[-] ReversalHatchery@beehaw.org 1 points 1 day ago* (last edited 1 day ago)

but that's where it becomes more serious: when basic functions of the system fail, silently. when you can't even reboot without a terminal, because the reboot dialog crashes

[-] ReversalHatchery@beehaw.org 4 points 2 days ago

as more and more official things can/need to be done online, it will only get to be a bigger risk. I don't think it's low even today.

[-] ReversalHatchery@beehaw.org 1 points 2 days ago

Usually you would only need to reboot if you want to use the new kernel right away after an update.

and the new version of all the software that is still running with the old version.

For most of the programs, you don't even need to restart them if they're already running.

~~how? won't they keep being the old version?~~

However, if you restart them they will run as the newer updated version.

oh, yeah, we agree on that. but my point is that in my experience, a lot of software gets very confused if some libs it would use or resource files have changed after they were started. often that's also the reason why holding back a package's version makes trouble over time (because certain other packages can't be updated either), or same with using custom repos that have a different release schedule or maybe are not even in sync with your distro

[-] ReversalHatchery@beehaw.org 11 points 2 days ago

rest assured, the 300 MB common social network apps with ever increasing storage and memory usage and decreasing functionality won't be marked appropriately

[-] ReversalHatchery@beehaw.org 2 points 2 days ago

But an adversary could easily use a bad usb when they have physical access to the computer and glitter nail polish doesn't detect that. I guess that this is why nail polish isn't sufficient on its own and why we need also either trenchboor or Heads.

it would be interesting to know how much does usbguard protect against this. of course you also need to do something to limit booting from usb, but how effective is usbguard in practice?
what is the risk of sticks that tries to compromise the machine through kernel driver vulnerabilities?
is it possible that it compromises some other firmware on the machine (like the EC in laptops)?
or that it takes advantage of some hardware design failure?


Personally I've only heard about Heads so far, but I think this is an interesting topic. Could you give us a short explanation about why is SRTM not enough, and what is a better way?

[-] ReversalHatchery@beehaw.org 1 points 4 days ago

Timeshift is explicitly designed to do that easily and automatically

by consuming much more space. but you're right, I did not think about it

Backup before upgrade is a weird thing to cram into a file system.

I agree, but these are not really backups, but snapshots, which are stored more efficiently, without duplicating data. of course it does not replace an off site backup, but I think it has its use cases.

[-] ReversalHatchery@beehaw.org 1 points 4 days ago

Not completely but kind of, all those poweroff, reboot etc. tied to systemd, though I believe this is mostly related to polkit run out of time.

that's right, but as I remember the error was talking about being unable to launch that KDE-specufic countdown overlay. journalctl has shown such an error for every time I tried to stop the session in any of the ways.

Normally updates don't change a thing on Linux since the system runs on RAM.

that's not how I understand the system is working. could you elaborate?

[-] ReversalHatchery@beehaw.org 2 points 4 days ago

I've learned this lesson with my Android phone a few years ago. There it was actually about sqlite databases of a system app (contacts I think?), but this can happen with other formats too. Worst is if it doesn't just error out, but tries to work with "garbage", because it'll possibly take much more time to debug it, or even realize that your data is corrupt.

[-] ReversalHatchery@beehaw.org 2 points 4 days ago

will that also restore your data? what happens when a program updates its database structure with the update, and the old version you restore won't understand it anymore?

[-] ReversalHatchery@beehaw.org 5 points 5 days ago

Maybe you have random powerloss?

who doesn't? even if rarely, but it just happens

[-] ReversalHatchery@beehaw.org 5 points 5 days ago* (last edited 5 days ago)

being able to revert a failed upgrade by restoring a snapshot is not a power user need but a very basic feature for everyday users who do not want to debug every little problem that can go wrong, but just want to use their computer.

ext4 does not allow that.

[-] ReversalHatchery@beehaw.org 7 points 6 days ago

we need to consume the rich. There's no other way

120

Recently there was a post where the OP pitched an idea for a service related to this community. I don't want to go into details but the post's text has shown that maybe there's some misunderstanding around the technology, and a considerable amount of us also thought that it's not a good idea.
The post was removed (noticed because I couldn't reply to someone) probably because the OP felt shame for their "failed" idea, but I think we shouldn't delete posts for reasons like this.

The post created an interesting discussion around the idea with useful info. It's useful to have things like these for future reference, for similar discussions in the future.
This is an anonymous forum, so there's no shame in recommending things, when you do that politely like it was done in that case.

21

I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/.

Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.

I have checked the version of gem by running gem --version. This is on a Debian Bullseye based distribution.

60

The video is a short documentary on Trusted Computing and what it means to us, the users.

If you like it and you are worried, please show it to others.
If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.

view more: next ›

ReversalHatchery

joined 2 years ago