ftbd

joined 1 year ago
[–] ftbd@feddit.org 1 points 3 days ago

Granted. You should brush up on your tensor calculus, though.

[–] ftbd@feddit.org 1 points 3 days ago

Ich habe mir brave zugegebenermaßen nur kurz angeschaut, war aber enttäuscht dass dort irgendeine selbst entwickelte Cryptowährung gepusht wird

[–] ftbd@feddit.org 8 points 2 weeks ago (1 children)

But I think 'encrypt home directory' only encrypts your home partition, not your root partition. Not sure why many distros offer only this option in the graphical installer

[–] ftbd@feddit.org 39 points 2 weeks ago (2 children)

Du verbringst drei Wochen bei deinen Eltern? Ich würde sagen dass ich ein recht gutes Verhältnis zu meinen hab, aber nach 3-4 Tagen gehen sie mir trotzdem auf die Nerven

[–] ftbd@feddit.org 1 points 3 weeks ago (1 children)

I'd say those are deductions rather than taxes. Taxes just fill the state's budget, but are not earmarked for specific purposes the same way a car payment is.

[–] ftbd@feddit.org 6 points 4 weeks ago

Don't put your cob in that

[–] ftbd@feddit.org 4 points 4 weeks ago (1 children)

Lasst und das erstmal in einem Pilotprojekt an Politiker:innen testen. Nach 10 Jahren wird das ganze dann auf Effektivität evaluiert bevor man über die flächendeckende Implementierung nachdenkt.

[–] ftbd@feddit.org 3 points 1 month ago (1 children)

Of course this depends on your electricity cost and how well your grow is going, but it's very feasible to get below 1€/g even with artificial lighting. Depending on what you would pay otherwise, you can recoup the initial investment for equipment with the first grow.

[–] ftbd@feddit.org 6 points 1 month ago (3 children)

Almost free, too

[–] ftbd@feddit.org 16 points 1 month ago (1 children)

This is about automation, not AI. AI is just the first kind of automation that also affects knowledge workers

[–] ftbd@feddit.org 1 points 1 month ago

Natürlich braucht man seinen Körper, aber du kämpfst nicht mehr mit Schwert und Schild. Da hätte eine Frau vermutlich keine Chance, aber wenn sich zwei Personen mit Gewehr gegenüberstehen sieht das ganze schon anders aus.

[–] ftbd@feddit.org 3 points 1 month ago (3 children)

Ja, das schon. Aber ist es dann sinnvoll, diese Idee nur auf 50% der jungen Menschen anzuwenden? Militärdienst ist zwar historisch eine Männerdomäne, aber heutzutage geht es ja nicht mehr unbedingt um körperliche Überlegenheit. Um ein Gewehr halten, eine Artillerie-Kanone zu bedienen oder eine Drone zu steuern muss man doch kein Mann sein.

 

Hi everyone!

I'm in the process of finally doing containers right in my NixOS installation. This is my 'wishlist':

  • podman containers should be run by users with minimal permissions
  • separate user per container
  • containers managed by systemd services for easier management

My current work-in-progress setup looks like this:

For each service (called $name), I have:

  • a user and corresponding group (referred to as $uid in the following)
  • a directory /srv/$name owned by $uid, in which mounted volumes are located

My containers are declared like this:

virtualisation.oci-containers.containers = {
    $name = {
        image = ...;
        ports = [ ... ];
        volumes = [
            "/srv/${name}/config:/config"
            ...
        ];
        user = $uid:$gid;
        extraOptions = [
            "--security-opt=no-new-privileges:true"
        ];
    };
};

Now for the parts I don't fully understand yet:

  • some images allow setting environment.PUID to specify a user. Does setting this option (and not setting user=$uid in the container declaration itself) mean that the container will be run as root, and the program inside will merely use PUID when e.g. creating files? This would still allow a malicious container to run commands as root on the host, right?

  • virtualisation.oci-containers.containers creates a systemd service. Since this is not a user-service for my user $uid, I need sudo to start/stop the container. Does that mean that the systemd service is run with root permissions, but it executes the command to spawn the container as $uid? If whatever is running inside the container was malicious, is there a functional difference between the container being started 'by root as $uid' and it being started by me (after logging in as $uid)?

  • Is it feasible to make these systemd services user-services owned by $uid instead?

  • Are there further hardening steps I forgot about?

Thanks for your input!

view more: next ›