cd /etc/nixos
nix flake update
sudo nixos-rebuild switch
git add -A .
git commit -m "Update"
🙆♀️
cd /etc/nixos
nix flake update
sudo nixos-rebuild switch
git add -A .
git commit -m "Update"
🙆♀️
fun fact: GPU drivers on Windows run in userspace, because MS got fed up with all the blue screens they caused and kicked them out of the kernel. if the GPU driver crashes, the screen will go dark for a second and then flick back on. if the GPU driver can’t restart then Windows will fall back to software rendering.
exactly everything I need and nothing more. doesn’t need X. reasonably lightweight. no fiddly configuration needed. nice support for tiling alongside floating.
also, very buggy (at least as of alpha.7), somewhat fickle (at least on my hardware), and I can’t remap keyboard shortcuts.
if anyone has one of these phones, please contact CitizenLab. they can reverse-engineer it.
and will you be paying with NAND or disk today?
border guard: do you have anything to declare?
me:
{ pkgs, config, ... }:
{
...
}
it’s literally what made me decide to go buy a Pixel and install it.
if you’re expecting your burner to get searched, they could access your social media through the phone. if you have none, you might look suspicious. if you have lots, you’re giving out tons of metadata.
plus with regular phones you’re giving out your location 24/7 to Google and your carrier. the intervals you’re on airplane mode are suspicious.
I think the more normies use GOS, the less it stands out. Tor still stands out, but Signal doesn’t, because tons of people use Signal. maybe even use GOS for burners - just get used Pixels. maybe say you use it to skip ads on YouTube and pirate shit? and if they try to unlock the burner, well… it wastes their time, only to find you were telling the truth all along.
the most secure possible? you’ll need to learn a ton. you’ll get there, but it’ll take a while.
decently secure? install Linux Mint, install your updates, don’t run sketchy commands with URLs in them unless you know what you’re doing, maybe follow a hardening guide. you’ll be okay.
if you need to be extremely secure and private, install Tails on a USB stick. it will be slow and frustrating, and you’ll need to save files to a second USB drive, but it will probably keep you pretty safe, and it’s decently user-friendly. just make sure you keep Tails updated! you’ll have to do that by flashing the new Tails onto a new USB drive, there’s no easy way around that.
those are your two most user-friendly, safe approaches.
I wasted twenty minutes of my life learning enough tumblr to understand the second note. tumblr is a strange and fascinating country, like Listenbourg.
yeah! there’s a punishing learning curve but it’s sooo frikkin powerful once you get it. for my NixOS config on WSL2, I have it cross-compile age-plugin-yubikey
for Windows, then stuff the (absolute) path in a wrapper script to use agenix
with passage
as a git-credential-helper
storage, all of which gets set up using home-manager
as my default git config. and it all just gets automatically built and configured when I nixos-rebuild switch
, so I can sync it to my other machines.
unfortunately I have no idea how it works anymore lol. that’s the problem, it’s so resilient I forget how to change it! but I can’t imagine doing that in any other Linux distro.
!unix_surrealism@lemmy.sdf.org is leaking.
between Gentoo and Arch, but so far down the y-axis it clipped off the chart.
t. masochistic NixOS user
oof.
(I say, as though I don’t use my phone 4x more than my laptop, which is honestly a bad habit I need to break because programming on phone suuucks.)
curl | bash
for the Windows crowd.
honestly it’s exactly as secure as running a binary you downloaded from their website. no more, no less (since https.)
the only computer user?!
learning Nixos is like undergoing a lengthy, tortuous hazing ritual in exchange for mastery of certain powerful blood magicks.
I bear the lambda snowflake on my arm, a sigil remnant of those dark months.