Flatpak shouldn’t require a reboot after install. I never have needed on any distro. It takes me about the same time as regular package manager. Odd to say the least.
Flatpak shouldn’t require a reboot after install. I never have needed on any distro. It takes me about the same time as regular package manager. Odd to say the least.
Application sandboxing is just SO important. If the app isnt available as Flatpak, you could install it normally and use Bubblejail to restrict it.
What specifically don’t you like about it?
Try to still all your desktop apps through Flatpak. Flatpak applications are sandboxes (meaning they are regulated by the system using permission toggles and variables). It is better for security/privacy, and makes transferring app data to a new OS install easy (app data is stored in ~/.var/app/
)
Bluefin (MacOS look) or Aurora (Windows look) are great starter Linux distros. It won’t give you the typical Linux experience (mostly that you won’t really need to do much terminal stuff).
If you won’t a more typical Linux experience, I recommend Fedora Workstation (the KDE spin if you want that Windows look).
Webcord is another good client. It is more so designed for security and isolation, but supports theming and plugins. Vencord (more specifically Vesktop) is probably a more interesting client.
Sadly, KDE Plasma has not yet secured the windowing protocols, so applications can freely record your screen. Only GNOME stops this ATM. Not a deal breaker, and KDE plans on improving this. Still a security risk.
I do agree that generally when we refer to the fediverse, we mean ActivityPub federation. I also just wanted to point out that ActivityPub is not synonymous with fediverse.
It is federated, just with other Matrix protocol servers. Just like how email is federated.
Element is default E2EE for 1-to-1 direct messaging. Rooms require setting up encryption.
WebCord supports it.
Unique to you, shared between your different browsers.
Except for shared unique similarities. Fingerprinting designers know “not all data is good data” and will then filter out bad data and use hard to change charateristics, like hardware or software similarities, which can enable cross-browser fingerprinting.
Lying about your host OS does nothing to protect against OS fingerprinting. Your OS can still he determined through the differences in how each OS renders and handles the Browser, and underlying architectural differences between browsers on each OS.
This is true. I still agree that closed source OSes are not private or as secure as if they were open source. Something like deblobbed AOSP (DivestOS) is better because it has strong sandboxing, full system MAC policies, and vastly reduced attack surface to google Android (or Apple). Desktop does not have a strong enough threat model, wish it was better.
I was referring to the OP’s comment on “iOS having a backdoor”. I am not saying I agree with OP, just was trying to see if there was something like a backdoor.
This maybe be what they are referring to: https://9to5mac.com/2023/12/27/most-sophisticated-iphone-attack-chain-ever-seen/
With new Android versions, permissions (sandboxing) and features change. Even a finished app needs development when new versions may break or alter the environment it expects.
God I hope not. OpenHarmony is a neat project.
It seems dead, hasn’t received updates since Jan. 2023
QKSMS is abandoned, QUIK is a maintained fork.