nyan

joined 8 months ago
[–] nyan@sh.itjust.works 6 points 1 day ago (1 children)

If you're interested in doing the tech equivalent of a party trick (except that it's less interesting to watch), go ahead and try. You'll probably just end up reinstalling almost every package on the system that differs between the base distro and the offshoot. Harmless, but also pointless, since you could just have installed Debian from the get-go and saved yourself a lot of trouble.

There are a whole bunch of Very Silly Things you can do in the Linux world that aren't worth the effort unless your income relies on the creation of niche Youtube vids. For instance, it should theoretically be possible to convert a system from Debian to Gentoo without wiping and reinstalling. I'm not going to try it.

[–] nyan@sh.itjust.works 2 points 5 days ago

My primary icon theme and widget style are 20+ years old and not flat in the least. You can still have that look and feel on a real computer if you want it (but you may have to compromise elsewhere or do some extra work). On phones, all bets are off.

Dunno what your issue with that icon pack is, but I'd bet there's a good chance it can be solved with a few file renames or symlinks if you care enough to bother.

[–] nyan@sh.itjust.works 0 points 5 days ago

Most people are not obsessed monomaniacs with room for only one interest in their lives. That means that most Linux users are interested in things other than free software, so many will choose to "dress up" their computers in ways that showcase their other interests, and may use material that is not under copyleft licenses to do so. If this causes you anxiety or confusion, you may want to speak to a mental health professional. Seriously.

[–] nyan@sh.itjust.works 2 points 1 week ago (1 children)

I ended up setting up custom themes for multiple different widget sets to get a true black background. It was easy for most QT variants, not too bad for GTK2, really awful for GTK3 because it doesn't have proper documentation for manual theme creation, and I haven't tried to tackle GTK4 yet.

Because they all need different configs (and the window manager title bar etc. may need yet another one), it's difficult to give suggestions unless you tell us which terminal and window manager software you're trying to theme—the requirements for a Gnome session are different from those for something like fluxbox. Some terminal software even has its own built-in theming support.

[–] nyan@sh.itjust.works 4 points 3 weeks ago (1 children)

TDE. Functional, stays out of my way, but still reasonably full-featured. The development team is dedicated to adding useful features while keeping the original look and feel, so I don't have to go hunting for settings that have inexplicably moved or changed defaults every time I update. It doesn't support Wayland, but I'm Wayland-neutral (that is, I have nothing against it, but I have nothing against X either).

[–] nyan@sh.itjust.works 17 points 3 weeks ago

Yet another, "well, yeah, technically it has security ramifications, but I'm not admin'ing any multiuser machines, so I'm not losing any sleep over it" bug.

[–] nyan@sh.itjust.works 2 points 4 weeks ago

Gentoo supports either configuration, as it does with a lot of things. My systems were installed with split /usr and I have no intention of changing that, because the merge adds no value for me.

[–] nyan@sh.itjust.works 4 points 4 weeks ago (1 children)

Um, if your primary use is typing accented letters, why don't you just set a compose key? The character sequences you need to type are much more intuitive, and you don't get this type of problem.

In my case, I have scroll lock (the most useless key on the keyboard) set as a compose key. To get "é", I type scroll lock, then e, then '.

You can set a compose key using setxkbmap, for instance setxkbmap -option compose:sclk. (If scroll lock isn't to your liking, there are a number of other modifier keys that can be used instead—list here, starting around line 810.) You can also specify it permanently using X configuration files, although I don't know the exact method.

[–] nyan@sh.itjust.works 10 points 1 month ago

The GPU doesn't care about the CPU, or vice-versa. AMD is probably better value for money right now if you're intending to replace both CPU and mobo, but Intel will work.

The reason you don't see AMD CPU + nVidia GPU in premade machines these days has to do with corporate contracts, not interoperability. Before AMD bought out ATI, it wasn't an uncommon combination.

[–] nyan@sh.itjust.works 2 points 1 month ago (1 children)

Even if the original issue had anything to do with ISOs, he's way overestimating the level of protection on many install ISOs, in my experience—they're just disk images, and presumably all the files read off them are passing through Ventoy itself. Even if you find one that performs some kind of verification, easy enough to change a jump instruction to a no-op somewhere in the machine code guts of a file as it passes through Ventoy, and prevent the verification from executing. (The difficult part is figuring out which instruction to change, but people have done it before.)

[–] nyan@sh.itjust.works 5 points 1 month ago (3 children)

It can’t inject anything into the ISO files at rest without bricking then, and I don’t know if an OS that doesn’t verify it’s own image before booting.

As far as I can tell, this is not talking about ISOs installed using Ventoy, but precompiled blobs of things like Busybox that are included in the Ventoy install package. It's an important distinction. The developer could bundle a tampered blob, include in the documentation the checksum that matches that blob, and then if someone checks with the upstream project and calls them out, say something along the lines of, "Oh, they must have withdrawn that release," and replace it with an untampered blob. If they don't fight to preserve the tampered blob, they might even get away with it.

[–] nyan@sh.itjust.works 1 points 1 month ago

-o PubkeyAuthentication=no should only work if the server is configured to allow password auth at all. I believe the advice these days is to disable password auth completely for security.

view more: next ›