Rhababerbarbar

joined 2 years ago
2
submitted 1 month ago* (last edited 1 month ago) by [email protected] to c/beacondb
 

Attention #BeaconDB contributors!

#Neostumbler 2.0.0 is out, bringing the option to exclude Wifis based on their name (SSID). This is important to exclude mobile hotspots and other moving wifis, that would mess up results.

Also it allows us to respect the "optout" and "nomap" SSIDs, used to prevent scanning.

BeaconDB has the "Common Network Index", copy the contents of these files into the field in NeoStumbler:

https://codeberg.org/beacondb/common-network-index/src/branch/main/data

@[email protected] @[email protected]

[–] [email protected] 4 points 3 months ago* (last edited 3 months ago)

@[email protected] @[email protected]

I like the small overlap between second context menu and first. Btw why is there none between panel and first overlay?

I really like the look! Can't wait for the new icons!

Btw, what is missing to have all corners rounded, always?

[–] [email protected] 2 points 4 months ago* (last edited 4 months ago) (1 children)

@vamp898 @sisadness @[email protected] @[email protected]

Yup, a random guy just revived it, updated to Qt5 and working on Qt6 I think. And another one has joined!

https://invent.kde.org/multimedia/amarok

[–] [email protected] 1 points 5 months ago

@[email protected] @[email protected]

For people interested, maybe #crabjail and #crablock can be a solution!

https://codeberg.org/crabjail/crablock

A #sandboxing tool written in #Rust, featuring " bleeding edge #Linux #security features like #Landlock or MDWE_REFUSE_EXEC_GAIN."

[–] [email protected] 1 points 5 months ago* (last edited 5 months ago) (3 children)

@[email protected] @[email protected]

Thx for the info, then it is like that.

Here is the goal proposal

https://phabricator.kde.org/T17370

Tbh, #bubblewrap would need to be fixed drastically to be as secure as the #Android #sandbox. And (I am not sure yet) I think even #Snaps are more secure (on #Ubuntu with #Apparmor patches) than #Flatpak with the current system.

As far as I understood, sandboxing needs to happen in #userspace, with tools like #fuse doing the work while being restricted by #MAC like #SELinux or Apparmor.

[–] [email protected] 4 points 5 months ago* (last edited 5 months ago) (5 children)

@[email protected] @[email protected]

Can you tell us what happens on the "sandbox all the things" goal?

I think this is a pretty crucial step forward, even though #sandbox technologies (most often through user namespaces) are more problematic than I initially thought.

(Basically, user #namespaces open up #privesc dangers to the monolithic #kernel, which is incredible. #Android and #ChromeOS use #LXC, mounts and #SELinux for #sandboxing)

[–] [email protected] 1 points 5 months ago

@[email protected] @[email protected]

Is this how the dark/light transition will look like?

A small visual issue but nice to see fixed!

[–] [email protected] 2 points 7 months ago (1 children)

@[email protected]

#Firefox got a ton of variants/forks recently.

  • #Librewolf
  • #MullvadBrowser
  • #ZenBrowser
  • #Midori

So yeah I take Firefox + Arkenfox user.js or Librewolf if they fixed their CI/CD

[–] [email protected] 1 points 8 months ago

@telepresence
@kde

Yes absolutely, the workflows especially in Dolphin, Plasma search, Panel are just great.