- 8 Posts
- 227 Comments
moonpiedumplings@programming.devto
Linux@lemmy.ml•Is it safe to assume that all apps from the software store (Discover in my case) are safe?
1·16 hours agomalicious code does occasionally sneak into Debian distributed apps
Do you have an example of this? The xz utils backdoor did not make it into debian stable, only unstable.
Debian stable essentially forks every package, maintaining a custom codebase. They then cherry pick security updates only (ignoring feature updates or minor bugfixes), and applying those. This makes it extraordinarily resilient to any form of supply chain attack.
moonpiedumplings@programming.devto
Linux@lemmy.ml•Is it safe to assume that all apps from the software store (Discover in my case) are safe?
2·16 hours agoFlatpak’s show up in discover, and aren’t by the distro. Usually it’s flathub.
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•NaiHe – lightweight E2E encrypted chat over any self-hosted MQTT brokerEnglish
13·1 day agoJournalists communicating with sources in censored regions
Whistleblowers sharing information securely
You and your peer agree on an encryption key (any string).
This is unacceptably unsecure for the usecases you mention. There is a reason why the most secure messaging apps don’t use symetric encryption, don’t use passphrases, and they also possess forward secrecy.
It’s pointless to push this as a censhorship circumvention method when many other methods exist that already do so 10x better, in a secure way, over decentralized, hidden and unblockable infrastructure. (Tor’s meek-azure bridges use microsoft’s infrastructure, which nobody is able to block because everybody depends on it, even China).
I appreciate the project, and I am always happy to see people learning, progressing, and publishing their results, but you need to be honest about the weaknesses of your software compared to established solutions. It’s not impossible for you to one day produce a secure messaging app, but today is not the day. Right now, using this is just a fast way to get killed.
moonpiedumplings@programming.devto
Linux@lemmy.ml•How to connect to local private network?
2·2 days agosomewhat relevant: https://en.wikipedia.org/wiki/Shadow_IT
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•a VPN that is easily self-hostable and resistant to blocking?English
2·4 days agoAlso try wireguard over port 53. Often (udp) traffic to port 53 is unblocked because it’s needed for DNS.
What is special about this setup is that it can sometimes get around captive portal wifi.
moonpiedumplings@programming.devto
Linux@lemmy.ml•How to run `firefox -p` command and have firefox opened after closing the terminal like WIndows Run box.
4·4 days agoIf you use kde, you can search for “profile manager”, and it will show up, and can be launched from the app menu.
At least works for me. Before this was added, the KDE search/app menu also lets you run commands directly, so I would just run firefox -p in there. No need for a terminal.
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•a VPN that is easily self-hostable and resistant to blocking?English
34·6 days agohides as regular HTTPS traffic so it’s not blockable by Firewalls
From OP’s post, of course. If OP does not need to evade firewalls that are that aggressive, then they should have settled for a less stealthy VPN solution, as many of these HTTPS proxy solutions have performance and usability (can often only proxy TCP traffic) tradeoffs.
Perhaps they have already tried the wireguard on port 443 solution, and it didn’t work for them. My high school would auto detect and block wireguard to any port. Perhaps they are in a similar situation.
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•a VPN that is easily self-hostable and resistant to blocking?English
35·6 days agoMany of the prominent https VPN protocols are for evading the great firewall of China. OP had that as a requirement, so it is not an unreasonable assumption.
If you are evading less locked down firewalls, then you don’t need as stealthy VPNs.
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•a VPN that is easily self-hostable and resistant to blocking?English
3·6 days agoYes because they are all designed to evade the great firewall of China, which automatically catches almost all other VPN’s and proxies.
Github is blocked in China. The fact that these repos are on Github and Chinese is proof of their effectiveness.
