- Joined
- Nov 4, 2024
It always brings a certain amount of joy to watch some cows, on green pastures, just living their lives. Watching an industrial operation where they just sit and shit makes me sad.Why are you concerned about niggercattle?
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
It always brings a certain amount of joy to watch some cows, on green pastures, just living their lives. Watching an industrial operation where they just sit and shit makes me sad.Why are you concerned about niggercattle?
That is a much more elegant idea! However, it is possible to create binaries that do not use libc, musl, or other libraries of the sort, just raw syscalls. To prevent this causing a security hole, all syscalls which hit the kernel from 'unsafe' (anything which doesn't begin in systemd) programs should send a DBUS message to systemd-syscallmon to check if they are allowed. systemd-syscallmon can then make the appropriate checks and come back to the kernel to determine whether they can proceed or not. At least, that's what I'm reading in Mr. Poettring's microsoft.com email account as being his next plan.Problems like these need to be solved at the root: libc. Drop glibc and write systemd-libcd (hand it off to Claude, it can handle it). All std calls (and especially syscalls) are checked against a database to see if 1) the code is allowed to make the call and 2) the user is allowed to make the call. If you want to change the database on your local machine to give permissions to a program ("sideload" it), you first need to register and verify your Developer Account with Freedesktop.
I hope Mr. Poettering sees this post and thinks about my proposal. We desperately need someone to finally rein in the wild, insecure, unsafe space that is Linux desktop.
clearly at this point it is going to be better to implement systemd-kerneld to create fully secure systemd/systemd systemThat is a much more elegant idea! However, it is possible to create binaries that do not use libc, musl, or other libraries of the sort, just raw syscalls. To prevent this causing a security hole, all syscalls which hit the kernel from 'unsafe' (anything which doesn't begin in systemd) programs should send a DBUS message to systemd-syscallmon to check if they are allowed. systemd-syscallmon can then make the appropriate checks and come back to the kernel to determine whether they can proceed or not. At least, that's what I'm reading in Mr. Poettring's microsoft.com email account as being his next plan.
Complies? You mean just stub it out with /etc/portage/patches?Once Gentoo complies
The quality of OpenSUSE has been steadily declining the past few years, the people behind it are more interested in commie politics than making a solid product.I might jump back to OpenSUSE.

Wasn't aware. Have recently put OpenSUSE on a test system, hoping it was a stable?The quality of OpenSUSE has been steadily declining the past few years, the people behind it are more interested in commie politics than making a solid product.![]()
Well... shit.The quality of OpenSUSE has been steadily declining the past few years, the people behind it are more interested in commie politics than making a solid product.![]()
yeah i will never understand people who glaze opensuseThe quality of OpenSUSE has been steadily declining the past few years, the people behind it are more interested in commie politics than making a solid product.![]()
Holy gem. It really is a shame that the core devs of Wayland are such unabashed faggots, there's tons of good Wayland-specific software out there that would benefit from fully decoupling them, i.e. Hyprland.
Edit: peep this https://gardenhouse.pinkro.se/, its a guy making reconfigured systemd elements for standalone use. Saw it in the Guix mailing lists in reference to Gnome's ever-hardening systemd dependencies with the implication that the dev for this may be able to put together shims and such for avoiding further enshittification, both for Gentoo and Guix. Might be an interesting thing to keep an eye on as things develop.
There's a reason why BDFL exists.Crossposting from OSS thread:
You think the BSDs won't comply? The entire BSD community is full of far-left loony troons and infosec "experts" who would love nothing more than to have an excuse to introduce RealID to the operating system so they could ban problematic people from using it.
Free and Net would take the position that, "UMM ACTUALLY IT WAS ALWAYS THE INTENTION OF THE ORIGINAL UNIX CREATORS TO HAVE A BIRTH DATE FIELD FOR ACCOUNTS BUT THE LIMITATIONS OF THE PDP-11 PREVENTED IT THEREFORE WE ARE JUST CORRECTING PAST DESIGN OVERSIGHTS"I can see OpenBSD refusing mostly because de Raadt's a schizo. Free and Net wont even fight and are probably happy that this is happening.
Do not use German software.The quality of OpenSUSE has been steadily declining the past few years
I have never worried much about security in my Linux install until the recent years when every soylanguage out there now has their own soypackage manager where soydevs simply soygit soypush their latest edits and the soypackage's soyversion immediately bumps up to the latest thing unverified by real engineers. I will start respecting systemd when it prevents npm, pip and cargo from running at all.Problems like these need to be solved at the root: libc. Drop glibc and write systemd-libcd (hand it off to Claude, it can handle it). All std calls (and especially syscalls) are checked against a database to see if 1) the code is allowed to make the call and 2) the user is allowed to make the call. If you want to change the database on your local machine to give permissions to a program ("sideload" it), you first need to register and verify your Developer Account with Freedesktop.
I hope Mr. Poettering sees this post and thinks about my proposal. We desperately need someone to finally rein in the wild, insecure, unsafe space that is Linux desktop.
soypkg start-new-project
soypkg add-pkg soybean # soybean's DEV GOT PWNED 5 MINUTES AGO NOW YOU TOO ARE FUCKED
The infuriating other side to this coin is:I have never worried much about security in my Linux install until the recent years when every soylanguage out there now has their own soypackage manager where soydevs simply soygit soypush their latest edits and the soypackage's soyversion immediately bumps up to the latest thing unverified by real engineers. I will start respecting systemd when it prevents npm, pip and cargo from running at all.
Bash:soypkg start-new-project soypkg add-pkg soybean # soybean's DEV GOT PWNED 5 MINUTES AGO NOW YOU TOO ARE FUCKED
A big thanks to the JavaScript, Python and Rust community for helping normalize this
MX uses shims to make sure most systemd-infected software still works. They did temporarily stop distribution of some of their dual-init and sysvinit ISOs with MX 25, but that was reversed in 25.1 when they got init-diversity-tools working, which promises to allow easy switching between even more inits in future. It's the best debian-based distro I've personally used.MX Linux is an option too I guess, I'll remember its maintainer for generously providing a whole repo of backported packages for Debian stable.