Illecors

@Illecors@lemmy.cafe

Calculator Manipulator

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Illecors,

I didn’t add it to any lists, but to the network interface itself. You know the output of ip a? The one pihole listens on (wg0 in my case, because wireguard) has something like, say, 10.0.0.1, but also 8.8.8.8. So when a DNS packet is spit out by chromecast to go to 8.8.8.8 UDP port 53 - my pihole happily answers that request. You could also do a separate unbound instance on a new virtual interface with a quad8 ip and just forward everything to pihole, if you fancy.

voxel, (edited ) to linux
@voxel@infosec.exchange avatar

Hey 👋 dear Linux Community,

I'm still kinda new to Linux (started using this year 😅) I already made it to my main OS, even if I still missing some things which I used on Windows, anyway. What I wanted to ask you guys, what recommendations do you have for Linux Mint (Cinnamon)? In terms of security, optimization, (a way to make the UI looking modern ;-;) and privacy? I would be very interested in what you do guys to optimize your Linux setup :) I'm pretty technical, so there is nothing which could overwhelm me (probaly).

Thx! 🤍

@linux

Illecors,

A tiling window manager and tmux. I don’t like window decorations, I think they’re a waste of precious screen real estate. And tmux… Well. It’s like pringles.

Illecors,

Separate. That’s the whole point of containerisation! Otherwise you’re just doing a regular deploy with extra steps

Illecors,

I would suggest having an nginx as a reverse proxy (I prefer avoiding a container as it’s easier to manage) and the have your services in whatever medium you prefer.

Illecors,

I don’t have something specific to read, my statement comes from questioning the declared permissions by apps. Why would, say, facebook - an app that, essentially, downloads and uploads content via http, need access to location, gyro, contacts, texts, call history, making calls, microphone, etc? Also, while I can’t prove it, as someone who works in computing I can guarantee there are undocumented/buggy/testing APIs and just straight up bugs that companies with enough resources can and do find and abuse. Cambridge analytica has only strengthened my view on this.

Illecors,

No, that’s normal. Might look strange for a native english speaker, but it definitely normal in othet languages.

Illecors,

Glad I could help! Just to make things a bit clearer - this is a btrfs thing. Other FSes behave differently.

Good luck web devs (lemmy.world)

Alt text:Twitter post by Daniel Feldman (@d_feldman): Linux is the only major operating system to support diagonal mode (credit [Twitter] @xssfox). Image shows an untrawide monitor rotated about 45 degrees, with a horizontal IDE window taking up a bottom triangle. A web browser and settings menu above it are organized creating a...

Illecors,

No idea what it was, sorry. One of the youtube recommendations at the time.

Illecors,

There is no installer as such. You copy an archive, extract it and rebuild @world. Anything beyond that is up to you. I’m sticking to openrc - haven’t had any issues since libxcrypt news item. Can’t even recall what it was.

Illecors,

Whoosh.

Illecors,

I don’t like what you’re trying to do, but I think gnome-keyring would do this for you. Seahorse is the gui for it

Illecors,

That’s what I do on the desktop, but on mobile there’s no quick way to open a new tab.

Illecors,

I can show/help you how to self host for about $6/month + $10-15/year, if you’re interested. Could be cheaper if you’re willing to bet on a less reliable cloud provider.

Illecors,

This doesn’t affect websites as such - it’s the end clients, i.e. browsers that would be forced to accept gov issued CAs. I don’t see anyone going after TOR as it’s already a very niche thing, so it should be fine.

Illecors,

Oh, it doesn’t - the restriction is not in place to begin with. But it will definitely happen if this is to go through.

Illecors,

@Aspaldiko This is what I would’ve said. Hiding in plain sight is the solution. It gets tricky when you want to send a message and not leave a trail at all, but in essence - privacy != anonymity.

Illecors,

The ending is not great, but it definitely was an ending. Some shows can’t even manage that. And to me it hasn’t spoilt all the previous seasons - those were solid.

Newbie with questions about Debian

I got an old Windows 7 laptop that was going to be thrown out and decided to put Linux on it (see previous thread here). Most people suggested I go with the latest stable version of Debian, so that’s what I installed. I’ve mostly used Windows, but I do have some experience with Ubuntu....

Illecors,

I’d like to respond to 3.

My suggestion would be to setup a keyfile to unlock the partition automatically. You can use your EFI partition to store the keyfile, which makes no sense from security perspective; or you can keep it on a usb drive. Machine will ask for password if usb is not present, or boot straight up if it is.

Illecors,

You’re pointing at the ugliest corner there is, and yet I’d like to point out that there’s been that kind of attack yesterday and the day before; and the tools and people reacted well enough for it to go unnoticed for most folk on the fediverse.

My ubuntu installation broke completely

I think that installation was originally 18.04 and I installed it when it was released. A while ago anyways and I’ve been upgrading it as new versions roll out and with the latest upgrade and snapd software it has become more and more annoying to keep the operating system happy and out of my way so I can do whatever I need to...

Illecors,

Ah, I had misunderstood your /boot situation previously. There’s an easy way to fix it by backing up current content of boot, unmounting it, creating some dir somewhere where there’s space (/tempboot was my choice last time), bind mounting it to /boot and going through the apt process. Then unmount the bind, mount the real boot, delete everything except currently booted kernel stuff, copy all the things from /tempboot update the initrd and grub. Et voila!

Illecors,

Someone had created !typewriters and I could swear it had some content, but engagement was low at the time and I think the creator abandoned it. I can move ownership to you if you’re up to it.

Illecors,

Yes! I’ve literally found out about a data leak this way before it was announced publicly.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #