• 1 Post
  • 36 Comments
Joined 1 year ago
cake
Cake day: May 18th, 2024

help-circle




  • I know I’m not exactly hitting the mark, have you looked at kagi? You can personalize the weighting of results from certain sites. You can also add lenses which will let you drive results to forums, programming, academia, etc.

    To me it was a bit like reliving the early days of google with the don’t be evil mantra still in tact.

    Let me also say, it appears to be privacy respecting.

    It has been good for me so far. If someone sees a reason I should run away from this, please let me know why and what we all should use instead, I’d appreciate it!




  • My biggest concern with these forks, is do they get the security updates quickly enough as they’re all downstream from either Chromium, Firefox, or web-kit. I’ve tried Zen a bit and had a good experience. From a privacy perspective, cookie management, containers, anti-fingerprinting, and telemetry are probably the biggest categories to address.

    Again, I always have security concerns for the forks getting patches quickly. The smaller the team the more risk likely in this category. Librewolf won my vote. I use it for almost everything. If the page won’t work there, I typically have to use Chromium because the site is just poorly built.

    I’d also recommend doing something to manage privacy at the DNS level for your local network/machine. Piehole or NextDNS would be a good place to start. I landed on NextDNS as it’s pretty cheap, easy, and stable. With internet, it has to “just work” or the family gets annoyed fast. I can still black-hole traffic from my network that is phone-home telemetry from devices more concentrated on collecting info for the manufacture than doing what they were purchased to do.











  • Does this work? I would think scanning a *.package would only assess that content. Wouldn’t something malicious likely be in the code or dependency it could call via some form of get request? That .deb package itself could be completely “safe” until it calls a git clone <URL> to then run something malicious.

    I think this would be more likely to work for appimage or flatpak, though the same approach could compromise the validity of the scan. Am I thinking too hard, or did I just miss the point?



  • If their computer can handle running a windows vm on virtualbox, I’d recommend that over dual boot. Windows update will almost certainly cause issues on boot…eventually.

    Jump into Linux with both feet. Use the vm as a crutch or a bridge to windows only software.

    Follow the advice below… backup everything. If you have a 2nd hd, this makes it easier to keep files and is separated.

    If you’re prepared to reinstall, it’s easy to nuke it and try again. It’s part of learning and sometimes easier to troubleshoot.