• 1 Post
  • 145 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle


  • ozymandias117@lemmy.worldOPtoLinux@lemmy.mlSilverblue vs uBlue
    link
    fedilink
    English
    arrow-up
    3
    ·
    15 days ago

    Hey! Thanks!

    I’ve installed Aurora to my new drive based off the comments here so far, and it’s been pretty smooth bringing my configs over :)

    Immutable is new to me, so I’m wondering how you manage host daemons and cli applications, such as mpd for music and password-store for password management

    Is the best practice to keep one Fedora <current release> distrobox with them?

    Also, are there any issues with upgrading a distrobox to a new major release over time?

    So far my mindset has been make sure I don’t layer anything, but maybe some things like mpd do make sense to layer?

    I also see brew as another option. Perhaps that’s the preferred way for those types of tools? However, it seems like the system upgrade script updates distrobox and not brew?

    Sorry for the rambling question - just trying to understand best practices with an immutable distro 😅












  • I wonder if development has actually accelerated, or if this is just a change in the approach to the release/versioning process

    Both.

    Development has increased, but you should use your comparison from the last 2.6 release.

    It stayed on 2.6.y for 8 years - that was where it got stable enough that there wasn’t some major milestone to use as a new marker for its update number

    There are cool new features, but if it followed the old versioning scheme, we’d still be on 2.6 because it hasn’t (intentionally) broken the API between the kernel and userspace








  • As much as I love openSUSE, and reproducible builds are a core requirement for trusted computing…

    reproducible builds were reported as being useful

    Really buries the lede of the xz attack results

    either both are trojaned, or none

    Edit: It is very useful for the first half - to ensure new packages extracted by a compromised xz weren’t modified during the extraction.

    It’s just that reproducing the build of the tampered xz would still produce a bit-for-bit identical compromised version due to the way it modified the build system