Served in the Krogan uprisings. Now I run a podcast

https://bdsmovement.net/get-involved/what-to-boycott

  • 0 Posts
  • 95 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle

  • Do you know if these folks actively develop it or do they just apply patches to the Firefox codebase ?

    Like do they just pre configure a bunch of about config settings and the pre installed search or do they harden the binaries at compile time ?

    I’ve not kept up with this but I’m curious if there is any real advantage of this over Firefox after it has been configured. If not I would stick with Firefox as it will get security updates quicker by people who know the source code intimately.

    Anyway not shitting on anyone’s choices here just curious.



  • Random hackers, companies, dragnet surveillance.

    The companies are probably the biggest exposure as we are forced to interact with them for utilities, flights etc . They get hacked all of the time and dont bother to secure their data.

    Also as a side note I hate how lots of places just assume you want to download their shitty spyware ridden apps or hand over your phone number or an email.








  • You are right, as you note this requires a set of skills that many don’t possess.

    I have been looking for ways I can help going forward too where time permits. I was just thinking having a list of possible targets would be helpful as we could crowdsource the effort on gitlab or something.

    I know the folks in the lists are up to their necks going through this and they will communicate to us in good time when the investigations have concluded.


  • I think going forward we need to look at packages with a single or few maintainers as target candidates. Especially if they are as widespread as this one was.

    In addition I think security needs to be a higher priority too, no more patching fuzzers to allow that one program to compile. Fix the program.

    I’d also love to see systems hardened by default.





  • I like it but I would prefer it to be more restrictive out of the box. Such as have apps declare a list of urls the are permitted to contact , a browser could have * .

    I’d like a more granular filesystem list too more akin to apparmors were each file path needed is explicitly defined, in some cases you would need a wildcard or a directory but for most apps this could be done.




  • I use btop in tmux on my server but on the desktop I run htop in a dropdown terminal when I need to keep am eye on things

    As to the why it depends on the use case but on my server I can monitor all disks and networks utilization by interface in addition to processor and memory usage with btop.

    Htop is easier to parse due to the colors but I’ll still use top if on a remove server to check something in work.