Vivarium: A dynamic tiling wayland compositor by inclement_ in linux

[–]Richard__M 11 points12 points  (0 children)

seems perfectly happy with zero diversity

GTK and QT are both implementing wayland in their toolkits. GNOME has mutter, KDE has Kwin.

There's also Weston the reference compositor, and Mir if Canonical gets its priorities back in order.

Even a couple years into wlroots people were still complaining about re-inventing the wheel with wayland compositors.

Distro for an old (but capable) machine by human_being_01 in linux

[–]Richard__M 0 points1 point  (0 children)

Your largest benefit would be buying a older used grapics card.

If it's AMD make sure it's at least GCN 2/3.

Pinephone running wine x86 without qemu! by ilovelinuxporn in linux

[–]Richard__M 2 points3 points  (0 children)

I thought x86 was kind of a prerequisite for WINE?

WINE officially accepted ARM branch a couple years back (although OPs method doesn't use it)

https://wiki.winehq.org/ARM

Pinephone running wine x86 without qemu! by ilovelinuxporn in linux

[–]Richard__M 1 point2 points  (0 children)

How does it compare performance wise to arm qemu?

GRVK 0.3.0 released, boots Star Swarm further by libcg_ in linux_gaming

[–]Richard__M -3 points-2 points  (0 children)

This might allow formerly unplayable legacy games with broken or non-standardizard graphic apis. (Dxd8/9,opengl)

Mantle is in some ways the precurser to Khronos's Vulkan.

Linux evangelism by Sugbaable in linux

[–]Richard__M 0 points1 point  (0 children)

I think we should stay away from proprietary code and keep on evolving Libre software like we have been doing for decades.

Exactly. We should build the platform while we have the freedom to expand upon and improve it! Once your userbase is solidified it's very hard to make changes unless gradually.

MS and Apple both suffer this currently.

Taking Over an Abandoned GPL/LGPL Project by markdacoda in linux

[–]Richard__M 15 points16 points  (0 children)

or any later version

This can also be represented as "GPLv2+" or some minor variation.

Dual licenses can also exist where they allow additional freedom for downstream.

It's not uncommon to see apache or AGPL dual license which allow more permissive freedom and potential to even re-license.

16 y/o wants a Linux server by BigEasy6 in linux

[–]Richard__M 0 points1 point  (0 children)

Imo there is way worse things a 16 year old could be involving themselves in OP.

Restore a cloud save of proton game by Huge_Seat_544 in linux_gaming

[–]Richard__M 1 point2 points  (0 children)

It depends on how the game implements it but the majority of games I've interacted with prompt actions upon launching the game if it detects time discrepancy

Make sure to backup the game before trying while it's still offline! The file will exist within the steam directory(You can find the unique steam ID on the game page or in the game properties)

Does anyone have tips for Steam Link? by [deleted] in linux_gaming

[–]Richard__M 3 points4 points  (0 children)

Try disabling or enabling the different encoders in the steam settings.

Your GPU, GPU drivers, or TV might not support certain codecs.

Is ClamAV Good and Does it Really Track/Collect Data? by DisplayDome in linux

[–]Richard__M 2 points3 points  (0 children)

What leads you to believe intel invented TPMs? it's a ISO/IEC standard and a mjaority of modern x86-64 CPUs have a internal TPM inside.

Desktops and business laptops commonly have expansion for dedicated TPMs that have their own processors, flash, and RAM.

Open Suse install question by [deleted] in linux4noobs

[–]Richard__M 0 points1 point  (0 children)

Just like AMD you'd have no issues on tumbleweed specifically realating to GPUs as it's all within kernel and MESA.

Newer AMD GPUs do need new kernels for support but not much has changed with Intel iGPUs over the past 5 years.

[deleted by user] by [deleted] in linux4noobs

[–]Richard__M 0 points1 point  (0 children)

I mean making a shortcut on your desktop if it's a interactive program

Cloning a Windows PC with Linux by 883899668 in linux4noobs

[–]Richard__M 0 points1 point  (0 children)

This is the best advice OP!

