Mike

  • 0 Posts
  • 18 Comments
Joined 1 year ago
cake
Cake day: September 28th, 2023

help-circle
  • Unfortunately, this is probably because of the apps started using the Play Integrity API, which is a hardware-based attestation and can only be faked in two ways that GrapheneOS isn’t interested in:

    • you can fake an older device that didn’t support hardware attestation yet, or had a broken implementation
    • or you can try getting leaked vendor keys and emulate the crypto with those until they get revoked



  • Whew, there’s a lot to unpack here.

    First, microkernels being the future: This is a sentence that was said time and time again, but while microkernels definitely have some advantages in separating components which could yield better security, in practice it also introduces other security concerns, not present with monolithic kernels, mostly with the communication between the kernel services.

    Second, about the no secure Linux distros thing: As many others have mentioned, there are security-conscious Linux distros, mostly the “immutable” distros. You can use Fedore Silverblue (or even better, SecureBlue) as a daily driver, with Flatpak for your apps. That way, your main OS is read-only, thus harder to infect and all system updates are signed and verified. Using Flatpak helps enforce permissions on apps in a manner similar to Android permission (you can deny an app the right to see your files, for example).

    Third, I don’t really understand what you mean by “Linux’s security holes”. Of course it’s not bug free, but no kernel of this magnitude is. Also, GrapheneOS uses Linux as well, albeit with a hardening patchset, but you can also get that with desktop Linux distros. If you think Linux (being a monolithic kernel) is automatically less secure than microkernel and hybrid kernel based systems, take a look at Windows and macOS, which both use non-monolithic kernels, but most security experts will tell you that you’re better off using Linux.

    Fourth, about all the niche, mostly hobby OSes you listed: A big part of security is about having more eyes on the source code. Even if you write a kernel in a “safe” programming language, there will be bugs. Something as advanced as a kernel that’s ready for daily desktop use and provides advanced isolation between processes is going to be so complex that you won’t be able to see what bugs arised from the different parts interacting with each other. Safe programming languages make it easier to write safe code, but don’t stop you from messing up the logic that defines what apps have which permissions. Your best bet is to stick to software that has had time to mature and had more people and companies look through it. Linux is regularly audited by all tech giants, because all clouds use Linux to some extent. If it’s secure enough to isolate the workloads in Google Cloud, and Amazon’s AWS, it’s going to be secure enough for your desktop, provided you use it well (make use of it’s security features and don’t shoot yourself in the foot by disabling mitigations and the like). This is partly why I think the idea that OpenBSD is more secure than Linux is somewhat outdated. Yes, they advertise it as such, but it has seen much-much less auditing than Linux did in the cloud era.

    Of course, there’s nothing wrong with playing around with alternatives operating systems, just don’t think you’ll be more secure just because something is written in Rust, or is a microkernel. Those can help, but there’s much more to security than the guardrails a programming language or software architecture can provide, especially with something as complex as a modern kernel.


  • For me, as an SRE:

    • Mullvad VPN
    • Google Drive (until I set up my NAS)
    • YouTube Premium
    • ChatGPT (but I am thinking of trying out Claude 3 instead)

    Other, non-tech subscriptions:

    • Public transport
    • Public bike sharing
    • Food delivery

    Things I might pay for if my employer didn’t:

    • IntelliJ Ultimate
    • GitHub Copilot

    Random IT-adjacent services I occasionally donate to:

    • Codeberg
    • Wikipedia



  • This change only brings speed & stability, which is essential, but hard to see for us, end users. The bigger one is going to happen on Thursday, where Lemmy itself is going to be updated. After Thursday’s update, any users will be able to block entire instances and see our upvotes, along with many other Lemmy updates.



  • Well, the routes might manifest somewhere as files, but I don’t expect anyone to be able to viably parse them without commands like ip or ifconfig (or know where the files even are).

    Some devices (like disks for example) are very straightforward to use as files, while some other special files (like USB devices) are so weird/ugly to use that everyone uses tools/libraries to access them (like libusb).

    This is very off-topic, but there’s a great talk by Benno Rice that talks about this (among many others): https://youtu.be/9-IWMbJXoLM




  • MiketoTechnology@lemmy.worldThe EU common charger : USB-C
    link
    fedilink
    English
    arrow-up
    17
    ·
    1 year ago

    Also, USB4 can optionally support PCIe tunneling, which is a fancy way of saying it supports plugging more advanced types of hardware in (like GPUs, high-speed network cards or NVMe SSDs) at speeds of up to 40Gbps.

    And there is USB4 v2 (not kidding, that’s the name) which extends USB4 to up to 80Gbps, but there are no devices that support that yet.



  • EDIT: This only seems to work for audio, thanks for pointing it out

    Try the AirCast community addon. The description says:

    AirPlay capabilities for your Chromecast players. Apple devices use AirPlay to send audio to other devices, but this is not compatible with Google’s Chromecast. This add-on tries to solve this compatibility gap. It detects Chromecast players in your network and creates virtual AirPlay devices for each of them. It acts as a bridge between the AirPlay client and the real Chromecast player.

    Sounds like just the thing you want, although I haven’t tried it personally.