It’s supposedly already open.
It’s supposedly already open.
Yes. As long as you have enough system resources, you can run whatever. If you want to refer to each service by an A record in DNS, just put a reverse proxy out in front. Otherwise, you can just refer to it’s forwarded port from the container if you wish.
Fedora or Ubuntu have the best installers. I would suggest Fedora.
The first step into the world of owning your tech is knowing what can actually run on it. It’s not just Linux. Just not Windows or MacOS.
If you’re super into what you’ve just accomplished, have a look at the ESP32 ecosystem and behold.
I think they are just misunderstanding what Gluetun is for.
What’s the concern?
Gluetun is for containers. OP is asking about routing.
Not enough info, but I’m guessing no. Looks like you started zeroing out the drive and cancelled realizing your mistake? If you had just deleted the partition, you could fix that with ease, but zeroing is pretty much a guaranteed no.
You can try and run some data recovery tools to find some specific files, but I’m pretty sure it’s just wasted time.
No, I’m saying the way ISOs are written, you couldn’t just, say, inject changes via text tools or whatever like the xz attack.
I’m not aware of HOW a binary blob not knowing specifically what it was going to attack COULD attack anything in a resting and isolated state like it would be with Ventoy.
Well anything that is linux-first WITH stylus support isn’t going to be cheap.
The cheapest Linux tab I can think of is the DC-Roma II ($250), but it’s RiscV and meant as a development platform. No stylus support.
Similar in features is the Juno Tab 3 ($699), but it’s an n100 based tablet, and I don’t think it has stylus support.
Maybe you can find a used Lenovo Tab and root it to install Linux? I know you’re unlikely to do so on a Samsung.
Zero complaints with mine. Linux daily driver, no issues at all. If OP didn’t actually mean a FULL Linux experience, then that’s something else, but this is the best one out there in tablet form with stylus afaik.
What an odd target.
The xz issue is something totally different though. That was a software library running and executing against flat files. I’m just not sure there’s a way to alter an ISO image before boot, undetected in the case of Ventoy.
If the goal is to alter files to provide access to something, this must be some sort of ingenious way that bypasses checksums, and targets something universal, which doesn’t seem quite possible in the case of a substitute bootloader.
Running any service as a dedicated user with limited permissions is more secure than not. It’s not just transmission. This is a very basic method of increasing security on any running machine. https://en.m.wikipedia.org/wiki/Principle_of_least_privilege
I understand the concern raised, but unless I’m reading this wrong there is an assumption that Ventoy may be doing something untoward, but I’m not sure how at this level. It can’t inject anything into the ISO files at rest without bricking then, and I don’t know if an OS that doesn’t verify it’s own image before booting.
Just sounds like super lazy project administration. Maybe I’m missing something?
They have enough trouble with their drivers and software ecosystem. I’m surprised they’re adding more onto that pile.
I thought you were asking about the bootloader. No idea if you’re trying to hack your own phone. Just reinstall it if you’re starting from scratch.