DistroWatch Weekly |
Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 1, value: US$3.80) |
|
|
|
 bc1qtede6f7adcce4kjpgx0e5j68wwgtdxrek2qvc4  lnurl1dp68gurn8ghj7ampd3kx2ar0veekzar0wd5xjtnrdakj7tnhv4kxctttdehhwm30d3h82unvwqhhxarpw3jkc7tzw4ex6cfexyfua2nr  86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le paypal.me/distrowatchweekly • patreon.com/distrowatch |
|
Linux Foundation Training |
|
Reader Comments • Jump to last comment |
1 • lifespan of encryption systems (by greg on 2019-12-23 00:35:57 GMT from New Zealand)
Have become doubly wary / suspicious of disk encryption and vaults. Bad experience. "Secured" my backups many years ago with an encryption system (Windows 2000 back then).... but have not been able to access these files ever since. Even tried recreating the platform with old hardware, no luck. Many files and memories are locked on those discs to this day. Apparently discontinued because it was hacked or crackable - not that I can pick the lock or find enough help to pick the lock.
2 • partiition encyrption (by wally on 2019-12-23 00:47:39 GMT from United States)
Used data partition encryption on a travel (at the time) laptop. Okay for the purpose needed and left it as such after travel ended. Problems arose when OS (multiple OSes) upgrades broke the LUKS system. Didn't lose anything but had to pull all the data off and do a lot of repair work to put everything back in non-encrypted format for the various OSes.
3 • Encryption experiences (by DaveW on 2019-12-23 01:36:41 GMT from United States)
Back in the day I had my confidential data in a TrueCrypt file. A new OS had a new version of TrueCrypt that would no longer read the old file. I kept the old OS around for a while just to access the data. Eventually, I used the old OS to decrypt and copy the data into a VeraCrypt file in my new OS. Just be aware you need to keep a backup of your access method as well as your encrypted data.
4 • File ebcryption (by rufovillosum on 2019-12-23 01:42:51 GMT from United States)
Another option is an encrypted archive using 7zip’s 256- bit AES. These can be opened as needed with file-roller and other archive managers, as well as 7-zip on windows systems.
5 • encryption of files (by drizzt on 2019-12-23 01:45:49 GMT from Australia)
Is using gpg as secure as a vault, like veracrypt. in general (or is it dependent on the algorithms used so can't really be compared)? i just use gpg's symmetrical option. i just encrypt some personal files, mainly text or odt/pdf. i fear using partition encryption for the reason of something getting messed up, like with comment #2 above. i also use veracrpyt but that allocates unused space which my ancient laptop don't have much of.
6 • Encryption (by Bobbie Sellers on 2019-12-23 02:46:34 GMT from United States)
Well in the SF-LUG we see people who have erred in some way in setting up encryption and now are unable to recover their files. This experience has soured many users on encryption as a good solution.
A lot of my files are on obsolete media, in obsolete file systems on my Amiga hard drive, a 4.3 GB 50 pin SCSI drive seemingly quite difficult to access. Who needs encryption to complicate matters?
bliss
7 • Encryption (by Otto on 2019-12-23 06:58:44 GMT from Sweden)
LVM on LUKS + Tomb vaults.
8 • encryption (by Crypt on 2019-12-23 07:33:13 GMT from United States)
VeraCrypt has worked well and is easy to use. Use on external usb drive, mount only if needed. Plus you can take it with you for safety and/or use as an encrypted backup. For single files you could put them in a .zip or .rar file. But personally I don't fully trust .zip files; they seem somehow to degrade over time, bit rot or something. Sometimes you go back to open them after a few years they have been mysteriously corrupted and fail to open. But an option for temporary purposes.
9 • Database encryption (by zcatav on 2019-12-23 08:03:58 GMT from Turkey)
Hi, Now I want to ask you when we talk about encryption. Should database encryption be performed at the operating system level or at the application level? Thanks for your attention.
10 • Encryption (by Wind on 2019-12-23 09:39:30 GMT from Netherlands)
In a work laptop I have Window 8 with BitLocker encrypted windows partition and Ubuntu KDE with LUKS. For the data to be accessible from the two systems I use a 50GB VeraCrypt container.
