DistroWatch Weekly |
Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 1, value: US$20) |
|
|
|
bc1qxes3k2wq3uqzr074tkwwjmwfe63z70gwzfu4lx lnurl1dp68gurn8ghj7ampd3kx2ar0veekzar0wd5xjtnrdakj7tnhv4kxctttdehhwm30d3h82unvwqhhxarpw3jkc7tzw4ex6cfexyfua2nr 86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le paypal.me/distrowatchweekly • patreon.com/distrowatch |
|
Extended Lifecycle Support by TuxCare |
|
Reader Comments • Jump to last comment |
1 • disk encryption (by Name (mandatory) on 2024-08-19 01:24:31 GMT from United States)
I'm noob. If something goes wrong with encryption, I would not know how to help myself. Hence, my disks are not encrypted
2 • Liya (by Kilroy the Great on 2024-08-19 02:57:17 GMT from United States)
"The system is intended to be easy to use, easy to explore, and distraction-free." Would be nice to see how it compares with Endeavour, Manjaro, Garuda, or a bunch of other easy to install, easy to use, etc. Arch-based distros.
3 • Disk encryption (by Alamedated on 2024-08-19 03:04:14 GMT from United States)
I am afraid of disk encryption. My work computer encrypts the disk and it takes them about 15 minutes to boot up. It is a bit irrational that I am afraid to encrypt a disk that I don't mind wiping out.
Thank you for the poll. I am going to try disk encryption!
4 • If you use disk encryption.... (by eco2geek on 2024-08-19 03:47:18 GMT from United States)
If you use disk encryption, you need a backup in case something goes wrong.
(And do you encrypt the backup too? :-)
5 • Encryption (by Friar Tux on 2024-08-19 04:10:32 GMT from Canada)
I'm with @3 (Alamedated), though I don't actually fear encryption. I just find it way too cumbersome, irritating and lagging to deal with. I'm the only one using my laptop and no one else in the family even uses Linux (The Wife does, but I do the wrangling), so no one actually knows how to work our computers. I guess you could say, in our case, the very OS is the actual encryption. By the way, in The Wife's case, one big "plus" of switching her to Linux was that her hearing aids connected automatically, directly to her laptop, which the proprietary OS never did.
6 • Encryption (by eb on 2024-08-19 07:44:26 GMT from France)
I encrypt only some files with ccrypt ; very simple and convenient. Seldom, I need to encrypt a folder : I tar.gz it, and then I ccrypt the tar.gz
7 • encryption (by dr.j on 2024-08-19 08:07:56 GMT from Bulgaria)
I use full encryption.
Anything else makes no sense in my opinion, because even in Linux systems so much data/information is stored outside the home directory that encryption is superfluous.
And fear of encryption? Unnecessary. I've been working with it for more than two decades. Back then with the good old pgp, then truecrypt and gpg etc. I now use zulucrypt. Problems: never. There is also a backup of the header - for emergencies.
8 • DIsk Encryption (by Hellfire103 on 2024-08-19 09:29:17 GMT from Belgium)
I use full disk encryption whenever possible, whether its using LUKS, FileVault, GELI, or whatever. However, this is not yet possible on my Raspberry Pi 5, so I just use encfs to encrypt my $HOME.
9 • DIsk Encryption (by James on 2024-08-19 09:33:02 GMT from United States)
I don't use DIsk Encryption as I only use one OS on any of my three laptops and I am the only user. There is only myself and my wife, so I don't have any worries about anyone snooping either.
10 • Disk encryption (by DachshundMan on 2024-08-19 10:50:44 GMT from United Kingdom)
I don't encrypt my disk or partitions but I do use Veracrypt, a successor to Trucrypt, to store some files that I want to keep secured. I chose Veracrypt as it also works on Windows and therefore I could read my encrypted virtual disk from my corporate laptop if required.
11 • Encryption (by Jesse on 2024-08-19 10:52:22 GMT from Canada)
@3: " My work computer encrypts the disk and it takes them about 15 minutes to boot up. "
Disk encryption carries almost no performance penalty. You won't notice any slow-down from using disk encryption. Something else is very _very_ wrong with your work computer.
@4: "If you use disk encryption, you need a backup in case something goes wrong."
You should have a backup whether you encrypt or not. Accidental deletion of files or hard drive failure will ruin your day just as quickly as an encrypted partition.
12 • Encryption (by Alfonse on 2024-08-19 11:00:41 GMT from Czechia)
I use LUKS for full encryption (except for /boot).
@11 Jesse, thank you, you just spared me from answering @3 and @4. :)
By the way @4: yes, my backups themselves are encrypted, and they are made to disks which in turn are also encrypted. (LUKS+borgbackup)
13 • Liya (past) (by Nathan3 on 2024-08-19 12:33:24 GMT from United States)
I tried Liya (1. something) last summer for about three months on a Dell laptop. Clean, easy to set up and use. I used the three CLI commands after installation, not the Pamac gui process. I had no need to use the AUR. This was the only Arch or Arch based distro that got through more then three updates before getting corrupted. Others refused to advance to the login screen, refused to accept my used name or password, refused to open the browser etc. So, good memories of the previous version.
The Dell was / is a "play" laptop used to check out distros. This week, I tried Archcraft (Arch + openbox), Lilidog (Debian + openbox) and presently Linux Mint 22 "MATE" Awaiting sometime in Sept 2024 for Lilidog 2.0
My daily driver remains MX, currently version 23 XFCE but with the Cinnamon desktop on a Lenovo desktop PC. So far (more then 4 years) no reason to change from MX except to upgrade to the latest version.
14 • Liya (by TMoss on 2024-08-19 13:53:57 GMT from Belgium)
@13: I assume you meant that you got through more *than three updates (took me some time to make out the meaning of your sentence).
I had some problems until I refrained from updating with something else than pacman -Syu. From that point on, I've used and updated a couple of Manjaro installations for more than 2 years without any trouble.
