

I honestly dont know, I never use twitch. I use the add-on Libredirect to auto use alternative frontends.
I’m the Never Ending Pie Throwing Robot, aka NEPTR.
Linux enthusiast, programmer, and privacy advocate. I’m nearly done with an IT Security degree.
TL;DR I am a nerd.
I honestly dont know, I never use twitch. I use the add-on Libredirect to auto use alternative frontends.
Idk if it is related but I found that my LCD monitor dims through the GNOME setting, but just not my OLED.
Yes there are. Actually quite a lot. They hate it because it isn’t a perfect solution in every single case that X.Org provided but ignore the long history of vulnerabilities, bugs, and cursed workarounds present in X.Org. it is getting harder for them to hate though as most of the pain points (eg. color management and global shortcuts) are part of the standard now.
Sadly it only works on Google Pixel. I’d recommend LineageOS, but the images aren’t signed so you can’t lock the bootloader.
eOS is just Android, so Android apps work.
That aside, eOS has a history of being often behind on security patches and updates, so it is highly recommend to avoid it.
I highly recommend openSUSE Tumbleweed (or Slowroll). It is a rock-solid rolling-release where most things can be done from the YaST GUI. The installer is very granular, you can pick and choose based on groups of programs (like internet, office, desktop environment, etc) or individual packages (in advanced mode).
It has never broke on me and I have used it on and off for several years now. I like to tinker so I often do reinstalls of other distros when I break them but never needed to with Tumbleweed.
It is modern but not unfamiliar, rolling but not unstable, granular but not overwhelming (imho).
If rolling-release isn’t your thing there is also openSUSE Slowroll which does updates monthly (apart from security updates which are back ported)
Even if you don’t pick Tumbleweed, there are plenty of good options. Rapid fire I’ll recommend some others.
Fedora Workstation: my next favorite distros for many of the same reasons as Tumbleweed, semi-rolling and major updates every 6 months, but no YaST or granular installer. It uses GNOME desktop environment.
Fedora Atomic: pretty much Fedora Workstation but more stable because the root filesystem is read-only and updates are pushed as an OCI image. You can still install anything supported by Fedora.
Universal Blue: Modified versions of Fedora Atomic which aim to be much more user-friendly and preconfigured out of the box. I recommend them over Fedora Atomic vanilla images. Bazzite is my recommendation for any gamer on Linux (though most distros work).
If you want to have a good experience on Linux, avoid perpetually out of date distros like Debian/Ubuntu and their derivatives. Linux game support is always improving, same thing with basically everything, so dont kneecap yourself with slow/stable release distros.
Sad but understandable. I saw the donation button but I don’t have spare money atm.
It might have been your DNS that was identified? It depends on whether you enabled proxy DNS for SOCKS5.
For best fingerprinting protection, use either:
Avoid using Tor with a normal browser because you will stick out like a sore thumb.
I personally like flatpak and its build system. Flatpak applications are sandboxed by default and don’t require root during any part of installation, reducing the risk of malicious/broken software damaging the host. They also are available for basically any base distro, meaning i can use the same apps if a ever distrohop and i can even just copy over the config folders as if nothing happened.
It’s a panel of tests for browsers. It isn’t the clearest what each mean (without doing a little research) and not all categories and subcategories have equal importance. I still like this website though just for the listed information.
Thanks for the rant, I liked your write-up.
I think it may also help some people to create simple decision flowcharts to help with acting consistent and avoid making simple mistakes with a complex threat model. Basically a scenario and the decision tree. Say for example someone is using QubesOS and needs to keep consistent what each qube is for and why.
Of course creating charts that show your strategy and make your decision predictable is itself just even more privileged information you now need to protect.
Also, any effective threat model also requires consistent reevaluation to assess the effectiveness of your methods and adjust with the evolution of threats.
No
/jk obvi I like Python
It really isnt any defense. All a website can do is initiate a download, websites are sandboxed by default. You still have to run the executable, which doesnt really apply to Linux because the file will have no executable permission.
This made me immediately think of how old American homes in the back of the mirror cabinet of the bathroom just had a slot that fed into the space between the drywall so you could through your razerblades away. Good luck to the renovators in 50 years when they need to remove that drywall and pick up a thousand rusty butterfly-style razerblades. Can’t throw those suckers in a plastic trashbag either cus it’ll cut right through.
Yeah okay.
My logic was that it is much more likely that someone will spoof there useragent already if they are on Linux. If threat actor is targeting not just Windows but also Linux, they probably would understand the very real likelyhood of platform spoofing.
That isnt a great defense against malware “imho”. Security through assuming the threat actor is lazy is just not security. It doesnt take like any effort on their part to just use some off-the-shelf OS fingerprinting code. It isnt worth it either because it contributes to your overall fingerprint, since normal RFP users have a standardized useragent for Windows and Linux separately.
WEAK. WASTE 17HRS AND UNCOUNTABLE AMOUNTS OF DATA BY FUCKING AROUND. 40 BILLION SUCH CASES!