A patch for optimizing GIMP 3.0+ for Adobe Photoshop users, including features like:

  • Tool organization to mimic the position of Adobe Photoshop;
  • New Splash Screen;
  • New default settings to maximize space on the canvas;
  • Shortcuts similar to the ones in Photoshop for Windows, following Adobe’s Documentation;
  • New icon and Name from custom .desktop file.

https://github.com/Diolinux/PhotoGIMP/blob/master/screenshots/photogimp_3_-_diolinux.png

Flatpak (Linux)

In order to install the newest version of PhotoGIMP on your Linux operating system using Flatpak, just follow this simple steps:

  • Make sure you already have GIMP installed from Flathub; (for Ubuntu/Mint user just select Flatpak below the install button in the manager)

  • Start and quit GIMP after you installed before you continue!

  • Download the files from this repository or just click here - > https://github.com/Diolinux/PhotoGIMP/releases/download/3.0/PhotoGIMP-linux.zip

  • Extract the content of the zip file on your home folder (.config and .local - they are the important ones) and overwrite the files if needed; (if you can’t see the file click Ctrl+H to see hidden files)

-You’re done, enjoy it! 😄

  • quick_snail@feddit.nl
    link
    fedilink
    arrow-up
    1
    ·
    15 hours ago

    It doesn’t verify the authenticity of all the software that it downloads with cryptography.

    Compared to something like apt, which will refuse to install something if it was maliciously altered, verified with pgp signatures.

    It’s pretty pathetic, but most of these new package managers are a security nightmare

    • moonpiedumplings@programming.dev
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      edit-2
      14 hours ago

      This is not true. Flatpaks from flathub are signed with a gpg key.

      Now admittedly, they use a single release key for all their signing, which is much weaker than the traditional distro’s model of having multiple package maintainers sign off on a release.

      But the packages are signed.

      Edit: snaps are signed in a similar way.

        • moonpiedumplings@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          3 hours ago

          From flahubs docs: https://docs.flathub.org/blog/app-safety-layered-approach-source-to-user#reproducibility--auditability

          The build itself is signed by Flathub’s key, and Flatpak/OSTree verify these signatures when installing and updating apps.

          This does not seem to be optional or up to the control of each developer or publisher who is using the flathub repos.

          Of course, unless you mean packages via flatpak in general?

          Hmmm, this is where my research leads me.

          https://docs.flatpak.org/en/latest/flatpak-builder.html#signing

          Though it generally isn’t recommended, it is possible not to use GPG verification. In this case, the --no-gpg-verify option should be used when adding the repository. Note that it is necessary to become root in order to update a repository that does not have GPG verification enabled.

          Going further, I found a relevant github issue where a user is encountering an issue where flatpak is refusing to install a package that is not signed, and the user is asking for a cli flag to bypass this block.

          I don’t really see how this is any different from apt refusing to install unsigned packages by default but allowing a command line flag (--allow-unauthenticated) as an escape hatch.

          To be really pedantic, apt key signing is also optional, it’s just that apt is configured to refuse to install unsigned packages by default. So therefor all major repos sign their packages with GPG keys. Flatpak appears to follow this exact same model.