Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SO
Posts
3
Comments
116
Joined
2 yr. ago

  • If you're making backups of things you care about and not running sudo rm -rf the command isn't really dangerous.

    But +1 for having it in /tmp I have a bash function I call tempd that is basically cd $(mktemp -d) I use it so much for stuff I dont really care to keep.

  • Tailscale keeps the private keys locally, . It just facillitates setting up wireguard. They could steal your private keys, as could any program you install with root access. But it would comepletely destroy their business, and it's open source. I really dont think they have anything to gain by tricking everyone

  • That's really weird. I set up a test system and I couldnt reproduce. The only thing I noticed errors flooding dmesg about elogind already running when I enabled it following the docs. I guess sddm is already starting it?

    I dont see how that would cause your issue though. I would probably just reinstall lol

  • It also depends on the viewer. I remember using prctl() in C to chamge a process name and top showed my change but htop didn't. I'm sure a competent malware writer would be able to trick it though