Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)K
Posts
22
Comments
167
Joined
3 mo. ago

  • It's that time again!

    Firefox ESR 140.10.0

    Firefox RR 150.0

    Relevant for AUR users this time, there is a regression with rustc 1.951 affecting both releases. So those building from source will need to either:

    • Ensure they compile with compatible rust version (1.94)
    • Apply fix for Bug 2033279
    • Use PKGBUILD that sorts it out. firefox and konform-browser have upstream patch ported for RR and ESR, respectively.

    Removing ac_add_options --enable-rust-simd from mozconfig might also be a workaround but have not tested that.

    1: Which is what Arch currently ships.

  • Thanks for the detailed review

    I wouldn't call that detailed. It was what glared at me from skimming for a couple of minutes.

    was calling pip install --break-system-packages at runtime, which is indefensible

    "You" still have three instances left of runtime pip install --break-system-packages without user interaction, one of which dead code.

    I think the follow-up beautifully clarified the "is this vibecoded?" question too.

    Labeling it 1.0.0 seems premature to say the least.

  • Is this vibecoded or is there thinking behind why it will silently reuse existing user SSH keys by default? For an app like this I would expect it to exclusively use its own keys. Same for PGP.

    I also find the ways dependencies are handled a bit unorthodox and surprising (possibly system-breaking even). For a python project it would make more sense with a lockfile and using a package manager for dependencies installed remotely via pip.

    https://codeberg.org/NovaFuture/Peerbox/src/commit/60ed3b638d6dc6c82322f73a9ce1c3e44ecec5d2/conf/config.py#L148-L197

    https://codeberg.org/NovaFuture/Peerbox/src/commit/60ed3b638d6dc6c82322f73a9ce1c3e44ecec5d2/system/mount/src/onion_client.py#L345

    I also wonder why it bundles minified js for Quill editor v1.3.7 (from 2019) when unminified version would be easier to audit and maintain, and v2.0.3 was released in 2024?

  • No mention if it is EME-Free (no DRM playback possible)

    DRM/EME/WidevineCDM integration disabled by default. They can still be enabled via the usual preferences. They will also be fully enabled like in FF (including downloading and installation of trusted binaries) if user enables "Just Make it Work" preset.

    Settings and prefs and bookmarks sync is a strong want from me, I just want to do so self-hosted, and not via Mozilla’s servers.

    Konform Browser still supports enabling that and has UI to make configuring custom Sync- and Accounts server endpoints more straightforward.

    Separately, profile import feature also supports other Firefox-based browsers as of recently.

  • Cybersecurity @sh.itjust.works

    Konform Browser - Open source web browser taking privacy, security and freedom to the next level

    codeberg.org /konform-browser/
  • You still need to use a privacy-centric browser

    Check out Konform Browser. Least leaky one out there.

  • A dedicated Forgejo instance f.example.com.

    For a small set of trusted "base" images (e.g. docker.io/alpine and docker.io/debian): A Forgejo Action on separate small runner, scheduled on cron to sync images to f.example.com/dockerio/ using skopeo copy.

    Then all other runners have their docker/podman configuration changed to use that internal forgejo container registry instead of docker.io.

    Other images are built from source in the Forgejo Actions CI. Not everything needs to be (or even should) be fully automated right off. You can keep some workflows manual while starting out and then increase automation as you tighten up your setup and get more confident in it. Follow the usual best practices around security and keep permissions scoped, giving them out only as needed.

    Git repos are mirrored as Forgejo repo mirrors, forked if relevant, then built with Forgejo Actions and published to f.example.com/whatever/. Rarely but sometimes is it worth spending time on reusing existing Github Workflows from upstreams. More often I find it easier to just reuse my own workflows.

    This way, runners can be kept fully offline and built by only accessing internal resources:

    • apt/apk repo mirror or proxy
    • synced base container images
    • synced git sources

    Same idea for npm or pypi packages etc.

    Set up renovate1 and iterate on its configuration to reduce insanity. Look in forgejo and codeberg infra repos for examples of how to automate rebasing of forked repo onto mirrors.

    I would previously achieve the same thing by wiring together more targeted services and that's still viable but Forgejo makes it easy if you want it all in one box. Just add TLS.

    1: Or anyone have anything better that's straightforward to integrate? I'm not a huge fan of all the npm modules it pulls in or its github-centric perspective. Giving the same treatment to renovate itself here was a little bit more effort and digging than I think should really be necessary.

  • Is there something particular going on or that has occurred to make you say this? Wondering what I’m missing.

    Not one thing in particular but a general trend driven by several factors. Things recently have, are, and will continue to heat up.

    For one, past few months a few significant supply-chain attacks have been hitting popular developer tooling and libraries used for web development. As devs get compromised, this will "trickle down" to users.

    For two, as stakes are rising, devs are burning out and the economy is shifting, crap like this is just considered "Monday" now. Already been common with browser addons for a while now.

    As for browser themselves, take a closer look at release notes and changelogs (for forks, go to upstream). Note the number and severity of addressed issues and update frequency.

    Adoption and evolution of LLMs also tie into this in multiple ways. Others have written in length about this. If there is one thing doomers and hypers agree on, it's this.

    Oh, and be careful with archive links.

  • Nice try, NSA

  • I think uBO does have that.

    Open popup -> Ctrl-click ⏻

  • Hard to give good advice without knowing more where you're @. Leaving out the human and organizational aspects, which might be at least as important:

    It could do you well to "harden" your environment and take a hard look at the software you are already running, what it does, and how it got there. Try to remove rather than add. Reduce your surface-area and exposure. Consider what options you have to isolate and "lock down" what remains.

