileged app instead. I could replace it, modify it on disk, or really any number of things in order to get myself a hook into a privileged position.

Just injecting code in some function call which launches malware.exe would do the trick. Ofc signature checks and the like can help here - but those aren’t a given. There’s any number of ways you can elevate yourself on a system based off of user security if your threat model is malicious processes. Linux (and windows) will stop users from accessing each other’s crap by default, but not processes.

Or: supply chain attacks. Now your official app without any modifications is malicious.

sudneo,

If you containerize, the application (malware) will run under the user configured in the image, unless you override it, and in a separate mount namespace, unless you change that, which makes the “alias sudo” trick extremely unlikely.

Even running under a separate user anyway prevents almost fully the attack you mention, unless the separate user has root privileges or the DAC_OVERRIDE capability is assigned to the binary (assigning it requires CAP_SYS_ADMIN).

In short, the attack you mention is a common persistence and privilege escalation vector, which is relatively easy to detect (watch for changes to shell profiles), although preventing it requires some care. I just want to point out that in single-user machines (e.g. personal computers) escalating to root is anyway fairly unnecessary, given that all the juicy stuff (ssh keys, data, etc.) is anyway probably running under/owned by that user.

IAm_A_Complete_Idiot,

Yep! You can also get pretty far even without containers. At the end of the day containers are just sandboxing using namespaces, and systemd can expose that pretty trivially for services, and tools like bubble wrap / flatpak let you do it for desktop apps. In an ideal world every package would only use the namespaces it needs, and stuff like this would largely not be a concern.

Pantherina,

Nearly all tools (with flatpak and portals progressing into better directions but probably never finished) have rw permissions everwhere.

The modern OS threat model is not other users, as private users mostly have single user systems. It is malware and software doing nasty things.

On Linux this always worked out somehow, but grabbing your sudo password is not hard, just alias sudo to a script reading your argument, reading your password, and piping the password to the real sudo. You dont even notice it but that script just got your sudo password.

Dont know what Reddit has to do with that

ReversalHatchery,

It’s not about someone, it’s about something. A lot of us aren’t (only) using Linux as a server OS, but for desktop too, and desktop usage involves running much more different kinds of software that you simply just can’t afford to audit, and at times there are programs that you can’t choose to not use, because it’s not on you but on someone on whom you depend.

Then it’s not even only that. It’s not only random shit or a game you got that can edit your bashrc and such, but if let’s say there’s a critical vulnerability in a complex software you use, like a web browser, an attacker could make use of that to take over your account with the use of a bashrc alias.

ShortN0te,

I.e. how malware could easily catch your Sudo password without root access.

Peeps, bad news, Linux is damn insecure.

By simply placing an alias in your bashrc they could already grab your sudo password.

Another bad news, this Windows “okay” Button without any password is actually more secure.

In other words: a compromised system at the User level can easily compromised at the admin level if there are no additional checks/measures in place. Same for Windows. Just change the link to a Programm you commonly need the press OK to to you maleware. Profit.

IAm_A_Complete_Idiot,

The proper way to handle issues like these is process level permissions (i.e. capability systems), instead of user level. Linux CGroups, namespaces, etc. are already moving that way, and in effect that’s the way windows is trying to head too. (Windows has its own form of containerization called AppContainers, which UWP apps use. Windows also has its own capability system).

Illecors, in Sway-Talisman: Sway – Terminal Application Launcher in Scratchpad, Minimalist And Native

I’m not convinced this is better thatn my floating alacritty window piping through fzf, sort and xargs.

Repo needs at least screenshots, ideally a gif or two showing the product in action.

Other than that - great work!

juli, in What Tweak, Program, ... changes a Desktop Environment from unusable to great for you?
zingo, in why does the poster image of c/linux have 3.8mb?

Interesting!

ReCursing, in Manjaro OS
@ReCursing@kbin.social avatar

Running Manjaro here. I'm been using Linux exclusively for years, and while I'm not a power user I like to think I'm conversant with it. I've had the odd problem here or there, but honestly not any more than I would expect with any other distro. I picked it because I wanted a rolling release distro that used KDE, and SuSE Tumbleweed didn't want to install that day!

teawrecks, in why does the poster image of c/linux have 3.8mb?

Which are you suggesting?

  • that the image could be losslessly compressed more efficiently?
  • that lossy compression should be used more aggressively?
  • that there is extra data hidden in the file?
_edge,

It’s 5120 px wide. Is this necessary?

teawrecks,

That’s a question for a web developer, which I am not. I would expect it to be the max common resolution width. A quick Google shows that modern ultrawides are 5120x1440. So that’s probably why.

Deckweiss, (edited )

So if you are not a cook, you can’t answer questions about food taste?

teawrecks,

I mean, I took a guess. I don’t know what you want from me.

Deckweiss,

I want you to laugh at my joke question.

kglitch, (edited )

I'm a web developer.

Lemmy does not use the entire screen width. The way it has been embedded in the page means that image takes up only 850 pixels of horizontal space so it could be 5x smaller and no one would be able to see the difference.

Lemmy really should be automatically resizing the images (on the server) when they are uploaded, not every single time the community is viewed (in the browser).

gregorum, (edited )

it’s not. the lemmy-ui max width for the poster element is far smaller than that (1104x960). in fact, the poster element is set to be a near-square (displays as rectangular in web and mobile web on the page header), as it also displays in the sidebar and in mobile apps as a square if the image is. most mods simply assume it’s a rectangle and upload a rectangular image.

this image is made to be the largest usable resolution lemmy can display as a community poster and optimized to be very small in file size. see on lemm.ee/c/plex

https://lemm.ee/pictrs/image/6df8e5b3-a7fb-441d-a114-94513bcccc56.webp?format=webp

stoy, in why does the poster image of c/linux have 3.8mb?