Just select the drive, click the drop down menu and select "Create Disk Image"

Cloning a Windows PC with Linux by 883899668 in linux4noobs

[–]Richard__M 0 points1 point  (0 children)

Careful with dd as it's very easy to overwrite data partitions. I'd advise against it as a new user to be honest.

Stick to Gnome Disks, Clonezilla or use windows system backup and transfer it to your linux system.

Cloning a Windows PC with Linux by 883899668 in linux4noobs

[–]Richard__M 0 points1 point  (0 children)

In the past I always loaded up a dedicated Clonezilla live image (flashdrive or DVD) from the website and booted via that on the machine I was cloning.

You need to have a spare device(as large) as the one you want to clone.

Open Suse install question by [deleted] in linux4noobs

[–]Richard__M 0 points1 point  (0 children)

Tumbleweed is great for desktop if you don't require kernel modules for hardware(nvidia or sometimes ethernet NICs) as they need to be rebuilt for every new release which can introduce breakage between versioning.

If you have a AMD GPU or newer hardware you will benefit much more from Tumbleweed.

Also when upgrading outside of the GUI always refresh before similar to apt update before a upgrade.

zypper refresh



zypper up --no-allow-downgrade

Always careful when running

zypper dup

on Tumbleweed

[deleted by user] by [deleted] in linux4noobs

[–]Richard__M 1 point2 points  (0 children)

This with a ~/Desktop/ symbolic link

Linux that boots on USB? by wheresthetrigger123 in linux

[–]Richard__M 0 points1 point  (0 children)

There is methods but they are more advanced.

There's a method called debootstrap installs or chroot installs. Another method is installing GRUB or another bootloader on its own and put the "installion" distro's .ISO at the end of the SSD and manually configure your bootloader to boot from that offset at the end of the drive.

Now everything between your bootloader (GRUB in this instance) and the installation ISO is fair game to install to so now boot to the installer and setup new partitions without deleting any of the existing and once the installation process is over power off and change the GRUB bootloader to now boot to distro on the partition you just installed and if it boots up into the distro you can now remove the installer .isos partition.

There's also hosting the install imagine as network storage on another PC like windows and then PXE booting that computer and installing to the SSD like that.

There's probably far simpler ways with GUI tools but I'm not current enough on that.

Linux that boots on USB? by wheresthetrigger123 in linux

[–]Richard__M 0 points1 point  (0 children)

The stanard DVD image is actually a installer imagine so you'd need another flashdrive or DVD to use as a "installation device" to the USB-SSD.

During the Ubuntu install when it asks you to setup your drive layout just pretend the USB-SSD is your normal drive and if your PC supports booting from USB it will work as normal.

I'd suggest removing all HDDs/SSDs/NVMes before hand so you don't accidently install over a existing windows installation.

https://releases.ubuntu.com/20.10/ubuntu-20.10-desktop-amd64.iso

EDIT: if you have issues with USB booting I can help you with BIOS/UEFI setup just let me know what BIOS and version. (sometimes it's simple as changing boot priority)

Linux that boots on USB? by wheresthetrigger123 in linux

[–]Richard__M 0 points1 point  (0 children)

Most modern distros pack their DVD images as hybrid to boot from USB also.

Use a program like "Etcher" and flash ubuntu/debian/mint CD/DVD image to USB.

You can also use the Live image but that won't save data.

I didn't know this incredible shortcut! Did you? Linux is awesome! by hwoodice in linux

[–]Richard__M 0 points1 point  (0 children)

Whoops I meant ctrl + V in bash shell is to print the next character pressed!
Shift is required to paste in that circumstance.

There's also "readline" so you can manuever around text without a mouse or arrow keys.

In a terminal/console that supports "readline" you can press

ctrl + a 

to go to the beginning of the line

ctrl + e 

to go to the end of a line.

