What filesystem are you using?
Just a regular Joe.
What filesystem are you using?
It is possible to wrap something like python into a single file, which is extracted (using standard shell tools) into a tmpdir at runtime.
You might also consider languages that can compile to static binaries - something like nim (python like syntax), although you could also make use of nimscript. Imagine nimscript as your own extensible interpreter.
Similarly, golang has some extensible scripting languages like https://github.com/traefik/yaegi - go has the advantage of easy cross compiling if you need to support different machine architectures.
Someone who lies is a liar. I lie unintentionally all too often, despite my best efforts not to (aside from some leg pulling.) Some people can’t seem to help lying, and some others do it quite intentionally. We humans aren’t very reliable or trustworthy, but we muddle on anyway, and we’re not that bad, mostly.
Not much, although it’s not strictly necessary for IPv6. But not much is pure IPv6 yet. Perhaps 2025 is the year of IPv6!
Lots of good advice here. I’ll add that you could develop an understanding of IP networking and how it works on Linux, network interfaces, with containers, with iptables as well as stateful and stateless firewalls, CIDRs and basic routing, IP protocols and some common protocols like DNS and HTTP. This used to be pretty common knowledge in applicants 15 years ago, but very few have it today I find. DHCP and PXE boot is fun to learn too, and is still common in datacenters.
Deemix is a good way to build up your local cache from Deezer, at which point you can serve it locally.
It will mess with artist renumeration though (which seems important to you), so you might want to find another way to compensate your favourite artists.
Regions give manual tiling possibility though, which is actually how I prefer it. I’m testing a new patch that someone recently did to support focus based on region, which is nifty.
labwc is working pretty well these days. Screen tearing for games and all.
There are a bunch of environment variables that I set this time though, which may have contributed to a better experience this time.
If I were a new user, I’d consider using such a tool. I guess I’ll see myself out. ;-)
That indeed changes things, potentially introducing much more bias. What motivation would somebody have to install this tool and run it? Is it being marketed/advertised somehow? How, where, and to whom? :-P
People who voluntarily report usage are more likely to be new users, experimenting with Linux distributions etc. Greybeards like me will check out new stuff every few months or years, and won’t shout about it one way or another. We’ll probably not send statistics when prompted, either.
https://forum.manjaro.org/t/caps-lock-behaviour-wayland/79868/8 seems relevant.
PFS matters where a party hasn’t already been compromised. Not so hard.
Read up on perfect forward secrecy and TLS.
And yes, a jurisdiction could compel them to break their security, depending on laws and ability to threaten.
IF TLS is used AND configured optimally on both ends, THEN the in transit message contents should be very secure, in that transient session keys were used.
I would be interested to know how often those two preconditions hold true though.
Of course, this is only one small link in the chain. There aint no magic bullet.
In some countries private law firms chase down infringers on behalf of copyright holders. They then attempt shakedowns with the threat of legal action if you don’t pay. They have a financial interest to catch people, and moral compasses vary.
Also, mistakes can happen (you, your family, guests using your wifi, in the courts, in the ISPs, in the law firms, in the tech they are using to identify people). Shit happens.
And if (when) it happens, then you would still have to deal with it, costing you time and money.
Understand the risks and make choices to minimize them if you can.
Apparmor profiles can be applied to an executable - the profile is then (if so configured) inherited by subprocesses. In my case I have a launch script to run lutris in a safe mode. It also changes the effective gid to be matched by some iptables rules (it was easier than creating a new network namespace, which is also possible). The script then checks that the Internet is inaccessible and that reading/writing to secured paths is denied before launching lutris.
Similarly I have a “safe” script to wrap other commands with an apparmor profile that stops most writes to my homedir/reads from some secure locations, which I often use to run scripts/programs from the Internet.
My sudo also requires a password (or a special keyboard combination, thanks to a custom pam configuration).
All that said and done, I’m sure I’ll be caught off guard one day.
I run a particular online windows game in a modded offline mode under Linux in network isolation and with a restricted apparmor profile. So far so good. Logs show no attempts to break out, except for the smoke test I run to ensure the sandbox is working. This is as much because of the random mods I install as the original devs (who could ban my online account).
On Windows, a VM would indeed be safer. GPU passthrough is possible … I guess easier with Windows using an onboard GPU, then passing a discrete GPU to the VM. You’ll lose some performance with a VM regardless, but it’s easy to disable networking, back up and restore from a known good state, and burn it to the ground when needed.
Your friends will find you wherever you are and will continue asking you such questions. There is no escape.
A nanotube garrote would be the talk of the town.