• 11 Posts
  • 351 Comments
Joined 2 years ago
cake
Cake day: August 10th, 2023

help-circle








  • Although the usage of (x)wayland is novel, there have already beem projects which do something similar before.

    Termux can run a linux container in a proot, which you can then connect to via an app like vnc to get graphics.

    There exist several options to automate this setup, such as anlinux. There is also the proprietary andronix, which used to be open source but now it looks like tgere repos aren’t being updated.

    It’s bad reporting to frame this as a novel app, when it’s not. The novel thing is the way this app does xwayland rendered by a native wayland compositor (instead of remote desktop softeare or other solutions), which is really cool though.









  • This may sound kind of weird, but do you really need a communication platform for a LUG?

    Our local LUG uses meetup and a website for advertising and telling people when we meet (once every two weeks at the same spot). (Okay I guess the one time our spot was closed and we had to track down people’s phone numbers to inform them of the new spot wasn’t that fun).

    Anyway, we have a mailing list, an irc, and a matrix chat bridged to the irc, but they are effectively dead and no one uses them. The lack of activity on them makes me wonder if you really need to have a chatroom to run a LUG. We seem to get by just fine, for the most part.





  • I’ve heard of thumbnails being used to deliver malware.

    You’ve heard of critical vulnerabilities in media processing applications that mean that thumbnails can theoretically be used to be spread malware. That is not the same as “this issue was being actively exploited in the wild and used to spread malware before it was found and patched”.

    These vulnerabilities, (again, cost money), and are fixed rapidly when found. Yes, disabling thumbnails is more secure. But I am of the belief that average users should not worry about any form of costly zero day in their threat model, because they don’t have sensitive information on their computers that makes them a target.