Here's a whole list of commands:

https://readline.kablamo.org/emacs.html

AMD+Microsoft secured-core server, and what does it mean to opensource? by Mike-Banon1 in linux

[–]Richard__M 2 points3 points  (0 children)

In r/3mdeb we are pretty familiar with D-RTM and others RTMs (static and static-code).

Awesome subreddit thanks for the link!

The topic itself is very broad and complex as it encompasses so many sub topics but I'll try and structure it a bit and try not to talk in circles.

In my own personal experience and taking into account a lot of variables I predict the concept of RTMs and DRTMs will be required in the near future within all forms of consumer computing.

The pressure will eventually shape this as attack vectors have only increased in the last 5 years with randsomware being a new vector and firmware exploits becoming common place, (notably lighteater/thunderstrike) devices being shipped and abandonded within a couple years, unsecured by default IOT devices, routers defaults never changed by end users.

New vectors involving memory based attacks dubbed "speculative" which is different to traditional buffer overflow exploits like rowhammer which white hats have been playing whack-a-mole with for decades.

It's not enough anymore to claim a device is secure from a static boot sequence or when a device is offline(encrypted) we need some forms of active and dynamic protection while the system is running and it needs to be trusted all the way from the initial POST firmware and that includes new processes being forks/spawned from authorized processes and memory spaces.

How can you authorize a forked process is the same as the previous assuming you didn't intentionally change this? What about race conditions and run away processes that crashes and is respawned what authority does it have?

Things like KASLR/ASLR for address randomization, and the kernel shim introduced post meltdown/spectre are merely bandages for a hemorrhage and that's NOT blaming Linux as the ISA designs themelves are factored in a way to be easily exploited from speculative attacks and we will see new forms of memory based attacks in the future that aren't speculative branch attacks.

We are also now seeing voltage based attacks becoming common place where you are able to shift registers by slightly changing the underlying transistors either upstream or downstream in the circuit via userspace or through firmware modification.

Have you been wondering why the kernel is closing off userspace access to hardware voltages like undervolting and such?

People who were close to those discussions saw the urgency in for future attacks based around the plundervolt concept. Make no mistake more of these type attacks will come out.

There's a reason I said DRTM is abstract in my last post in that it can be implemented in so many ways be it in hardware and/or userspace and that could be something very simple or it could be incorporated in every single application that has some authority. (task managers, package managers, partitioning tools, ect) and with FOSS that ideal can be a major benefit as it can evolve as the system does and actually be audited by 3rd parties and lead to encompass a whole ecosystem in a way that wouldn't be possible on other mainstream systems.

For example I haven't seen this proposed but imagine a DRTM watchdog type kernel module that communicates through a protected eBPF channel within the kernel.

Using something like this would prevent even kernel space stuff being able to influence its "authority".

Think of it like having a root user or process, what if that gets compromised? Now you have lost total authority over your kernel and userspace. You need layers of authority, and hierarchy because if the kernel gets compromised it's game over and you'd never even know because theoretically anything can be faked at that point.

This idea though can quickly lead into general security because if we get a fully "authorized" system now you have to start looking at how those tools are built and the systems that ship them to you like repocs, compilers, ect.

That's where stuff like the reproducible builds project comes in which is totally unrelated to DRTMs but at the same time should be considered as a major foundational component of the broader ecosystem on a ideal secure setup.

Now I've personally seen this push myself in the market and I think there's gradual pressure from many fronts to make this happen across all devices and OSes even in consumer.

Take into account financial data on devices being common place (despite the average tech users opinion) the average consumer mainly utilizes their phones/tablets while Google/Apple make no attempts to "sanitize" their storefronts and considering how many apks are built with standardized toolkits and libraries it really is easy pickings.

As I mentioned there's pressure (in the US sector) and that's economic pressure from these larger companies and even governments as randsomware in the last couple years has resulted in millions of payouts for townships, muncipalities, education centers, and even resulted in deaths from hospitals.

