xinomilo | enyc, in MATE you can open "Preferred Applications" in control panel and change file manager there (system tab) | 14:58 |
---|---|---|
xinomilo | GyrosGeier, i disagree. we know that google/microsoft and probably other "big" cloud providers, sold data to whoever asked/payed. for a great benefit it would seem... | 15:05 |
Evilham | That's why I'd rather pay some more and stick with small providers I can get to know personally :-) | 15:15 |
Evilham | also because I'll know they are too busy keeping things running to be doing BS :-D | 15:15 |
GyrosGeier | analyzing what happens inside a VM is a difficult task | 15:16 |
xinomilo | one of "those" here. you're absolutely right :) | 15:16 |
GyrosGeier | halting problem etc. | 15:16 |
xinomilo | intel helps surveillance : https://cpu.fail/ | 15:21 |
xinomilo | not a security expert, but PoC seems very easy to perform.. | 15:22 |
telmich | We are actually running / offering VMs on AMD - I did not ever expect this to be such a good choice | 15:28 |
Hurgotron | I'm qute happy that my own virtualization (linux-vserver) is on AMD, too. | 15:29 |
enyc | xinomilo: Ooooo i see and see 'file manager' listed | 15:30 |
enyc | xinomilo: not necesasliralyl the same // catch all cases, as the file i modiede but thanyok for pointer | 15:31 |
GyrosGeier | the usual rule about threat scenarios applies | 15:34 |
GyrosGeier | if the gain of hacking your box is low compared to the effort, nobody will bother | 15:34 |
GyrosGeier | if it is scriptable and you can run it against a few million boxes, the effort will be low, so that happens | 15:36 |
GyrosGeier | but targeted attacks only happen if there's something to be gained | 15:36 |
GyrosGeier | a VM that encrypts data it sends to the disk is reasonably non-standard already even if it keeps the key in cleartext in the initrd.gz | 15:37 |
GyrosGeier | someone would actually have to look at the VM and find out where the key is | 15:37 |
telmich | Speaking from the ISP role, it is as usual: | 15:38 |
telmich | as an ISP, you have way too much to do to care about hacking / getting into customer VMs. And if law enforcement comes, I heard the usual thing they do is sniffing traffic, not sophisticated access to the memory of a VM | 15:39 |
GyrosGeier | the NSA generally archives the entire thing | 15:39 |
GyrosGeier | and makes a note to try all keys they come across in the future | 15:40 |
GyrosGeier | but they are not in the business of selling your info | 15:40 |
Pr0metheus | The last two days I get from apt update: E: The repository 'https://pkgmaster.devuan.org/merged ceres Release' no longer has a Release file. Any idea? | 22:19 |
fsmithred | Pr0metheus, you can switch to using packages.devuan.org until the problem is fixed. I'm pretty sure that's working ok. | 22:29 |
Pr0metheus | fsmithred is it temporary? | 22:43 |
fsmithred | the problem is temporary | 22:43 |
fsmithred | the switch is not necessarily temporary - both packages.devuan and pkgmaster.devuan should work | 22:43 |
fsmithred | packages/auto.mirror was upgraded to amprolla3 awhile ago, and it has been working. | 22:44 |
fsmithred | Pr0metheus, are you on jessie or ascii? | 22:46 |
fsmithred | oh, ceres | 22:58 |
Pr0metheus | fsmithred thank you for the info. I think I will wait. Thanks again | 23:09 |
Generated by irclog2html.py 2.17.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!