• 2 Posts
  • 106 Comments
Joined 5 months ago
cake
Cake day: June 9th, 2024

help-circle

  • I’m shocked I didn’t get downvoted to shit myself.

    It’s just that it was VERY clearly either sanctions or a NSL, since the Linux Foundation is in the US and the two things that result in a public entity like that making silent, un-explained changes are, well, sanctions and NSLs and you don’t say shit because your lawyer told you not to.

    I don’t necessarily agree that tossing contributors off an open-source project is in the spirit of the OFAC list, but the problem almost certainly is that they’re employed by some giant tech company in Russia.

    And, in Russia, like in the US, and Israel, and China, and anywhere else you care to mention, tech companies are almost always involved in military supply chains, since shit don’t work without computers at this point.

    Which leads to a cycle of being unable to work with Weapons, Inc. and someone works for Weapons, Inc. so now that person can’t be worked with either and so your choices are… comply with the OFAC list, or take a stupid amount of legal risk up to and including angry people with guns showing up to talk to you.

    We really don’t know the whole story and immediately jumping to “Imperialists bad!” is how certain chunks of Lemmy roll these days.

    I think they’d be much happier if they all moved to North Korea and helped achieve the goal of Juche by becoming dirt farmers.




  • As someone who has one: buy an Microsoft Surface with the Pen and keyboard and shit.

    I’m using a… 3? 4? (6th gen intel, so it’s old AF) and it works perfectly. Touch, pen, removable keyboard, sleep, etc.

    You have to install some specific drivers from the Suface Linux project to get some of that working, but it’s like a whole 10 minute deal.

    Also, they’re cheap as shit at this point, so bonus?




  • competition in the x86 OS space back then

    Oh yeah: there were a stuuuupid amount of OSes.

    On the DOS side you had MS, IBM, and Digital Research.

    You also had a bunch of commercial UNIXes: NextStep, Solaris, Xenix/SCO, etc. along with Linux and a variety of BSDs. There were also a ton of Sys4/5 implementations that were single-vendor specific so they could sell their hardware (which was x86 and not something more exotic) that have vanished to time because that business model only worked for a couple of years, if that.

    There was of course two different Windows (NT, 9x), OS/2 which of course could also run (some) Windows apps, and a whole host of oddballs like QNX and BeOS and Plan9 or even CP/M86.

    It was a lot less of a stodgy Linux-or-Windows monoculture, and I miss it.


  • Seconding that’s a not-how-things-were.

    The lovely thing with legacy architectures (6502, 68k, x86, z80, etc.) that were in use during that time is that they were very very simple: all you needed to do was put executable code on a ROM at the correct memory address, and the system would boot it.

    There wasn’t anything required other than making sure the code was where the CPU would go looking for it, and then it’d handle it from there.

    Sure, booting an OS meant that you needed whatever booted the CPU to then chain into the OS bootloader and provide all the things the OS was expecting (BIOS functions, etc.) but the actual bootstrap from ‘off’ to ‘running code’ was literally just an EPROM burner away.

    It’s a lot more complicated now, but users would, for the most part, not tolerate removing the ability to boot any OS they feel like, so there’s enough pressure that locked shit won’t migrate down to all consumer hardware.





  • Those are cool, and they’ve definitely nailed the aesthetic. Also looks like they’re working on a new revision which looks like a reasonable upgrade.

    Not sure it’s the right choice for what I’m after (it’s kinda expensive and very performance limited for the cost), but uh, I’m going to keep an eye out because that’s a cool piece of kit.



  • “Debian is too far behind! Packages are too old!”

    The best rule of thumb I’ve ever heard regarding Debian Stable is that if the kernel in stable’s default repo fully supports ALL your hardware, and the software in stable’s default repos fully support your workflows, it’s fine.

    If those are NOT true, then you probably don’t want to use Stable, because you’ll either end up fighting it via manually compiled and installed software, or you’ll venture into so many 3rd party repos for updated packages that updating it later becomes problematic and prone to making the whole system catch fire and burn down.


  • You know, the older I get the more I respect the people who come out and say ‘I’m not going to learn that, and I don’t want to.’

    It’s a LOT better than dealing with someone who half-asses and kinda wishy-washes around and says they’ll maybe do something but then doesn’t and well, wasn’t ever going to.

    If you’re not interested and won’t, say so up front so you don’t waste your or my time trying to get you to do something.



  • You have your coworkers on an unmanaged machine with a foreign OS on the guest WiFi with custom networking.

    Which, at any of my last few corporate jobs, would be grounds for termination, if not immediately throwing you out of the building and telling you if you come back we’re calling the cops.

    You really don’t bypass controls in a corporate environment like this if you like working there.

    (And yes, not EVERY job will react that way, but any that’s got any compliance requirements absolutely will.)




  • It’s serious, but seems like a wonky attack vector for most.

    Yeah, it’s super trivially exploited, BUT it requires you to do a series of dumb things or let an attacker have access to your LAN which is one of those you-have-bigger-problems moments anyways.

    And then you have to use their added printer (though there’s an exploit path that may be usable to over-write the printer you already have configured, if the attacker knows what that might be) to print something before anything happens.

    Dude who found it seems to have overhyped it just a little bit (while being a huge dick about it), but I could see how you might exploit this in certain circumstances.