Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)MV
Posts
18
Comments
1,775
Joined
2 yr. ago

  • What level of involvement are you looking for in setting up the host os?

    I'm a NixOS fan because once you painstakingly get the configuration file set up you basically never need to do it again. If you don't need anything outside of nixpkgs it's easy, otherwise it's terrible. Docker is available in nixpkgs.

  • On connectbot for Android I really appreciate the feature that saves port forwarding settings for each connection. If you can add that and the option to start forwarding on connect that would be great.

    Also it would be nice to be able to specify a custom command to run instead of the user's shell.

  • For all of my personal machines secure boot is disabled.

    The main benefit is enabling signature checks on every piece of code that runs to start your machine. This is a good idea to prevent direct modification of the binaries involved. This will work as far up the chain as software supports, even to userland code although I don't know of any Linux distros do that.

    However, if you occasionally rebuild any of that software and can sign it yourself secure boot just moves the attack surface from the binaries into the build process. Any modifications made to the kernel, bootloader, or firmware before signing are included as trusted code and are vulnerable to malicious modification.

    Since I don't / can't verify every piece of code on my system, and rebuild Linux occasionally, and people have demonstrated secure boot bypass flaws, I prefer to disable secure boot entirely for convenience. Also, in a roundabout way this increases the security of my system because I won't get locked out for misconfiguring an update.