Nice. Software developer, gamer, occasionally 3d printing, coffee lover.

  • 0 Posts
  • 22 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle






  • I’ve had bad tinkering break my system before, but never had an update break it irreversibly. The closest would actually be on Silverblue itself, when an update to the kernel was using different signing keys that cause the system not to boot. Fortunately it was simple, I selected the previous deployment and I was in (on a non versioned OS I would have selected the previous kernel which most are configured to retain the last few). A quick Google revealed Ublue had a whole kerfuffle and after verifying it was legit, I enrolled the new certs into my MOK.

    Although one time on Arch I had installed an experimental version of Gnome from one of their repos, and was pleasantly surprised when that version finally released and I removed the experiment repo and did an update absolutely nothing at all broke. Nothing.


  • Zikeji@programming.devtoLinux@lemmy.mlVPS encryption
    link
    fedilink
    English
    arrow-up
    5
    ·
    2 months ago

    LUKS, or anything that relies on the server encrypting, is highly vulnerable (see schizo@forum.uncomfortable.business’s response).

    Your best bet would be encrypting client side before it arrives on the server using a solution like rclone, restic, borg, etc.











  • New ish. My current Thinkpad is a P14s Gen 1 with a Ryzen 4750U 16GB of RAM, and it came with a 512GB SSD. I paid just under $300 for it on eBay and well worth the cost. I wouldn’t get anything that is still a TXXX variant anymore though (e g. T490), they simplified the product line. So T490 was replaced by the E14 Gen 1, and the P14s Gen 1 is an AMD variant.

    Highly recommend. One thing worth noting though is to double check the fingerprint reader if you desire that, the E14 Gen 1 has a reader not compatible with Linux in a functional way. The P14s Gen 1 however does.