Salta al contenuto principale




How do I check that my system is Linux-compatible?


Not too long ago I installed Mint onto a laptop that turned out to have a network card by Broadcom, which doesn't have Linux support, so that didn't work. I'm going to upgrade my currently Windows PC to Mint at the end of Win10 support in October, and I want to be sure I don't have any hardware that is incompatible with Linux. Which manufacturers are obstinate like that?
in reply to ssillyssadass

If it is a computer, it is compatible

You may just need some extra bits in addition to the base ISO

IIRC the Broadcom website has the latest Linux drivers on there if the kernel doesn't support it out of the box, so grab a copy of those and put them on a USB.

As others have said, you could get a live distro to test it out before you install

in reply to ssillyssadass

You can get broadcom to work, it means adding the missing driver.

For example in NixOS its adding a line in the hardware/config file then running a rebuild.

For Ubuntu there appears some steps spelled out lower in this thread askubuntu.com/questions/55868/…

Some distros publish their know working hardware lists
en.opensuse.org/Portal:Hardwar…

Questa voce è stata modificata (6 giorni fa)

in reply to Spectre

That scroll can't stop me, because I ~~can't~~ won't read

Commulists owned

Questa voce è stata modificata (6 giorni fa)



in reply to sabreW4K3

If this happened in any of the non-imperial core countries, we would be hearing about it for the next 20 years.

Since it's in a "free, non-authoritarian democratic^TM^ country", it'll be forgotten in the rapid news cycle within a month.

Questa voce è stata modificata (6 giorni fa)



China unveils brain-inspired AI that could redefine efficiency


#AII
Questa voce è stata modificata (3 giorni fa)


British police arrest nearly 900 at pro-Palestine London protest


Questa voce è stata modificata (6 giorni fa)



in reply to Dessalines

This is the first time I've heard "lint" used this way, but I like it. I've heard Linus refer to various waste left behind on your system as "turds" 💀

Anyway, this looks like a cool tool. Gonna check this out.

in reply to frongt

I have heard "lint" or "delint"/"delinting" in terms of checking scripts for syntax errors and such, I have never heard it used in terms of deduping a filesystem, since that already has a term for it.
in reply to Dessalines

Hey Dessalines

I never got on with rmlint. It never felt safe to me.

I found fclones to be much better and safer.

Plus there is a GUI version for those not using the terminal

Gui Version
github.com/pkolaczk/fclones-gu…

CLI version
github.com/pkolaczk/fclones

+++++++++++++++++++++++++

Usage

fclones offers separate commands for finding and removing files. This way, you can inspect the list of found files before applying any modifications to the file system.

group – identifies groups of identical files and prints them to the standard output

remove – removes redundant files earlier identified by group

link – replaces redundant files with links (default: hard links)

dedupe – does not remove any files, but deduplicates file data by using native copy-on-write capabilities of the file system (reflink)

+++++++++++++++++++++++++

I did actually test this by creating a directory with duplicates.

test_dupes 186 files

scanned directory for duplicates and created dupes.txt

fclones group . >>dupes.txt

dupes.txt

remove duplicates to another directory

/home/user/Desktop/dupes

fclones move target_dir <dupes.txt

fclones move /home/user/Desktop/dupes <dupes.txt

test_dupes now has 173 files

in reply to infjarchninja

I haven't tried fclones, but rmlint is extremely safe. It only creates a json file and a remove script file, that you can review and edit before running.
Questa voce è stata modificata (6 giorni fa)
in reply to Dessalines

Thank you

I will check it out again if and when I need to do a clean out.

I do create a lot of duplicates as I move and transfer files between 3 laptops.

in reply to infjarchninja

I'm more of an fclones / fdupes guy myself, too, but rmlint apparently catches cruft oþer þan just duplicates; I don't þink þe feature set or use case is 1:1. E.g., (from þe project)

  • Nonstripped binaries (i.e. binaries with debug symbols)
  • Broken symbolic links.
  • Empty files and directories.
  • Files with broken user or/and group ID.
Questa voce è stata modificata (6 giorni fa)


KDE Linux entra in fase alpha


KDE rilascia la prima alpha di KDE Linux, la distribuzione immutabile basata su Arch con Plasma. Scopri le caratteristiche innovative e come scaricarla. #KDE #Linux


in reply to RandAlThor

Silk Road of Surveillance: The report exposes the significant collaboration between the illegal Myanmar military junta and Geedge Networks in implementing a commercial version of China’s "Great Firewall", giving the junta unprecedented capabilities to track down, arrest, torture and kill civilians.

