Skip Navigation
InitialsDiceBear„Initials” ( by „DiceBear”, licensed under „CC0 1.0” (
Posts 0
Comments 80
General Advice for shell scripts
  • Do you use bash? If not, which one do you use? zsh, fish? Why do you do it?

    Mostly fish, because it just feels much more modern than bash, it has good built-in autocomplete and I don't have to install millions of plugins like of zsh.

    Do you write #!/bin/bash or #!/bin/sh? Do you write fish exclusive scripts?

    #!/usr/bin/env bash Occasionally I also write fish scripts. Just replace sh with fish.

    What should’ve people told you what to do/ use?


    general advice?

    As @[email protected] already suggested, use shellcheck.

    is it bad practice to create a handful of commands like podup and poddown that replace podman compose up -d and podman compose down or podlog as podman logs -f --tail 20 $1 or podenter for podman exec -it "$1" /bin/sh?

    I don't think so

  • how do I make sure the pixels 7a I buy is completely relockable, including bootloader, on non-stock software?
  • You don't need to worry about whether it's relockable, but it's important that it can be unlocked in the first place. Just don't get it from a carrier and you'll be fine. Buy the phone from some store like Best Buy.

    To answer your second question: It uses USB-C.

  • I am genuinely horrified to see how much data google collected from me
  • Basically every bank blocks Tor and many even block VPNs. Also, Tor Browser is not particularly secure. It's been designed for fingerprinting resistance and network anonymity through the Tor network. The Tor Browser is based on Firefox, which lacks many important security features like site isolation, Control Flow Integrity or any meaningful sandboxing. I absolutely hate Google and their monopolistic business practices, but Chromium is by far the most secure browser. Especially when it's running on a secure mobile operating system. GrapheneOS goes even further than Android and deploys a hardened memory allocator (which was actually ported from OpenBSD), which significantly reduces the risk for memory coruption. On the newest generation of mobile SOCs (ARMv9), GrapheneOS enables memory tagging by default. Again, find me a desktop platform with MTE. This once again proves my point that mobile devices are simply more secure. Every single piece of hardware and software in your phone has been built with a strong focus of security.

    Or, better, use monero.

    I absolutely agree on this one. Look at the Lemmy instance I'm on. I'm a big fan of Monero, but unfortunately there aren't many places that accept XMR.

  • I am genuinely horrified to see how much data google collected from me
  • No, Tails doesn't solve this issue at all. It's built for maximum anonymity, not security. It also uses Tor for all connections, which will get your bank account locked immediately. Qubes is a good option for security, but it's way too complicated for most users. Stop making up some random shit and accept that mobile devices running modern operating systems are reasonably secure and definitely more secure than your ordinary desktop.

  • I am genuinely horrified to see how much data google collected from me
  • I'm talking about the security model of the platform, not the way you use your devices. If you do your online banking in a browser on your computer and your system gets infected with malware, that malware can access all the files on your computer. Including application data of your browser. It can access your cookies, which your bank's website uses to store your login information. Such an attack is impossible on a mobile device, since apps can only access their own data, and inter-process communication is heavily restricted. Additionally, mobile operating systems like Android have complex permission systems, as well as kernel-based mandatory access control like SELinux/SE for Android. Your typical desktop OS has none of that. Android also has a strong implementation of Verified Boot, which makes sure that malware can't persist on your system partition, even after your device gets infected. I recommend this video if you want to learn more about mobile device security: