I have too many toothbrushes

  • 1 Post
  • 15 Comments
Joined 1 year ago
cake
Cake day: July 9th, 2023

help-circle





  • The Tumbleweed installer is great, the general feel of the distro is polished, modern, up-to-date and efficient.

    As other people have said, use the terminal to update both flatpaks and packages.

    One main reason I went back to Arch BTW is that there aren’t, contrary to the old self a declaration by Suse, that many software available for my use case, so I ended up with tons of ppa’s, sorry, Suse Vendors who relied on each others for libraries, and it eventually broke down my system when some stuff wasn’t available but was required, while some may be available from 4 different, private, repos.

    So I found software management a nightmare: where to find, which one to choose from? Looking for stuff in yast, then in gnome-software, then in software.opensuse.org, then on the Build Service… Clicking bliindly to trust keys from people with personal repos titled “Use At Your Own Risk”. Updating that mess then was complicated, and slow because gnome-software would lock yast while checking stuff in the background. I had to kill it, even just to relaunch it to search for stuff.

    But Tumbleweed installs Snapper on Btrfs by default, so rolling back shouldn’t be a problem? True, and I did it and it’s just delicious, fuck up your system, wind back in two clicks… That is, unless btrfs snapshots didn’t got unruly, and in it’s default settings ate up all my disk space, forcing me to destroy that great system.

    What annoyed me most here wasn’t the software all-over-the-place mess, but that the default, factory setting of a great system they themselves contributed to the Linux world wouldn’t be working 6 months down the line on a small disk (30Gb). Thanks to the Arch Wiki I know better now, and it is easily manageable, but it was too late for me.

    Went back to Arch, with snapper, snap-pac, grub-btrfs, snapper-rollback. Can’t yet wind back like in Suse at all, currently at VM number 9, trying again, wish me luck.

    TL;DR: a rolling release from a reputable company with one-click rollback is a perfect solution if you keep your system relatively standard.





  • My proposition here is that your machine (current mac address) will be once online, through a location used once, with dns-leak protection - yes, your machine will be fingerprinted once, and if the only thing you do when using this particular config is pulling software from the opensuse repos, and pay attention to only ever after live your online life with the spoofed mac and another VPN location, connecting both gonna be near impossible. Who’s gonna fingerprint you anyway, if really the only use of the network is the Suse installer pulling rpm’s from its own repos? At that, Nord isn’t worst than any other since the internet provider for the connection can only sniff you going to some X location for an hour or so.

    Extra Paranoid Step, do it from any public free WiFi across town or something.

    You know, at the end of the day, fingerprinting works very well even behind the standard privacy protection we all know about. An interesting concept I read here was that the more addons / special stuff you add to protect you, the more “unique” is your profile, enabling efficient tracking!

    Good luck with all this

    Tumbleweed/ProtonVPN here


  • I’m guessing your use case require extra steps towards anonymity.

    2 ways :

    1. Download the needed .rpm from software.opensuse.org from another machine, transfer via USB, install manually from terminal or YAST ; it is gonna be tedious since dependencies will be missing and you will have to pull them, transfer them, install them manually.

    2. (cleaner). It’s probably easier to wipe your system, re-install while connected behind either a PiHole or a VPN on your phone using HotSpot + a decent DNS provider and setting the VPN to target an unusual location. This time, do configure properly your machine including extra software that may not be available on the offline installation media. Reboot, configure, don’t use previous VPN location ever again.




  • Sorry, not a native speaker

    • My domain name provider offers basic webmail service with my domain name

    • Gmail allows login in that service, writing "as* me@mydomain and retrieving incoming messages as well.

    • I’ve been doing this since 2006. If gmail is down, I just go to the webmail page for my domain and I’m good.

    Your phrasing of “after the DNS update” made it clear for me: all mails are handled by the new service referenced by the new custom DNS entries. My mailbox attached to my domain doesn’t disappear, it is just not in use anymore.

    Ergo, I loose the ability to log in to my original @mydomain webmail interface in case of proton outage/issue/billing conflict whatever. Or if money is tight.


  • Thanks! Am guessing you’re able to write as you@blabla.you from you@proton.me then?

    The way gmail handle this is crude, but effective: you give it your hosting company’ provided mailbox details (address, port, username, PW) and it “impersonates” you.

    It is super-convenient since the login data is provided by the hosting company, you just fill out a setup form in gmail. And your OG mailbox is still right there, untouched unless needed.

    I stopped the transition process when I realised I didn’t know what I was doing, blindly adding custom entries in my DNS host setup… Well I guess going back is just deleting the custom entries I added for Proton, and restoring the original ones.