15 • disk encryption (by penguinx86 on 2024-08-19 15:11:00 GMT from United States)
I don't encrypt anything. I have a handful of home computers and the rest of my family never uses them. They're too busy with their iPhones to bother with a computer that doesn't have a touchscreen.
16 • Missing information (by Martins on 2024-08-19 17:23:52 GMT from Portugal)
In your "Summary of expected upcoming releases" section, you forgot to mention the upcoming interim release of ubuntu 24.04.1 now rescheduled to 2024-08-29. It may be important for the many users of ubuntu, only this interim release will allow the use of "do-release-upgrade" for those who use older ubuntu releases.
17 • disk encryption (by IchWerSonst on 2024-08-19 18:16:11 GMT from Germany)
@6: Didn't know that one. Seems handy, like kryptor but with less functions.
To address the "naysayers". Encryption is really not that hard to cope with nowadays. If you're using a laptop or any other mobile device, encryption should be mandatory. No matter if you're the only one in your relationship/family using it. Think of theft/robbery i.e.
Some useful tools: https://www.privacyguides.org/en/encryption/
@12: Same thought. :D
18 • Encryption (by Much Derper on 2024-08-19 18:20:25 GMT from United Kingdom)
@11 > Disk encryption carries almost no performance penalty. You won't notice any slow-down from using disk encryption.
That's not an absolute, it's conditional on hardware being sufficiently new to support AES-NI or an equivalent instruction set. For people that still rock, e.g., first-gen Core i7 CPUs (like the one in the otherwise still quite usable with its 32GiB RAM and SSD ThinkPad W510 I have) disk encryption does slow down the system noticeably enough. And it not only causes the disk I/O to be slower than it would be otherwise, but it also takes away CPU cycles from the rest of the software. Still, depending on the workload the system can still remain quite usable even then.
19 • Encryption (by Jesse on 2024-08-19 20:15:20 GMT from Canada)
@18: "That's not an absolute, it's conditional on hardware being sufficiently new to support AES-NI or an equivalent instruction set. For people that still rock, e.g., first-gen Core i7 CPUs (like the one in the otherwise still quite usable with its 32GiB RAM and SSD ThinkPad W510 I have) disk encryption does slow down the system noticeably enough."
First, no you don't need a newer computer/CPU to run encrypiton without a noticeable performance penalty. Second, there must be something else affecting your machine, it's not going to be the encryption.
I can run encryption on a 15 year old laptop with a spinning drive, 4GB of RAM and i3 processor in it with no performance hit. There is no way you're seeing a slow down due to encryption on anything made in the last decade or so.
20 • Use encryption (by Simon on 2024-08-19 23:11:00 GMT from New Zealand)
As long as you’re perfectly comfortable with burglars or hackers browsing through all of your data, sharing your photos, reading your emails and using them to impersonate you, and so on and so on, it can indeed make sense to avoid encryption as it can involve a very small cost (depending on your implementation) in terms of speed and/or ease of data recovery.
On the other hand if you’re not completely comfortable with the contents of your computer being fully available to anyone who wants to use them for any purpose, it would be ridiculous not to implement something so easy and with so much flexibility (you can encrypt anything from physical drives to single files… including encrypting large single files that you can then mount as drives full of directories and data).
It’s maybe possible that the 71% of poll respondents who don’t use encryption at all genuinely don’t need it… but I bet some of them are just counting foolishly on good luck. They may regret it when their laptops are lost or stolen and they suddenly realize that their login password couldn’t stop a competent 7-year-old and their digital lives are now anyone’s for the taking. Especially if they were foolish enough to allow their browsers to save their online passwords too, on unencrypted systems that allow anyone to launch those browsers as if they were the owner! Some folk seem to go through life with an irrational “it won’t happen to me” filter: it certainly does happen, so if you don’t want it to happen to you, use encryption.
21 • encryption / paranoia (by Steve on 2024-08-20 00:13:36 GMT from New Zealand)
@20 - depends on the crime rate in your part of the Great Green Lie, aka NZ Aostealaroa.
I travelled to Africa a few years back and my laptop was encrypted - just in case, to calm the fear mongerers. I returned with the laptop, the only "feature" was I had a ridiculously slower laptop and an extra step login for that period. It got reinstalled within a week of returning.
Talking of installs. Noto. Do I need to say any more to anyone in Linuxland? Everything from LinearA and Egyptian hieroglyphs, to Mayan, and 200+ Indic fonts - FORCED IN and as a DEPENDENCY by crucial packages at the unremovable CORE of many, many distros. Gentlemen (distro makers), unless you want to see BILLING for my hours to clean up this Noto s**t, drop this dependency!! I am the ba***d who WILL come knocking at your Embassy's door, bill in hand!
22 • Encryption (by ThomasAnderson on 2024-08-20 04:27:52 GMT from Australia)
Fear is the path to the dark side. Fear leads to anger. Anger leads to hate. Hate leads to suffering.
Do not fear encrypting your drive, whether a full disk or just the home partition with LUKS, it is battle tested now for years without any issues.
The reasons why you should encrypt at the bare minimum your /home are primarily for privacy. We all have things we need to keep confidential and encryption is your friend in this regard.
Almost everyone has a mobile, which is encrypted. Do you fear having an encrypted phone? If not, why fear an encrypted drive which provides so much benefit. Even on Windows, installations are encrypted with Bitlocker, although not secure, encryption is there.
Embrace encryption. Edward Snowden warns that if your computer or laptop is stolen, “pictures, where you live, where you work, where your kids are, where you go to school” would all be accessible to a criminal.” Not to mention financial records, personal documents, potential passwords, crypto wallets etc etc.
23 • @22 Thomas Anderspn: (by dragonmouth on 2024-08-20 11:36:14 GMT from United States)
There is also paranoia which leads to hysteria.
If you feel the entire world is just itching to have a look at your files.and you MUST encrypt, have at it. I don't encrypt but then I do not keep my entire life on my computer. The things that I "need to keep confidential" are NOT on my PC. They are safely stored away.
BTW - your PC can be encrypted three ways from Sunday but there is NOTHING that you can do about personal and confidential information gathered by every institution you deal with. How many BILLIONS of records have been compromised by the breaches of such institutions? How would your fully encrypted PC prevent your private and confidential information being stolen?
24 • Encryption (by picamanic on 2024-08-20 11:39:06 GMT from United Kingdom)
OK, I am convinced by the need to encrypt more of my "home" directory. At present I just use a symmetric AES file encryption for files containing "secrets". The only complication of is that I use a semi-custom filesystem Mirror based on Lsyncd for my "home" directory. I might have to create some new software to realise this.
I am wary of encrypting the whole file system or even whole "disk". Just gut feeling.
25 • Encrypted Install Tips (by Random Experienced Void User on 2024-08-20 17:17:31 GMT from United States)
For pain-free setup, make /boot a cleartext partition, encrypt the rest. Nearly all of the supposed "pain" of encryption revolves around bootloader issues. So /boot should be cleartext ext4 minus journaling. Bye bye bootloader hassle. The /boot files are not your personal work or configs anyway. Leaving /boot as cleartext is a rational trade-off. Technically you could stash /boot on a separate USB key, just as you could a keyfile.
I never let installers partition disks, but use gdisk, and often make my own filesystems too. Installer options are too limited and outdated. Installers still enable swap needlessly. The best advise on /swap is not using it. And I *always* turn off ext4 journaling. That change makes ext4 faster and more stable. Installers don't present the option.
The minimum to encrypt: /root, /home, and /etc, which encompass $HOME, $XDG_CONFIG_HOME, and $XDG_DATA_HOME for all users. Yet encrypting everything is easier than such cherry-picking.
Backup is simple with ddrescue. Create an image of the encrypted partition on another drive. That image is equally encrypted and mountable as a filesystem. This method is neither space-efficient nor maximally fast, but trivial, and makes recovery so. To get an old file, mount the image and copy the file out. To restore in full, ddrescue the whole (unmounted) image back to the (unmounted) source partition. You can finish a full system backup (all partitions) in under an hour, give or take.
The world needs encryption more in communications. Distros should package the superb SimpleX Chat app which covers all platforms and phones. There's even an AppImage. The home page lags development, so get releases from GitHub. Currently 6.0.1 is the latest.
https://simplex.chat/ https://github.com/simplex-chat/simplex-chat/releases
RetroShare is another vastly underappreciated and also multi-mode comm app with solid encryption baked in.
26 • fixpacrepo (by Jacob Kauffmann on 2024-08-20 21:20:24 GMT from United States)
"Yes, I probably should have found the instructions to run fixpacrepo to rebuild the repos and update the GPG keys sooner than I did. And, almost certainly, an Arch devotee would have known to do it as matter of course."
While a well-versed Arch user might have known how to investigate the issue to fix manually, there is no such "fixpacrepo" command in Arch, as far as I can tell. I tried to look and see if it's an in-house Liya Linux tool, but I'm having a hard time finding any of Liya's source code.
27 • fixpacrepo (by Roger Brown on 2024-08-21 01:46:10 GMT from Australia)
@26 - Further to this topic, trying to find an easy entrance to Archlinux by installing a distro based on an Archlinux snapshot is invariably bad news due to the likely large number of updates and the possibility of package authentication issues.
Users unwilling to adopt the Archlinux manual install procedure should look for a "live" installer which will pull the latest packages.
I'd recommend either Arch's own archinstall script or the excellent Calam-Arch installer found on Sourceforge.
28 • @21 (by Simon on 2024-08-21 01:49:19 GMT from New Zealand)
A "ridiculously slower laptop" is not encryption's fault: that's just user error. If 95% of a drive's contents are files downloaded from distro servers and installed from packages then those are publicly available files so to waste time encrypting and decrypting them is more likely to be a mistake than a real need for that level of security. When it comes to encrypting all of home, that's more reasonable because a lot of data can be hiding in hidden directories that users don't know about... but users who are familiar with the contents of their home directories can usually encrypt a single secure folder and pop anything sensitive in there... it has zero impact on system performance.
As for the "Great Green Lie", you must be living in an unusually dangerous neighbourhood, or else perhaps basing your opinion on reporting (which, obviously, chases ratings with an endless parade of crime) rather than stats. New Zealand is consistently ranked as one of the safest and least corrupt nations in the world: the US, for example, has a much higher crime rate. Knowing how safe this country is relative to others doesn't change the fact that laptops are often stolen from public places, here as in other countries, desktops are occasionally stolen in burglaries, and everything on the Internet is an attack surface for people in much less safe nations (China, Nigeria, etc.) to get their hands on whatever they can.
It's not just a matter of personal privacy: anyone with clients and legal obligations to protect client data or commercially sensitive data and so on definitely needs encryption. I still think most of the people who said they're not using any encryption probably should be (or they are already, because they're just playing with Linux and are using encryption on their Windows or Mac boxes). But if you don't need it, cool: like I said, if you don't really need it then it makes sense not to use it, as things are simpler without it. Most people though, if they're using their computers in the real world, do need it and should be using it.
29 • Encryption (by Jason on 2024-08-21 03:49:25 GMT from Canada)
I am not against the idea of encrypting and I think businesses should definitely do it but for myself, I have a couple dozen computers at home and nothing on any of them is of any concern that I would be worried about it being lost or stolen, anything important is kept on removable media on multiple backups, and any serious internet usage(banking,payments,etc.)I do through secure anonymous browsing with nothing saved beyond that session so I just never seen the point in personal encrypting at home. So honestly in 24 years of linux usage I have never even once played with encryption, maybe I should try it out sometime just to have the experience with it if it ever comes up but I seriously have no opinion on the tools for it.
30 • disk encryption (by Vukota on 2024-08-21 13:15:32 GMT from Serbia)
@4: "And do you encrypt the backup too?"