11 • File encryption (by muvori on 2019-12-23 13:46:18 GMT from Netherlands)
If you want to be really lazy you could just zip up a file or folder and encrypt the zip file, most archive utilities have this functionality built-in.
12 • Encryption (by Friar Tux on 2019-12-23 14:02:40 GMT from Canada)
I voted '...none of the above'. Encryption is fraught with too many issues when trying to recover the files, as noted in some of the comments, here. My method is much simpler. I create, and work with, the files to a couple of flash drives and simply hide the drives. No messing with encrypting or decrypting and no issues. (Yes, 'a couple of flash drives". That way there's a backup.) Now here is where my method gets interesting. If anything should suddenly happen to me, my kids will most likely clear out my vast collection of books, and bring them to a used book store. It would be interesting to see who finds, and/or, buys my 'book vaults'. Not that I'll be around to give a hoot.
13 • @ 12 • Encryption (by OstroL on 2019-12-23 16:00:44 GMT from Poland)
"My method is much simpler. I create, and work with, the files to a couple of flash drives and simply hide the drives."
He, he, I agree. Best never to encrypt any, as the app might get corrupted.
14 • chiming in on encryption (by unaspire on 2019-12-23 17:51:29 GMT from Indonesia)
definitely voted for none. i also went through the troubles of being unable to decrypt a long time ago, which might somehow taste like the wannacry thing a while back. things are moving quickly, and the fear of app/hardware up/downgrades incompatible seems too much of a hassle, id prefer a simple passworded archive over any form of encryption any day of the week.
15 • @8: bitrot and encryption (by nanome on 2019-12-23 19:44:53 GMT from United Kingdom)
@8: bitrot and encryption. I recently discovered bitrot in a 20-year old 500mb tar-chive with some photos [a CRC error]. So I believe it to be a real means of silently corrupting seldom-used files. Corrupting an encrypted file for which the plain-text is no longer available would be more or less disasterous!
Bitrot would be compounded by a subtle change in the format used by a proprietary encryption tool. Even open source developers can't resist "development". I am considering the use of a self-contained encryption program for which I will have all 2k lines of C code, and even then I will keep a paper/plaintext copy of important stuff.
16 • encryption (by Sitwon on 2019-12-23 21:24:40 GMT from United States)
I'm a little surprised at all the encryption naysayers who have been soured by one bad experience.
At a minimum, everyone should be using full-disk encryption on every portable storage device. You can mitigate the risk of losing that data by keeping (encrypted) filesystem backups, which you should already be doing anyways.
FDE is a simple and common-sense way to protect the data at rest in case a device is lost or stolen. The "risk" of it being harder to recover the data is entirely mitigated by up-to-date filesystem backups. It's easier and more reliable to restore from a backup than to recover data from a corrupted drive.
That leaves the sensitive files that you want to protect even when the filesystem is mounted, not just at rest. By putting them in an encrypted archive there is a possibility that you could lose access to those files if key is lost or the archive becomes corrupted. But the solution to that is not to leave those sensitive files completely unprotected.
You wouldn't leave your car unlocked for fear that you might lose your car keys and be locked out of it.
The solution, is redundancy and integrity checking. Before deleting the plain-text copy of the file, validate the integrity of the encrypted copy and make sure there is a secure backup of the encrypted copy. It's one extra step that you can abstract with automation.
17 • The cost of freedom is steep indeed. (by CS on 2019-12-23 22:54:06 GMT from United States)
Having last week bought a 13" Lenovo ThinkBook 13s with 16 GB RAM and 500 GB NVMe for the wife for $660 (before tax) I decided to price the Purism Librem 13 version 4 with similar specs which came to $1,477. Being free sure ain't cheap.
18 • Encryption (by Ken on 2019-12-24 04:47:09 GMT from United States)
I'm prone to losing/misplacing things. How I haven't lost my laptop yet is a true miracle. But, in case I do, I want my personal data to be protected. My laptop is protected by LUKS encryption. I keep my personal files on an encrypted NitroKey which also acts as the GPG key for my emails. On another USB drive that holds long-term sensitive data, I have an EncFS folder so I can pull up the data only when I need it.
