• 0 Posts
  • 15 Comments
Joined 1 year ago
cake
Cake day: June 2nd, 2023

help-circle


  • Lemongrab@lemmy.onetoPrivacy@lemmy.mlWhat browser do yall use?
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    6 days ago

    Cromite is a good brave alternative without crypto, built-in adblocking, secure defaults (better security hardening), and cross-platform (Linux, Windows, Android). Best experience is on Android. Cromite is an actively updated fork of Bromite, released by a former contributor of Bromite. Cromite also comes without any proprietary libraries on Android (unlike Brave, Mulch, or Vanadium).






  • Use Mull (made by the DivestOS developer) on mobile. It is available through the dev’s f-droid repo. It is hardened Firefox mobile similar to Librewolf and supports sync because it is a Firefox mobile fork. It is also fully open source and doesnt come with proprietary dependencies (unlike standard Firefox mobile)




  • Lemongrab@lemmy.onetoSelfhosted@lemmy.worldOS recommendations
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    1
    ·
    2 months ago

    Generally, I think it is better to use a general server OS like Debian or Fedora instead of something specialized like Proxmox or Unraid. That way you can always choose the way you want to use your server instead of being channeled into running it a specific way (especially if you ever change your mind).



  • Lemongrab@lemmy.onetoSelfhosted@lemmy.worldSecurity and docker
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    2 months ago

    It is not speculation, it is reducing attack surface. Security is preemptive. Docker/Podman are not strong isolation solutions. Rare does not mean we shouldn’t protect against the chance of kernel vulnerabilities. The linux kernel around 30 million lines of code long and written in a memory unsafe language. Code isn’t safe just because we dont know the vulnerabilities, this is basic cybersec reasoning.


  • Lemongrab@lemmy.onetoSelfhosted@lemmy.worldSecurity and docker
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    2 months ago

    Docker/Podman and LXC linux containers share the same kernel with the host machine. Root in the container is root period (in the case of rootfull containers). Even without root, much of the data on your machine is readable from any user. With a exploit to escape the container (which are common) the malicious program has root on the machine. This is a known attack vector against linux containers. VMs are much better for isolating untrusted software from the host OS.