jamesbunagna

joined 2 months ago
[–] [email protected] 5 points 1 day ago

Trivalent, i.e. "a hardened chromium for desktop Linux inspired by Vanadium". Vanadium, for the uninitiated, is the browser found on GrapheneOS; the most secure and privacy-friendly/conscious OS for phones.

[–] [email protected] 4 points 1 day ago (1 children)

The only thing is that there’s not a lot of distro-specific guidance out there

I'm genuinely curious to hear what's missing here.

[–] [email protected] 4 points 2 days ago

Not OP. But, FWIW, I've been daily driving secureblue for over a year now. And it has been wonderful experience.

Note that, by virtue of its superior security model, preconceived knowledge may not translate well. However, if you read its documentation and FAQ, then I'm pretty confident that you should be fine. Thankfully, if something's not clear or if you're facing issues, then you're in good hands through their Discord.

[–] [email protected] 4 points 3 days ago

Going from Linux Mint to Qubes OS could be rough. You're warned ;) .

[–] [email protected] 3 points 3 days ago

secureblue absolutely does.

Qubes OS does too. But that's becomes dom0 and most of the qubes you'd interact with are just Linux. But the qube can be based on BSD instead. Heck, you could have it based on Windows even. These qubes are VMs; so you can basically do whatever you want with them. The heavy use of virtualization is exactly what makes Qubes OS as secure as it is.

[–] [email protected] 3 points 3 days ago

Not the one you asked, but please allow me give my take on the matter.

Do you know if you can still do everything with it? Like atomic already has its own limitations and quirks. I can imagine there are bigger limitations with this.

Being derived from Fedora Atomic, already comes with its own set of limitations; like being limited in which kernel mods you can make use of (without reinventing the wheel), or how UKI is unsupported or how you should probably create your own image if you want to populate /usr. You can't even install software from any repository; e.g. installing the ProtonVPN RPM has been hit or miss for me.

And, on top of this, secureblue's hardening does (strictly) limit this even further. Most impactful, so far, would be the inability to use sudo or anything like it. Instead, run0 is suggested. I'm 100% sure that run0 is better. However, I've had at least 1 occasion on which the software doesn't know how to properly interact in this setting. Ultimately, I'd have to give the blame on the software that doesn't properly support run0. And, perhaps, you could help address the issue by opening a bug report related to it. But it's definitely something to keep in mind.

Finally, note on first setup you're walked through the many different additional hardening that can be reverted based on your needs. Just be aware of that fact.

Like can you install driver-level stuff like tablet drivers

Maybe. Depends on what exactly it is.

GPU/CPU control

I have.

udev rules

Shouldn't be a problem either.

etc… I guess I don’t really know the implications of the extra hardening.

If you're interested, I suppose the best course of action would be to find a secondary device of yours and setup it to your heart's content with secureblue. Whenever you face a roadblock, consider paying a visit to their discord server for support; they've been a great help so far. If, at some point, you find something you absolutely can't do, then you'd have to make up your mind on what you deem more important. Wish ya the best of luck!

[–] [email protected] 4 points 3 days ago

To add onto what N.E.P.T.R said, it is technically possible to make a custom amalgamation of Bazzite with secureblue's hardening. However, it would be neither here or there. Some discussion of it can be found here. IIRC, it was ultimately deemed counter-intuitive as a gaming-distro inherently conflicts with a hardened one.

Finally, we shouldn't disregard the technical part of this; it's IIRC one of the reasons why the Bluefin-variants of secureblue were eventually disbanded. It frequently had a lot of interesting bugs that were simply not present on other secureblue-images. This isn't on Bluefin either, as the non-hardened edition worked as you'd expect.

[–] [email protected] 7 points 3 days ago (2 children)

I believe your confusion comes from the following line: "secureblue does not claim to be the most secure option available on the desktop."

Which is simply their acknowledgement that more secure options like Qubes OS exist. Note, however, that Qubes OS is not based on Linux, but instead on Xen.

[–] [email protected] 9 points 4 days ago (1 children)

If you don't want to stray away from Debian, then I don't think there's anything better than PikaOS. It's like Nobara but based on Debian instead.

It's a relatively small distro, community-wise. But it has been around for some time, so I trust its longevity.

Other than that, as some other have mentioned, could be Pop!_OS.

If you're willing to stray away from Debian, then a lot of other options become available. But I digress.

[–] [email protected] -3 points 4 days ago

Bad advice, my apologies. But, I've had great success with LLMs to tackle such problems. Be cautious. However, if you've got no time to waste, then it might be your best option.

[–] [email protected] 1 points 5 days ago

Depending on how you define immutable distros, you absolutely can.

For example with Fedora Atomic, which most peeps refer to when talking about immutable distros, you absolutely can do rm -rf /*. At best, it might require you to include the --dont-preserve-root flag (or something like that) to actually start the process. And, arguably, it ain't as satisfying as doing it on say Arch due to the many error messages. But you'll end up breaking your system.

Immutable distros aren't indestructible by definition. Even a dumb user can break it without ill intent; I know cuz I have done so myself 😅. However, it does offer better protection. Furthermore, there are multiple issue trackers on GitHub that indicate that the developers want to iron out these things and perhaps convert them to features instead. Like, wouldn't it make sense for an immutable distro to 'factory-reset' whenever rm -rf /* is invoked?

[–] [email protected] 4 points 6 days ago

Could you edit your post to include system specs?

84
submitted 1 month ago* (last edited 1 month ago) by [email protected] to c/[email protected]
 

https://github.com/AlfredoSequeida/hints

Disclaimer: I'm not affiliated to this excellent piece of software.

 

Disclaimer: I'm not affiliated to the project.

Aside from the fact that it's relatively new and unknown, does this hold a candle to other Firefox-based projects? They seem to be competent by their own comparison tables.

Has anyone got any first-hand experience?

 

Disclaimer: I'm not affiliated to the project.

Aside from the fact that it's relatively new and unknown, does this hold a candle to other Firefox-based projects? They seem to be competent by their own comparison tables.

Has anyone got any first-hand experience?

 

Hey folks! After using Fedora Atomic for quite a while and really appreciating its approach, I've been eyeing one particular feature from NixOS: its congruent system management. Inspired from Graham Christensen's "Erase your darlings" post, I'd like to explore implementing something similar to NixOS' impermanence module on Fedora Atomic as one step towards better state management.

Why not just switch to NixOS? Well, while NixOS's package management and declarative approach are incredible, I specifically value Fedora's stringent package vetting and security practices. The nixpkgs repository, despite its impressive scope, operates more like a user repository in terms of security standards.

I've already made some progress with the following:

  • Fedora Atomic's shift to bootable OCI containers has helped with base system reproducibility when one creates their own images. This process has thankfully been streamlined by templates offered by either uBlue or BlueBuild
  • Using chezmoi for dotfiles (would've loved home-manager if it played nicer with SELinux)

My current (most likely naive and perhaps even wrong) approach involves tmpfs mounts and bind mounts to /persist, along with systemd-tmpfiles. I'm well aware this won't give me the declarative goodness of NixOS, nor will it make the system truly stateless - there's surely plenty of state I'm missing - but I'm hoping it might be another step in the right direction.

Particularly interested in:

  • Best practices for managing persistent vs temporary state
  • Working with rpm-ostree's (or bootc') assumptions
  • Tools or scripts that might help
  • Alternative approaches that achieve similar goals

Thanks in advance!

view more: next ›