Sender | Message | Time |
---|---|---|
12 Apr 2024 | ||
shibcreate set a profile picture. | 21:43:14 | |
14 Apr 2024 | ||
randomletters | what's the github/lab url of the redox background? the one that creates a full-screen uncloseable window with no border at the back of the screen? I saw some code there (like, specifiying multiple enums, as an option "flag" sort of thing? if I knew how to describe it, I would've googled it lol) | 00:40:27 |
randomletters | I checked orbital, but that wasn't it | 00:40:54 |
Ribbon | In reply to @random_letters:matrix.org This? https://gitlab.redox-os.org/redox-os/orbdata/-/blob/master/background.png?ref_type=heads | 00:41:36 |
Ribbon | In reply to @random_letters:matrix.org If you mean the wallpaper program: https://gitlab.redox-os.org/redox-os/orbutils/-/tree/master/orbutils/src/background?ref_type=heads | 00:42:43 |
randomletters | yep, I think it's the second one | 00:44:10 |
randomletters | thanks ribbon! | 00:44:13 |
randomletters | In reply to @random_letters:matrix.orgoops... it was just an array :) | 00:46:04 |
mobius_771 | Hi there. I brought something like this up like a week ago or so (immutability), but back to cause more trouble lol. Really I'm just interested in OS security. As I understand redox packages, they're binaries with native integration, just like a standard linux distro? So no sandbox, or even option to sandbox? | 13:44:05 |
mobius_771 | By default I mean. I guess the user could implement that, no? | 13:45:07 |
Ribbon | In reply to @mobius_771:matrix.org Currently they aren't sandboxed, but they will be. The Contain program was improved to become our sandbox solution and is working, see: https://gitlab.redox-os.org/redox-os/redox/-/blob/master/config/x86_64/desktop-contain.toml?ref_type=heads | 13:51:06 |
rw_van | In reply to @draft_isa:matrix.orgContain currently only works when run as root, as we have to expand our namespace management to allow it for non-root users and to provide layered sandboxing. | 13:52:16 |
mobius_771 | That is awesome news! Definitely going to give that a read | 13:52:28 |
rw_van | Contain is a filesystem proxy that runs like a driver (scheme) in the background and starts the user's program in the sandbox. | 13:53:53 |
Ribbon | In reply to @mobius_771:matrix.orgOur plan is to make all filesystem configurations use it. | 13:53:59 |
mobius_771 | The more I learn about redox, I think it's the future. Don't get me wrong, I absolutely love linux, but it's outdated - C, monolithic kernel, write permissions, no default sandbox, etc. It was made for the 90s and isn't capable of dealing with security in 2024+ environment | 13:56:33 |
Ribbon | In reply to @mobius_771:matrix.orgI love Redox because it's more stable. | 13:57:59 |
mobius_771 | I wish I knew Rust already and could write drivers 😭 | 13:58:45 |
Ribbon | In reply to @mobius_771:matrix.orghttps://doc.redox-os.org/book/ch09-08-references.html | 13:59:17 |
mobius_771 | Thanks, Ribbon! But I'm in intro to programming in college lol. Another couple of years perhaps | 14:00:13 |
15 Apr 2024 | ||
mobius_771 | Hi there again. I was trying to find that hardware page on gitlab that lists what works with what hardware, but couldn't seem to. Maybe someone would please be so kind as to point me in the right direction. I'd like to get a dedicated machine to run redox. Currently it won't boot on mine. Thanks | 21:59:36 |
ganipote | In reply to @mobius_771:matrix.orghttps://gitlab.redox-os.org/redox-os/redox/-/blob/master/HARDWARE.md | 22:23:47 |
mobius_771 | Yep, that's it, thanks! | 22:26:11 |
mobius_771 | All I was finding was the hwio repo | 22:26:27 |
mobius_771 | I really appreciate that | 22:31:49 |
16 Apr 2024 | ||
thunderbird32 joined the room. | 22:13:50 | |
17 Apr 2024 | ||
SyntheticBird changed their profile picture. | 08:55:28 | |
18 Apr 2024 | ||
ネコ | does redox have a kernel io cache? | 07:25:30 |
ネコ | and does it work with http urls? | 07:25:40 |
ネコ | that would be neat i think | 07:27:39 |