today super grateful for a fantastic sun over my skin and a beautiful insight on chroot and containers in general🥰
https://www.youtube.com/watch?v=JOsWB50LmwQ
ponymontana💜⚡
ponymontana@nostriches.club
npub185pu...36k8
drastically ungovernable
taxes disrespector, ANCAP LIBER*
Notes (9)
#YESTR there's literally nothing beyond you and God, that is in you and all the other stuffs.
Everything is fine if you align yourself to God, inside and outside.
Everything is broken if you dont humbly embrace this power.
nostr:nevent1qqs88qp455q0z4lpw9ha83s6pml8hzhyacwl6udtd6xj7da2z344xrspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsyg8q7kl5nzvmsncc6k9c75g0x54zdg3hjwed0qav5mmcpvafnml44ypsgqqqqqqsh2qv4a
user namespace is really a cool concept in #linux, basically an elegant way to permit to user processes to mount an entire filesystem where they can act as root.
It is used in containers and browser sandboxes, to effectively isolate processes.
But there are problems here: now, when user namespaces is activated in the kernel, ANY user process (so any random app) can access a gigantic amout of functions and kernel calls that was intended to be ran from a root user.
These functions have bugs.
These bugs wasnt a security threat before, because if you are already root and you are invoking a kernel function to trigger a bug that makes the kernel crash.... Well, you was already root.
The process that invoked the function was already in total control of the machine, so the bug was basically useless for hackers to use in a chain of exploits.
Now, with user namespaces, a user process can invoke these functions to trigger the bugs to crash the kernel or whatelse: these bugs now are security threats.
Solutions?
Seems there isnt a better alternative to do this kind of sandboxing in linux, so the solutions are [fixing the bugs®] and restrict the capability of use user namespaces to a whitelist of trusted apps (like containers, browsers, flatpak, systemd-something, and apps that in the future will start using it....)
S U P E R C Y C L E
nostr:nevent1qqsz5a2gp740c3ukkv0djfyf2xh32se4d384cz3ddnvnm4dkjplravcpz9mhxue69uhkummnw3ezuamfdejj7q3qv9qy0ry6uyh36z65pe790qrxfye84ydsgzc877armmwr2l9tpkjsxpqqqqqqzszgmxg
S U P E R C Y C L E
nostr:nevent1qqsyd0m5s322pgl7dwukvqy3unndz9987vjguskw9yy4rr2lmex5lzcpz9mhxue69uhkummnw3ezuamfdejj7q3qv9qy0ry6uyh36z65pe790qrxfye84ydsgzc877armmwr2l9tpkjsxpqqqqqqzxkw0h6
hi nostr:nprofile1qqsfmefa5zm0azxvmua3jagneczx9se94cj34tv4l4ltl0qk4zdxsqgpp4mhxue69uhkyunz9e5k7tcpr9mhxue69uhhyetvv9ujuumwdae8gtnnda3kjctv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0hafruz I'll be curious to have clarifications on how blitz is sovreign. How can I see and publish the pre-signed tx to unilaterally claim onchain my funds in case things go wrong with sparks?
Thank you, amazing wallet!
unpopular opinion: the lowest the floor number, the highest the quality of the party
nostr:nevent1qqsdkf95w6cl0kwgrnhze8sapnklcq655fky9nxpy6ny20vycdl5rwqpz9mhxue69uhkummnw3ezuamfdejj7q3qarkn0xxxll4llgy9qxkrncn3vc4l69s0dz8ef3zadykcwe7ax3dqxpqqqqqqzkxkquz
#vlog #vlogstr #ita #italia ~il miracolo~
https://video.nostr.build/daa0478d01792544f06304c9bcec866ffadb3d52a4fa7fcc0ef49e05e0c91e71.mp4
this is factual, things happening have no meanig unless you observe and project your expectations into it. So if something is good, bad, unfair, hard, and so on, you are already projecting your thoughts into it, so it is "happening for a reason" or, in other words, you are already started the coscient process of extracting events from chaos and projecting meaning trought it.
nostr:nevent1qqsryqgcw7vegqm48pquptxf0syxathjephflcg5pkac89ljyg07y6qpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyqr0gcuwzeqwqx5839t4arefs4e8eg0ryfa22xxug2gu5wdkwp8zvqcyqqqqqqg8yfw8r