rufus

@rufus@discuss.tchncs.de

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Can flatpaks be installed and accessed from another partition on the same drive?

My laptop seems very finicky with linux and enjoys periodically freezing. Some distributions are more stable than others and I’d like to keep testing other distributions without reinstalling/ downloading/transferring all my apps and steam games constantly....

rufus, (edited )

I feel you. The bugs that get the machine to crash and you have zero chance of getting any useful debug information, are by far the most annoying ones.

In my experience it’s most of the time some driver issues in the kernel or the (NVidia) proprietary drivers. Or an hardware issue. On Debian I can install several kernel versions alongside each other. So there would be no need for me to install more than one distribution. Most of the times a proper crash isn’t caused by the userspace anyways, so it boils down to the different kernel versions and configurations anyways. You could also try an older kernel.

rufus, (edited )

Hehe, but the old myth that graphics cards degrade if you use them is a myth. I think Linus Tech Tips did a video on this and an older one. Sad that your GPU is flickering now, but probably unrelated and had happened either way at some point.

rufus, (edited )

Yeah, that’s not quite right. You need a means to discuss things and review code. You can do this via a website or mailing list. The Linux kernel uses the latter. Lots of other devs use the former. Like Github. And Github and Git aren’t the same. The issue tracking, discussion platform etc are something Github does on top of Git. You can as well use Email or a different service/online platform for the communication. The actual program code is stored in Git in both cases.

rufus, (edited )

Yeah, next time don’t panic. Use ps and pstree and fuser (or the programs you like) to first find out the executable filename with full path and which program started it. Then you can kill it and you’ll have some info to start debugging things.

rufus,

Why? Make me learn something.

rufus,

Yeah. Hetzner is the hosting company. They are the owner of the IP range and thus get the letters. They forward it to their customers, in this case OP. And the letter seems to be from one of those shady companies that scan the torrent swarms for Intellectual Property of their customers and then write letters to the abuse contacts of the IP addresses of the offenders. I don’t know where OP lives, but Hetzner is big in Germany, so it’s probably german law we’re talking about. And we’re not very liberal with copyright infringement, should that escalate to that point.

rufus, (edited )

I think Hetzner wants you to tell them you’ve removed it. They did as requested and took down the VPS and disabled it. It’s now in your hands.

I myself wouldn’t ignore such a letter. It’s now just asking you politely. If you continue they need to make the choice if it’s worth pursuing you. I don’t have any good insight if and under what circumstances they do. I would comply, remove said content and probably not reply to them. It’s unlikely to make it better for you if you talk to people targeting you. And I wouldn’t keep the logs around as they requested. Accidents happen, files get deleted, nobody is perfect.

But you obviously need to talk to Hetzner.

rufus,

The relays don’t have access to the content, it’s encrypted. But the exit-nodes can see what you’re transmitting. They just don’t know who you are because they got your data forwarded by the relays.

rufus, (edited )

Well, I don’t know the exact reasons. I read somewhere that it’s been a frequent issue. That has either to do with the way the torrent client is programmed and it doesn’t pay attention to the specifics for that case. Or the users frequently get the config wrong.

For example: Since Tor doesn’t support UDP, if your torrent client sends out a UDP packet, it goes over your normal internet connection, immediately revealing your real IP. Whereas if you used a VPN, the packed had been tunneled and that would disguise you.

Also the Socks-Proxy setup is more complicated. Seems to be the case there are just many more possibilities to get it wrong.

I don’t know any reason why you couldn’t theoretically get it watertight. But you have to pay close attention to do it right.

There could be specifics to torrent traffic that expose you in some way. I’m not sure, you’d need to ask a security expert about this. But a torrent download is another kind of data stream than the web-surfing Tor was made for. I know there was research done on Tor. I can only speculate.

rufus, (edited )

Both work quite differently. TOR routes you over several layers, obscures your IP and changes the IPs around occasionally so you can’t be tracked.

With Bittorrent you want lasting connections to other peers to be able to receive and send all the data. This doesn’t align with the ever changing IPs and stuff.

