

No idea. I have two accounts, one on Lemmy, one on Mastodon. Presumably somebody is mirroring this community to Mastodon, or perhaps the other way around, I’m not sure.
Anything and everything Amateur Radio and beyond. Heavily into Open Source and SDR, working on a multi band monitor and transmitter.
#geek #nerd #hamradio VK6FLAB #podcaster #australia #ITProfessional #voiceover #opentowork


No idea. I have two accounts, one on Lemmy, one on Mastodon. Presumably somebody is mirroring this community to Mastodon, or perhaps the other way around, I’m not sure.


The issue is not packaging, it’s users circumventing security out of ignorance, willful or not, still ignorance.
As Linux gains popularity, the users will need to learn, often the hard way, how to go about installing stuff. Running a random script off the internet is not how it’s done.


Uhm … no.
Linux had permissions from day one, neither Windows nor Apple did until much more recently.
I use Apple, since there’s many versions of its OS and only¹ the one based on BSD has permissions.
The entire Linux ecosystem is permissions based, it’s baked into the kernel and while bugs continue to be discovered and patched, they’re visible to everyone, where that’s not the case with either Windows nor Apple.
Permissions aren’t new. Unix has had them from the early days, as have operating systems like VMS, BSD and OS/400 to name a few.
As for exploits, the level of user social engineering exploits is exploding with the growth of Linux, since most new users come from operating systems with poor security.
In my opinion Mac OS is hurting itself by making inexplicable security choices, causing pain where none is required, resulting in people actively disabling security to their own detriment.
As for actual exploits, they’re getting more and more ubiquitous since more and more operating systems are running the same code, think python, nginx, bash, etc.
Finally, I’d point out that your attempt at dispelling what you call a myth does not appear to be backed up by facts or sources.
I’ve been in this industry for over 40 years and while it’s far from perfect, I am comfortable stating that Linux is more secure than many operating systems and I suspect that it will continue to be the case for the foreseeable future.
I also note that it has a significantly larger user base than any other OS. Don’t believe me? Heard of Android, same Linux kernel.
¹ There was a brief A/UX hybrid OS that had permissions, based on Unix System V and BSD. It was discontinued in 1995.

Fortunately my name is Onno and I speak Dutch from time to time 😁
Interestingly, in reading that Dutch article it appears this has been in the works since 2020 when Amsterdam banned fossil fuel advertising. It was copied in several other cities, and the ban that came about today was an enhancement of the previous decision, banning among other things, meat products, flights and cruises, and fossil fuel vehicles.
I think that it’s a very interesting approach to encouraging societal change. Australia banned cigarette, alcohol and gambling ads to drive change in a similar way.
Unfortunately much of that content is now pushed online instead, so I’d hazard that Amsterdam will need to encourage this across the entire country and then via broadcast media and online before it becomes ubiquitous.

Do you have a local source for this news?


Pandoc will convert markdown to a PDF in portrait or landscape and there’s even “beamer” support, aka data projector or presentation support.
Why run Docker Desktop when it’s installable as a cli service?
What are you actually trying to achieve?


Tah. I’ll have a look see.


Not sure how, or if, I’d want to install an Arch package under Debian, but it’s my understanding that the package I’ve raised a bug for under Debian implements, or is supposed to at least, the functionality you’re describing.
What I haven’t found is a recipe that documents exactly how it’s supposed to work (not to mention, in a Debian way).
I’d love to discover something that doesn’t start with instructions to remove all pipewire packages and install from source, since that completely defeats the purpose of running Debian Stable as the host.


In my adventures I did look at this, but it appears to require that you install support for this inside the guest, which is possible for modern guests, but not for ancient ones like say Debian Wheezy or Win98se.


I’d be surprised if they had been updated at all after their installation was signed off.
Nothing says leadership quite like being the first to leave a toxic platform … oh wait.


Just added the link.


I’m not sure if we’re talking about the same thing. One of the recent leaks had code that pretended to be a developer, so you could pick if it submitted a PR as Assumed Intelligence, or as a person.
I’ll see if I can find a reference.
Edit: Undercover Mode in Claude Code:


Hold on, wasn’t one of the “features” of the “leaked” Assumed Intelligence source code the “human”-like version?


And how is an operating system defined in that law?
Should this be handled at the BIOS level, the kernel level, the init level, the packaging level, the GUI level, the user login level, the user desktop level, or somewhere else entirely, like a derivative distribution with its own layers, some of which will be different from the base distro?
I’m asking because each of those levels are pretty much handled by different groups of individuals, groups and organisations in different jurisdictions, cultures and countries.
While we’re talking about options on where to put this “feature”, who is liable for it not being implemented?
You might have an opinion on where it “should” be, but I can guarantee you that there are at least as many opinions on where it should be as people you ask.
That’s why the Debian Project is doing what it is.


Asking an expert for their opinion, even if that expert is a lawyer, is not “lawyering up”, nor is their any evidence whatsoever that the Debian Project or the SPI is going to “probably sue over it”.
The summary under the heading “TL;DR” was nothing more than an inflammatory opinionated interpretation of the headline and as interpretations go, it was not in any way, shape, or form, anything that might be considered a summary, which is what the “TL;DR” implied.
Hence my “WTF?” response and subsequent top level reply with the actual text and its source as sent by the DPL.
I note that the issue of “age verification” is an extremely troubling trend and I think that discussion about it needs to be considered and nuanced, neither of which were in evidence.
I faced pretty much the exact same choice, except I was given four of them, each with 8 GB of RAM.
Unfortunately they were two different hardware revisions, so the most I could achieve was two servers with 16 GB each.
They sound like a Jet taking off when powered up and the BIOS doesn’t support lower fan speeds.
Instead after months of deliberation I decided to go with a SFF Lenovo, 32 GB, 2 x 1 TB NVME, Ryzen 7, and bought this:
https://www.officeworks.com.au/shop/officeworks/p/lenovo-ideacentre-ryzen-7-32gb-2tb-desktop-lenic00aau
It’s whisper quiet and running Proxmox.
To get VM video passthrough to work I installed an extra video card, though, you could install a desktop on the host OS instead if you prefer.
The video card I used to fit inside is this:
https://www.msy.com.au/product/msi-geforce-gt-1030-4gd4-low-profile-oc-graphics-card-geforce-gt-1030-4gd4-lp-oc-73092