    Cut out or replace any software that calls home. Isolate and sandbox things. Take a critical look at your supply-chain(s): Are you satisfied with your repos/registries/installation methods? How auditable are your services in reality? Can you improve on that? Are there things that should be mirrored and/or built from source? (BTW, reading the source of the stuff you use and rely on and building it is a good exercise in itself whether you end up relying on the output or not)

    Get familiar with relevant monitoring and debugging tools for whatever you have. Learn how to verify and validate your assumptions of "what is going on". This probably involves getting comfortable and intimate with traditional data-engineering processes and tooling.

    This applies to everything: shared infrastructure "in the cloud", IDE and browser on your local workstation, transitive dependencies of apps you are working on and their toolchains, etc.

    Maybe you need/want to set up some mirrors and dedicated CI. Forgejo is one easy way to get started as it comes with a lot of the components you need in one package.

    If not used to doing so already, force yourself to think from first principles. Take less things for granted. Practice active threat modeling. Think about trust. Audit yourselves.

    The "Sec" part is more about processes, focus and mindset. What tools are important can vary widely depending on what you have to work with.

  • Arch Linux @discuss.tchncs.de

    PSA for AUR users: Don't fall behind on browser updates

  • Arch Linux @lemmy.ml

    PSA for AUR users: Don't fall behind on browser updates

  • Redditors have long been the best bullshit detectors, and increasingly great Turing testers.

    🦾

  • So how is mentioning Vivaldi bad?

    I would guess they were probably thinking more about your Zen Browser reference1, and your comment on Mullvad Browser. Both are misinfo and I would agree it's good to do a little DD on your own before posting hearsay. Even with the disclaimers it's contributing to spreading and giving credibility to those claims.

    1: Perhaps the least inspiring major FF fork from a privacy perspective... https://codeberg.org/dialhome-study/browser-network-insights

  • The Lemmy community is broadly 50:50 on their support for said calls for the violence.

    1. There's astroturfing. Careful with judging community vibes by obviously votes but also comments.

    2. There is more to "The Lemmy community" than what's on display on .ml.

  • I also believe nobody here is sending threats.

    I wouldn't be so sure of your tribe. 19 users so far upvoted a comment with among other concerning bits:

    if you’re anti this bullshit “law” then you are also pro physically harming poor FOSS “contributors”.

  • You missed this option:

    • Ignore the feature and don't use it.

    systemd is quite modular. For example, if you abhor systemd-resolved (not at unreasonable stance) it's NBD to disable it.

    Recently (<1 year?) I frequently see the notion that software is "tainted" by having been touched by Bad. I find this a bit silly. Especially if it's from a user who's not even spending time in the codebase.

  • Opensource @programming.dev

    Konform Browser 140.9.0-100 - Security-oriented Firefox fork

    codeberg.org /konform-browser/source/releases/tag/140.9.0.100
  • Linux @programming.dev

    Konform Browser 140.8.0-106 - Security- and privacy oriented open source web browser

    codeberg.org /konform-browser/source/releases/tag/140.8.0.106
  • Linux @lemmy.ml

    Konform Browser 140.8.0-106 - Security- and privacy oriented open source web browser

    codeberg.org /konform-browser/source/releases/tag/140.8.0.106
  • Privacy @lemmy.world

    Konform Browser 140.8.0-106 - Security- and privacy oriented open source web browser

    codeberg.org /konform-browser/source/releases/tag/140.8.0.106
  • Free and Open Source Software @beehaw.org

    Konform Browser v140.8.0-103 released

    codeberg.org /konform-browser/source/releases/tag/140.8.0.103
  • Linux @lemmy.world

    Konform Browser v140.7.1-100 released

    codeberg.org /konform-browser/source/releases/tag/140.7.1.100
  • Privacy @lemmy.ml

    Konform Browser v140.7.1-100 released

    codeberg.org /konform-browser/source/releases/tag/140.7.1.100
  • Linux @programming.dev

    Konform Browser v140.7.1-100 released

    codeberg.org /konform-browser/source/releases/tag/140.7.1.100
  • Privacy @lemmy.dbzer0.com

    Konform Browser v140.7.1-100 released

    codeberg.org /konform-browser/source/releases/tag/140.7.1.100
  • Free and Open Source Software @beehaw.org

    dialhome-study/browser-network-insights: they have played us for absolute fools

    codeberg.org /dialhome-study/browser-network-insights/src/branch/main/README.md
  • cybersecurity @infosec.pub

    dialhome-study/browser-network-insights: they have played us for absolute fools

    codeberg.org /dialhome-study/browser-network-insights/src/branch/main/README.md
  • Privacy @lemmy.ml

    dialhome-study/browser-network-insights: they have played us for absolute fools

    codeberg.org /dialhome-study/browser-network-insights/src/branch/main/README.md
  • privacy @lemmy.ca

    dialhome-study/browser-network-insights: they have played us for absolute fools

    codeberg.org /dialhome-study/browser-network-insights/src/branch/main/README.md
  • Linux @lemmy.world

    Konform Browser - Taking privacy, security and freedom to the next level

    codeberg.org /konform-browser
  • Privacy @lemmy.dbzer0.com

    Konform Browser - Taking privacy, security and freedom to the next level

    codeberg.org /konform-browser
  • unixporn @lemmy.world

    LPT: Redmond97-SE theme pack is kicking and now on AUR

    aur.archlinux.org /pkgbase/redmond97se-themes
  • unixporn @lemmy.world

    [Xfce] [Xmonad] Back to root