biribiri11

joined 8 months ago
[–] biribiri11@lemmy.ml 11 points 5 months ago

But how does this solve the problem of the config files of the various DEs (GTK rc files or other theme stuff) messing with each other in the home directory?

It does not. Your dotfiles will be a bit wrecked when you rebase. See: https://universal-blue.discourse.group/t/why-is-rebasing-between-desktop-environments-bad/690/4 It’ll also cause random issues like: https://discussion.fedoraproject.org/t/flatpak-apps-crashing-after-rebasing-from-silverblue-to-kinoite/83623/2

It’s mostly plasma fighting gnome, though. I haven’t seen any conflicts with say, sway.

[–] biribiri11@lemmy.ml 4 points 5 months ago* (last edited 5 months ago) (3 children)

If the kernel is available in a COPR or another third party repo, you can just do a little swapping with rpm-ostree: https://github.com/openshift/os/blob/master/docs/faq.md#q-how-do-i-replace-the-current-kernel-with-kernel-rt-or-a-new-kernel-version-in-rhcos

Edit: Just in case this is the project you’re using, here’s specific install instructions for Fedora Silverblue: https://github.com/linux-surface/linux-surface/wiki/Installation-and-Setup#fedora-silverblue

[–] biribiri11@lemmy.ml 2 points 5 months ago

This use case would be covered by bootc, but BlendOS doesn’t have support by the looks of it atm

[–] biribiri11@lemmy.ml 3 points 5 months ago

but they don’t have the means to maintain that many distros “properly”

That’s why they’re not separate distros from Fedora (as in, they don’t even host their own RPM repos nor maintain their own set of Fedora packages like Manjaro vs Arch) and purposefully so. It’s just stock Fedora with a few configs, third party repos/packages, and some scripts preinstalled. The entire thing runs on GH actions.

[–] biribiri11@lemmy.ml 8 points 5 months ago

Afaik yes, the token is keyed to a specific source in the case of verifying through a website, but from what I can tell, that doesn’t stop someone else from creating a separate malicious website (or git repo) that looks similar but contains malware, and publishing that as a verified app with a similar name as the real app to flathub (so there would be multiple versions of an app, with only 1 being the “real” one on flathub).

[–] biribiri11@lemmy.ml 9 points 5 months ago (1 children)

If a new user installs malware from flathub while trying out mint for the first time, they’ll probably blame mint instead of flathub. Nobody will say “damn, I should have listened to that warning” while their “discrod” app rm -rf’s their entire PC away, they’ll instead claim Linux is crap and go somewhere else. Doing this helps keep mint safe, and definitely encourages unverified FOSS apps to hurry up and get verified.

[–] biribiri11@lemmy.ml 20 points 5 months ago (2 children)

This is a great start, but tbh, I’m not fully sold on “verified” flathub apps. Verification requires a token to be placed into a source repo or a website, but there appears to be nothing on actually verifying that the source/site are the original creators. So, for example, if someone packaged a malicious version of librefox and established it under io.github.librewolf-community instead of the canonical io.gitlab.librewolf-community, I’m concerned it’ll still show as verified (though quickly removed). The process can be read about here.

[–] biribiri11@lemmy.ml 3 points 5 months ago

The cheapest you’ll find that is still pretty good for HDDs is serverpartdeals. They have recertified Seagate Exos X22 20TB drives with 2 year warranties for $215. They also offer new drives with the full 5 years, ofc. Exos can be a little loud, as with other enterprise drives. You’ll still need a way to read from it in case you don’t have a spare drive bay, too.

[–] biribiri11@lemmy.ml 3 points 5 months ago

ostree is based on OCI images, the basis for containers and the like. “Rebasing” just refers to swapping out the OCI image containing your root with another.

[–] biribiri11@lemmy.ml 3 points 5 months ago

I know ssh -X works fine in a rootless podman container, and so does waypipe. I’d be shocked if xpipe didn’t.

[–] biribiri11@lemmy.ml 2 points 5 months ago

Not everything should be flatpak’d. In your case, xpipe (and in the future, waypipe) should always be installed in a docker container containing your normal “mutable” OS. It’s why Fedora is evaluating Ptyxis: when you open a terminal, instead of defaulting to your immutable root, it can be set up to go to a container which has your home mounted but a traditional, mounted root.

view more: ‹ prev next ›