[-] kenkenken@fedia.io 15 points 2 weeks ago

Oh no, Ramiel is already here!

[-] kenkenken@fedia.io 196 points 2 weeks ago

Microsoft is just a bug.

[-] kenkenken@fedia.io 2 points 2 weeks ago

I would pat a cat-sized plush antlion instead.

[-] kenkenken@fedia.io 2 points 2 weeks ago
  1. Do not give much attention to downvotes. There are many crypto haters over the network who will use their chance to downvote if they see a non-negative crypto related post.

  2. r/Monero is a place of tribalistic circlejerk. I downvote promotional, tribalist or maximalist posts while upvote good informational and technical posts, news, etc.

[-] kenkenken@fedia.io 9 points 2 weeks ago

Alarm clock sound.

[-] kenkenken@fedia.io 2 points 3 weeks ago

No. I can't remember when Linux used to be a conservative swamp driven by pure nostalgia.

[-] kenkenken@fedia.io 3 points 3 weeks ago

Shattered Pixel Dungeon is a perfect game for girls. And yes, you can care for pets there.

[-] kenkenken@fedia.io 19 points 4 weeks ago

Will it become as successful as Trust Social?

[-] kenkenken@fedia.io 5 points 1 month ago

The state won't save you.

[-] kenkenken@fedia.io 9 points 1 month ago

It is not like 'very limited'. But generally they are focused around modern Intel CPU, and can have issues on new AMD CPU. And it won't work on very old CPUs without proper virtualization features.

https://www.qubes-os.org/hcl/ can hint on what Qubes will work better.

Also see the system requirements: https://www.qubes-os.org/doc/system-requirements/

[-] kenkenken@fedia.io 6 points 1 month ago

Probably, yes. Qubes AppVMs don't run the whole DE inside it. Also, Qubes uses automatic memory balancing for VMs, so users doesn't need to care about it much.

https://www.qubes-os.org/doc/qmemman/

13

As AMD has no intentions to release a patch for the Ryzen 3000 series and bellow, what users can do to protect themselves?

I can assume few things:

  1. Do not run any untrusted software and closed source software in general.

  2. Do not run untrusted OSes and distros. Also disable ability to boot from external devices.

  3. Sandboxing (e.g. flatpaks) won't give you any protection, as it does not protect against kernel exploits.

  4. VMs can give defense if you need to run untrusted apps. Probably it is good to run networking apps in a VM also.

What else? What about web browsers? What you are going to do with affected devices if you have them?

view more: next ›

kenkenken

joined 1 month ago