Of course I do. That one is even more likely to get lost or stolen (or digged up from trash). For easy, full/partial and fast access to the backups and "refresh" I make raw file on external medium as LUKS encrypted disk with compression. I can even access that from Windows (and WSL) what other options doesn't provide.
31 • @11 Jesse, that does make me suspect drive failure or a bad drive connection (by RJA on 2024-08-21 13:20:48 GMT from United States)
That's likely a bad drive, indeed. Or the drive connection is bad, causing the OS to be in PIO mode! PIO mode=They will be lucky to get 5 MB/s-7 MB/s!
32 • Package Cache + Be Worried Already (by Random Experienced Void User on 2024-08-21 19:40:12 GMT from United States)
@28 @29 "...files downloaded from distro servers...are publicly available...so to waste time encrypting and decrypting them is...a mistake [not] security."
Fair point. Now carry that thought to its logical conclusion: package cache belongs in tmpfs regardless of encryption. Putting it on disk at all is bad engineering. You want performance? Then why write packages to disk at all? Keep them in RAM, where they were first downloaded anyway, use them from RAM, and delete them from RAM. They are deadweight after installation. Save disk write time and space! RAM is 100x faster and erases itself at shutdown. Most distros have an env var to set cache location. It should be tmpfs by default. All distros would boost performance and free disk space with this change.
The encryption story changes after installation. Once the package is installed and running, configuration files hold sensitive data. Even library files, with the right network hack, evil maid, or government backdoor, could be compromised. Think about replacing glibc with a backdoored version. Nobody steals your laptop. Someone just inserts a USB key and copies a file to it while you took a bathroom break at the airport. The attack comes over the Internet weeks later. Or the enemy might be your kid's school chum doing it in your own house. Your lack of encryption enabled this attack.
Official packages are threats too! Recently the humble xz compression library was caught. Heartbleed lived in the SSL lib. Online banking activity was wide open. Anyone with 5ki11z could have written JavaScript to read your disk through an "secure" website. Lately the entire US Social Security database was lifted. Ransomware is everywhere. Threats exist whether you imagine yourself living with safe people, or on safe property, or not. Assuming that you know in advance what form and fashion future attacks will take is hubris.
Businesses have this hubris in spades and are dumb as rocks. Few have security oversight officers. People don't want to bother. They want an easy-peasy, unencrypted, "paperless" work life. I once contracted with a European concern. It asked me to scan and transmit official IDs and bank statements as image attachments to e-mail. I told them that request was extremely stupid and no, I would not do it. That set of files is everything a thief needs to rob me blind. I would mail paper copies. Businesses want to go "paperless" and think it's very clever and efficient and hip. Sensitive document scans, whether sitting on disk or transmitted, need encryption.
Those afraid of OS disk encryption might want to use Tomb for sensitive files or current work. The latest Tomb is 2.11, Void is at 2.10, Debian stable at 2.9, Debian sid at 2.11. https://dyne.org/tomb/
33 • Packages (by Jesse on 2024-08-21 20:19:21 GMT from Canada)
@32: "Now carry that thought to its logical conclusion: package cache belongs in tmpfs regardless of encryption."
This isn't a good idea as it means you can't access/use the packages later if you want them. For example, to re-install or downgrade a package. You'd need to fetch them over again, which is going to be a problem if an update broke your network connection.
"You want performance? Then why write packages to disk at all? Keep them in RAM, where they were first downloaded anyway, use them from RAM, and delete them from RAM."
This already happens automatically. Files downloaded and saved to the disk are cached in memory. It doesn't speed up anything to put the files in tmpfs because they're already cached. Writing to the disk just saves the packages for later use/querying.
"All distros would boost performance and free disk space with this change."
They'd save a few megabytes of disk space, which no one is going to notice. But there wouldn't be any performance boost due to the caching in RAM.
34 • Liya 2.0 (by zephyr on 2024-08-21 21:32:29 GMT from United States)
Installed Liya, found it to be attractive and easy to use distro. Found none of the issues Jeff Siegel mentions. Install was great, update and added extra apps with pamac. No issues what so ever and now day 3 as a daily driver. I like it.
35 • Disk encryption for laptops requiered (by Sebastien on 2024-08-21 22:07:15 GMT from France)
@9: here all laptops of the family have disk encryption activated. Because one can always be stolen, whether you bring it outside the house or not. Loosing your favorite device would be already a bad experience you would not want your sensitive data to leek as well, this would be even worst.
36 • Encryption (by Josh on 2024-08-21 23:51:20 GMT from Spain)
Encryption is the bare minimum, all phones use it in user data, an computer without encryption is basically open for anybody who plug something. The idea that anyone should just disclose everything is bonkers made by social media.
37 • Package Fallback Trope (by Random Experienced Void User on 2024-08-22 00:17:15 GMT from United States)
@33 Hi Jessie, I've run this way for years on multiple distros. I never need to fallback to some old version. It's a trope in my opinion as a software engineer. I don't know why so many devs are stuck on the idea. Maybe your personal use case as a regular distro tester is unique.
Caching in tmpfs does not happen automatically. If you mean disk cache, yes hard drives have that, and SSDs are another ball of wax. Eventually there is a physical write to physical disk media (and SSD writes are notoriously slow compared to HDD platters). If you mean RAM cache related to the file system, it's exactly the same story. Eventually a disk write (flush) happens. Only if you tell the distro to *store* packages in tmpfs will you avoid disk writes to actual media.
And unattended cache can easily eat gigabytes. The typical n00b will never clean it. I have in the past found myself shocked at the wasted space on my own systems.
Even as a software engineer who distrohops and runs Ventoy I have never, repeat never, not once, *ever* needed to fall back to an old version of *anything*. If that need occurs, the upstream distro itself reverts users to the old version via the package manager. It has happened e.g. in Void with the recent xz fiasco.
