Avatar
Tobo⚡
1cf75683d02b4ec0aa4d2127ff45d335fe2ef5a884b5794775d608bace006a16
Trying to figure out this bitcoin thing
Replying to Avatar Chema

You could use Alby Hub from within a nostr:nprofile1q9z8wue69uhnvmr9dp58jernwf6xsct8d45hxdn4w5m8gatrdej8v7nhxa3h2cnsw94ksanc09unw6n0d9hkxdp4d44hxu35v4skgtn0de5k7m30qy88wumn8ghj7mn0wvhxcmmv9uqzq44xkafh8j8hhy79809wsmv0lw46nu4pkwqjyp20ekml80mytde8phfu08 OS + BTC full node + mempool + ... However, this tutorial's point was to use the cheapest computer you might have at home. Ideal for that raspy that you might have to lie around without any usage. It doesn't matter if it is raspy or a mini PC. The tutorial goes further, showing the simplicity of its installation and first usage 🧠

I know I know.

I was just making a not so subtle jab against Raspberry PIs.

Enterprise Thinclients are cheaper, much faster and generally more stabile without all the USB storage nonsense. They can also be upgraded.

They are not scarce; they are abundant, inexpensive, naturally stable, and energy-dense.

Precisely the qualities that the neo-malthusian Davos class does not like.

Made a very difficult decision today. It was the right think to do.

Replying to Avatar Final

Secureblue is a security-focused desktop Linux operating system.

Features

Exploit mitigation:

Installing and enabling GrapheneOS' hardened_malloc globally, including for flatpaks.

Installing our chromium-based browser Trivalent, which is inspired by Vanadium.

SELinux-restricted unprivileged user namespaces

Setting numerous hardened sysctl values details

Sets numerous hardening kernel arguments

Configure chronyd to use Network Time Security (NTS) using chrony config from #GrapheneOS

Set opportunistic DNSSEC and DNSOverTLS for systemd-resolved

Installing usbguard and providing ujust commands to automatically configure it

Filling holes in the linux security posture

Remove SUID-root from numerous binaries, replacing functionality using capabilities, and remove sudo, su, and pkexec entirely in favor of run0

Disable Xwayland by default (for GNOME, Plasma, and Sway images)

Mitigation of LD_PRELOAD attacks via ujust toggle-bash-environment-lockdown

Disable install & usage of GNOME user extensions by default

Disable KDE GHNS by default

Removal of the unmaintained and suid-root fuse2 by default

Disabling unprivileged user namespaces by default for the unconfined domain and the container domain

Security by default:

Disabling all ports and services for firewalld

Use HTTPS for all rpm mirrors

Set all default container policies to reject, signedBy, or sigstoreSigned

Enabling only the flathub-verified remote by default

Reduce information leakage:

Adds per-network MAC randomization

Disabling coredumps

Attack surface reduction:

Blacklisting numerous unused kernel modules to reduce attack surface

Brute force protection by locking user accounts for 24 hours after 50 failed login attempts, hardened password encryption and password quality suggestions

Disable and mask a variety of services by default (including cups, geoclue, passim, and others)

Security ease-of-use:

Installing bubblejail for additional sandboxing tooling

Tooling for automatically setting up and enabling LUKS TPM2 integration for unlocking LUKS drives

Tooling for automatically setting up and enabling LUKS FIDO2 integration for unlocking LUKS drives

Toggles for a variety of the hardening set by default, for user convenience (ujust --choose)

https://secureblue.dev/

Donate with Monero OR Coinbase 😂 wtf