Why are people on your LAN exploiting vulnerabilities on your computer? Don’t you also have a network firewall and NAT?
Why are people on your LAN exploiting vulnerabilities on your computer? Don’t you also have a network firewall and NAT?
Can’t you do that with Wine for the most part?
I remember playing Katamari, and it having really unique gameplay. I’ll have to check out the other ones you mentioned. They seem pretty cool! Thanks for the suggestions!
Oh you silly goose!
What about plus addressing which is supported by most major mail services for free? You can just use personaladdress+nameofshop@gmail.com for example.
When I worked as a mechanic it was blinker fluid. When I worked as a chef it was the bucket of steam.
Kubuntu and everything is good too but I don’t know what to do with it.
deleted by creator
It’s like when people say “no offense but” and then continue with something offensive. Just because you say no offense, it doesn’t make it not offensive.
Why not make the fine 100%?
I’m not saying I disagree, but I had a different experience.
“you’re not going to carry a calculator with you everywhere”
That’s fine if you want to believe that, but that’s not what the article is about that you posted. The article states that the president will be able to ban ANY non-us application by executive order which is inaccurate.
Has anybody actually read the bill?
The whole bill is about giving the government power to ban “foreign adversary controlled applications” and there’s nothing about the president being able to ban whatever app they want.
The bill defines a foreign adversary as: “a country specified in section 4872(d)(2) of title 10, United States Code”:
The People’s Republic of China, including the Hong Kong Special Administrative Region (China);
Republic of Cuba (Cuba);
Islamic Republic of Iran (Iran);
Democratic People’s Republic of Korea (North Korea);
Russian Federation (Russia); and
Venezuelan politician Nicolás Maduro (Maduro Regime).
So unless you are on the side of the enemies of the US and want social media apps controlled by them, I don’t know why you wouldn’t support this bill.
Edit: I think the misunderstanding/misinformation comes from a few places, but ultimately I think it boils down to the fact the bill requires the app/platform to be a foreign adversary AND it requires a presidential executive order before the app will be banned.
See my reply for some sources I found.
Found this file by user “arindas” on GitHub which seems to highlight a lot of the issues that I’ve been seeing. To summarize:
Package Management
Manjaro maintains a separate repository that is not in sync with Arch’s main repositories which means Manjaro is not just Arch. To add to that, even Manjaro wiki states that it is not Arch!
Source: https://wiki.manjaro.org/index.php?title=Manjaro:_A_Different_Kind_of_Beast
Manjaro claims to be stable just by delaying packages for a week. This is not an approach a stable distribution would take at all!
Say that a package in the AUR depends on a library, say libxyz. And libxyz is in the main repos, not in the AUR. The package is updated so that it relies on the new features introduced in libxyz’s version 1.1 however Manjaro delays packages so libxyz is still on 1.0 in Manjaro. If you update the package in Manjaro, it will break because Manjaro holds back packages. So the only way Manjaro can be stable is by literally forking all the Arch related repositories including the AUR and keeping them in sync.
However it is important to note that often these problems are isolated to single packages and not the system as a whole. Please read #25 (comment) for additional context.
Security
The Manjaro system updater used to have a serious security vulnerability [in 2018] which has fortunately been fixed.
Source: https://lists.manjaro.org/pipermail/manjaro-security/2018-August/000785.html
This is actually a core package, not an extra or community package. To quote the list,
I have discovered an issue with one of your core Manjaro packages, manjaro-system 20180716-1 and earlier. The issue allows a local attacker to execute a Denial of Service, Arbitrary Code Execution, and Privilege Escalation attack.
In an update, password less updates in pamac (Manjaro’s AUR helper) were sneaked in and from the look in the issue made concerning this, the change was made to look like a “feature”. This is a major security issue considering that packages in AUR are not checked by Arch Linux maintainers (and Manjaro does not maintain its own either). Some AUR packages were found to be malware in the past. So think about a casual user (Manjaro’s target demographic are not really power users) installing a harmless-looking AUR package that could potentially mess up their system!
Source: https://gitlab.manjaro.org/applications/pamac/-/issues/719
The post also mentioned an issue where the Manjaro updater used bad practices when updating packages such as using the no-confirm
flag. This appears to have been fixed from what I can tell.
Manjaro let their SSL certificates expire not once, not twice, not thrice, but four times! The first time [2015], they asked the users to use a private window and/or change the system time.
Source: https://web.archive.org/web/20150409095421/https://manjaro.github.io/expired_SSL_certificate/
Changing the system time could have unintended consequences such as with cron jobs not running at the intended time. It’s also not a best security practice to use an incognito window to bypass the SSL expiry alert. The correct solution is to not let the certificates expire in the first place, which is not difficult and is done by all secure websites.
The second time when the SSL certificates expired [2016], they did the same.
Source: https://web.archive.org/web/20160528135123/http://manjaro.github.io/SSL-Certificate-Expired/
This time the Manjaro developers didn’t recommend changing the system time, but they still recommended creating an exception for the Manjaro website.
The third SSL certificate expiration was handled a little more sanely [2021].
The fourth time, HSTS was set but the website was still down [2022].
Source: https://web.archive.org/web/20221013234550/https://manjarno.snorlax.sh/expiry-2022-08-17.png
Sending Unexpectedly Large Traffic volume to AUR
I think some of the dates and sources in this section were wrong, but I did my best to correct them.
On 2021-04-26, the AUR (Arch User Repository) faced a huge web traffic spike from pamac clients, caused by a bad version of pamac, which is the default Graphical Package Manager for Manjaro
Source: https://gitlab.manjaro.org/applications/pamac/-/issues/1017
Manjaro developers have developed thorough technical solutions to mitigate the huge traffic spike from pamac installations [2021-10-02]. They have outlined the steps taken here #25 (comment)
Source: https://gitlab.manjaro.org/applications/pamac/-/issues/1161
On 2021-10-14, Pamac was once again blocked by the AUR for shipping another version that flooded the AUR with requests. However the updated version itself was meant to mitigate problems.
Source: https://gitlab.manjaro.org/applications/pamac/-/issues/1135
Additional sources: https://www.reddit.com/r/linuxquestions/comments/wqzrpl/did_manjaro_just_forget_to_renew_the_ssl/ https://www.reddit.com/r/linux/comments/q85t8n/deleted_by_user/
Thanks for the context :)
Could you elaborate on what you mean by Manjaro being “a known trap”?
Edit: See my reply for some sources I found.
We used to use Slack + Zoom and had a much better experience than Teams.