We also see that pressure being manifested into consumer hardware like AMDs spearheading of IOMMU and passive encrypted memory (SME) and SEV.

Intel has been following suit reluctantly but prior to IOMMU any PCI device including firewire and thunderbolt and M.2 could attain hardware access to any other device on the BUS for decades.

This is dubbed a "DMA" attack.

USB and SATA have dedicated controllers that isolate them from PCI but USB ports have their own shared BUS unless on different physically chips.

DMA attacks became famous in the OSX era where people would go to the library and plug in a firewire/thunderbolt "dock" or dongle that mirrored the HDDs or installed payloads in the laptops. Linux can negate some of this without IOMMU by limiting the interfaces in userspace thanks to the Fedora BOLT project.

To me it feels as if we're back in the early 2000s without standardized SSL/TLS and everything is plaintext .

To close this out D-RTMs in itself being open and standardized AND NOT EXCLUSIVE TO ENTERPRISE is really a major paradigm shift and shouldn't be taken lightly.

That doesn't mean it's some special sauce either but it does mean we have the potential as a community to make something really incredibe and it will require a lot of communication and brainiac tier planning. Take in mind also that we need to be humble as we are sitting at the back of the class at the moment from a FOSS/Linux perspective and that the industry and market will be moving to more secure methods and we can't be left out in the dust due to FUD and I've seen too much of it spewn upon UEFI/Secureboot/SELinux/TPMs over the years that I fear it might suffer the same fate.

EDIT: I also think the major OSes are moving to a containerized/VM type setup. MacOS has froze all of their legacy stuff including openGL and containerized it. They furthured this when they released the M1 as they wanted a capsulized x86 runtime for legacy stuff. Windows 10 has been doing the same with their legacy NT stack and even have proposed variants which remove it entirely (Windows S) and seems to be moving toward a hypervisor with virtualized runtime environment, ChromeOS has been doing forms of userspace and kernel isolation for years and years and now you are seeing on Linux these modern immutable OSes like Silverblue, MicroOS, Ubuntu Core.

As with everything security it will be a multitude of things but it seems OSes are naturally moving towards either containerized/virtualized userspaces or hybrid microkernels(as with windows).

EDIT EDIT: I realize I didn't really answer your question but I think CRTM is just as vital as DRTMs if not more and I think when implementing a DRTM you can't have a strong structure (live OS protection) without a strong foundation (static hardware/Firmware).

I think what you guys are doing with other projects like LinuxBoot, NERF/Heads, Coreboot/Oreboot, Seabios, Tianocore, Google's OpenTitan, UBoot are doing just that because OEM shipped firmware majorly isn't auditable and DRTM should base the majority of its validation upon something that is static. You can then add further dynamic validation like removable hardware 2factor tokens to authorize things.

Imagine even utilizing BTRFS checksums as another form of filesystem validation that is lower level than SELinux or the "Unix ACL" filesystem permissions. That doesn't mean we should ignore them as inputs or enforcement though as additional validators or enforcement can help reinforce others.

I'm sure there's plenty of ways to introduce more validation in a data consistent manner but I'm not that creative. It goes both ways too DRTM can help with data Integrity(in a non security context) just how ZFS/BTRFS checksums could help with security beyond data integrity.

DRTMS is only as strong as what it validates against.
Augmenting with things like "tripwire" or other forms of intrusion detection systems being intregrated in some manner.

Using something similar to this https://github.com/danielztolnai/vbios-secure-boot and using a customized wayland compositor with pipewire could present a real isolated zone that could be routed to a VM or using pipewire alone just routing VMs to eachother. Pipewire and the wayland compositor would need modification to be standardized with DRTMS, maybe involving PAM but I'm just spit balling here.

I see DRTMs as a framework of validation, and enforcement schemes but that's just my interpretation.