Ultimately one can carry the off Internet logic to its own conclusion too. If lack of Internet is anticipated, one should maintain a full rsync copy of the entire distro repo. You know, all 2 terabytes. After all, you never know what app you might want to install when your Internet is off. These hypotheticals get silly. In practice nobody needs a package cache on disk. It's bad engineering these days. When RAM was small things were different, and that was also when we still needed swap.
38 • File encryption (by Rothingham Coyle on 2024-08-22 05:38:12 GMT from United States)
I write my own encryption software, my own algorithms, and use it extensively to encrypt any and all of my sensitive files. That way I know for certain that I'm not using tools that contain trap doors, have been cracked or otherwise compromised. I won't divulge my methodology but I do encourage others to use home grown encryption to secure their really sensitive data.
39 • re: File encryption (by picamanic on 2024-08-22 09:04:32 GMT from United Kingdom)
@38: Just out of interest, does your encryption software depend on being itself secret, or could you publish it?
40 • Filw encryption (by Rothingham Coyle on 2024-08-22 11:24:22 GMT from United States)
It depends heavily on being itself secret. I keep the source code locked in my safety deposit box and the executable I keep on a usb memory chip so that it only gets exposed to my operating system whenever I have to use it.
41 • @37 (by Jürgen on 2024-08-22 12:04:05 GMT from Czechia)
@37 Sorry, but you're full of fallacies *and* confidence, which makes for false statements and a terrible "community experience".
You appeal to your supposed authority, namely to your supposed experience[d user] and software engineer status. Appeal to authority is a common fallacy, yet you consistently do it, which is just all the more proof that your supposed labels mean nothing. It's also funny how you, a supposed software engineer don't know what caching Jesse was referring to, or at least you pretend not to understand it.
> I never need to [...] in my opinion as a software engineer. I don't know why [...] Maybe your personal use case as a regular distro tester is unique.
Your ignorance and faulty thought process shine here. You call out Jesse for mentioning his own use-case, while you keep referring to your use-case as if it mattered anything *in general*. It doesn't. And if it did, so did Jesse's. (Also, look up the Linux-related software Jess has or is maintaining, compare that to your "experience", and then decide who has more "authority" to make fact-based statements in these topics.)
It's also funny you try to justify your *opinion* with your recurring label ("software engineer"). No offense, but what kind of engineer does that? =)The "I don't know why" and the "maybe" also speak for themselves, you seem to have only ideas, but little relevant knowledge in the field.
> and SSD writes are notoriously slow compared to HDD platters
I must have misunderstood you, but it seems you think SSDs are slower than traditional HDDs. Is that what you meant?
> And unattended cache can easily eat gigabytes.
For which there is at least an order of magnitude more space on the hard drive than in memory. Not everyone has your fancy "software engineer" machine with zettabytes of memory, especially not people with "older hardware". Also, the RAM being much smaller than the hard-drive means the RAM will fill up much faster (with your idea of caching everything there), which just defeats the (/your) whole purpose.
> Even as a software engineer [..] I have never, repeat never, not once, *ever* needed to
Again, appeal to authority, and appeal to your own needs as if it were the needs of others or as if they proved any technical point. (They aren't and they don't.)
> Ultimately one can carry the off Internet logic
Slippery slope "argument"; apparently you still lack any real arguments.
> one should maintain a full rsync copy of the entire distro repo. You know, all 2 terabytes.
Not even close. You would need a basic set of packages, including drivers for our hardware. Most of the popular disrtibutions provide them on their live discs, and if not, you could just download them and write them to a USB key. Again, you make faulty and ridiculous statements to try and prove your point, but again, it shows your ignorance and faulty thinking.
> These hypotheticals get silly.
Your hypotheticals get silly. Also, labelling legit concerns as "hypotheticals" is not an argument.
> In practice nobody needs a package cache on disk.
"In practice" means "some (maybe many) people do, but I want you to forget that, because that would reveal I'm wrong". Also, you forgot to prove your statement.
> It's bad engineering these days.
Except when it isn't. Hard disk space is way cheaper (and therefore way more plentiful) than RAM, therefore it makes sense to use it for caching the latest version of any installed packages, because the cost is so little. With companies with their own package caches/proxies, it is almost mandatory. (Red Hat Satellite comes to mind.) By the way, while it's anecdotal, my Mint install seems to only store a single deb package in the cache right now, so I wonder how many desktop distros cahce packages these days. If not many, then your assumption about disks getting full is even less likely; if many of them, your argument about no one needing it is false. :)
Also "bad engineering" is silly coming from an "engineer" with incredulously faulty thinking, wrong assumptions, false statements, statements without proof, appealing to authority, using anecdotal "evidence" and an insufferable amount of ego. Please, less hubris, more facts, more logic. (If you won't stop making yourself look bad, please at least stop engineers look bad.)
42 • Cache (by Jesse on 2024-08-22 12:36:55 GMT from Canada)
@37: " I never need to fallback to some old version. It's a trope in my opinion as a software engineer. "
So because you don't use a feature in your job you feel it's not a feature anyone would use in any job? That seems a bit narrow in focus. I can tell you, as a system administrator, it's often handy to be able to rollback packages. Perhaps broadening your view to what other people want/need would shine light on what features make sense in a distribution.
"Maybe your personal use case as a regular distro tester is unique."
Do you think my entire career in IT for the past 25 years has just been reviewing a new distro every week?
"Caching in tmpfs does not happen automatically. If you mean disk cache, yes hard drives have that, and SSDs are another ball of wax."
I'm not talking about using tmpfs or disk cache. I'm talking about how all files the operating system accesses (downloads or reads) are kept in memory. All the files you open (or download) are kept in RAM. tmpfs for files you plan to just download and access once is redundant.
"If you mean RAM cache related to the file system, it's exactly the same story. Eventually a disk write (flush) happens. Only if you tell the distro to *store* packages in tmpfs will you avoid disk writes to actual media."
Yes, eventually the package gets written to the disk, but that's not a problem. The disk won't be the bottleneck when downloading new software and updates, the network connection will be. Also, you're going to end up writing to the disk eventually when you install the package (probably to /usr or /opt). One way or another, data is going to end up on the disk. tmpfs just adds an extra step you don't need to set up due to automatic RAM caching.
"And unattended cache can easily eat gigabytes."
Modern drives are in the range of 500GB to 8TB. You can easily update a distribution for years without ever noticing the few GB of space that might get consumed.
"Even as a software engineer who distrohops and runs Ventoy I have never, repeat never, not once, *ever* needed to fall back to an old version of *anything*."
Again, you're assuming your needs and experiences match everyone else's. But we have different jobs. Your needs are not my needs and vice versa.
"Ultimately one can carry the off Internet logic to its own conclusion too. If lack of Internet is anticipated, one should maintain a full rsync copy of the entire distro repo. You know, all 2 terabytes. After all, you never know what app you might want to install when your Internet is off."
Now you're just being silly. I pointed out it's possible to have one key package break during an update (like Network Manager) and it's handy in those cases to be able to revert from the cache immediately, instead of re-fetching the package on another machine or recovering using live media. Can you think of a better/faster way to recover than having the last version in the cache?
"These hypotheticals get silly."
Your extreme version of caching the entire repo, instead of just packages the system is actually using is certainly silly. Why would anyone cache packages that aren't installed?
"In practice nobody needs a package cache on disk"
This is factually wrong. Lots of people do. It's just _you_ don't and you don't acknowledge the use cases of others.
43 • encryption? Yes, pleas... (by tom joad on 2024-08-22 20:59:52 GMT from United States)
I am shocked.
Only 14%, as of this writing, use full disk encryption.
I spend a lot of time on the road and in public facilities. I am on the go all the time.
Several year ago i started encryping. First my laptop. Later, I encrypted my hope tower. And since then I have moved on to encryping USB drives. And I encrypt my frequent back up also. Lastly I have added encrypted cloud storage.
Sorry to disappoint you; I am really just an average Joe. But my stuff is MY stuff and I fully intend to keep it my stuff.
I find it equally shocking that 75% of the respondents don't encrypt anything. I wish them the best and maybe where they are there just isn't a need for encryption. I wish I lived there. But I live in 'realville.' In realville we have to have our dukes up. My world is full of a lot of bad actors who daily seem to be ever more intent of getting at our stuff.
And I am ever more intent on keeping those bad actors at bay.
Lastly my question to the 75% who encrypt nothing why bother with passwords, anti viruses, etc.? Why lock your doors at night or any time for that matter? Just leave the keys in the ignition too. Let folks rummage through your purse too and leave your wallet on the bar while you to go to the bathroom.
Think!!!!!
44 • nocrypt. (by Jack Byus on 2024-08-22 22:45:11 GMT from United States)
As always, the minority speak the loudest. For the rest of us 75%, we just smile and move on. I have never nor will I ever encrypt. Simple as that. What are they going to find; an operating system, some useless text files. My important stuff is kept off-line.
45 • nocrypt two (@44) (by Kilroy the Great on 2024-08-23 02:33:57 GMT from United States)
I spent some years looking at other people's computers. The stuff people keep on their hard drives is mind-boggling. Never mind hacking or stealing passwords, I could have had a tidy blackmailing side-gig. Unfortunately, I didn't get Hunter's laptop, or I could be set for life. Of course, drive encryption would not have helped in those cases, since I needed access to the systems to do the job. File encryption, maybe. So, do I encrypt? Not really. Like @44, anything I wouldn't want my saintly mother or my enemies (if any) to see is off my computers.
Traveling with secrets? Encrypt the files if you must. Put them on the cloud. Access and decrypt at your destination. Home burglars want to sell your computer quickly, not spend time trying to find your porn. Hackers have easier and more effective ways of getting what they want. Unless you're a government or corporate minion privy to important secrets, no one really wants your stuff so badly. I've been all over the world, including some unsavory places. As the man who jumped off the Empire State building said when passing the 50th floor: So far, so good.
46 • @43 Tom Joad: (by dragonmouth on 2024-08-23 10:39:14 GMT from United States)
If we followed your reductio ad absurdum, we would all live in concrete bunkers with 2 foot thick walls and 2 inch bars on gun-slit windows, the whole bunker surrounded by razor wire and mine fields. There is caution and then there is hysteria.
47 • ZFS encryption (by Dave on 2024-08-23 13:05:53 GMT from Australia)
I use ZFS to encrypt the whole disk - well partition - gotta have uefi partition.
One reason is it's so much simpler. A file system on a partition.
As opposed to a disk, with partitions, with lvm, with luks, with a file system all stacked on top of each other 🫤
48 • @47 - thanks for the reminder (by Brad on 2024-08-26 00:13:38 GMT from United States)
Late to the party, I know -
Based on the ZFS recommendation above, I decided to re-visit an old friend - NomadBSD.
It worked even better than the last time I tried it, and it is now residing on my "play" laptop. I've been learning how to use ZFS, and it's been a revelation. I may be a noob, but it seems as though ZFS encryption may be the solution that some folks seek for keeping their data secure.
UNIX was actually my first "serious" OS (4.2 BSD, back in the days of ARPAnet), and I'm starting to see its advantages over Linux-of-the-day.
BSD's actually work on my laptop with wireless out-of-the-box now! There are still issues with incorrect or sparse documentation for the "derivatives", but the FreeBSD handbook has saved me more than once today. This may become my daily driver soon.