Sorry for being a bit of a dick, I think you mean that the file “is 3.8MB”.

“mb” would mean millibit, 3.8millibit is an impossibly small file size, and would never exist practically (though I an sure that with some clever maths a zip bomb could be designed so that one bit of data could be compressed into 3.8millibits)

MB is the proper shorthand for MegaByte, a decent file size for a high quallity pucture, depending on the format and compression.

Unless we analyze the image, and determine the image format and compression settings we have no idea of if 3.8MB is a resonable size of the file or not, and the mods have hidden a rar file in the picture file, it is highly improbable that would be the case however.

Sorry for being a dick.

kpw,

Please stop purposefully misunderstanding people when the thing their trying to say is clear. Most annoying character trait one could have.

explore_broaden,

It leads to genuine confusion because of the difference between Mb and MB (and further MiB), so this is a good point to make in this case.

stoy,

This is all fair, I can’t say it wont happen again ever, but I usually am not this kind of a dick.

juli,

I was just lazy, but thx for the explanation and the importance of correct spelling

stoy,

Eh, you should not have had to deal with that, I was just annoyed about other stuff and should have ignored the post instead of being a dick.

I am sorry for my bad post.

governorkeagan,

I’ll add some context for anyone who might be interested.

why does the poster image of c/linux have 3.8mb?

When speaking Portuguese (possibly Spanish as well) you would say it like this, a imagem tem….

It is quite common for native speakers of Portuguese (and probably Spanish) mix this up when speaking English.

source: I speak Portuguese

_edge,

OP does not argue about ‘has’ vs ‘is’.

governorkeagan, (edited )

I’m just adding useful extra information to the thread.

Sorry for being a bit of a dick, I think you mean that the file “is 3.8MB”.

The sentence I was referring to in my original comment.

Edit: added context

0x4E4F, in why does the poster image of c/linux have 3.8mb?

It’s grainy. Grain always takes a lot in size.

NOOBMASTER, in Manjaro OS

Zorin OS

_edge, in why does the poster image of c/linux have 3.8mb?

> 8MB in as jpeg

yote_zip, in why does the poster image of c/linux have 3.8mb?
@yote_zip@pawb.social avatar

Everyone fully missing the point here. This is the banner image for !linux (that’s not where we are right now for the record), and it has a normal JPEG size of 7.7MB. When it’s served as WebP it’s 3.8MB. OP is correct that this is very stupid and wasteful for a web content image. It’s a triple-monitor 1440p wallpaper that’s used verbatim, and it should instead be compressed down to be bandwidth-friendly. I was able to get it to 1.4MB at JPEG quality 80, and when swapping it out in dev tools and performing A/B testing I can’t tell the difference. This should be brought to the attention of a mod on that community so it can stop sucking people’s data for no reason.

cmnybo,

It could be resized too. 5120x1440 is way too big for a website banner. There’s no reason to go more than double the size it will actually be displayed at. That would bring it down to a couple hundred KB.

juli,

Thank you!

kglitch,

I got it to 47 KB after resizing it to 850px by 239px, heh

cm0002, in why does the poster image of c/linux have 3.8mb?

It’s not 1999 anymore, 4MB is nothing and a very common size for a decent quality image file

Disonantezko,
  • I usually use Lemmy at my smartphone with 4G that was released 3 years ago, I’m happy with it, and I don’t need other one more new and expensive.
  • The area of 4G is very congested, then the connection is slower in peak hours.
  • Only rich people has last medium and high end smartphone with 5G, and live in area with that coverage.
  • I live now in downtown, and just got slow fiber connection 3 months ago, there are a lot buildings with only ADSL in this area, and it’s the capital.
  • Maybe you are lucky, with good connection.
  • Is not so hard to optimize the image for everyone in the world, and maybe put a link to original big image of you want.
  • There’s a lot of ways to optimize, like changing resolution, reduce colors, clean image. And compression, using webp lossy 95% you got a very small file that looks very close to the original, usually got less than 1MB.
  • Today’s web is very bloated for no reason, and very slow in old computers. Browsers are the main RAM eaters.
juli,

You’re welcome to visit me in germany. I’ll show you german internet. Vietnam has faster internet.

Pantherina, in What Tweak, Program, ... changes a Desktop Environment from unusable to great for you?

Gnome, basically some extensions.

KDE: Adapta just the icons. I cant stand the regular Plasma Icons.

Pantherina, in Surface Go 2 with 4GB Ram and 4425Y worth it?

No way, if you dont already have that, its a complete waste of money. 300€ is not little! I bought a Clevo NV41MZ for that, which has 16GB RAM, 500GB SSD, i7 CPU and is supported by Coreboot

Prunebutt,

I already have a laptop. I was in the market for a small tablet.

Pantherina,

Oh didnt know surface also has Tablets

lemmy_user_838586, (edited )

Aaand that’s how badly Microsoft messed up the marketing for the surface line. I didn’t know the surface line had laptops, I thought the surface line was a tablets only (With the detachable keyboard base). 2 random internet people who are involved in the tech world had 2 completely opposite understandings of their product line because they made the marketing and branding so bad.

RymdLord,

I have used it and cannot recommended it. If I was you I would buy a Google Pixel Tablet and then Install GrapheneOS or CalyxOS on it.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • linux@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #