lily33

joined 1 year ago
[–] lily33@lemm.ee 3 points 4 months ago (2 children)

That only works if the main reason someone uses Linux is personal privacy.

[–] lily33@lemm.ee 7 points 5 months ago* (last edited 5 months ago) (1 children)

However, it also uses halium and libhybris. That means you can't just install your favourite distro and upstream tools. Everything that needs GPU acceleration needs to be patched for libhybris. For example, that means no upstream wlroots - and the latest patched version I think is 0.12 or so.

[–] lily33@lemm.ee 5 points 5 months ago

Actually, no, this seems to work on a very different principle.

[–] lily33@lemm.ee 13 points 5 months ago (6 children)

Not really. It seems to use a very different technology from termux.

[–] lily33@lemm.ee 7 points 5 months ago

I like the idea, but I really hate that they've hardcoded the provider.

[–] lily33@lemm.ee 1 points 6 months ago (2 children)

I'm somewhat skeptical. What if LetsEncrypt decided to misbehave tomorrow? Would the browsers have the guts to shut it down and break all sites using it?

[–] lily33@lemm.ee 2 points 6 months ago (1 children)

It seems to me like a MITM hacker can just redirect all requests to a Blockchain node towards their malicious node.

[–] lily33@lemm.ee 18 points 6 months ago* (last edited 6 months ago) (2 children)

Actually, that's not quite as clear.

The conventional wisdom used to be, (normal) porn makes people more likely to commit sexual abuse (in general). Then scientists decided to look into that. Slowly, over time, they've become more and more convinced that (normal) porn availability in fact reduces sexual assault.

I don't see an obvious reason why it should be different in case of CP, now that it can be generated.

[–] lily33@lemm.ee 5 points 6 months ago

Good point. I'd try to grep for something like [Bb3][Ee3]g[Ii1][nη]\w+<and so on> but I just know I'll miss something

[–] lily33@lemm.ee 14 points 6 months ago* (last edited 6 months ago) (2 children)

Oh, in that case we don't need to read either - just run a simple grep!

[–] lily33@lemm.ee 25 points 6 months ago (9 children)

Finally, presumably if anyone added some malicious code in a their program, it would be sneaky and not obvious from quickly reading the code.

[–] lily33@lemm.ee 80 points 8 months ago* (last edited 8 months ago) (1 children)

On the one hand, doas is simpler. Less code means less bugs, and lower chance someone manages to hack it and gain admin rights. On the other hand, sudo is more popular, and so has a lot more people double-checking its security. Ultimately, I don't think it matters - when someone unauthorized gains admin rights, usually it's not due to bug in sudo or doas, but other problems.

view more: ‹ prev next ›