Number of Comments: 48
Display mode: DWW Only • Comments Only • Both DWW and Comments
| | |
TUXEDO |
TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
• Issue 1087 (2024-09-09): COSMIC desktop, running cron jobs at variable times, UBports highlights new apps, HardenedBSD offers work around for FreeBSD change, Debian considers how to cull old packages, systemd ported to musl |
• Issue 1086 (2024-09-02): Vanilla OS 2, command line tips for simple tasks, FreeBSD receives investment from STF, openSUSE Tumbleweed update can break network connections, Debian refreshes media |
• Issue 1085 (2024-08-26): Nobara 40, OpenMandriva 24.07 "ROME", distros which include source code, FreeBSD publishes quarterly report, Microsoft updates breaks Linux in dual-boot environments |
• Issue 1084 (2024-08-19): Liya 2.0, dual boot with encryption, Haiku introduces performance improvements, Gentoo dropping IA-64, Redcore merges major upgrade |
• Issue 1083 (2024-08-12): TrueNAS 24.04.2 "SCALE", Linux distros for smartphones, Redox OS introduces web server, PipeWire exposes battery drain on Linux, Canonical updates kernel version policy |
• Issue 1082 (2024-08-05): Linux Mint 22, taking snapshots of UFS on FreeBSD, openSUSE updates Tumbleweed and Aeon, Debian creates Tiny QA Tasks, Manjaro testing immutable images |
• Issue 1081 (2024-07-29): SysLinuxOS 12.4, OpenBSD gain hardware acceleration, Slackware changes kernel naming, Mint publishes upgrade instructions |
• Issue 1080 (2024-07-22): Running GNU/Linux on Android with Andronix, protecting network services, Solus dropping AppArmor and Snap, openSUSE Aeon Desktop gaining full disk encryption, SUSE asks openSUSE to change its branding |
• Issue 1079 (2024-07-15): Ubuntu Core 24, hiding files on Linux, Fedora dropping X11 packages on Workstation, Red Hat phasing out GRUB, new OpenSSH vulnerability, FreeBSD speeds up release cycle, UBports testing new first-run wizard |
• Issue 1078 (2024-07-08): Changing init software, server machines running desktop environments, OpenSSH vulnerability patched, Peppermint launches new edition, HardenedBSD updates ports |
• Issue 1077 (2024-07-01): The Unity and Lomiri interfaces, different distros for different tasks, Ubuntu plans to run Wayland on NVIDIA cards, openSUSE updates Leap Micro, Debian releases refreshed media, UBports gaining contact synchronisation, FreeDOS celebrates its 30th anniversary |
• Issue 1076 (2024-06-24): openSUSE 15.6, what makes Linux unique, SUSE Liberty Linux to support CentOS Linux 7, SLE receives 19 years of support, openSUSE testing Leap Micro edition |
• Issue 1075 (2024-06-17): Redox OS, X11 and Wayland on the BSDs, AlmaLinux releases Pi build, Canonical announces RISC-V laptop with Ubuntu, key changes in systemd |
• Issue 1074 (2024-06-10): Endless OS 6.0.0, distros with init diversity, Mint to filter unverified Flatpaks, Debian adds systemd-boot options, Redox adopts COSMIC desktop, OpenSSH gains new security features |
• Issue 1073 (2024-06-03): LXQt 2.0.0, an overview of Linux desktop environments, Canonical partners with Milk-V, openSUSE introduces new features in Aeon Desktop, Fedora mirrors see rise in traffic, Wayland adds OpenBSD support |
• Issue 1072 (2024-05-27): Manjaro 24.0, comparing init software, OpenBSD ports Plasma 6, Arch community debates mirror requirements, ThinOS to upgrade its FreeBSD core |
• Issue 1071 (2024-05-20): Archcraft 2024.04.06, common command line mistakes, ReactOS imports WINE improvements, Haiku makes adjusting themes easier, NetBSD takes a stand against code generated by chatbots |
• Issue 1070 (2024-05-13): Damn Small Linux 2024, hiding kernel messages during boot, Red Hat offers AI edition, new web browser for UBports, Fedora Asahi Remix 40 released, Qubes extends support for version 4.1 |
• Issue 1069 (2024-05-06): Ubuntu 24.04, installing packages in alternative locations, systemd creates sudo alternative, Mint encourages XApps collaboration, FreeBSD publishes quarterly update |
• Issue 1068 (2024-04-29): Fedora 40, transforming one distro into another, Debian elects new Project Leader, Red Hat extends support cycle, Emmabuntus adds accessibility features, Canonical's new security features |
• Issue 1067 (2024-04-22): LocalSend for transferring files, detecting supported CPU architecure levels, new visual design for APT, Fedora and openSUSE working on reproducible builds, LXQt released, AlmaLinux re-adds hardware support |
• Issue 1066 (2024-04-15): Fun projects to do with the Raspberry Pi and PinePhone, installing new software on fixed-release distributions, improving GNOME Terminal performance, Mint testing new repository mirrors, Gentoo becomes a Software In the Public Interest project |
• Issue 1065 (2024-04-08): Dr.Parted Live 24.03, answering questions about the xz exploit, Linux Mint to ship HWE kernel, AlmaLinux patches flaw ahead of upstream Red Hat, Calculate changes release model |
• Issue 1064 (2024-04-01): NixOS 23.11, the status of Hurd, liblzma compromised upstream, FreeBSD Foundation focuses on improving wireless networking, Ubuntu Pro offers 12 years of support |
• Issue 1063 (2024-03-25): Redcore Linux 2401, how slowly can a rolling release update, Debian starts new Project Leader election, Red Hat creating new NVIDIA driver, Snap store hit with more malware |
• Issue 1062 (2024-03-18): KDE neon 20240304, changing file permissions, Canonical turns 20, Pop!_OS creates new software centre, openSUSE packages Plasma 6 |
• Issue 1061 (2024-03-11): Using a PinePhone as a workstation, restarting background services on a schedule, NixBSD ports Nix to FreeBSD, Fedora packaging COSMIC, postmarketOS to adopt systemd, Linux Mint replacing HexChat |
• Issue 1060 (2024-03-04): AV Linux MX-23.1, bootstrapping a network connection, key OpenBSD features, Qubes certifies new hardware, LXQt and Plasma migrate to Qt 6 |
