Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)PA
Posts
34
Comments
2,349
Joined
2 yr. ago

  • There's nothing stoping you from gutting your distro and installing new kernel, libc, package manager, toolchain, and all the other components. The GUI should be trivial as people have change back and forth among different ones (within the same distro) anyway, assuming your package manager.

    Of course, this begs the question: why the fuck would you do that instead of just installing a new one fresh?

  • Mint: consistency, versatility, having all the Ubuntu's benefits (being industry standard, somewhat) without the drawbacks (Canonical's opinionated bullshit like snap)

    Debian: stability, predictability, leanness

    Gentoo: customizability down to compile-time level

  • What does that even mean? What kind of exploitation are you talking about?

    Every use case comes with its own risk, and every risk needs to be handled differently. People jokingly said that if you wanna be sure, don't connect your computer to the network at all; and if you wanna be surer, don't use a computer. While that was a joke, there's truth in that.

    If you're just going to use it as a workstation, then firewall to make sure some randos don't ping you should suffice. If you're sharing this workstation with your tech illiterate mates, then perhaps something to prevent executing random stuff like SELinux or AppArmor would do. If executing random stuff is just what you do, then set up VMs or some other ways to isolate that execution environment.

    If you're sharing files directly from your computer to the internet (e.g. with SMB or NFS), then you'd need to make sure only the right people have the access, and the auth can't be brute-forced (i.e. with rate-limiting and lock-out policy). Same goes if you allow remote login (i.e. thru SSH). Some people use custom port number to obscure their stuff, and you can do it too, but do keep in mind it could make your life (or your mates' lives) harder.

    If you're running other outward facing services like SQL database or HTTP, that would require different ways to address. If you're on such level, you'd want do some serious readings.