[-] loudwhisper@infosec.pub 10 points 3 months ago

That quote is from D'Azeglio, not Garibaldi.

[-] loudwhisper@infosec.pub 7 points 3 months ago

But in a new window i don't have the 10-20 pinned tabs that I jump to very often, having tab groups helps in this regard.

[-] loudwhisper@infosec.pub 7 points 3 months ago

Most of the pro-Docker arguments go around security

Actually Docker and the success of containers is mostly due to the ease of shipping code that carries its own dependencies and can be run anywhere. Security is a side-effect and definitely not the reason why containers picked-up.

systemd can provide as much isolation a docker containers and 2) there are other container solutions that are at least as safe as Docker and nobody cares about them.

Yes, and it's much harder to achieve the same. In systemd you need to use 30 different options to get what using containers you achieve almost instantly and with much less hussle. I made an example on my blog where I decided to run blocky in Systemd and not in Docker. It's just less convenient and accessible, harder to debug and also relies on each individual user to do it, while with containers a lot gets packed into the image and therefore harder to mess up.

Docker isn’t totally proprietary

There are a many container runtimes (CRI-O, podman, mirantis, containerd, etc.). Docker is just a convenient API, containers are fully implemented just with Linux native features (namespaces, seccomp, capabilities, cgroups) and images follow an open standard (OCI).

I will avoid comment what looks like a rant, but I want to simply remind you that containers are the successor of VMs (virtualize everything!), platforms that were completely proprietary and in the hands of a handful of vendors, while containers use only native OS features and are therefore a step towards openness.

[-] loudwhisper@infosec.pub 4 points 3 months ago

I would also add security, or at least accessible security. Containers provide a number of isolation features out-of-the-box or extremely easy to configure which other systems require way more effort to achieve, or can't achieve.

Ironically, after some conversation on the topic here on Lemmy I compiled a blog post about it.

[-] loudwhisper@infosec.pub 6 points 3 months ago

citizen

Actually I believe it's "residents". You don't need to be a citizen.

[-] loudwhisper@infosec.pub 3 points 5 months ago

Not to the level I can get with rofi and i3. The only way to get somewhat similar is to use yabai, which needs SIP disabled to have somewhat similar features.

[-] loudwhisper@infosec.pub 4 points 5 months ago

I want to customize all the keybindings for workspaces, since I want to create my own workflow. I think different people have different preferences. I am not looking for an out-of-the-box experience, but a setup I can make mine and opinionated. That's what I mean that it depends on personal requirements too.

[-] loudwhisper@infosec.pub 5 points 5 months ago

Polished doesn't mean functional or ergonomic, which is something I value a lot. The ability to customize what I want easily is also something that Linux offers much more directly than macOS (which is the definition of getting in the way).

Again, I totally believe that for someone the Mac experience can be superior, but it depends on preference, use, habits and priorities.

[-] loudwhisper@infosec.pub 15 points 5 months ago

This can be absolutely true the other way around too, depending on how proficient you are, and what you are used to or find intuitive. For me, macOS is extremely unintuitive, for example, while my fully personalized Linux setup allows me to do what I want. It is very subjective, ultimately.

[-] loudwhisper@infosec.pub 7 points 5 months ago

Their privacy policy is rock solid, and there is no business incentive for them to do so, at the moment.

[-] loudwhisper@infosec.pub 4 points 5 months ago

They did not disclosing any content of any email. They disclosed the very little they have. Once they have been forced to log IP addresses and that was turned to law enforcement, another time they were forced to disclose a recovery email address. These facts if anything should help build trust in proton, as they show how little they collect and therefore can disclose. With signal is the same, they collect super minimal info (the time you last logged in and a couple more data points, I think), and that's what they disclosed in the past.

It's a non-news.

[-] loudwhisper@infosec.pub 6 points 5 months ago

The law - for good or for bad - is what defines rights. If there is a judge which says that an investigation has to happen, and also the companies ensured that the claim is legit (you see from the stats that the context 15-20% of the data requests), then what else can be done?

You cannot operate illegally, so either you comply or you shut down.

view more: next ›

loudwhisper

joined 7 months ago