Top
Best
New

Posted by psxuaw 18 hours ago

Maybe you shouldn't install new software for a bit(xeiaso.net)
729 points | 390 commentspage 7
throwaway613746 17 hours ago|
[dead]
Luker88 8 hours ago||
Dammit, this is why nobody uses NixOS. Nothing works on it!

The copyFail didn't, the dirtyfrag doesn't.

This copfail2 does modify /etc/passwd, but I can't `su - sick` as expected.

/s

Luker88 8 hours ago|
sligtly unrelated, but the portable way to execute stuff is via `/usr/bin/env`, not `/bin/bash`.

I did try fixing the path to use nixos paths, but it was still unsuccessful. Did not really check further.

cyanydeez 17 hours ago||
[flagged]
_--__--__ 17 hours ago||
? This is related to a vulnerability that was introduced to the Linux kernel in 2017.
ChrisClark 17 hours ago||
What?
infrapilot 15 hours ago||
[flagged]
infrapilot 15 hours ago||
[flagged]
arc-in-space 7 hours ago|
Blatant bot
foo12bar 14 hours ago||
Don't install anything, use an LLM to write everything from scratch. It may have bugs, but no one will know how to exploit them, especially when closed source.

Code is cheap and is becoming cheaper by the day. We need new paradigms.

Wilder7977 11 hours ago||
So no external libraries for anything? Billions of lines of code that duplicate the same thing n-times across an organization?

And the benefit is the obscurity of "no one will know how to exploit them"?

No, thanks.

foo12bar 6 hours ago||
Code is becoming so cheap that all you need is a bunch of api's for hardware and your computer will build to that spec. And you can define it in natural language.
Gigachad 12 hours ago|||
LLMs have been used to scan binary blobs for exploits already. What would be more effective is a system designed with multiple layers of security so any one exploit is largely useless.
foo12bar 6 hours ago||
They would have to have access to and scan your individual binary. You'd have to describe how you can write a system with multiple layers of security generally for most problems, because I don't see that as being possible.
randyrand 14 hours ago||
Next: the back doors are written by the LLM!
foo12bar 6 hours ago||
You think we are doing well against back doors right now? Pfft.
mistyvales 16 hours ago|
Fedora upgrades have usually been great, but I jumped the gun on Fedora 44. Sound completely dead with no Pipewire service available. ALSA not responding. Firefox dies immediately if I open a new tab or right click anywhere on the browser itself (inlcuding nightly builds). QEMU refuses to load. Maybe something got completely f'd in the upgrade process.. I never had an issue before having upgraded from Fedora 38 all the way to 43. I am too tired to investigate it all.

I know this is unrelated to the article, but related to the title.

dralley 16 hours ago||
I have had none of those issues on Fedora 44, FWIW.
senectus1 16 hours ago||
ditto. my upgrade from 43 - 44 went very smooth
circularfoyers 16 hours ago|||
If this is still the same install that you've been using since 38, you might find a clean install resolves some issues (whether or not your upgrade got botched). Also helps me get rid of software I installed that I don't use anymore, which I feel is relevant to this article. But part of why I love Silverblue so much is I don't have to worry about upgrades getting botched and fwiw as well, I haven't noticed any of those bugs on 44 across several very different machines.
cevn 16 hours ago|||
I had a day 1 crashloop with KWin on the 2nd desktop, but on day 2 some package update fixed it. Honestly it isn't the first time Fedora upgrades have messed something up for me either but I do think it's more stable than the average Ubuntu release, not that I've upgraded ubuntu in like 5 yrs.
tokkkie 12 hours ago||
Fedora 44 here, no issues.