I hope that by sticking to tried-and-true and widely-supported free software solutions, even if they are later deprecated, I'll be able to migrate my encrypted data and keep it secure.
19 • bcrypt (by Trihexagonal on 2019-12-24 10:19:33 GMT from United States)
I use bcrypt to encrypt individual text files from the terminal. I've had some of the same files for 10 years or more and they still decrypt like they should.
20 • nomad (by traveler on 2019-12-24 11:51:02 GMT from Moldova, Republic of)
thanks for review of nomad,
good to know that there are still some BSD projects for newbies, which just work out of box, with live CD and graphical installer.
21 • Once is all it takes. (by Friar Tux on 2019-12-24 13:56:10 GMT from Canada)
@16 (Sitwon) "I'm a little surprised at all the encryption naysayers who have been soured by one bad experience." Once is all it takes, my friend. Especially if it's really important stuff and you need it now. I've learned MY lesson and it only took one time. Now, as I mentioned in my comment, earlier, I use no encryption, but keep my important stuff (plus backup) on a flash drive, physically hidden.
22 • @ 17 Best of both (by OstroL on 2019-12-24 14:49:52 GMT from Poland)
"Being free sure ain't cheap."
You can have the best of both for half the price. Installation of a Linux distro is just a matter of time. Anyway, Purism is something I won't touch with a long pole.
23 • Full disk encryption... (by tom joad on 2019-12-24 16:21:59 GMT from United States)
I started doing the full disk encryption about a year or so ago. I did my laptop first. Being out and about alot and having to go to the bathroom I thought full disk encryption was a good idea. I set a really strong password too. I mean really strong...20 characters with high entropy too. Over the intervening time having to enter a password is not really that much of a bother. But that is me...your mileage may vary as they say.
That worked out well so I did my home computer too using a different really strong password.
Then I got the bright idea of doing the same for USB drives. So I formatted a drive in Fat 32 and EXT4. I do 3/4 fat and 1/4 EXT4. Then I encrypt the EXT4 partition with LUKS. And, yes, with a different and strong password.
Why?
Every time the Government makes strident demands on our privacy, every time there is a big, ugly hack with users being put at risk...I ramp up my stuff.
Am I bullet proof so to speak? I dunno. But I believe I can keep most of the bad actors away from my stuff while slowing the government down.
Besides...you never know what will happen next.
24 • Disk encryption and file vaults (by Bob on 2019-12-24 17:19:05 GMT from Canada)
An aspect not addressed in the original discussion of protecting sensitive data in file vaults is: what happens to that data from an open file vault if some of it ends up in an unencrypted swap partition?
When I added an SSD to my system, I encrypted it immediately on the understanding that it is impossible to securely wipe an SSD before its eventual disposal.
25 • XFCE, encryption, and gpg verification (by hotdiggettydog on 2019-12-24 20:27:42 GMT from Canada)
Best (mostly)Xfce distro is Peppermint in my opinion.
I use Veracrypt and encrypted zip files. I place copies here and there. I use the rock solid ext4 file system and never experience corrupted files.
I always look at gpg verification for downloaded iso images and other mission critical software. Nice to see many signing their software. You can't trust sums on their own.
Happy Holidays all.
26 • @24 unencryptedd swap (by Otto on 2019-12-25 06:23:58 GMT from United States)
I dunno about others, but for me, full-disk encryption means that the swap partition also is encrypted. Just as you said, it wouldn't be nice to have some sensitive data end up unencrypted on my disk. (Tomb in particular checks whether swap is encrypted or not.)
27 • encryption (by Otis on 2019-12-25 16:25:12 GMT from United States)
Umm.. I'd like to ask the question, what data are you keeping on your computer that you don't want others to see? Is this about bank accounts? Passwords to bank account sites? Passwords for other financial things? Naughty pictures/texts, emails, etc?
Those, and more, are all things I'd never put on a computer in the first place. Or any disc. Or any thumb drive etc. Businesses, now that's a different story, and I'm sure they use encryption as best they can in most cases, and it still gets broken into as we see in the news.
28 • @27 (by FedUpMonkeyMan on 2019-12-25 19:22:21 GMT from Mexico)
"Those, and more, are all things I'd never put on a computer in the first place. Or any disc. Or any thumb drive etc. "
Sorry but are you from the past? In all seriousness, are you suggesting that any record or document of importance including the afore mentioned be kept in paper form only, in a filing cabinet or safe?
I'm not sure you understand what you are writing.
I suppose living like one did in the pre-computer era has some nostalgia but ot certainly osn't practical for 99.999% of people to not use a computer to store data.
29 • file encryption (by Simon Plaistowe on 2019-12-25 20:40:00 GMT from United States)
Currently I have nothing worth encrypting, however if I did then based on past experimentation I'd use VeraCrypt to create a vault, then I'd put into it only the data which needed to be there and I'd open the vault only when I needed to access the data within.
30 • @28: (by dragonmouth on 2019-12-26 16:44:42 GMT from United States)
"are you suggesting that any record or document of importance including the afore mentioned be kept in paper form only, in a filing cabinet or safe?" Considering the frequency and ease with which corporate databases holding our vital data are compromised, a safe is definitely the most secure place for any record or document of importance. However, if you wish to expose your data to hackers, feel free but remember that the price of convenience is security and privacy.
"I suppose living like one did in the pre-computer era has some nostalgia" Yes, I am nostalgic for the days when I did not have to worry about my identity being stolen, when banks and other financial institutions were able to keep their records secret from 99.99% of the public, when it wasn't possible for every Tom, Dick and Harry to easily purchase a folder filled with my personal data . How silly of me to be nostalgic about the pre-computer days.
31 • @28 (by Lancre on 2019-12-26 18:46:42 GMT from United States)
IMO, Otis and Dragonmouth have it exactly right. You can't crack what isn't there. If it is on your computer, any security you have can be cracked by someone. Any security scheme one mind can devise, another mind can circumvent.
32 • losing stuff (by @ngr? on 2019-12-26 21:23:10 GMT from Australia)
When you're protecting stuff, you also need a password management system. Because if you don't write a password down, you'll forget it when you don't regularly use it. If you write them all down, you'll forget which account / volume / file they belonged to. And if you just write down the password hints, you'll forget what they referred to.
Then again, if you use the latest wiz-bang electronic protections, and someone wanted your stuff, you could lose a finger or an eyeball along with your files... Ouch!
33 • Data security (by Stefan on 2019-12-27 17:38:02 GMT from Brazil)
. @12 (Friar Tux) "My method is much simpler. I create, and work with, the files to a couple of flash drives and simply hide the drives. No messing with encrypting or decrypting and no issues."
__ I use the very same method, only mounting a filesystem when necessary. But I also use a mix of gpg and veracrypt to protect "sensitive data" like corporate documents, emails, and even family photos. To avoid problems for me, my wife and son in case I die subtly or my home is assaulted, all our personal documents were hidden in a steel-made vault located in a "secret place". Also put in that truly undetectable spot of the house, full information about bank/exchange accounts and investments is kept in PAPER form and CODED in such a way that no random invader can decode it, except my beloved family members (and myself, of course).
__ Do you think I'm crazy? After living for 64 years in this incredibly unstable and dangerous country called Brazil, paranoia is the natural behavior of any conscious person. By the way, I have always believed in Murphy's Law. It's my religion since I started to use Windows Me at home (Windows XP at work). Happily, many years ago, my boss converted to Linux and invited all employers to follow him. What a smart move!
@27 (Otis) "Is this about bank accounts? Passwords to bank account sites? Passwords for other financial things?" ... "Those, and more, are all things I'd never put on a computer in the first place."
__ Bad news for you and every other citizen in this planet: No matter if you do not have "sensitive data" stored in a personal computer, or even if you never do "Internet banking", your entire life (school records, work records, social records, and everything else including financial data like bank accounts and passwords) is stored somewhere in a myriad of private and governmental servers. And we all know what evil hackers can do with them...
@28 (FedUpMonkeyMan) "In all seriousness, are you suggesting that any record or document of importance including the afore mentioned be kept in paper form only, in a filing cabinet or safe?"
__ Well, it's the 21st century, the era of online computers and digital data storage. But there are situations when keeping "sensitive data" in a computer is extremely unsafe. For that reason, all my cryptocurrency assets are recorded in PAPER wallets created OFFLINE. Such a smart procedure is by far the best. Thus Otis (@27) is wright, at least partially.
__ Nobody should trust computers as if they were gods. Cellphones are even worse. All brands and models are incredibly unsafe. And remember that the upcoming "5G Technology" is going to kill many people of cancer according to scientific studies.
@30 (dragonmouth) "Yes, I am nostalgic for the days when I did not have to worry about my identity being stolen, when banks and other financial institutions were able to keep their records secret from 99.99% of the public, when it wasn't possible for every Tom, Dick and Harry to easily purchase a folder filled with my personal data."
__ You've taken the words from my mouth. I was much more confident when computer hackers did not exist! How big is my nostalgia for those so wonderful old times... .
34 • @33 Stefan: (by dragonmouth on 2019-12-27 19:48:14 GMT from United States)
"__ Bad news for you and every other citizen in this planet: No matter if you do not have "sensitive data" stored in a personal computer, or even if you never do "Internet banking", your entire life (school records, work records, social records, and everything else including financial data like bank accounts and passwords) is stored somewhere in a myriad of private and governmental servers. And we all know what evil hackers can do with them..."
Be that as it may, there is absolutely no reason to make things easier for the data collectors. I realize that because of the universal penchant for data collection and hoarding, the ubiquitous THEY know more about me than I know about myself. However, keeping paper records and the money in my mattress at least I have the illusion of security. :-)
35 • @nonsense (by Otis on 2019-12-30 19:45:14 GMT from United States)
lmao:
"@27 (Otis) "Is this about bank accounts? Passwords to bank account sites? Passwords for other financial things?" ... "Those, and more, are all things I'd never put on a computer in the first place."
__ Bad news for you and every other citizen in this planet: No matter if you do not have "sensitive data" stored in a personal computer, or even if you never do "Internet banking", your entire life (school records, work records, social records, and everything else including financial data like bank accounts and passwords) is stored somewhere in a myriad of private and governmental servers. And we all know what evil hackers can do with them..."
You are malinformed, and, I dare say, part of the problem. You may have to meditate on that for a bit (if you truly believe that which I quoted there.
Another helpful hint: You can have a computer. You can have a bank account. You can have it all, and never need to encrypt your hard drive. And you can do all this, as many many people do, living in a nice city anywhere on Earth, or in a small pueblo. Take your pick.
36 • Is this real life? (by Stunned on 2019-12-30 21:46:45 GMT from Canada)
I am stunned by the naivety of the posts here, I can hardly believe what I am reading. Putting valuable things under your mattress? Leaving all of your most important and personal information completely unencrypted?
That kind of lax attitude is precisely what bad actors depend on, and how they succeed in data mining, theft, and worse.
You won't encrypt anything because one time your data got corrupted? BACK IT UP NEXT TIME, for Christ sake. I make 3 backups, the odds of all 4 copies going bad are 0.000000000001%.
The fact that 54% of the Linux community doesn't use encryption and thinks they can "hide" their totally exposed and unprotected data is laughable, and at the same time shows how far the human race has fallen. If the Linux community is this bad maybe we are not so educated as we think on computers...I don't even want to imagine what the % is for Windows 10 users, probably 95-98% are too lazy or uneducated to encrypt.
Encrypt and use long and complex passwords for Christ sake. If you ALSO want to physically hide your flash drives/SD cards and drives that's great, but don't rely on changing the file name/putting it in a different folder and and thinking they are now magically hidden or throwing it under the mattress and thinking it is safe from robbers by some miracle, because it's not. That's just asking for a disaster.
37 • @36 (by anticapitalista on 2019-12-30 22:33:22 GMT from Greece)
@36 Maybe they have an encrypted mattress ...
On a serious note, most (desktop) users probably think that they have no need for encryption as they are not using their box for really important stuff, so (understandably) don't take encryption seriously.
38 • File Systems with build in encryption will help! (by Andre Gompel on 2019-12-31 10:21:14 GMT from France)
I have over the years successfuly encrypted my Linux based disks: always worked well, so the encryption Cassandras here don t seem to have a valid point.
BTRFS, ZFS with build in ecryption and compression will be a much welcome feature of Open Source software.
There may be too many file systems : at some point solidifying around the best, fastest and more robust FS should happen, because it is a key feature of any FS based OS based like UNIX where "everything is a file".
On system low level, Fedora/Red-Hat has been the leader; wondering if the recent acquisition by IBM will reinforce or weaken this leadership.
A.G
39 • @36 & 37: (by dragonmouth on 2019-12-31 14:33:15 GMT from United States)
IF I lived my entire life on my PC and stored EVERYTHING on my PC, I would encrypt everything. But since I only use my PC to surf the 'Net and maybe do some word processing. the only secret data on it is what is already freely available on the Internet. So, no encryption is necessary. The only danger is that my PC may become part of a "bot net. If that were to happen, all I have to do is to physically replace the disk drive and install any distro of my choice. Automagically, any connection to any bad actors is removed.
Paradoxically/ironically, the data that would require encryption is not for me to encrypt. My medical, financial and similar data is stored on other peoples' computers, to which I have no access.
If you insist on shoving all your eggs into one basket, you damn well better protect that basket i.e. encrypt the hell out of your PC. If you strategically spread the placement of your eggs all over the place, very little protection is necessary for each individual egg.
40 • Veracrypt, and LUKS (by Wally on 2020-01-02 14:37:39 GMT from United States)
I use LUKS on my mobile workstations because the most distro installers includes it natively. I use VeraCrypt on USB flash drives when I might need to access the file container from a non-free OS. I was using Veracrypt/Truecrypt before I moved to GNU/Linux.
Number of Comments: 40
Display mode: DWW Only • Comments Only • Both DWW and Comments
| | |
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
• Issue 1046 (2023-11-20): Slackel 7.7 "Openbox", restricting CPU usage, Haiku improves font handling and software centre performance, Canonical launches MicroCloud |
• Issue 1045 (2023-11-13): Fedora 39, how to trust software packages, ReactOS booting with UEFI, elementary OS plans to default to Wayland, Mir gaining ability to split work across video cards |
• Issue 1044 (2023-11-06): Porteus 5.01, disabling IPv6, applications unique to a Linux distro, Linux merges bcachefs, OpenELA makes source packages available |
• Issue 1043 (2023-10-30): Murena Two with privacy switches, where old files go when packages are updated, UBports on Volla phones, Mint testing Cinnamon on Wayland, Peppermint releases ARM build |
• Issue 1042 (2023-10-23): Ubuntu Cinnamon compared with Linux Mint, extending battery life on Linux, Debian resumes /usr merge, Canonical publishes fixed install media |
• Issue 1041 (2023-10-16): FydeOS 17.0, Dr.Parted 23.09, changing UIDs, Fedora partners with Slimbook, GNOME phasing out X11 sessions, Ubuntu revokes 23.10 install media |
• Issue 1040 (2023-10-09): CROWZ 5.0, changing the location of default directories, Linux Mint updates its Edge edition, Murena crowdfunding new privacy phone, Debian publishes new install media |
• Issue 1039 (2023-10-02): Zenwalk Current, finding the duration of media files, Peppermint OS tries out new edition, COSMIC gains new features, Canonical reports on security incident in Snap store |
• Issue 1038 (2023-09-25): Mageia 9, trouble-shooting launchers, running desktop Linux in the cloud, New documentation for Nix, Linux phasing out ReiserFS, GNU celebrates 40 years |
• Issue 1037 (2023-09-18): Bodhi Linux 7.0.0, finding specific distros and unified package managemnt, Zevenet replaced by two new forks, openSUSE introduces Slowroll branch, Fedora considering dropping Plasma X11 session |
• Issue 1036 (2023-09-11): SDesk 2023.08.12, hiding command line passwords, openSUSE shares contributor survery results, Ubuntu plans seamless disk encryption, GNOME 45 to break extension compatibility |
• Issue 1035 (2023-09-04): Debian GNU/Hurd 2023, PCLinuxOS 2023.07, do home users need a firewall, AlmaLinux introduces new repositories, Rocky Linux commits to RHEL compatibility, NetBSD machine runs unattended for nine years, Armbian runs wallpaper contest |
• Issue 1034 (2023-08-28): Void 20230628, types of memory usage, FreeBSD receives port of Linux NVIDIA driver, Fedora plans improved theme handling for Qt applications, Canonical's plans for Ubuntu |
• Issue 1033 (2023-08-21): MiniOS 20230606, system user accounts, how Red Hat clones are moving forward, Haiku improves WINE performance, Debian turns 30 |
• Issue 1032 (2023-08-14): MX Linux 23, positioning new windows on the desktop, Linux Containers adopts LXD fork, Oracle, SUSE, and CIQ form OpenELA |
• Issue 1031 (2023-08-07): Peppermint OS 2023-07-01, preventing a file from being changed, Asahi Linux partners with Fedora, Linux Mint plans new releases |
• Issue 1030 (2023-07-31): Solus 4.4, Linux Mint 21.2, Debian introduces RISC-V support, Ubuntu patches custom kernel bugs, FreeBSD imports OpenSSL 3 |
• Issue 1029 (2023-07-24): Running Murena on the Fairphone 4, Flatpak vs Snap sandboxing technologies, Redox OS plans to borrow Linux drivers to expand hardware support, Debian updates Bookworm media |
• Issue 1028 (2023-07-17): KDE Connect; Oracle, SUSE, and AlmaLinux repsond to Red Hat's source code policy change, KaOS issues media fix, Slackware turns 30; security and immutable distributions |
• Issue 1027 (2023-07-10): Crystal Linux 2023-03-16, StartOS (embassyOS 0.3.4.2), changing options on a mounted filesystem, Murena launches Fairphone 4 in North America, Fedora debates telemetry for desktop team |
• Issue 1026 (2023-07-03): Kumander Linux 1.0, Red Hat changing its approach to sharing source code, TrueNAS offers SMB Multichannel, Zorin OS introduces upgrade utility |
• Issue 1025 (2023-06-26): KaOS with Plasma 6, information which can leak from desktop environments, Red Hat closes door on sharing RHEL source code, SUSE introduces new security features |
• Issue 1024 (2023-06-19): Debian 12, a safer way to use dd, Debian releases GNU/Hurd 2023, Ubuntu 22.10 nears its end of life, FreeBSD turns 30 |
• Issue 1023 (2023-06-12): openSUSE 15.5 Leap, the differences between independent distributions, openSUSE lengthens Leap life, Murena offers new phone for North America |
• Issue 1022 (2023-06-05): GetFreeOS 2023.05.01, Slint 15.0-3, Liya N4Si, cleaning up crowded directories, Ubuntu plans Snap-based variant, Red Hat dropping LireOffice RPM packages |
• Issue 1021 (2023-05-29): rlxos GNU/Linux, colours in command line output, an overview of Void's unique features, how to use awk, Microsoft publishes a Linux distro |
• Issue 1020 (2023-05-22): UBports 20.04, finding another machine's IP address, finding distros with a specific kernel, Debian prepares for Bookworm |
• Issue 1019 (2023-05-15): Rhino Linux (Beta), checking which applications reply on a package, NethServer reborn, System76 improving application responsiveness |
• Issue 1018 (2023-05-08): Fedora 38, finding relevant manual pages, merging audio files, Fedora plans new immutable edition, Mint works to fix Secure Boot issues |
• Issue 1017 (2023-05-01): Xubuntu 23.04, Debian elects Project Leaders and updates media, systemd to speed up restarts, Guix System offering ground-up source builds, where package managers install files |
• Issue 1016 (2023-04-24): Qubes OS 4.1.2, tracking bandwidth usage, Solus resuming development, FreeBSD publishes status report, KaOS offers preview of Plasma 6 |
• Issue 1015 (2023-04-17): Manjaro Linux 22.0, Trisquel GNU/Linux 11.0, Arch Linux powering PINE64 tablets, Ubuntu offering live patching on HWE kernels, gaining compression on ex4 |
• Issue 1014 (2023-04-10): Quick looks at carbonOS, LibreELEC, and Kodi, Mint polishes themes, Fedora rolls out more encryption plans, elementary OS improves sideloading experience |
• Issue 1013 (2023-04-03): Alpine Linux 3.17.2, printing manual pages, Ubuntu Cinnamon becomes official flavour, Endeavour OS plans for new installer, HardenedBSD plans for outage |
• Issue 1012 (2023-03-27): siduction 22.1.1, protecting privacy from proprietary applications, GNOME team shares new features, Canonical updates Ubuntu 20.04, politics and the Linux kernel |
• Issue 1011 (2023-03-20): Serpent OS, Security Onion 2.3, Gentoo Live, replacing the scp utility, openSUSE sees surge in downloads, Debian runs elction with one candidate |
• Issue 1010 (2023-03-13): blendOS 2023.01.26, keeping track of which files a package installs, improved network widget coming to elementary OS, Vanilla OS changes its base distro |
• Issue 1009 (2023-03-06): Nemo Mobile and the PinePhone, matching the performance of one distro on another, Linux Mint adds performance boosts and security, custom Ubuntu and Debian builds through Cubic |
• Issue 1008 (2023-02-27): elementary OS 7.0, the benefits of boot environments, Purism offers lapdock for Librem 5, Ubuntu community flavours directed to drop Flatpak support for Snap |
• Issue 1007 (2023-02-20): helloSystem 0.8.0, underrated distributions, Solus team working to repair their website, SUSE testing Micro edition, Canonical publishes real-time edition of Ubuntu 22.04 |
• Issue 1006 (2023-02-13): Playing music with UBports on a PinePhone, quick command line and shell scripting questions, Fedora expands third-party software support, Vanilla OS adds Nix package support |
• Issue 1005 (2023-02-06): NuTyX 22.12.0 running CDE, user identification numbers, Pop!_OS shares COSMIC progress, Mint makes keyboard and mouse options more accessible |
• Issue 1004 (2023-01-30): OpenMandriva ROME, checking the health of a disk, Debian adopting OpenSnitch, FreeBSD publishes status report |
• Issue 1003 (2023-01-23): risiOS 37, mixing package types, Fedora seeks installer feedback, Sparky offers easier persistence with USB writer |
• Issue 1002 (2023-01-16): Vanilla OS 22.10, Nobara Project 37, verifying torrent downloads, Haiku improvements, HAMMER2 being ports to NetBSD |
• Issue 1001 (2023-01-09): Arch Linux, Ubuntu tests new system installer, porting KDE software to OpenBSD, verifying files copied properly |
• Issue 1000 (2023-01-02): Our favourite projects of all time, Fedora trying out unified kernel images and trying to speed up shutdowns, Slackware tests new kernel, detecting what is taking up disk space |
• Issue 999 (2022-12-19): Favourite distributions of 2022, Fedora plans Budgie spin, UBports releasing security patches for 16.04, Haiku working on new ports |
• Issue 998 (2022-12-12): OpenBSD 7.2, Asahi Linux enages video hardware acceleration on Apple ARM computers, Manjaro drops proprietary codecs from Mesa package |
• Issue 997 (2022-12-05): CachyOS 221023 and AgarimOS, working with filenames which contain special characters, elementary OS team fixes delta updates, new features coming to Xfce |
• Issue 996 (2022-11-28): Void 20221001, remotely shutting down a machine, complex aliases, Fedora tests new web-based installer, Refox OS running on real hardware |
• Issue 995 (2022-11-21): Fedora 37, swap files vs swap partitions, Unity running on Arch, UBports seeks testers, Murena adds support for more devices |
• Issue 994 (2022-11-14): Redcore Linux 2201, changing the terminal font size, Fedora plans Phosh spin, openSUSE publishes on-line manual pages, disabling Snap auto-updates |
• Issue 993 (2022-11-07): Static Linux, working with just a kernel, Mint streamlines Flatpak management, updates coming to elementary OS |
• Full list of all issues |
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Shells.com |

Your own personal Linux computer in the cloud, available on any device. Supported operating systems include Android, Debian, Fedora, KDE neon, Kubuntu, Linux Mint, Manjaro and Ubuntu, ready in minutes.
Starting at US$4.95 per month, 7-day money-back guarantee
|
Random Distribution | 
Myrinix
Myrinix was smart and centralised operating system for the home. Its main feature was the ability to connect a plasma TV or large LCD screen to a central server that can record and play DVD or surf the Internet on the big screen. Myrinix was a live CD based on Debian GNU/Linux and sidux.
Status: Discontinued
|
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
|