• Issue 1059 (2024-02-26): Warp Terminal, navigating manual pages, malware found in the Snap store, Red Hat considering CPU requirement update, UBports organizes ongoing work |
• Issue 1058 (2024-02-19): Drauger OS 7.6, how much disk space to allocate, System76 prepares to launch COSMIC desktop, UBports changes its version scheme, TrueNAS to offer faster deduplication |
• Issue 1057 (2024-02-12): Adelie Linux 1.0 Beta, rolling release vs fixed for a smoother experience, Debian working on 2038 bug, elementary OS to split applications from base system updates, Fedora announces Atomic Desktops |
• Issue 1056 (2024-02-05): wattOS R13, the various write speeds of ISO writing tools, DSL returns, Mint faces Wayland challenges, HardenedBSD blocks foreign USB devices, Gentoo publishes new repository, Linux distros patch glibc flaw |
• Issue 1055 (2024-01-29): CNIX OS 231204, distributions patching packages the most, Gentoo team presents ongoing work, UBports introduces connectivity and battery improvements, interview with Haiku developer |
• Issue 1054 (2024-01-22): Solus 4.5, comparing dd and cp when writing ISO files, openSUSE plans new major Leap version, XeroLinux shutting down, HardenedBSD changes its build schedule |
• Issue 1053 (2024-01-15): Linux AI voice assistants, some distributions running hotter than others, UBports talks about coming changes, Qubes certifies StarBook laptops, Asahi Linux improves energy savings |
• Issue 1052 (2024-01-08): OpenMandriva Lx 5.0, keeping shell commands running when theterminal closes, Mint upgrades Edge kernel, Vanilla OS plans big changes, Canonical working to make Snap more cross-platform |
• Issue 1051 (2024-01-01): Favourite distros of 2023, reloading shell settings, Asahi Linux releases Fedora remix, Gentoo offers binary packages, openSUSE provides full disk encryption |
• Issue 1050 (2023-12-18): rlxos 2023.11, renaming files and opening terminal windows in specific directories, TrueNAS publishes ZFS fixes, Debian publishes delayed install media, Haiku polishes desktop experience |
• Issue 1049 (2023-12-11): Lernstick 12, alternatives to WINE, openSUSE updates its branding, Mint unveils new features, Lubuntu team plans for 24.04 |
• Issue 1048 (2023-12-04): openSUSE MicroOS, the transition from X11 to Wayland, Red Hat phasing out X11 packages, UBports making mobile development easier |
• Issue 1047 (2023-11-27): GhostBSD 23.10.1, Why Linux uses swap when memory is free, Ubuntu Budgie may benefit from Wayland work in Xfce, early issues with FreeBSD 14.0 |
• Issue 1046 (2023-11-20): Slackel 7.7 "Openbox", restricting CPU usage, Haiku improves font handling and software centre performance, Canonical launches MicroCloud |
• Issue 1045 (2023-11-13): Fedora 39, how to trust software packages, ReactOS booting with UEFI, elementary OS plans to default to Wayland, Mir gaining ability to split work across video cards |
• Issue 1044 (2023-11-06): Porteus 5.01, disabling IPv6, applications unique to a Linux distro, Linux merges bcachefs, OpenELA makes source packages available |
• Issue 1043 (2023-10-30): Murena Two with privacy switches, where old files go when packages are updated, UBports on Volla phones, Mint testing Cinnamon on Wayland, Peppermint releases ARM build |
• Issue 1042 (2023-10-23): Ubuntu Cinnamon compared with Linux Mint, extending battery life on Linux, Debian resumes /usr merge, Canonical publishes fixed install media |
• Issue 1041 (2023-10-16): FydeOS 17.0, Dr.Parted 23.09, changing UIDs, Fedora partners with Slimbook, GNOME phasing out X11 sessions, Ubuntu revokes 23.10 install media |
• Issue 1040 (2023-10-09): CROWZ 5.0, changing the location of default directories, Linux Mint updates its Edge edition, Murena crowdfunding new privacy phone, Debian publishes new install media |
• Issue 1039 (2023-10-02): Zenwalk Current, finding the duration of media files, Peppermint OS tries out new edition, COSMIC gains new features, Canonical reports on security incident in Snap store |
• Issue 1038 (2023-09-25): Mageia 9, trouble-shooting launchers, running desktop Linux in the cloud, New documentation for Nix, Linux phasing out ReiserFS, GNU celebrates 40 years |
• Issue 1037 (2023-09-18): Bodhi Linux 7.0.0, finding specific distros and unified package managemnt, Zevenet replaced by two new forks, openSUSE introduces Slowroll branch, Fedora considering dropping Plasma X11 session |
• Issue 1036 (2023-09-11): SDesk 2023.08.12, hiding command line passwords, openSUSE shares contributor survery results, Ubuntu plans seamless disk encryption, GNOME 45 to break extension compatibility |
• Issue 1035 (2023-09-04): Debian GNU/Hurd 2023, PCLinuxOS 2023.07, do home users need a firewall, AlmaLinux introduces new repositories, Rocky Linux commits to RHEL compatibility, NetBSD machine runs unattended for nine years, Armbian runs wallpaper contest |
• Issue 1034 (2023-08-28): Void 20230628, types of memory usage, FreeBSD receives port of Linux NVIDIA driver, Fedora plans improved theme handling for Qt applications, Canonical's plans for Ubuntu |
• Issue 1033 (2023-08-21): MiniOS 20230606, system user accounts, how Red Hat clones are moving forward, Haiku improves WINE performance, Debian turns 30 |
• Full list of all issues |
Star Labs |
Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Random Distribution |
ESUN Linux
ESUN Linux was an Ubuntu-based distribution containing free software for enterprise management. Developed at the University of Tarapaca in Chile, the project's goal was to deliver a new alternative to students, teachers and the community at large. The distribution includes software for enterprise resource planning (ERP), customer relationship management (CRM), project management, accounting, electronic commerce, human resources, office and database.
Status: Discontinued
|
TUXEDO |
TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Star Labs |
Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
|