Geedge Networks is a Chinese company with links to the Chinese government.

The report also exposes 13 telecommunications companies in Myanmar that are integral to the continued functioning of Geedge’s sophisticated surveillance and censorship technology on behalf of the junta.




Amid ‘unprecedented’ rise in respiratory disease in Gaza, famine is making routine infections life-threatening


cross-posted from: hexbear.net/post/6058319

At Nasser Medical Complex in Khan Younis, Manal Zaqout accompanies her 6-year-old daughter, Aya, for treatment. Aya had been moved to the hospital from the al-Mawasi areas east of Khan Younis after a continuous cough, fever, and fatigue that refused to resolve itself. The child was diagnosed with the flu, but the symptoms were far more severe than regular influenza.

On Sunday, the Gaza Government Media Office said that a “new strain” of the virus is spreading across Gaza amid a severe shortage in medicines due to Israel’s blockade of humanitarian assistance to the Strip.

“The rapid spread is attributed to extreme overcrowding, lack of water and ventilation, and the deterioration of healthcare services due to the war, in addition to restrictions imposed by the occupation,” the Government Media Office said in the statement.

Full Article



The Pager


I decided to purchase a one-way pager, a programmer, and a paging subscription to satisfy my curiosity about pagers.

In this post, I am explaining my thought process and describing some of what I have learned about how pagers work. This is especially relevant to the national paging network in the Netherlands, but hopefully others also find it interesting.

The cellular network

Cellphones give us the ability to reach others and to remain reachable regardless of our location if within a network's coverage. The network infrastructure is continuously evolving in ways that make it more efficient, secure, and reliable.

One way that the network becomes more efficient is by improving its device tracking abilities to reduce the amount of radio broadcasting resources needed to deliver data to the recipient. Security and reliability are improved by having two-way communication between the network and devices such that devices can be authenticated, data correctly encrypted, and message delivery confirmed.

A participant within this network must accept one or more of their device's unique identifiers (at the very least the IMSI, often also the IMEI) is associated with an approximate location.

Since I do not want to accept these terms, I do not carry a phone with a SIM card on me.

A burner phone and an emergency pre-paid SIM card gives me the opportunity to connect to the network in the case that I need to contact someone immediately.

However, this does not give the opportunity to others to reach me in the case that they need me or worry about me. This is not common, but there have been cases in which being reachable would have been good.

LoRa / Meshtastic

Last year I learned about LoRa radios and the Meshtastic network implementation. These devices allow one to send encrypted messages directly between devices. The range is decent, especially if there is a line-of-sight between devices. With Meshtastic it is possible to create a network of nodes that route messages, and to make use of tunnels over the internet to connect nodes that are very far apart.

So far, my favorite use-cases for Meshtastic are communicating with my partner as I approach an area to meet them, communication during festivals/events, and when travelling in a small town or camping.

It is a great tool in some contexts, but I cannot be reliably reached with it.

The Pager

I am currently living in the Netherlands and so what I say is most relevant to the Dutch paging network 'KPN Nationaal 3'. Messages are broadcast using POCSAG 1200 at 172.450 MHz. I know that the situation with paging networks vary across the world, with paging networks being no longer available in many countries, but I don't know the details. It may be that the system here is rather special and unique.

The paging network is considered a legacy broadcasting system. Messages to the network are broadcast by transmitters distributed across the full coverage range. The message that is broadcast contains the RIC (Receiver Identify Code) and the message in plain text.

Anyone with an SDR (Software Defined Radio) device can decode and log all of the unencrypted messages. Here is an example using SDRConnect + multimon-ng:

Using a programming interface, a user can select the RIC codes that they want their network-tuned pager to be responsive to. The pager will beep and display on the screen messages sent to that RIC. In my case, the seller of the pager assigned a new RIC from their pool to me and programmed the pager to listen to it.

A pager does not have a built-in transmitter, and so it does not reveal any information to the network.

A subscription to the paging network works the following way:
- You get assigned your own 'RIC', which is publicly broadcast with every message
- You get assigned a private number (0665xxxxxx)
- While your subscription is active, you send an SMS or an e-mail to a specific address with your private number + message, and the network provider will broadcast it with the RIC as the recipient.

Then, anyone who knows your private number is able to reach a pager listening to your RIC. The public RIC is not enough information to request a message to be sent to you.

Registering to the network has a monthly cost (typical current pricing of 8 € - 20 €) depending on whether you want to be able to recieve text messages, numeric messages, or only make the pager beep. Your identity and banking information are known to the network provider. I was able to register as an individual without needing to provide any company information. I had to fill-in a short form and send it over e-mail with a photo of an ID to register.

So:
- The network provider knows your identity
- The service has a monthly cost
- The unencrypted message content, when they are sent, and the recipient's RIC are public information
- The network does not confirm delivery
- Inefficient for the network (all transmitters broadcast every message)
- Being a legacy system, the network may not remain alive for too long

But:
- It is possible to reach you at all times without needing to broadcast your location to the network

The pager is a technology that I looked at early on when I started thinking about privacy and I quickly discarded the idea. Giving my identity to a network provider and broadcasting unencrypted messages publicly did not seem logical to me.

Today, I see the value of having a receive-only device that is supported by a network with national coverage. A paging message would contain only enough information for me to know how urgently I need to find a way to communicate - whether I need to activate the burner phone immediately, or whether I can spend some time to go find another way to communicate.

For me, it was a pleasant surprise to discover that this legacy system fills the specific gap of reachability without tracking.

I also recently became aware of the existence of paging networks that rely on volunteer HAM radio operators (like DAPNET), and would like to explore these systems in the future.

Questa voce è stata modificata (6 giorni fa)



Cosmic Desktop BETA, more SteamOS devices, GNOME keeps X11 after all - Linux Weekly News




Cosmic Desktop BETA, more SteamOS devices, GNOME keeps X11 after all - Linux Weekly News


Head to squarespace.com/thelinuxexperi… to save 10% off your first purchase of a website or domain using code thelinuxexperiment

Grab a brand new laptop or desktop running Linux: tuxedocomputers.com/en#

👏 SUPPORT THE CHANNEL:
Get access to:
- a Daily Linux News show
- a weekly patroncast for more thoughts
- your name in the credits

YouTube: youtube.com/@thelinuxexp/join
Patreon: patreon.com/thelinuxexperiment

Or, you can donate whatever you want:
paypal.me/thelinuxexp
Liberapay: liberapay.com/TheLinuxExperime…

👕 GET TLE MERCH
Support the channel AND get cool new gear: the-linux-experiment.creator-s…

Timestamps:
00:00 Intro
00:50 Sponsor: SquareSpace
02:07 Cosmic desktop isn't dead
05:00 GNOME 49 won't remove X11 sessions after all
06:38 Steam Deck 2 could be years away still
09:05 Lenovo has another SteamOS device in store
10:57 Steam Frame trademark registered by Valve
12:01 BcacheFS won't receive updates in the kernel
13:51 Mint 22.2 released
15:32 Google won't have to sell or change anything
17:42 KDE gains much better app permissions UI
20:10 Microsoft open sources their old BASIC
21:34 Sponsor: Tuxedo Computers
22:38 Support the channel

#linux #linuxdesktop #linuxdistro #technews




LineageOS is apparently not private?


I'm planning on flashing LineageOS on my phone to debloat and to degoogle, and additionally to increase overall privacy but apparently from what I've heard here that it's not private enough or even at all?

I know about it being less secure because of the opened bootloader and the higher chances of you rooting to achieve what you want with a degoogled phone, but beyond that (especially privacy-wise) I don't know anything.

I've seen a video on how to degoogle it further, but surely it isn't all I need to do.

I need some education.


Unfortunately my phone is so obscure that it isn't supported by literally anything, but fortunately there's an unofficial port of LineageOS I found on Telegram, and that's the one I'll be using. So if you're thinking of suggesting another custom ROM, you're out of luck. Also you can't make me buy a Pixel - that thing ain't supported in my country (5G and others) and it's hella expensive as well.

in reply to PragmaticIdealist

Nothing will be private enough for some people.

There will always be people who will scoff and puff about what is working for you or what works best for you in your attempt to regain privacy. What's important is for you to assess your threat profile, what you want to accomplish, and if LineageOS helps you with that. Just the other day people were scoffing at people buying physical movies and not backing them up in 1-2-3 format. Like, who has the fucking time and energy for that? And it's stupid. It's like scoffing at people who buy books because eventually the binding may fail or the book could get wet so they should've scanned it into a PDF. Or when people scoff at Proton users instead of being glad people are weaning off Google. It never ends and it gets worse the further you go down the hole. Ignore them.

What other options do you have for your phone at the moment besides Lineage? Regular Android? Better off having Lineage.

in reply to PragmaticIdealist

to debloat and to degoogle, and additionally to increase overall privacy but apparently from what I’ve heard here that it’s not private enough or even at all?


So... there is what is theoretically possible, what's pragmatically feasible with your current skillset, what you believe you need and what you actually need.

If you rely on what is theoretically possible and what you believe you need you usually end up with burn out.
If you focus on what's pragmatically feasible with your current skillset and what you actually need instead you WILL disappoint strangers on the Internet but you might remain sane and surely will learn something in the process, thus both improve your skillset AND have a better understanding of what you actually need.



"After The Last Sky", by Mahmoud Darwish


"The Earth is closing on us, pushing us through the last passage, and we tear off our limbs to pass through.

The Earth is squeezing us. I wish we were its wheat so we could die and live again.

I wish the Earth was our mother so she’d be kind to us.

I wish we were pictures on the rocks for our dreams to carry as mirrors.

We saw the faces of those who will throw our children out of the window of this last space. Our star will hang up mirrors.

Where should we go after the last frontiers ?

Where should the birds fly after the last sky ?

Where should the plants sleep after the last breath of air ?

We will write our names with scarlet steam. We will cut off the hand of the song, to be finished by our flesh.

We will die here, here in the last passage. Here and here our blood will plant its olive tree."

– Mahmoud Darwish



"Oh Rascal Children Of Gaza", by Khaled Juma


"Oh rascal children of Gaza,

You who constantly disturbed me with your screams under my window,

You who filled every morning with rush and chaos,

You who broke my vase and stole the lonely flower on my balcony,

Come back –

And scream as you want,

And break all the vases,

Steal all the flowers,

Come back,

Just come back…"

  • Khaled Juma


The climate of fear is self-imposed


I am not generally in the habit of criticizing the editorial decisions of The Washington Post, my employer for 11 years and an institution that continues to good, important work in covering the unwinding of American democracy. But I think the paper’s assessment of the putative debate over Donald Trump’s signature on the note provided for Jeffrey Epstein’s 50th birthday demands some context.

The article’s original headline was “No clear answers on whether Trump signed the Epstein birthday book,” a declaration that was eventually softened to “Is the signature Trump’s? Epstein birthday book feeds speculation.” The article first presents the denials of Trump’s staff and allies that he couldn’t have signed the bizarre, creepy, suggestive document. It then quotes handwriting experts, some of whom who indicated uncertainty about the signature’s provenance. A number of full signatures of Trump’s are shown in an apparent effort to demonstrate variation.

The use of full signatures doesn’t make sense because the signature in the book — created in 2003, before Epstein was on law enforcement’s radar — includes only Trump’s first name. The New York Times compared that signature to other examples of Trump signing only his first name, showing that they are nearly identical. In fact, the Wall Street Journal, which originally reported on the note, also published an article demonstrating why the note was almost certainly from Trump, including similar first-name-only signatures from the now-president.

The Journal did so, it’s safe to assume, because its initial report on the letter was rejected as invented or “fake news” by Trump et al. (Trump even sued, claiming, in part, that no such letter existed.) In other words, it probably assumed that publication of the note would trigger precisely the response that it did, an effort to move the goalposts of claimed fraudulence.

There is absolutely no reason to think that the note was not, in fact, from Trump and no reason to think that the signature is not his own. Even setting aside the obvious-to-any-layperson similarity to other signatures, the idea that someone would create a phony Trump letter as a private gift to someone Trump had praised publicly the year prior doesn’t make any sense.

So why treat the idea that the signature isn’t his seriously? Why treat the assertions of people with demonstrated track records of lying on Trump’s behalf — including Trump, his communications team and right-wing influencers — as offering sincere complaints on this particular issue? Why grant them the benefit of the doubt that they actually think the signature isn’t his?

reshared this



Genocide by remote control: Israel's explosive robots devastate Gaza


Israeli forces deploy explosive robots at 'unprecedented pace', obliterating homes and displacing families


One year on, family of US citizen killed by Israel still seeking justice


Aysenur Ezgi Eygi’s loved ones say they will continue to pursue accountability for her 2024 killing in the occupied West Bank.




In the West, it is a crime to deny one Holocaust and dangerous to name another


The difference between Holocaust denial and Gaza Genocide denial is that Holocaust denial is illegal or a criminal offence in many countries, and is, for the most part, the preserve of marginalised kooks and conspiracy theorists.

No self-respecting journalist considers Holocaust denial a legitimate point of view, and no serious media organisation argues that impartiality requires it to provide Holocaust denial with a platform in any serious discussion about Germany's extermination of Europe's Jews during World War Two - let alone equal time, or beginning and ending every such discussion with "Germany said".

Gaza Genocide denial, by contrast, is a well-organised and orchestrated global campaign sponsored, funded, and avidly promoted - without any hindrance whatsoever - by the regime perpetrating the genocide.

In many states, Gaza Genocide denial counts among its champions elected and other senior officials, influential lobbies and powerful organisations. Its messages are amplified by an international network of conspiracy theorists, fanatic ideologues and hired hands.

Serious media organisations not only consider it a journalistic requirement to give Gaza Genocide denial a platform and equal time, but they also routinely communicate Israel's talking points to their audiences. The BBC's compulsive resort to "Israel says" is a case in point.



Debian 13.1 disponibile per il download


Debian 13.1 “Trixie” è disponibile con 71 correzioni di bug e 16 aggiornamenti di sicurezza. La nuova ISO semplifica l’installazione su hardware recente e migliora la stabilità del sistema. #Debian #Linux


Debian 13.1 disponibile la nuova ISO


Debian 13.1 “Trixie” è disponibile con 71 correzioni di bug e 16 aggiornamenti di sicurezza. La nuova ISO semplifica l’installazione su hardware recente e migliora la stabilità del sistema. #Debian #Linux


𝐛𝐚𝐭: the tool to syntax highlight (almost) anything on Linux - Bread on Penguins


I was already using bat, but I only really scratched the surface of everything it could do. From the video description:

github.com/sharkdp/bat

github.com/eth-p/bat-extras

wallpaper photo is mine, patreon.com/c/breadonpenguins

my music: unicornmasquerade.bandcamp.com…

  • 0:00 command color outputs!
  • 1:35 syntax highlighted manual page btw
  • 1:57 supported languages
  • 2:30 install bat, bat-extras
  • 3:12 config options
  • 3:46 style formats
  • 4:30 custom colorschemes
  • 4:59 integration for common tools
  • 5:33 bat preview in fzf
  • 6:28 colorized help menus
  • 7:02 performance comparison?
  • 8:36 syntax highlighting makes my brain perform faster
in reply to Otter Raft

If you enjoy bat, may I also recommend you try:

  • eza as an alternative to ls
  • zoxide as an alternative to cd
  • fd as an alternative to find
  • fzf paired with fd for enhanced reverse searching and more
  • delta for syntax highlighting pager for git, diff, grep, blame output

I’ve been using these for probably around 5-10 years / daily, without issue.

Questa voce è stata modificata (1 settimana fa)
in reply to dinckel

I never used erdtree. What do you like about it that is different from eza?
in reply to trevor (he/they)

I've found it before I've heard about eza, but i think it generally fits my needs better. erdtree combines features of ls, tree, and find, in a way that's convenient for me
in reply to Otter Raft

This is a great video. I always appreciate a deeper look into tools like this.


Firefox integra Copilot l'AI di Microsoft


in reply to LinuxEasy

Ho sfanculato Mozilla e Firefox 4 anni fa. Prima muoiono entrambi, meglio è.

transalation for you inglish:

I ditched Mozilla and Firefox four years ago. The sooner they both die, the better.

omgubuntu.co.uk/2025/09/firefo…

Try Librewolf, doesnt have ai

in reply to infjarchninja

Wow non hanno neanche creato il loro assistente AI e hanno usato Copilot... 🤑🤑🤑


Linux distro for noob


I have a laptop from 2014 and I'm thinking of installing Kubuntu or Arch. I don't know much about linux but the computer is not important and is damaged so I can screw it What would you recommend? I'm thinking of something customizable (Arch) but easy to use (so Kubuntu is a good option)

If the English is not good, blame the translator 😃👍

I have the minimum requirements for both.

Edit: The computer isn't suposed for be a daily driver. And thanks for the replies.

Questa voce è stata modificata (1 settimana fa)
in reply to Arya

Kubuntu is a pretty solid choice. It has an up-to-date KDE, and it's surprisingly snappy and resource efficient.




Any fake location app that fakes travelling too?


play.google.com/store/apps/det…

It gets the job done, but it's proprietary — is there any open-source equivalent of that?

Questa voce è stata modificata (1 settimana fa)
in reply to admin

Fake Traveler is another GPS spoofer that was recommended online, since you say MockGPS didn’t work consistently for you.
Questa voce è stata modificata (1 settimana fa)
in reply to admin

Why spoof your location instead of just denying location permissions?


Washington’s Crypto Pivot Isn’t About Silicon Valley. It’s About Treasuries


Pyramids all the way down.


Middle click mouse to open new window


This was my SO's fav feature in windows, but in mint it closes all windows. Is there any fix? I've looked all over and cant find it. They'd really appreciate this feature as theyre apprehensive about linux already!

Edit: SOLVED. Very easy. Right click on yhe app in the taskbar and select configure. Then you can adjust the middle click function.

Questa voce è stata modificata (1 settimana fa)
in reply to bridgeenjoyer

Right-click on the applet (where you want to middle-click), select 'Applet preferences' -> 'Configure'. Change the 'Middle click action'.
in reply to DiamondOrthodox

I don't think there is an option for open new window here - i thought id found this solution too 🙁

Edit - I think they must have added this recently!! open new instance is available! solved 😀 thanks!

Questa voce è stata modificata (1 settimana fa)
in reply to bridgeenjoyer

GNOME does this by default, so if it's not working for your SO, they probably have installed some extension that modifies that behavior. I've never used Mint, but I think it's pretty heavily modified from base GNOME, so maybe it has that feature disabled with whatever their suite of modifications does. I'd poke around in the panel settings if those are exposed to you in Mint.
in reply to Luke

Mint's desktop environment, Cinnamon, is technically based on GNOME Shell (i.e. a fork of it), but we're not just talking "pretty heavily modified". In many ways, it's its own thing now and you can't really assume things to work similarly.



Jeena's Hyprland Demo


I switched to Hyprland some time ago and now I made a video showcasing all the features I've implemented for myself, check it out!

In this video I'm showing my current Hyprland setup as a demo. I'm showing features I implemented myself and my configuration of hyprland, waybar, tofi, wlogout, kitty and other tools.

And here the link to my hypr-dotfiles: git.jeena.net/jeena/hypr-dotfi…



Palestinian boys shot in testicles as “target practice” (Video short)


Dr. Nick Maynard, from Oxford University Hospital, talks about Palestinian boys in Gaza with gunshot wounds he believes were caused by deliberate targeting by Israeli soldiers.
Questa voce è stata modificata (1 settimana fa)

in reply to Mrkawfee

The west just loves proving why every country needs a strong, armed resistance.
in reply to Mrkawfee

Disarm your resistance fighters or we'll send our rabid attack dog to genocide your civilians while openly giving them the tools to do so. America is a terrorist state.