Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IV
Posts
0
Comments
220
Joined
2 yr. ago

  • I've yet to see a serious review of Duckduckgo browser, the only thing I saw was that because of it's agreement with Microsoft for their search engine the browser, for a time, had rules to avoid blocking Microsoft tracking.

  • Well in the end I think I'm needlessly nitpicking. It doesn't matter if it's strictly immutable or not. What matter is that it has the good parts of reproducibility, immutability and declarativity.

  • I’ve had NixOS absolutely refuse to run some compiler toolchain I depended upon that should’ve been dead simple on other distros, I’m really hesitant to try anything that tries to be too different anymore.

    Yes, some toolchain expect you to run pre-compiled dynamically linked binaries. These won't work on NixOS, you need to either find a way to install the binary from nix and force the toolchain to use it or run patchelf on it somehow.

  • Well that was an approximation to keep it simple and disprove the given example. There are other directories in the root filesystem that are in the path by default, or used in some other critical way (like /etc). Even if they are links to directories in the nix store you can replace the link.

  • To be honest I don't know these very well. I only use NixOS. My understanding is that in an immutable distribution the root filesystem is read-only. Granted in NixOS the nix store is immutable and most things in the root filesystem are just links to the nix store, but the root filesystem itself is not read-only.

  • if it's being read from, it can be written to.

    Why would being able to read imply being able to write?

    Having an extra step or two in the way doesn't make it "extremely secure".

    Well it can greatly improve security by preventing a compromised app to achieve persistence.