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•How to "upgrade" from Gitea to Forgejo (not for the faint of heart!)English
11·6 days agoIf you are not a Gitea customer, you are not being informed of security updates in a timely manner:
Gitea repeatedly makes choices that leave Gitea admins exposed to known vulnerabilities during extended periods of time. For instance Gitea spent resources to undergo a SOC2 security audit for its SaaS offering while critical vulnerabilities demanded a new release. Advance notice of security releases is for customers only.
https://forgejo.org/compare-to-gitea/#security
Also, ForgeJo was promising federation which is still a WIP several years later.
Oh no, it doesn’t do the big feature™. I guess it’s unusable now.
I wish people would realize that software still works and is excellent even without the various flagship features. I use Kubernetes on a single node. I know there are people who use matrix without federation and e2ee because it’s actually a really good chat app, it just struggles with the performance demands of federation, and the e2ee ux isn’t quite there yet.
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•How to "upgrade" from Gitea to Forgejo (not for the faint of heart!)English
6·6 days agoYes. But this is a lot. It may be easier to use Forgejo’s built in migration tools, to copy over repositories along with their issues and other info. You would have to rebuild the admin parts of the site, like “organizations” and user privileges. (Well if you are using oauth and mapping users from oautb groups then you don’t…). And I don’t know if it’s automated for a many, many repos. But it’s just a click click click in the gui.
I remember there was a tool, I think it was related to forgefed, that could do batch repo migrations via the cli. I can’t find it anymore though.
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•a VPN that is easily self-hostable and resistant to blocking?English
1·6 days agoIt’s not quite a VPN, but it is very resistant against blocking:
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•Your logging is probably downEnglish
2·7 days agohttps://github.com/pgautoupgrade/docker-pgautoupgrade
Or if you are on k8s, you can use cloudnativepg.
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•Your logging is probably downEnglish
3·9 days agohttps://wiki.hackerspaces.org/List_of_Hacker_Spaces
Also check out meetup.com for linux user groups and other events.
moonpiedumplings@programming.devto
Linux@lemmy.ml•isnt proton making linux dependent on windows binaries?
21·10 days agoMindustry (open source)
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•Remote KVM recommendationsEnglish
3·10 days agoAlso check out meshcentral. Important thing aboout meshcentral is that it lets you hijack the users screen, show you can show them step by step through things. RDP doesn’t do that, it kicks the other user out.
moonpiedumplings@programming.devto
Linux@lemmy.ml•isnt proton making linux dependent on windows binaries?English
22·10 days agoNo, because proton is not Windows. Wine only works on Linux, so it’s actually a Linux platform. I consider every developer/publisher who targets proton to actually be targeting Linux, rather than windows. Every single time a windows update breaks something that continues to work on proton I laugh
See also: https://steamcommunity.com/app/221410/discussions/8/1734336452576620754/?l=czech
moonpiedumplings@programming.devto
Linux@lemmy.ml•isnt proton making linux dependent on windows binaries?English
1·10 days agoYes but the steam runtime is basically an entire Linux installation (that never gets updated) that valve drags onto your system. I found it greatly annoying when I wanted to use Steam Input (because that would make Nintendo Switch pro controllers work) on a laptop with 32 gb of storage and steam dragged along 4 gb of ubuntu that I was never going to touch (since I was playing games outside of steam using wine directly).
moonpiedumplings@programming.devto
Selfhosted@lemmy.world•An actually functional webproxy to self-hostEnglish
1·10 days agoBy the way: https://en.wikipedia.org/wiki/Shadow_IT




Debian repos are basically guaranteed safe: https://programming.dev/comment/22863237
Flathub is much, much safer than say, the google play store, but it ultimately does follow a model of app developers submitting packages which get reviewed and approved. In theory, someone could sneak malware past that, although there haven’t been any incidents (perhaps flathub’s review is very effective?). But the snap store, which follows a similar model has had malware. But canonical hasn’t been the best steward of that one.
In addition to this, not all stuff on flathub is open source, which is definitely concerning.
Thankfully, flatpak has a built in sandboxing system, which lets you limit what the appps have access to. KDE has a UI for it, and there is also the GUI app flatseal.