Why not use Privacy Badger to prevent usage of tracking cookies?
bizdelnick
I recommend to throw away this drive because blocks that are readable and writeable now, may fail soon. But if you want to use it anyway, it is possible to collect a list of unaccessible blocks usong badblocks
and pass it to mkfs
to create a filesystem that ignores that blocks. IIRC this is described in man badblocks
.
I have read this. There are no details about attacked projects, mail texts, addresses and github logins, nothing. It's even impossible to ensure that attack attempts really took place. One may guess they occured before the xz attack disclosure and were performed by different actors because thay seem much more dumb.
Continue? There are no details on attack attempts published, even when they occured.
gksu
and kdesu
are unsupported for >10 years iirc, they were not more secure than sudo
and that's one of the reasons they were abandoned. I've never heard about sux
. Polkit is a bit another thing that indeed replaced them, however it does not and can not separate GUI and non-GUI processes. The process itself has to fork, drop privileges and draw a GUI after that. There's no difference between running it via sudo
or pkexec
, however polkit provide additional protections to prevent running unsafe apps with elevated privileges.
PAM and GVFS are not "privilege elevation frameworks" whatever you mean by this.
Idk what is bleachbit. But I know that "auth systems" can't "handle GUIs in a secure fashion". The app itself can be secure or not. By default they are not secure if they provide a GUI running in privileged process.
I know. Don't do this. Read the manual.
It's not when app was written. Wayland apps probably work with sudo, x11 don't because sudo does not pass the $DISPLAY
environment variable. It's a correct behavior of sudo because running x11 apps with root permission you create a security hole.
Too many files in a directory?
Probably? They won't run with sudo
normally (in xorg at least). And only those explicitly allowed to be run with pkexec
by maintainers will do. Of course it is possible to evade this restriction, but you definitely should not.
The native directory sharing method for kvm is virtiofs. Have you tried it?