[-] ctr1@fl0w.cc 5 points 11 months ago

Personally, I've relied on an OnlyKey for a few years (with backups and an extra fallback device) and haven't needed to type passwords since. This doesn't help with the number of prompts, but it does make them easier to dismiss.

I do use autologin, but I don't use a system wallet (only KeePassXC, which I do need to unlock manually). Autologin with system wallets can be tricky, but I've had some luck setting it up in the past. You might want to check out this wiki for PAM configuration.

[-] ctr1@fl0w.cc 4 points 1 year ago* (last edited 1 year ago)

If you're willing to spend the time to learn how to write custom policies, SELinux can be used for this, to some extent. It's highly customizable and can sandbox your apps, but the process of doing so is quite complicated. I wrote a small guide on custom policy management on Gentoo in another comment if you're interested.

There's also apparently a "sandbox" feature, but I don't know much about it. I just write my own policies and make them as strict as possible.

As an example, my web browser can't access my home directory or anything except its own directories, and nobody (including my own user), except root and a few select processes (gpg, gpg-agent, git, pass) can access my gnupg directory.

This only covers security/permissions, and doesn't include many of the other benefits of containerization or isolation. You could also try KVM with libvirt and Gentoo VMs; that works pretty well (despite update times) and I did that for a while with some success.

[-] ctr1@fl0w.cc 5 points 1 year ago

I learned by watching a bunch of cppcon videos, reading cppreference, and writing a lot of programs. Learning how to understand the error messages is also really important

[-] ctr1@fl0w.cc 4 points 1 year ago* (last edited 1 year ago)

I stopped using recommendations years ago and only use NewPipe and Invidious. I did notice a reduction in my watch time, but there is plenty to watch when using a subscription-only feed. I havent added very many channels to my list since then, but personalized recommendations aren't worth the privacy cost. Hoping to leave the platform eventually

[-] ctr1@fl0w.cc 5 points 1 year ago* (last edited 1 year ago)

Had the same issue with Plasma Wayland in QEMU but I never found a solution. Toggling anti-aliasing sometimes helped, temporarily

[-] ctr1@fl0w.cc 4 points 1 year ago* (last edited 1 year ago)

Try going down the page and looking for the categories with more than a few bits of identifying information. I'm running LibreWolf with just uBlock Origin and Dark Reader (which I don't think influences results) and I'm able to get nearly-unique, instead of unique (but I do get unique on default settings). TBB gets non-unique, which is a good set of results to compare to.

In my case I noticed that my fonts were really unique so I set browser.display.use_document_fonts = 0. Also I use my WM to set my page resolution to 1920x1080, which seems to have a better fingerprint than the default LibreWolf floating resolution of 1600x900 (and even the letterboxing resolutions, from what I can tell).

I just spent some time testing again and checking for anything else. RFP does force a generic user agent, but unfortunately it keeps the version information and I can't figure out how to change it with RFP on. Would be nice to set it to the ESR version used by TBB (which has lower bits), but I'm not sure if that would lead to a more unique fingerprint (if, say, a feature was detected that is available in later versions but not ESR).

Edit: just tried Mullvad browser, and it's non-unique! Might be the best option.

[-] ctr1@fl0w.cc 4 points 1 year ago* (last edited 1 year ago)

The difference is that your ISP doesn't know where your packets are headed, and the destination doesn't know where your packets came from. The ISP sees you connect to the entrance node and the destination sees you connect from the exit node, and it's very difficult for anyone to trace the connection back to you (unless they own both the entrance and exit and use traffic coorelation or some other exploit/fingerprint). Regardless, both parties are generally able to tell that you are using TOR if they reference lists of known entrance/exit nodes. Also the anti-fingerprinting measures taken by TB are a bit more strict than other privacy-focused browsers

[-] ctr1@fl0w.cc 5 points 1 year ago* (last edited 1 year ago)

With a decent CPU the kernel compiles pretty fast. I'm using a default configuration with modules disabled (compiled in) and various settings enabled/optimized for my hardware, and this is what I get:

make -j24

real 2m16.357s
user 38m36.133s
sys  4m26.449s
[-] ctr1@fl0w.cc 4 points 1 year ago

Absolutely! I haven't had any problems setting up dependencies for various projects and have only needed overlays a few times. Sometimes USE flags can be tricky but most things are pretty well documented

[-] ctr1@fl0w.cc 4 points 1 year ago* (last edited 1 year ago)

Out-of-box security configurations supported by the organization (SELinux, hardening)

[-] ctr1@fl0w.cc 5 points 1 year ago

Excellent package and dependency management with a wide variety of up-to-date software

[-] ctr1@fl0w.cc 4 points 1 year ago* (last edited 1 year ago)

fl0w.cc- single user; the domain is meant to be part of my username :)

view more: ‹ prev next ›

ctr1

joined 1 year ago