N.E.P.T.R
I’m the Never Ending Pie Throwing Robot, aka NEPTR.
Linux enthusiast, programmer, and privacy advocate. I’m nearly done with an IT Security degree.
TL;DR I am a nerd.
- 9 Posts
- 642 Comments
Funnily enough OpenRC is probably the slowest of the inits offered by Artix. The current best in both features and stability are Dinit and s6. Dinit is far more user friendly. Both boot ~20% faster than the others, and much faster than systemd. Generally though, simplicity without expense to features is what Dinit and s6+66 excel at.
Gentoo wiki page comparing inits: https://wiki.gentoo.org/wiki/Comparison_of_init_systems
From the Dinit developer: https://github.com/davmac314/dinit/blob/master/doc/COMPARISON
On a side note, are other trans people ok with the terms AMAB and AFAB. I was talking to a trans friend, and used those terms when talking about some old friends when we all lived in gendered dorms (not specifically for just trans), and after we were done talking she mentioned after (as an aside) that a lot of trans people dont like those terms because they are sometimes used by exclusionary type bigots. I am agender and dont really care about what pronouns are used for me (as long as no assumption is made about me based on a stereotypic gender role). I just want to be more conscious.
Ever done psychedelics? It can cause the same long-lasting memory/flashbacks and recognition of patterns in objects.
Supercritical CO2 turbine be like: whatup
When I was 18, I asked a group of maybe five people and they thought I was 27. That was many years ago.
Well, of course.
I just read the title and when I see the name Ada I think of this: https://en.wikipedia.org/wiki/Ada_(programming_language)
N.E.P.T.R@lemmy.blahaj.zoneto
linuxmemes@lemmy.world•Operating System Political Compass - Updated versionEnglish
2·23 days agoYes, just get the Nvidia version of Secureblue/Bazzite and you are good.
N.E.P.T.R@lemmy.blahaj.zoneto
linuxmemes@lemmy.world•Operating System Political Compass - Updated versionEnglish
2·23 days agoI personally adhere to the idea of avoiding installing too many overlayed packages. Most i have installed in like five (with dependencies) at once. If you are comfortable with still using mostly Flatpaks and (only) a few overlayed packages, then Atomic may still be for you.
I really do recommend Secureblue.
N.E.P.T.R@lemmy.blahaj.zoneto
linuxmemes@lemmy.world•Operating System Political Compass - Updated versionEnglish
2·23 days agoI see this misconception all the time about Fedora Atomic distros. You can actually install any normal package available through the included repos, or add your own repo (
rpm-ostree install $pkg). DNF can be used to add a repo from a URL and then you just userpm-ostree install $pkg. It is really that simple.The reason you aren’t supposed to is that it makes the system diverge from the default image by overlaying the package. Still though, Fedora Atomic is just Fedora but container images for updates.
N.E.P.T.R@lemmy.blahaj.zoneto
Not The Onion@lemmy.world•Melania Trump pitches robots as potential educators for American schoolchildrenEnglish
7·24 days agoCan’t tell which one is the “real” robot.
N.E.P.T.R@lemmy.blahaj.zoneto
Linux@programming.dev•Wine 11 rewrites how Linux runs Windows games at the kernel level, and the speed gains are massiveEnglish
21·25 days agodeleted by creator
N.E.P.T.R@lemmy.blahaj.zoneto
Privacy@lemmy.ml•Mullvad Browser and Tor Browser have unique-per-computer persistent IDs on fingerprint.comEnglish
16·25 days agoVivaldi is also proprietary. Not a good privacy browser.
N.E.P.T.R@lemmy.blahaj.zoneto
Not The Onion@lemmy.world•Quadruple amputee cornhole player accused of fatally shooting man in MarylandEnglish
3·25 days agoThis is the 3rd time it has been posted. The last post (2nd post) was 2 posts away from this one.
N.E.P.T.R@lemmy.blahaj.zoneto
Transfem@lemmy.blahaj.zone•I cant remember my teenage yearsEnglish
8·25 days agoDissociative Amnesia maybe?
N.E.P.T.R@lemmy.blahaj.zoneto
Linux@lemmy.world•How to confine an existing distrobox container?English
1·25 days agoFlatpak apps cant use namespaces. Flatpak (the software) uses namespaces but Flatpak apps can not.
N.E.P.T.R@lemmy.blahaj.zoneto
Linux@lemmy.world•How to confine an existing distrobox container?English
1·26 days agoYes, I understand Flatpak does some seccomp syscall filtering. It still isn’t enough to consider a secure sandbox where the threat model is that the app is untrusted. Bubblewrap is generally considered a weak sandbox and isn’t “secure by default”, allowing for easy footguns.
LXC/Incus does support proper VMs but it isnt as common.
Neither are really designed to run untrusted apps.
N.E.P.T.R@lemmy.blahaj.zoneto
Linux@lemmy.world•How to confine an existing distrobox container?English
3·27 days agoI guess I just don’t understand your question. Explain in more detail.
- Who is the threat actor? (State, APT, Hackivist, etc)
- What is their goal (what do they want)? (Money, data, persistent access, blackmail)
- What tools do they have?
Really think about the Ws (who, what, where, when, how).
If you want to protect against an “advanced” threat actor, you can not do that without multiple layers of isolation, including but not limited to virtualization, MAC (SELinux), namespaces, seccomp.
All protections are meaningless without a clear understanding of what assets you are protecting, the threat you face, and they want from you.
N.E.P.T.R@lemmy.blahaj.zoneto
Linux@lemmy.world•How to confine an existing distrobox container?English
9·26 days agoDistrobox is design to be the opposite of confined. Its goal is integration. The container is stripped away as much as possible to allow for sharing host resources.
As it says on the Distrobox website:
Security implications
Isolation and sandboxing are not the main aims of the project, on the contrary it aims to tightly integrate the container with the host. The container will have complete access to your home, pen drive, and so on, so do not expect it to be highly sandboxed like a plain docker/podman container or a Flatpak.
I would also argue calling “plain docker/podman container or a Flatpak” being “highly sandboxed” is also quite wrong and a misuse of those technology.
It uses Docker/Podman which is not a security sandbox. The purpose is app containers, not a security boundary. It shares the sane kernel as the host, which makes kernel vulnerabilities a source of container escapes. Docker (the default) runs as root and could be a source of privilege escalation. Best case is use gVisor or SELinux. Still not a secure sandbox.
Similar problems with Flatpak. Not a secure sandbox.
Doesn’tBarely filters syscalls (and in a general way instead of per-app), barely reduces attack surface, granting frequently required permissions often significantly reduces the strength of the sandbox, shares a kernel with the host (and no application kernel like gVisor or sydbox), weak use MAC (like SELinux). Most of this can also be said of the previous 2 container software (and also LXC/LXD/Incus).Also, don’t use browsers with Flatpak, they have a significantly weaker sandbox because it is missing a layer of sandboxing (namespaces). This makes attack exponential more likely by reducing the need chain another major vulnerability to execute a successful sandbox break.
What you want is a VM. It is designed to be a secure sandbox but needs some configuring.





Here is the link to UAD-ng: https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation/