Comments

This profile is from a federated server and may be incomplete. Browse more on the original instance.

moonpiedumplings, to foss in Why FOSS projects are using proprietary, privacy invasive infrastructure?

Putting something on GitHub is really inconsequential if you’re making your project open source since anyone can use it for anything anyway,

Except for people in China (blocked in China) or people on ipv6 only networks, since Github hasn’t bothered to support ipv6, cutting out those in countries where ipv4 addresses are scarce.

So yes, it does matter. Both gitlab and codeberg, the two big alternatives, both support ipv6 (idk about them being blocked in china). They also support github logins, so you dob’t even need to make an account.

And it’s not a black or white. Software freedom is a spectrum, not a binary. We should strive to use more open source, decentralized software, while recognizing that many parts are going to be out of our immediate control, like the backbone of the internet or little pieces like proprietary firmware.

moonpiedumplings, (edited ) to linux in Disk imaging

Ventoy. I love it so much, being able to have more than one bootable iso and storage on a usb.

Although, it is slower to boot the more folders you have, since it scans all folders, but this is configurable

I use nix-shell to get the ventoy cli for when I need to install it to a usb stick.

moonpiedumplings, to sysadmin in r/sysadmin and the size of this community

I agree with this.

Sometimes I’ve seen people complain about people using asklemmy for not askreddit style questions, but I actually think that’s ok and I’m in favor of that as it means more discussion, content, and visibility.

Eventually asklemmy will reach “critical mass”, and split into more niche communities.

moonpiedumplings, to linux in Debian maintainer unilaterally strips KeepassXC package of a lot of features

The python3 package should contain the entire python standard library

You are free to use a distro which does not split packages, favorite distro, Arch Linux (btw).

Or, you can install the recommended dependencies of python3. Testing in a container, the python3 package pulls:


<span style="color:#323232;">root@a72bd55a3c1a:/# apt install python3
</span><span style="color:#323232;">Reading package lists... Done
</span><span style="color:#323232;">Building dependency tree... Done
</span><span style="color:#323232;">Reading state information... Done
</span><span style="color:#323232;">The following additional packages will be installed:
</span><span style="color:#323232;">  ca-certificates krb5-locales libexpat1 libgpm2 libgssapi-krb5-2 libk5crypto3
</span><span style="color:#323232;">  libkeyutils1 libkrb5-3 libkrb5support0 libncursesw6 libnsl2
</span><span style="color:#323232;">  libpython3-stdlib libpython3.11-minimal libpython3.11-stdlib libreadline8
</span><span style="color:#323232;">  libsqlite3-0 libssl3 libtirpc-common libtirpc3 media-types openssl
</span><span style="color:#323232;">  python3-minimal python3.11 python3.11-minimal readline-common
</span><span style="color:#323232;">Suggested packages:
</span><span style="color:#323232;">  gpm krb5-doc krb5-user python3-doc python3-tk python3-venv python3.11-venv
</span><span style="color:#323232;">  python3.11-doc binutils binfmt-support readline-doc
</span><span style="color:#323232;">The following NEW packages will be installed:
</span><span style="color:#323232;">  ca-certificates krb5-locales libexpat1 libgpm2 libgssapi-krb5-2 libk5crypto3
</span><span style="color:#323232;">  libkeyutils1 libkrb5-3 libkrb5support0 libncursesw6 libnsl2
</span><span style="color:#323232;">  libpython3-stdlib libpython3.11-minimal libpython3.11-stdlib libreadline8
</span><span style="color:#323232;">  libsqlite3-0 libssl3 libtirpc-common libtirpc3 media-types openssl python3
</span><span style="color:#323232;">  python3-minimal python3.11 python3.11-minimal readline-common
</span><span style="color:#323232;">0 upgraded, 26 newly installed, 0 to remove and 18 not upgraded.
</span>

python3-venv python3.11-venv

I find it odd, because debian does this by default, actually. They account for usecases like yours, and instead you have to edit a config file or use a command line flag to get it to not install recommended dependencies.

moonpiedumplings, to linux in Debian maintainer unilaterally strips KeepassXC package of a lot of features

I guess someone is super happy they saved a few hundreds kilobytes of disk space though.

Yes. All the people basing docker images off if debian, and trying to get them as small as possible. The splitting up of packages, allows people to only pull in what they need.

moonpiedumplings, to selfhosted in Nextcloud appreciation post

What was it? I’m planning to do a nextcloud deployment via helm soon.

moonpiedumplings, (edited ) to nix in NixOS Foundation board: Giving power to the community

Just like Eelco’s way of governing, it will likely have 0 effect on 99% of people using NixOS,

Flakes not being stabilized, or worked on by Eelco, despite him literally being the inventor absolutely has an effect on every single Nix user. The flakes-nonflakes aplit is part of why the documentation on nix is so poor. Some things only support one or the other, and it’s a pain.

The aux fork of nix (which idk what’s gonna happen to it) said they would stabilize the current implementation of flakes as v0. I hope this new council does the same, because it’s been far too long. So much of the community uses flakes that’s it’s basically official, but it being “experimental” means they can’t be mentioned in official docs, or included by default in the official installer. You have to edit a config file to enable flakes.

The worst part of this all, is that the Determinate Systems nix installer, only comes with flakes and no channels (old way) - and Eelco literally works for Determinate Systems. Despite all of this, flakes are still “experimental”.

I hope things change. Flakes are legitimately better, a minor addition in complexity, in exchange for making it easy to reuse code. And finally having unified documentation and tooling (if flakes become the main way) will probably be the best benefit.

I really hope this council moves flakes put of their “experimental” status. If so, then democracy has spoken: the users want flakes.

moonpiedumplings, (edited ) to programming in Bruce Perens proposes draft Post-Open Zero Cost License

What stops companies from having a shell corporation use the code, and then that shell company rents “services” at a very low cost to a large corp?

I’m thinking something of the opposite if what Google does, where Alphabet (““located”” in Ireland) rents the Google logo to Google, allowing Google to say that their revenue is much less than it actually is.

EDIT: After some research, it seems that they stopped doing that: theguardian.com/…/google-says-it-will-no-longer-u…

But a similar scheme being applied to this license does concern me.

moonpiedumplings, to linux in If all kernel bugs are security bugs, how do you keep your Linux safe?

That only applies to unstable distros. Stable distros, like debian, maintain their own versions of packages.

Debian in particular, only includes security patches and changes in their packages - no new features at all.* This means risk of breakage and incompatibilitu is very low, basically nil.

*exceot for certain packages which aren’t viable to maintain, like Firefox or other browsers.

moonpiedumplings, to linux in NixOS forked

forgejo.org/compare-to-gitea/

I dunno, some of these are a pretty big deal, in particular:

Gitea repeatedly makes choices that leave Gitea admins exposed to known vulnerabilities during extended periods of time. For instance Gitea spent resources to undergo a SOC2 security audit for its SaaS offering while critical vulnerabilities demanded a new release. Advance notice of security releases is for customers only.

Gitea is developed on github, whereas forgejo is developed on and by codeberg, who use it as their main forge (also mentioned on that page). Someone dogfooding gives me more confidence in the software.

moonpiedumplings, to 196 in Nether Rule

Related: getindie.wiki

moonpiedumplings, to outoftheloop in What's the draw of watching/following streamers?

moonpiedumplings.github.io/blog/twitch/

I like to watch people program on twitch. Seeing people suffer with code reminds me that I am not alone.

moonpiedumplings, to linux in Ubuntu Snap Hate

The comparison isn’t quite right because you can use git with any provider (Github, gitlab, etc), including multiple at once.

On the other hand, snap is hardcoded to only be able to use one store at a time, the snap store. To modify this behaviour, you would have to make changes to the snap client source code.

It’s a crucial difference.

moonpiedumplings, to linux in Ubuntu Snap Hate

What? Github is not open source.

And plenty of people have issues with Github: sfconservancy.org/GiveUpGitHub/

their entire hosting site is, itself, proprietary and/or trade-secret software

moonpiedumplings, to selfhosted in Self Host Pen Testing

sn1per is not open source, according to the OSI’s definition

The license for sn1per can be found here: github.com/1N3/Sn1per/blob/master/LICENSE.md

It’s more a EULA than an actual license. It prohibits a lot of stuff, and is basically source-available.

You agree not to create any product or service from any par of the Code from this Project, paid or free

There is also:

Sn1perSecurity LLC reserves the right to change the licensing terms at any time, without advance notice. Sn1perSecurity LLC reserves the right to terminate your license at any time.

So yeah. I decided to test it out anyways… but what I see… is not promising.


<span style="color:#323232;">FROM docker.io/blackarchlinux/blackarch:latest
</span><span style="color:#323232;">
</span><span style="color:#323232;"># Upgrade system
</span><span style="color:#323232;">RUN pacman -Syu --noconfirm
</span><span style="color:#323232;">
</span><span style="color:#323232;"># Install sn1per from official repository
</span><span style="color:#323232;">RUN pacman -Sy sn1per --noconfirm
</span><span style="color:#323232;">
</span><span style="color:#323232;">CMD ["sn1per"]
</span>

The two pacman commands are redundant. You only need to run pacman -Syu sn1per --noconfirm once. This also goes against docker best practice, as it creates two layers where only one would be necessary. In addition to that, best practice also includes deleting cache files, which isn’t done here. The final docker image is probably significantly larger than it needs to be.

Their kali image has similar issues:


<span style="color:#323232;">RUN set -x 
</span><span style="color:#323232;">        && apt -yqq update 
</span><span style="color:#323232;">        && apt -yqq full-upgrade 
</span><span style="color:#323232;">        && apt clean
</span><span style="color:#323232;">RUN apt install --yes metasploit-framework
</span>

docker.com/…/intro-guide-to-dockerfile-best-pract…

It’s still building right now. I might edit this post with more info if it’s worth it. I really just want a command-line vulnerability scanner, and sn1per seems to offer that with greenbone/openvas as a backend.

I could modify the dockerfiles with something better, but I don’t know if I’m legally allowed to do so outside of their repo, and I don’t feel comfortable contributing to a repo that’s not FOSS.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • khanakhh
  • mdbf
  • ethstaker
  • magazineikmin
  • GTA5RPClips
  • rosin
  • thenastyranch
  • Youngstown
  • InstantRegret
  • slotface
  • osvaldo12
  • kavyap
  • DreamBathrooms
  • JUstTest
  • Durango
  • everett
  • cisconetworking
  • normalnudes
  • tester
  • ngwrru68w68
  • cubers
  • modclub
  • tacticalgear
  • provamag3
  • Leos
  • anitta
  • lostlight
  • All magazines