• 1 Post
  • 131 Comments
Joined 8 months ago
cake
Cake day: November 1st, 2023

help-circle
  • alt@lemmy.mltoPrivacy@lemmy.mlNixOS
    link
    fedilink
    arrow-up
    13
    ·
    edit-2
    7 months ago

    Most distros are somewhat equal when it comes to privacy, anonymity and security; with the likes of Fedora and openSUSE known for taking it more seriously out of the box than the other ‘big bois’, while some smaller distros like Kicksecure are known for their best-in-class[1] hardening that they offer by default.

    As for NixOS, it’s really its own thing (together with Guix), and thus very different from any other distros. If you conquer it, you would be delightfully met by a system that enables you to do things unheard of in other distros. However, the learning curve is very steep. And perhaps even hardening it to the level that Fedora or openSUSE provide by default might not be trivial.


    1. Qubes OS is technically not a Linux distro. But it’s worth mentioning as one generally tends to run Linux within a qube (read: VM), and in regards to security and privacy; Qubes OS is simply unmatched, period.


  • Not much to say regarding their first paragraph.

    As for their second paragraph, perhaps they are rightfully sceptical regarding Privacy Guides. The body of topics they try to cover is substantial, though. And if TheAnonymouseJoker or whosoever disagrees with them, then they’re free to challenge their views.

    Privacy Guides isn’t any kind of Gospel or whatsoever that you’d have to agree with in its entirety. I do believe, however, that they’ve done a tremendous job at offering a one-stop shop for those that are conscious regarding their security and privacy. Everyone is free to choose and pick whatever they like from there or not.

    I would love to hear about other resources that do a similarly great job at providing at least decent information when it comes to security and privacy; FWIW thenewoil.org exists, however I don’t recall any VPN overview/guide/recommendations from them.





  • Pop!_OS is definitely worth considering as it’s one of the few distros that goes as far as providing a recovery partition and offers one of the best experiences for those with Nvidia GPUs. Furthermore, Pop!_OS’ maintainers (read: System76) are actually financially incentivized to make their distro very polished and newbie-friendly as their distro is used on the hardware they sell.

    On the flip side, Pop!_OS is currently in a major overhaul to replace GNOME with COSMIC; their own homebuilt Desktop Environment. As the Desktop Environment is arguably the most important contributor to how one experiences their Linux system, the eventual change might disrupt your workflow and you might even be too accustomed to GNOME to consider COSMIC at that point. The ongoing work on COSMIC has even meant that Pop!_OS has missed three major releases and are still clinging on their release from April 2022; thankfully it’s based on Ubuntu’s LTS (read: Long Term Support) release, so they aren’t particularly in rush to get a new release out and can rely on Ubuntu for security updates.

    Regardless, COSMIC’s unsure future does leave a lot to be desired and does pose the question if perhaps other options should be considered more seriously instead.

    Therefore, my personal recommendation would be either one of the following:

    • If you just really like what you see from Pop!_OS, then just install its 22.04 release and you should be good until April 2027. As time goes on, you might be deprived from new developments and features; but at least updates etc will not be able to (potentially) corrupt/break your system in the meantime.
    • Wait until April next year; when they’re supposed to release a new version. If you like what you see and the update and the changes are well-received by the community, then consider installing that one instead. It should be supported for 5 years, which is plenty to not worry about your system in the mean time.
    • Go look elsewhere. There are hundreds of actively maintained distros out there. While not all of them are worth considering, there are at least a dozen of them that are worthy contenders. In case you’re interested to get the community’s help in finding a distro, consider answering the following questions:
      • Do you use an Nvidia GPU?
      • How would you rate your tech savviness on other operating systems?
      • How eager are you to learn and/or invest time to use your Linux system?
      • Do you prefer to have up-to-date software at all times even if that means daily/weekly updates that might potentially break some functionality?
      • Security or convenience?
      • Opinionated or blank slate?

    A shortlist of distros worth considering for a beginner (from easiest to hardest): Linux Mint, Ubuntu, Debian/Fedora/openSUSE and Arch.



  • installing Chromium

    This wouldn’t sit well with most privacy conscious folk out there. Though, I can understand it from a security point of view. Especially, when one notices that Chromium isn’t installed from Fedora’s repos, but instead the RPM is built to offer a more up-to-date version that should provide improved security compared to the stable version.

    removing Flatpak

    Probs for the sake of disabling unprivileged user namespaces; as you might have correctly alluded to.

    even software stores

    I imagine for the sake of minimizing attack surface.

    So how am I gonna install software now, layering?

    The Nix package manager is installable on Fedora’s atomic distros, so perhaps that route is worth exploring.

    to my knowledge flatpaks are more secure than RPMs

    To my knowledge, Flatpak’s sandbox indeed isn’t achievable by default with RPMs; unless one knows how to properly utilize SELinux to that effect.


  • alt@lemmy.mltoPrivacy@lemmy.mlIs this VPN comparison breakdown trustworthy?
    link
    fedilink
    arrow-up
    24
    arrow-down
    1
    ·
    edit-2
    7 months ago

    a few commenters pointed out that the highest rated VPN providers in this table just happen to be the ones that advertise most aggressively and are well-known for buying positive reviews from tech blogs, which are pretty clearly designed to be misleading

    Exactly. This is unfortunately common practice, so this breakdown can be dismissed as they’re obviously biased due to monetary motivations.

