• 6 Posts
  • 42 Comments
Joined 2 years ago
cake
Cake day: August 10th, 2023

help-circle












  • Not really? From this page, all it looks like you need is a salsa.debian.org account. They call this being a “Debian developer”, but registration on Debian Salsa is open to anybody, and you can just sign up.

    Once you have an account, you can use Debian’s Debusine normally. I don’t really see how this is any different from being required to create an Ubuntu/Launchpad account for a PPA. This is really just pedantic terminology, Debian considers anybody who contributes to their distro in any way to be a “Debian Developer”, whereas Ubuntu doesn’t.

    If you don’t want to create an account, you can self host debusine — except it looks like you can’t self host the server that powers PPA’s. I consider this to be a win for Debusine.





    1. Corporations really, really love being admin on everybody elses devices. See kernel level anticheat.

    2. I feel like people have gotten zero trust (I don’t need to trust anybody) confused with “I don’t trust anybody”.

    3. I was listening to a podcast by packet pushers and they were like “So you meet a vendor, and they are like, ‘So what do you think zero trust means? We can work with that’”.


  • UWP 💀

    UWP is Microsoft’s “new” app format, it’s what the windows store and the xbox use.

    It also isn’t compatable with wine, and my pet theory is that this was the entire point of it. Combined with Windows S mode, which doesn’t let you install apps other than from the windows store, the goal was to lock down the windows ecosystem by having apps that can’t be made to run on linux.

    I remember seeing a compatability layer for UWP apps a while ago, and I am pleased to see that it has come this far. Great work!

    Edit: wait this uses a windows VM. Still good though and lets people escape the windows ecosystem.




  • Share your lsblk output. It’s likely that your system still leaves the bootloader unencrypted on the disk, even if the kernels and bootloader config are being encrypted (they aren’t encrypted by default on most installs).

    It is theoretically possible to have only one partition that is luks encrypted, but this requires you to store the bootloader in the UEFI, and not all motherboards support this, so distros usually just install it to an unencrypted partition. The UEFI needs to be able to read an unencrypted bootloader from somewhere. That’s why it’s somewhat absurd to claim that the ESP can be encrypted, because it simply can’t.

    From your link:

    One difference is that the kernel and the initrd will be placed in the unencrypted ESP,