

Emacs is a stranger breed of ppl than vi users still… Kudos.


Emacs is a stranger breed of ppl than vi users still… Kudos.


which I don’t need my three year computer science degree for.
vi really isn’t complex.
CUA editors
CUA editors work as long as there is grid display and ANSI input. They do not work in a line feed or console-line environment like telnet, console, etc., hence the need for hjkl movement.
Also CUA is an IBM initiative, it wasn’t followed everywhere.


When I have to console into the old Solaris boxes at work, I’m reminded both of how many quality-of-life enhancements we enjoy on modern Linux, and also why I will always default to vi as my editor.


I understand the premise, and I’ve seen this come around many times in the last 15 years. I just haven’t seen it named that.
It is a flawed premise. The number of executables and libraries on a system is not a good indicator of its complexity, and complexity is not a good indicator of potential for exploitation.


Xen itself runs on the Linux kernel. In qubes, the root dom0 runs in a Fedora environment, so it is “Linux proper”, but I think I understand what you’re getting at.


Amazing. I’m off to donate to keep your stuff going. Great work.


isn’t quite Linux
What do you mean?


security-by-minimality
That’s a new one.


Thanks for the reply.


That is not an answer.
Here’s a simple way to look at it
I’m not looking for a simple way to look at it. I want a technical breakdown of why rebuilding back end instances is valuable in a security context.
I’ll be blunt with you: your answers to this and others have been very surface-level and scant on technical details, which gives a strong impression that you don’t actually know how this thing works.
You are responsible for your output. If you want chatgpt or github ai tools to help you, that’s fine, but you still need to understand how the whole thing works.
You are making something “secure”, you need to be able to explain how that security works.


- Find all of the SSH keys you want to replace.
I hate this part.


Re-gen the keys. In this environment, you would have PKI setup and automation to handle cert renewal.
Having the certs expire is an advantage, security-wise. Auth will expire with certs, stolen creds can be instantly invalidated.
That’s a lot of pedantic side-stepping.
Your Holy Imperial Majesty?
Look, I don’t know what you’re trying to get out of this conversation, but at this point, you can kindly fuck off.
Ah, yes, I suppose that’s true. My apologies.
Oh, I fully understand what you said, the diatribe wasn’t required. I just thought it was weird, just walking into a chili cook-off telling everyone you don’t like chili.


Can you explain the “rotating containers back end”? I’m trying to understand what that adds to security.


It’s not a very constructive community though
You need guidance in your presentation style, you have managed to completely alienate your potential users in one single post.
No one owes you anything. No one asked you to spend time and money on a project. Calling folks “ungrateful” while trying to attract them to your project is weird.
Bold reply in r/Linux.
I use wanderer.
It works fairly well to document and organize my hikes.
Yes, well CDE doesn’t enter into the equation over a minicom console. As I said, cua isn’t super useful in line-feed environments.
I haven’t seen CDE in over 20yrs.