bizdelnick

joined 1 year ago
[–] bizdelnick@lemmy.ml 6 points 6 months ago

The native directory sharing method for kvm is virtiofs. Have you tried it?

[–] bizdelnick@lemmy.ml 3 points 6 months ago (1 children)

Why not use Privacy Badger to prevent usage of tracking cookies?

[–] bizdelnick@lemmy.ml 15 points 6 months ago* (last edited 6 months ago)

I recommend to throw away this drive because blocks that are readable and writeable now, may fail soon. But if you want to use it anyway, it is possible to collect a list of unaccessible blocks usong badblocks and pass it to mkfs to create a filesystem that ignores that blocks. IIRC this is described in man badblocks.

[–] bizdelnick@lemmy.ml 8 points 6 months ago* (last edited 6 months ago)

I have read this. There are no details about attacked projects, mail texts, addresses and github logins, nothing. It's even impossible to ensure that attack attempts really took place. One may guess they occured before the xz attack disclosure and were performed by different actors because thay seem much more dumb.

[–] bizdelnick@lemmy.ml 9 points 7 months ago (3 children)

Continue? There are no details on attack attempts published, even when they occured.

[–] bizdelnick@lemmy.ml 1 points 7 months ago (1 children)

gksu and kdesu are unsupported for >10 years iirc, they were not more secure than sudo and that's one of the reasons they were abandoned. I've never heard about sux. Polkit is a bit another thing that indeed replaced them, however it does not and can not separate GUI and non-GUI processes. The process itself has to fork, drop privileges and draw a GUI after that. There's no difference between running it via sudo or pkexec, however polkit provide additional protections to prevent running unsafe apps with elevated privileges.

PAM and GVFS are not "privilege elevation frameworks" whatever you mean by this.

[–] bizdelnick@lemmy.ml 1 points 7 months ago (3 children)

Idk what is bleachbit. But I know that "auth systems" can't "handle GUIs in a secure fashion". The app itself can be secure or not. By default they are not secure if they provide a GUI running in privileged process.

[–] bizdelnick@lemmy.ml 1 points 7 months ago (5 children)

I know. Don't do this. Read the manual.

[–] bizdelnick@lemmy.ml -1 points 7 months ago (7 children)

It's not when app was written. Wayland apps probably work with sudo, x11 don't because sudo does not pass the $DISPLAYenvironment variable. It's a correct behavior of sudo because running x11 apps with root permission you create a security hole.

[–] bizdelnick@lemmy.ml 1 points 7 months ago (1 children)

Too many files in a directory?

[–] bizdelnick@lemmy.ml -2 points 7 months ago (9 children)

Probably? They won't run with sudo normally (in xorg at least). And only those explicitly allowed to be run with pkexec by maintainers will do. Of course it is possible to evade this restriction, but you definitely should not.

view more: ‹ prev next ›