    Consider to read Privacy Guides’ take on the matter instead.

    (Perhaps personal) TL;DR would be that Mullvad VPN in combination with Mullvad Browser offers the most private internet browsing experience for people who don’t desire to connect to the Tor Network. Furthermore, Proton offers a suite of privacy-friendly services for mail, drive, password manager etc. Therefore, for the sake of trusting the least amount of parties for these services (at the cost of putting all eggs in one basket), one might consider Proton VPN instead; additionally it includes a free tier and some support to port forwarding (read: allows the use of torrent applications).



  • I don’t own any devices with an Nvidia GPU. Therefore, I can’t share my own experiences but only the ones from the community. If my memory serves me right, it should work. However, as usual, expect some strange behavior at times. Thankfully, getting back to a working system shouldn’t cause you any troubles on Jovian-NixOS. Nonetheless, it’s something to keep in mind.



  • to use as a media centre and multiplayer gaming system in my living room

    Based on this, you’re basically looking for the ‘game console experience on your couch’. If that’s the case, honestly you shouldn’t look beyond[1] Bazzite.

    If, instead, you actually wanted to play retro games primarily, then please let us know.


    1. While ChimeraOS and HoloISO also offer the ‘game console experience’, they don’t support Nvidia GPUs. So you would be on your own at best; which would be a horrible experience for a new user. If you feel particularly adventurous, then Jovian-NixOS is actually another option. But arguably less newbie-friendly compared to Bazzite.


  • Basically, you want to not disable kernel.unprivileged_userns_clone.

    For a temporary solution that has to be redone after reboot, there is sysctl kernel.unprivileged_userns_clone=1.

    For a lasting solution, consider echo kernel.unprivileged_userns_clone=1 | sudo tee /etc/sysctl.d/99-enable-unpriv-userns.conf.

    In either case you’re foregoing security for the sake of convenience/functionality, so I understand why you would rather not act upon either of them.

    I don’t know what the solution is that would be analogous to installing bubblewrap-suid. Perhaps, it’s worth exploring the projects found within the github page of Awesome Fedora Security for some pointers.


  • I don’t know by heart if it’s able to do your bidding, but perhaps it’s worth checking out penguins-eggs. I guess the following would be its elevator pitch:

    "penguins-eggs is a console tool, under continuous development, that allows you to remaster your system and redistribute it as live images on usb sticks or via PXE.

    The default behavior is total removal of the system’s data and users, but it is also possible to remaster the system including the data and accounts of present users, using flag --clone. It is also possible to keep the users and files present under an encrypted LUKS file within the same resulting iso file, flag --cryptedclone.

    You can easily install the resulting live system with the calamares installer or the internal TUI krill installer."


  • Thanks for the explanation!

    I didn’t like Runit

    Unfortunate, but not very surprising 😭. I hope it (or another init) will one day be more than a viable alternative to systemd, so that the hegemony will cease to exist.

    the package selection wasn’t great

    While not applicable in all cases, I’ve had great success with relying on Distrobox in case I had to rely on the repos of another distro to get my software.

    As for siduction, it was just a touch too buggy (i.e. XScreensaver caused the laptop to freeze when I closed the lid) and too preconfigured to be able to resolve easily. It also played havoc with my school’s BYOD internet.

    Interesting! I didn’t know that siduction is relatively unpolished.

    I’ll probably go back to it at some point, though.

    I wonder if perhaps SpiralLinux does a better job.

    Of course, the main reason for this new install is that I just bought an SSD, and I’d rather start fresh than try to flash my old hard disk across.

    Relatable 😜.



  • alt@lemmy.mltoLinux@lemmy.ml*Permanently Deleted*
    link
    fedilink
    arrow-up
    2
    ·
    7 months ago

    Thanks a lot for this excellent write-up! I believe it has successfully fulfilled its purpose.

    To make myself absolutely clear: I believe that we agree on our general sentiment towards systemd; I don’t like how it has almost ostracized other inits, nor do I like how ever-impactful it has become across the board so much so that even the most established DE (read: GNOME) has had hard dependencies to systemd in the past[1].

    And this is where i think you’ve contradicted yourself. IMO, the only reason opponents use it is not because it’s so great but because it’s so entrenched in whichever distro they’re using.

    Got it! I see now why you might have perceived that as a contradiction. And honestly, you might be correct! I assumed that systemd is used for how it might enable the full system AppArmor policy[2] and other features that Kicksecure has become known for. Honestly, I’m not an expert on Kicksecure myself. I just like the project and even try to import some of their systemd-related features and/or configs on my daily driver.

    Based on past readings, the idea that systemd was (ironically) still preferred on Kicksecure for security-related features stuck with me. But, honestly, it could have been my misunderstanding and instead they might have chosen to make the best out of it as not using systemd would have increased the maintenance burden tremendously.

    This conversation has opened the possibility to me that Kicksecure’s maintainers might have stuck to systemd for non-security reasons. Ultimately, your contribution by addressing that point has been immense. Thank you so much for the insight and for being patient with me 😊!


    1. I believe this has since been resolved.
    2. Based on the following statement: “AppArmor can do this by loading a profile for systemd in the initramfs.” found here