unhrpetby

joined 1 month ago
[–] unhrpetby 1 points 5 hours ago* (last edited 4 hours ago) (1 children)

Privilege escalations always have to be granted by an upper-privilege process to a lower-privilege process.

There is one general way this happens.

Ex: root opens up a line of communication between it and a user, the user sends input to root, root mishandles it, it causes undesired behavior within the root process and can lead to bad things happening.

All privilege escalation is two different privilege levels having some form of interaction. Crossing the security boundary. If you wish to limit this, you need to find the parts of the system that cross that boundary, like sudo[1], and remove those from your system.

[1]: sudo is an SUID binary. That means, when you run it, it runs as root. This is a problem, because you as a process have some influence on code that executes within the program (code running as root).

[–] unhrpetby 0 points 5 hours ago* (last edited 5 hours ago)

secureblue is about as secure as Linux can get...

Unless you have an unusual threat model, this statement is utter nonsense. I can run a kconfig stripped kernel with zero kernel modules and one userspace process that is completely audited and trusted, without the ability to spawn even other processes or talk to network (because the kernel lacks support for the IP stack).

Secureblue might offer something significant when compared to other popular and easily usable tools, but if you compare it to the theoretical limit of Linux security, its not even comparable.

I examined Secureblue's kernel parameters and turned multiple of them off because some were mitigations for something that was unnecessary. IE: The kernel would make the analysis that your hardware is not affected by a vulnerability, and thus there is no need to enable a specific mitigation. But they would override this and force the mitigation, so you take a performance hit, for what I understand to be, no security gain. Not sure why they did that, a mistake? Or did they simply not trust the kernel's analysis for some reason? Who knows.

[–] unhrpetby 1 points 5 hours ago

Is desktop linux more insecure than Windows?

This is an impossible question to answer without more information. Depends on your threat model, how you use the computer, your distro, etc.

[–] unhrpetby 12 points 1 day ago (1 children)

If they don't have the training data available, then I wouldn't consider them open source.

[–] unhrpetby 1 points 4 days ago

...if someone nefarious gets to the point they can read this stuff then they’ll already be able to record your screen, log keystrokes, etc.

No screenshots -> less data. Less data -> lower breach severity.

(Unless you have an unusual threat model)

[–] unhrpetby 3 points 4 days ago

All this can be gutted by an advanced user.

Talk is cheap. Show me the code.

[–] unhrpetby 2 points 1 week ago* (last edited 1 week ago)

Nothing™ lost just about all of its credibility with me when they released a disaster of a messenger and then proceeded to downplay it on social media.[1][2]

[1] [2]

[–] unhrpetby 4 points 1 week ago* (last edited 1 week ago)

It literally would have been easier to make an account than to type up this comment.

Not necessarily. Avoid making assumptions about those whose threat model and precautions you know little about.

[–] unhrpetby 10 points 1 week ago* (last edited 1 week ago)

The difference would be that RMS is extremely well-versed in computer technology. He understands the problems with non-free software.

Someone with his knowledge could choose to disregard those issues for convenience, but Stallman is willing to make great sacrifices.

[–] unhrpetby 0 points 1 week ago* (last edited 1 week ago)

...the government is absolutely a threat to you.

I don't see how this supports your previous claim of: "If you don’t have privacy from the government, you don’t have privacy."

[–] unhrpetby 5 points 1 week ago* (last edited 1 week ago) (3 children)

If you don’t have privacy from the government, you don’t have privacy.

Privacy refers to more than just privacy regarding the government.

Your threat model and situation might mean that if the government knows something, its as bad as if every single person knows it.

But this isn't for everyone.

[–] unhrpetby 1 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

But now it's too long for a power user.

Short and Long options are a thing.

Ex: GNU rm can use

--recursive
-r

or

--force
-f
 

Helix is great, but please why can't indentation just be what is set in the language.toml file?

[[language]]
name = "zig"
indent = { tab-width = 8, unit = "\t" }

Changing indent-heuristic doesn't fix it. Why does helix give me the option to set the indentation style and then proceed to overwrite it, Instantly resetting it to 4 spaces instead of what I told it.

The behavior that is occurring is extremely weird and would be instantaneously solved if helix would just use the value in the file.

I don't want your garbage heuristic, I just want you to leave my file alone and do what I told you.

view more: next ›