mlfh
You're right, thanks!
Heated Killcount Rivalry
~~This looks to be running a full virtual machine via the Android Virtualization Framework in the same way as the new "Terminal" app in AOSP, so~~ you have full root control over it.
Edit: I was wrong about the backend, per below it uses proot instead
This is so cool! Thanks for your work uncovering these things, and thanks for posting it.
My adhesion was like this until I washed my bed with dish soap, and now I have to chisel my prints off with a hammer because they stick on too well.
Podman/docker leave behind old images, image layers, and containers that need to be cleaned up occasionally. podman system prune will do so.
If 8TB was taken up quickly or unexpectedly, it might be something like a container failing to start and being recreated over and over, leaving each failed container behind as it goes. podman ps --all will list all containers, running or stopped. Before doing the system prune run that and podman image ls --all to see if anything looks amiss.
Good opsec, really.
Edit: also I just realized this is the Privacy community lol
Subscribed/Scaled most of the time, which gives me a nice selection of things I'm interested in, with a boost for posts from smaller communities so they don't get drowned out by larger ones.
All/Hot when I want to check in and see what the rest of the fediverse is up to.
This isn't about the user being treated as untrustworthy or as less than an adult, it's about the security model GrapheneOS is based on. The team explains it well in this thread: https://discuss.grapheneos.org/d/18953-why-the-stigma-against-rooting
If you want to trade away the benefits of that security model to be able to tinker with things and feel more in control of your phone, you can use something else that lets you do that by default, or patch and build a rootful Graphene yourself. Ironically, the risk there is of giving full control of your phone and privacy to a potential malicious third party anyways, but different threat models may deem that acceptable or low-risk enough.
but desktop OSes function fine giving users root abilities.
Again, threat models. They may function fine for most people, and for most people the risk is low, but the linux desktop world is a security nightmare.
You should only enter a password once to log in, so maybe we just use our machines 1000x more than other people?