A VPN gives you one IP that you can have for hours.

A VPN supports UDP connections, TOR doesn’t.

Connecting your Bittorrent client to the Socks-Proxy of a TOR client is a different setup than it just sending normal packets through a VPN tunnel.

TOR is slow (by design), a VPN is fast.

If your client or something leaks your IP it happens anyways, if you route it over one node or seven. All the extra energy is just wasted.

And bittorrent puts even more strain on the TOR network the way it works. Making it slower for anybody else. And (ab)using the resources volunteers provide. (And which are meant for better use-cases.)

rufus, (edited )

It’s probably more they either optimize for speed or for privacy. You sometimes can’t do both. Including IPs is usually done to find the best and direct connection between peers. It’s not shady per se. But it’ll harm you if it’s the default.

rufus,

I’ve asked what the mocking itself accomplishes.

rufus, (edited )

It’s a bit more complicated than that. It may very well be the case for political communities, I don’t really know. But for computer-related stuff and my niche interests, the federation between those instances has (only) benefit to it. So I don’t really support that conclusion in general. But I’m in support of pushing down on toxic behaviour. And not everything on Lemmy is what I’d like it to be.

rufus, (edited )

Sorry, can you please re-phrase that question?

rufus,

You need to dumb it down a bit if you want me to understand. Give me a bit of context. Who is doing what?

rufus,
rufus, (edited )

Yes please, don’t do brigading but I didn’t get you. And you kind of ‘answer’ questions with different questions.

rufus, (edited )

Dudes, Duderinas and people from all around… While I said something in the meta-debate here, I’m not engaging in the underlying argument. What are you trying to accomplish here? The people you are talking about are suffering horrible atrocities. All you can think about is hating on each other on the internet… (There has to be a better way to deal with the situation.)

rufus, (edited )

Well the bugtracker and additional features are not inside of the git repository. So they’d get lost. But each ‘git clone’ is a complete clone of the (source code) repository including all of the history of changes, the commit messages, dates and individual changes. That’s stored on every single computer that cloned the repository and you have a copy of everything locally. Though it might be out of date if you didn’t pull the latest changes. But apart from that it’s the same data that Github stores. You could just make it available somewhere else and continue.

rufus, (edited )

I think there isn’t really something “authoritative” in Git. You can upload your changes somewhere or another developer can download changes from you. You can also all make incompatible changes and then you won’t be able to sync it anymore (you’d need to fix that first and manually handle the conflict). There’s nothing authoritive in it. In practice most people choose a central place and all upload their changes there and everybody else regularly pulls them from there. But you could as well directly do it with the computer of your colleague if you have a network connection and access to it. Files including history of changes are the same on every machine and server. (If they’re all up to date). It’s like storing a directory including past versions on 10 different computers.

rufus,

I answered there. Not sure why you open a completely new post for that follow-up question?! You could have asked just here.

rufus,

It will never get recommended. It’s bad for the network and bad for your privacy.

The Paperweight Dilemma: Original Pinephone might lose future kernel updates if devs can't pay down tech debt (blog.mobian.org)

I think I’m reading this blogpost correctly: Mobian devs working on maintaining Linux kernel support for Pinephone painted themselves into a corner with tech debt, and may not be able to continue porting new kernel updates. Pinephone Pro runs a different chipset with wider community support, so it’s not affected....

rufus,

The phone is from 2019 and i think even back then the SoC was a compromise.

It has more quirks. There have been some hardware issues. And mainline Linux and a Linux Desktop is still struggling today with power management. Like getting chat messages while it’s asleep. It’s really not for use except for tinkerers.

But I’d agree. A newer, properly usable and powerful Linux phone would be great. Idk if there are good SoCs out there with fully open-source drivers and bootloader. And power consumption that lasts you a day.

rufus,

Yeah, a Nokia N950 with a proper SoC and 8GB of RAM. Or something like the APU from the Steam Deck.

That’d be great 🤗

rufus,

Well, to do it properly I believe we need a whole API for applications that does connected standy. (Like Android Apps have)

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #