DistroWatch Weekly |
Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 2, value: US$35.20) |
|
|
|
 bc1qxes3k2wq3uqzr074tkwwjmwfe63z70gwzfu4lx  lnurl1dp68gurn8ghj7ampd3kx2ar0veekzar0wd5xjtnrdakj7tnhv4kxctttdehhwm30d3h82unvwqhhxarpw3jkc7tzw4ex6cfexyfua2nr  86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le paypal.me/distrowatchweekly • patreon.com/distrowatch |
|
Extended Lifecycle Support by TuxCare |
|
Reader Comments • Jump to last comment |
1 • Untrusted applications (by Katie on 2023-03-27 00:26:35 GMT from United Kingdom)
I have a spare laptop for all the untrusted applications. Running Arch btw.
2 • Q&A privacy. (by Hermit on 2023-03-27 01:54:25 GMT from United States)
I'm puzzled by the Q&A. The questioner asks about privacy, but then lists three of the most intrusive applications available, I'd be more concerned about any unlikely malware, or anyone having access to the information on those apps: credentials, history, etc. Having those apps hacked can cause some difficulties in your life. Skype is the least intrusive. I have it and use it rarely under a fictitious name, and only after checking all options to send as little info to MS as possible. Still, it knows any contacts I have and any numbers I call. In the questioner's case, he uses them for work, so they know who he is, where he works, what he looks like, probably where he lives, and in some cases, when he goes to the toilet. Zoom consists of sitting in front of a camera saying and doing things, some of which you might regret and which can be recorded for posterity. (Google Jeffrey Toobin) By all means it isn't a bad idea to isolate those apps, but the questioner's concerns are upside-down. Security? Sure. Privacy? Gimme a break!
3 • Re: 2 (by Sitwon on 2023-03-27 02:44:59 GMT from United States)
There are many dimensions to both security and privacy. They can both be used to describe a wide variety of concerns.
While the primary feature of Zoom is to share audio and/or video streams between participants, that is fairly obvious to all involved. The fact that you may be recorded is not inherently a violation of privacy, if you consent to the recording. Many people are fine with sharing recordings of themselves under certain circumstances, but not others.
However, being closed-source software, the questioner might not trust that their consent is being respected by the software tools they named and may want to enforce technological limits to curtail the ability of the software to observe or record any information that they have not explicitly consented to.
Privacy is about consent. It's reasonable to consent to sharing a limited subset of information, and to want to enforce those boundaries.
4 • At 2 & 3: (by Bert on 2023-03-27 04:16:45 GMT from Belgium)
Being recorded at the computer. Not that much of a deal when you are carefull enough to see what you do and what you say. You are being recorded just walking down the street as well. The other day I had been talking to the major just outside an inn. I needed to go to be at the police office 2 days later and for one reason or another they told me that they had seen me talking to the mayor. So, those cameras are being well monitored as well. There is no more privacy. More to the point: be carefull about which programs you use and protect your computer as good as you can. But with that comes another problem: I have Avira Professionel and Surfshark. The programs are good but they limit the speed of your browsing drastically if you do not turn off the web protection. So good protection comes with the price of less functionality.
5 • @3 & 4 privacy (by Hermit on 2023-03-27 06:16:27 GMT from United States)
Good comments, but straying from the point. The purpose of isolating apps by is not to keep internet security while browsing, nor keeping from being recorded. It is to deny access to the rest of your system, thus keeping them from obtaining your private data or inserting their own malware or whatever. My point is that those app mentioned (not all apps) contain more personal info than I would be comfortable making accessible outside the apps. I'd want my door closed the other way, to keep my system or anyone with access to it from getting to the info on the apps. The personal data required by those apps can be used for harm, impersonation among several others.
On recording: My expectation of privacy is not the same on the street as it is at home, so cameras on the streets are not relevant. If I want privacy on the street, Ill need to wear a disguise. No matter what restrictions you place on your Zoom or other app, I can record my screen with sound by other means, so can anyone else who wants to. If using a video conferencing app, I will always assume I can be recorded.
Internet: I don't use antivirus or any of the apps @3 mentions on Linux. If I want privacy and protection I can use an anti-fingerprinting browser like Librewolf, and If needed, I run it isolated, usually in a VM.
6 • Security and Siduction (by Hank on 2023-03-27 09:19:20 GMT from Switzerland)
When I read snap and Flatpack in conjunction with security the relative difficulty of inspecting package contents always comes to mind. Apart of the bloat aspect that is Fatpack is pretty descriptive.
Siduction is one of the better debian based offerings. Only a couple of things stop me using it, the init which I find a pain, and need to install Libreoffice from LO Org. The version included is thanks to debian 7.4.
Version 7.5 has been stuck in debian experimental for weeks already, seems devs enjoying a long long teatime.
7.5 from LO Org includes some for me important updates, it is running fine on the devices I support which are on antiX with sid repos enabled for rolling release. Sid is not for everyone but generaly more stable than some big name distros.
7 • Politics in Linux (by Joe Beer on 2023-03-27 10:45:37 GMT from United States)
Politics should not be in Linux period. If that code isn't ever accepted, then I'll start look at alternative OS's.
8 • How I isolate untrusted applications (by James on 2023-03-27 11:34:18 GMT from United States)
I just don't use proprietary applications. I find Linux alternatives, but then I am retired and not forced by work.
I did use Zoom for a short period during the lock downs, but didn't do anything specific to secure it and removed is as soon as possible. Actually you didn't even have to do that there were some people that just joined by phone, which is possible, but there would be no video if you did.
9 • siduction (by Tim on 2023-03-27 13:36:27 GMT from United States)
In my distro hopping days, I used siduction for a long while (probably more than a year) and I liked it very much. The people who manage and support it are very knowledgeable, friendly, and helpful. Like the reviewer, I would recommend it to anyone who wants a Debian-based, cutting edge distribution.
10 • Security and Privacy (by Dr.J on 2023-03-27 13:41:25 GMT from Germany)
Some comments have already pointed out, privacy and security are two different things. I use Arch and I have Firejail installed; it does some useful things like passing a noroot parameter to the kernel or building a custom filesystem for the sandbox etc. Do I use it often? No. Because 99.9% of the time I use the official Arch repos.
Privacy is something else entirely. For example, run Opera browser in Firejail sandbox and nothing changes in terms of privacy, starting from IP to installed fonts, fingerprints and all phone-home-activities etc. But: All the available means to change this are great, starting with special Tor gateways (like Whonix), VPN, Tails etc. and ending with the Tor browser. The problem is: if the Tor browser is running at the highest security level, you can forget about the Internet. Too many sites block you, the speed is moderate, mails can not be retrieved or sent, etc.. It is not easy to find a good compromise here, which is also practicable. Because at the end of the day nobody out there wants you to be private.
11 • untrusted applications (by K4RS on 2023-03-27 15:54:34 GMT from United States)
I chose None of the above. The reason is simple. If I don't trust it, I don't run it. End of story.
12 • privacy/security (by Tomposter on 2023-03-27 16:53:17 GMT from United States)
Excellent article on protecting privacy. I run Firefox using Firejail almost always. In addition, I have a separate user without SUDO for certain activities. @10 Dr J says it well, "nobody out there wants you to be private". There is a need to take steps to protect yourself.
Having a separate operating system on a separate SSD for must-be-secure activities is a big advantage for some of us. In the days of the big boxes with bays accessible from the front of the computer, one could install a "rack" that allows 2.5" SSDs to be switched easily. Such a rack can't be (easily) used in common modern boxes. I'd like to be able to run SSD-based Linux from USB (full install, not "live"). But TRIM-over-USB is difficult for technically-challenged users like myself. I don't run Windows, but have read that Windows has enabled TRIM over USB for devices that support UASP. One day a Linux developer may see the advantages of running a fully-capable operating system over USB and make TRIM easy for all of us.
13 • Political? (by GT on 2023-03-27 17:32:39 GMT from United States)
"We don't feel comfortable accepting patches from or relating to hardware produced by your organization.
Please withhold networking contributions until further notice."
Is there anything more to this than these two sentences? If not, isn't labeling this "political" an assumption? I can see this being interpreted multiple ways.
14 • Security (by minux on 2023-03-27 17:41:33 GMT from United Kingdom)
Like @1 does, install dodgy apps, and windows xp only app gems, to a spare old laptop that never goes online
Who else ticked 'virtual machine' when it's actually 'another machine'?
15 • Politics on Linux (by John on 2023-03-27 20:07:08 GMT from Argentina)
That's a good dictatorial way of limiting software freedom. When people mix work with personal life, problems start. Kicinski is basically taking benefits from the community because of his personal opinions.
16 • Politics in Linux (by Jacob A. Tice on 2023-03-27 23:31:02 GMT from United States)
I hate to break it to you, Joe (@7), but "politics" is a lot more than just "politician X is bad." Everything is political, blanket banning all "politics" accomplishes nothing but not being able to have disagreements, or even be different to the norm. Also, John (@15), how exactly do you propose we separate all personal life from the work we do? Because anywhere there is a discussion that will come up.
17 • Politics in Linux (by Jacob A. Tice on 2023-03-27 23:36:11 GMT from United States)
Also, doing some searching, it turns out the the patches are being made specifically for the Baikal series of processors, made by Russian company T-Systems. It is currently against the law in the US to do business with them. I'm not saying I agree with that, I'm just saying how it is.
18 • Politics in Linux (by John on 2023-03-28 14:37:55 GMT from Argentina)
@17 what has the US law to do with the kernel? besides, if you read Kicinski's rejection comment, there is no mention to LAW but only to PERSONAL opinions "We don't feel comfortable accepting patches from or relating to hardware produced by your organization." @16 you separate personal life from work by separating personal life from work. as simple as that. If your personal opinions undermine the progress of your work and the benefits for the end user, that's a sign of interference.
19 • @18 (by Justin on 2023-03-28 19:11:47 GMT from United States)
If you dealt with the law in those countries, you would know. Stating their discomfort and being brief is a way to protect themselves from legal ramifications. For example, if they are subject to US laws in this case (if you reside in the US, you are subject to US laws, regardless about how you feel about politics), there is nothing they can do. However, they can decline politely in a way that says, "hey, we can't do this now but perhaps one day we can, sorry" instead of "hey buddy, dealing with you is _illegal_ so go fsck off." They are probably being smart and don't want to hurt future relations. At the moment they may be unable (or at least unsure) how best to proceed, but eventually the macropolitical situation will resolve itself, and they will all want to get back to being open source buddies.
This isn't unique to today. You can look up many examples from the 20th century during its many hot and cold wars. Scientists, technologies, etc., care about the research and the work. It sucks when external things prevent us from working together, but we don't have to be jerks about it.
20 • Isolation privacy trust/untrust (by Sebastien on 2023-03-28 21:25:22 GMT from France)
I've never used it but according to what I've seen and read, QubeOS seems to have pushed the concept quiet far to address this kind of concern.
Not sure it would fit my needs as a daily driver but it looks a very nice piece of software still. I definitly have to try this one day or another !
21 • security privacy (by whyfi on 2023-03-29 04:24:07 GMT from Singapore)
One man's freedom is another man's security flaw. e.g.,
* FOSS philosophy is that many eyes on the code identifies bugs, so improves software. But on the flip side it means that everyone knows all the innards of an OS. Doesn't this make it trivial for hackers to write malware that targets certain areas for data - like familiar paths, locations of user folders, or locations of system stuff. So wouldn't these names / locations need to be obfuscated somehow to provide security?
* Manufacturers make hardware & components that are designed to be always powered, always trying to connect, ready to print, or ready to share files. (e.g., They slap wifi onto anything nowadays.) It's up to the user to use software to turn things off - which is not always effective, or can be compromised.
Eventually, all the malware, spyware, and ransomware will become so pervasive that it will cause the tech industry to have to redesign computers from the hardware up, from a security / privacy perspective, and not from a connecting / sharing perspective.
22 • Linux security/privacy (by Otis on 2023-03-29 16:21:49 GMT from United States)
@21 Methinks the eventuality feared in that last paragraph would already have happened, after decades of Linux proliferation, world wide.
We have flaws, we patch. Seems to be working okay.
23 • @21: (by dragonmouth on 2023-03-29 16:51:32 GMT from United States)
"Doesn't this make it trivial for hackers to write malware......" It also makes it trivial to see the hacks or the malware.
24 • Untrusted applications (by Greg Zeng on 2023-03-30 05:05:51 GMT from Australia)
Comments from readers are interesting, again. “INCOGNITO” mode is available in many operating systems and web browsers. Many web browsers also have varying & multiple levels of privacy protection. One comment also mentioned TOR and VPN.
The original Q&A did not mention AppImage applications, which claim the same container safety as Snap & Flatpak. There are an extremely large number of Linux operating systems that specialized particularly on Incognito and Privacy Protection. These Linux systems are based on the two major platforms (DEB & Red Hat RPM). A few other Linux systems claim to be “independent”, which has different meanings at this time.
Most of the current “living” operating systems can run without installing onto the main storage medium. This is so that the trial user can check the Linux system, or to debug-modify the installed system of the hardware. A few Linux systems have been designed, specially never to be installed to any specific hardware computer.
Some comments seem to understand why the Privacy & Incognito systems are necessary for some computer users. One of the main reasons is checking whether suspected malware is specific to what part of the existing computer system. Hardware, software, operating system, location, user, Trojans, boot-bugs, etc. Some users have suspected or supposed affiliations with earlier life events, earlier or current employers, etc. Work affiliations and personal privacy are often needing to be kept apart. For example, “pen-names”, stage-names, etc.
Once again, Distrowatch has shown a major reason why Linux is better than most commercial operating systems, especially Microsoft & Apple.
25 • AppImage (by Friar Tux on 2023-03-30 13:27:22 GMT from Canada)
@24 (Greg Zeng) "The original Q&A did not mention AppImage applications..." I have noticed that AppImage is consistently missing from most discussions involving portable/containered software. I, personally, prefer it to Flatpak and Snap (mainly because of the "one file = one app" idea). As I've mentioned before, AppImage is also the only format that picks up my local theme - Flatpak and Snaps do give you a choice between light and dark themes but these are either eye incinerating, bright white, or that ugly dark grey. I keep a folder of my favourite AppImages on a USB pen drive to ensure I have my needed tools with me should my system ever go belly up. Some may be as old as dirt, but they do what I need them to do and that's all that counts. AppImage have been around for longer than the other two and seem to work far better than the other two so it baffles me why it was not more universally adopted. The only thing I can think of is that it's a continuation of the popularity contest between Red Hat and Canonical.
26 • AppImages (by Jesse on 2023-03-30 13:36:11 GMT from Canada)
@24: "The original Q&A did not mention AppImage applications, which claim the same container safety as Snap & Flatpak."
AppImages do not offer any isolation or container safety. You can add sandboxing to them by using an external tool like Firejail, which we did talk about.
27 • 3CX (by fruit flavor on 2023-03-31 03:34:52 GMT from Norway)
Do you use comms software from 3CX? What to do next after biz hit in supply chain attack
https://www.theregister.com/2023/03/30/communications_software_vendor_3cx_hit/
Miscreants hit downstream customers with infostealers
28 • @22 (by Justin on 2023-03-31 17:04:15 GMT from United States)
It actually isn't working so well. The number of IoT devices with exploitable flaws is astounding specifically because there is no ability to patch them. That process of redesign is happening now but takes time. Famous examples are Spectre/Meltdown. The internet as a whole was never designed with security or privacy in mind, so we bolt on DoH and (hopelessly) wait for DNSSEC. The big problem is inertia, cost, and perceived value. It's slowly happening.
29 • DNSSEC Security (by Otis on 2023-03-31 20:21:16 GMT from United States)
Of course it does not offer privacy for queries, but is quite robust at protecting the actual DNS responses themselves. "Privacy" is a weird goal in all this, given that we're all out there in some way or another, on or off grid.
Individual user end can do a lot in that privacy direction, of course. I honestly do not agree with that as a primary goal, because, again, do you wear a mask or other disguise when you go out in public? Why not?
YKWIM ;)
Number of Comments: 29
Display mode: DWW Only • Comments Only • Both DWW and Comments
| | |
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
• Ussye 1118 (2025-04-21): Fedora 42, strange characters in Vim, Nitrux introduces new package tools, Fedora extends reproducibility efforts, PINE64 updates multiple devices running Debian |
• Issue 1117 (2025-04-14): Shebang 25.0, EndeavourOS 2025.03.19, running applications from other distros on the desktop, Debian gets APT upgrade, Mint introduces OEM options for LMDE, postmarketOS packages GNOME 48 and COSMIC, Redox testing USB support |
• Issue 1116 (2025-04-07): The Sense HAT, Android and mobile operating systems, FreeBSD improves on laptops, openSUSE publishes many new updates, Fedora appoints new Project Leader, UBports testing VoLTE |
• Issue 1115 (2025-03-31): GrapheneOS 2025, the rise of portable package formats, MidnightBSD and openSUSE experiment with new package management features, Plank dock reborn, key infrastructure projects lose funding, postmarketOS to focus on reliability |
• Issue 1114 (2025-03-24): Bazzite 41, checking which processes are writing to disk, Rocky unveils new Hardened branch, GNOME 48 released, generating images for the Raspberry Pi |
• Issue 1113 (2025-03-17): MocaccinoOS 1.8.1, how to contribute to open source, Murena extends on-line installer, Garuda tests COSMIC edition, Ubuntu to replace coreutils with Rust alternatives, Chimera Linux drops RISC-V builds |
• Issue 1112 (2025-03-10): Solus 4.7, distros which work with Secure Boot, UBports publishes bug fix, postmarketOS considers a new name, Debian running on Android |
• Issue 1111 (2025-03-03): Orbitiny 0.01, the effect of Ubuntu Core Desktop, Gentoo offers disk images, elementary OS invites feature ideas, FreeBSD starts PinePhone Pro port, Mint warns of upcoming Firefox issue |
• Issue 1110 (2025-02-24): iodeOS 6.0, learning to program, Arch retiring old repositories, openSUSE makes progress on reproducible builds, Fedora is getting more serious about open hardware, Tails changes its install instructions to offer better privacy, Murena's de-Googled tablet goes on sale |
• Issue 1109 (2025-02-17): Rhino Linux 2025.1, MX Linux 23.5 with Xfce 4.20, replacing X.Org tools with Wayland tools, GhostBSD moving its base to FreeBSD -RELEASE, Redox stabilizes its ABI, UBports testing 24.04, Asahi changing its leadership, OBS in dispute with Fedora |
• Issue 1108 (2025-02-10): Serpent OS 0.24.6, Aurora, sharing swap between distros, Peppermint tries Void base, GTK removinglegacy technologies, Red Hat plans more AI tools for Fedora, TrueNAS merges its editions |
• Issue 1107 (2025-02-03): siduction 2024.1.0, timing tasks, Lomiri ported to postmarketOS, Alpine joins Open Collective, a new desktop for Linux called Orbitiny |
• Issue 1106 (2025-01-27): Adelie Linux 1.0 Beta 6, Pop!_OS 24.04 Alpha 5, detecting whether a process is inside a virtual machine, drawing graphics to NetBSD terminal, Nix ported to FreeBSD, GhostBSD hosting desktop conference |
• Issue 1105 (2025-01-20): CentOS 10 Stream, old Flatpak bundles in software centres, Haiku ports Iceweasel, Oracle shows off debugging tools, rsync vulnerability patched |
• Issue 1104 (2025-01-13): DAT Linux 2.0, Silly things to do with a minimal computer, Budgie prepares Wayland only releases, SteamOS coming to third-party devices, Murena upgrades its base |
• Issue 1103 (2025-01-06): elementary OS 8.0, filtering ads with Pi-hole, Debian testing its installer, Pop!_OS faces delays, Ubuntu Studio upgrades not working, Absolute discontinued |
• Issue 1102 (2024-12-23): Best distros of 2024, changing a process name, Fedora to expand Btrfs support and releases Asahi Remix 41, openSUSE patches out security sandbox and donations from Bottles while ending support for Leap 15.5 |
• Issue 1101 (2024-12-16): GhostBSD 24.10.1, sending attachments from the command line, openSUSE shows off GPU assignment tool, UBports publishes security update, Murena launches its first tablet, Xfce 4.20 released |
• Issue 1100 (2024-12-09): Oreon 9.3, differences in speed, IPFire's new appliance, Fedora Asahi Remix gets new video drivers, openSUSE Leap Micro updated, Redox OS running Redox OS |
• Issue 1099 (2024-12-02): AnduinOS 1.0.1, measuring RAM usage, SUSE continues rebranding efforts, UBports prepares for next major version, Murena offering non-NFC phone |
• Issue 1098 (2024-11-25): Linux Lite 7.2, backing up specific folders, Murena and Fairphone partner in fair trade deal, Arch installer gets new text interface, Ubuntu security tool patched |
• Issue 1097 (2024-11-18): Chimera Linux vs Chimera OS, choosing between AlmaLinux and Debian, Fedora elevates KDE spin to an edition, Fedora previews new installer, KDE testing its own distro, Qubes-style isolation coming to FreeBSD |
• Issue 1096 (2024-11-11): Bazzite 40, Playtron OS Alpha 1, Tucana Linux 3.1, detecting Screen sessions, Redox imports COSMIC software centre, FreeBSD booting on the PinePhone Pro, LXQt supports Wayland window managers |
• Issue 1095 (2024-11-04): Fedora 41 Kinoite, transferring applications between computers, openSUSE Tumbleweed receives multiple upgrades, Ubuntu testing compiler optimizations, Mint partners with Framework |
• Issue 1094 (2024-10-28): DebLight OS 1, backing up crontab, AlmaLinux introduces Litten branch, openSUSE unveils refreshed look, Ubuntu turns 20 |
• Issue 1093 (2024-10-21): Kubuntu 24.10, atomic vs immutable distributions, Debian upgrading Perl packages, UBports adding VoLTE support, Android to gain native GNU/Linux application support |
• Issue 1092 (2024-10-14): FunOS 24.04.1, a home directory inside a file, work starts of openSUSE Leap 16.0, improvements in Haiku, KDE neon upgrades its base |
• Issue 1091 (2024-10-07): Redox OS 0.9.0, Unified package management vs universal package formats, Redox begins RISC-V port, Mint polishes interface, Qubes certifies new laptop |
• Issue 1090 (2024-09-30): Rhino Linux 2024.2, commercial distros with alternative desktops, Valve seeks to improve Wayland performance, HardenedBSD parterns with Protectli, Tails merges with Tor Project, Quantum Leap partners with the FreeBSD Foundation |
• Issue 1089 (2024-09-23): Expirion 6.0, openKylin 2.0, managing configuration files, the future of Linux development, fixing bugs in Haiku, Slackware packages dracut |
• Issue 1088 (2024-09-16): PorteuX 1.6, migrating from Windows 10 to which Linux distro, making NetBSD immutable, AlmaLinux offers hardware certification, Mint updates old APT tools |
• Issue 1087 (2024-09-09): COSMIC desktop, running cron jobs at variable times, UBports highlights new apps, HardenedBSD offers work around for FreeBSD change, Debian considers how to cull old packages, systemd ported to musl |
• Issue 1086 (2024-09-02): Vanilla OS 2, command line tips for simple tasks, FreeBSD receives investment from STF, openSUSE Tumbleweed update can break network connections, Debian refreshes media |
• Issue 1085 (2024-08-26): Nobara 40, OpenMandriva 24.07 "ROME", distros which include source code, FreeBSD publishes quarterly report, Microsoft updates breaks Linux in dual-boot environments |
• Issue 1084 (2024-08-19): Liya 2.0, dual boot with encryption, Haiku introduces performance improvements, Gentoo dropping IA-64, Redcore merges major upgrade |
• Issue 1083 (2024-08-12): TrueNAS 24.04.2 "SCALE", Linux distros for smartphones, Redox OS introduces web server, PipeWire exposes battery drain on Linux, Canonical updates kernel version policy |
• Issue 1082 (2024-08-05): Linux Mint 22, taking snapshots of UFS on FreeBSD, openSUSE updates Tumbleweed and Aeon, Debian creates Tiny QA Tasks, Manjaro testing immutable images |
• Issue 1081 (2024-07-29): SysLinuxOS 12.4, OpenBSD gain hardware acceleration, Slackware changes kernel naming, Mint publishes upgrade instructions |
• Issue 1080 (2024-07-22): Running GNU/Linux on Android with Andronix, protecting network services, Solus dropping AppArmor and Snap, openSUSE Aeon Desktop gaining full disk encryption, SUSE asks openSUSE to change its branding |
• Issue 1079 (2024-07-15): Ubuntu Core 24, hiding files on Linux, Fedora dropping X11 packages on Workstation, Red Hat phasing out GRUB, new OpenSSH vulnerability, FreeBSD speeds up release cycle, UBports testing new first-run wizard |
• Issue 1078 (2024-07-08): Changing init software, server machines running desktop environments, OpenSSH vulnerability patched, Peppermint launches new edition, HardenedBSD updates ports |
• Issue 1077 (2024-07-01): The Unity and Lomiri interfaces, different distros for different tasks, Ubuntu plans to run Wayland on NVIDIA cards, openSUSE updates Leap Micro, Debian releases refreshed media, UBports gaining contact synchronisation, FreeDOS celebrates its 30th anniversary |
• Issue 1076 (2024-06-24): openSUSE 15.6, what makes Linux unique, SUSE Liberty Linux to support CentOS Linux 7, SLE receives 19 years of support, openSUSE testing Leap Micro edition |
• Issue 1075 (2024-06-17): Redox OS, X11 and Wayland on the BSDs, AlmaLinux releases Pi build, Canonical announces RISC-V laptop with Ubuntu, key changes in systemd |
• Issue 1074 (2024-06-10): Endless OS 6.0.0, distros with init diversity, Mint to filter unverified Flatpaks, Debian adds systemd-boot options, Redox adopts COSMIC desktop, OpenSSH gains new security features |
• Issue 1073 (2024-06-03): LXQt 2.0.0, an overview of Linux desktop environments, Canonical partners with Milk-V, openSUSE introduces new features in Aeon Desktop, Fedora mirrors see rise in traffic, Wayland adds OpenBSD support |
• Issue 1072 (2024-05-27): Manjaro 24.0, comparing init software, OpenBSD ports Plasma 6, Arch community debates mirror requirements, ThinOS to upgrade its FreeBSD core |
• Issue 1071 (2024-05-20): Archcraft 2024.04.06, common command line mistakes, ReactOS imports WINE improvements, Haiku makes adjusting themes easier, NetBSD takes a stand against code generated by chatbots |
• Issue 1070 (2024-05-13): Damn Small Linux 2024, hiding kernel messages during boot, Red Hat offers AI edition, new web browser for UBports, Fedora Asahi Remix 40 released, Qubes extends support for version 4.1 |
• Issue 1069 (2024-05-06): Ubuntu 24.04, installing packages in alternative locations, systemd creates sudo alternative, Mint encourages XApps collaboration, FreeBSD publishes quarterly update |
• Issue 1068 (2024-04-29): Fedora 40, transforming one distro into another, Debian elects new Project Leader, Red Hat extends support cycle, Emmabuntus adds accessibility features, Canonical's new security features |
• Issue 1067 (2024-04-22): LocalSend for transferring files, detecting supported CPU architecure levels, new visual design for APT, Fedora and openSUSE working on reproducible builds, LXQt released, AlmaLinux re-adds hardware support |
• Full list of all issues |
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Random Distribution | 
VideoLinux
VideoLinux was a PCLinuxOS-based distribution with focus on DVD backups, video encoding and transcoding, DVD authoring, format conversion and pretty much anything else you want to do with video.
Status: Discontinued
|
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
|