![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/q98XK4sKtw.png)
I like to put mine in /var/local/movies
etc. to keep the root standard and uncluttered.
Of course it’s just personal preference
I like to put mine in /var/local/movies
etc. to keep the root standard and uncluttered.
Of course it’s just personal preference
Where’s the source code? Seriously, the only thing I can find for drive & calander are repos that were archived in 2021
I think that it’s definitely a good case for overlaying with install
. They say to use it sparingly because it increases the chances of something breaking, but that doesn’t mean it will. Something like a VPN usually needs liw level access that container isolation makes difficult.
I’ve only had 1 issue on silverblue years ago where I couldn’t update because I had vim overlayed and they fixed it within a day or two.
You can set up multiple remotes for a repo and push to a local git server and github at the same time
I was too dumb too link it lol
Damn, I thought this was self hosted
Try running docker logs
for the tailscale container to see if it gives any more info
Bash is my login shell, but I have fish set as the default shell for alacritty
For anyone thinking about conducting a similar search for this image.
Turn on safe search before you search “flesh prison”
I’m done internetting for today
If you’re making backups of things you care about and not running sudo rm -rf
the command isn’t really dangerous.
But +1 for having it in /tmp
I have a bash function I call tempd that is basically cd $(mktemp -d)
I use it so much for stuff I dont really care to keep.
Tailscale keeps the private keys locally, . It just facillitates setting up wireguard. They could steal your private keys, as could any program you install with root access. But it would comepletely destroy their business, and it’s open source. I really dont think they have anything to gain by tricking everyone
Did anybody think that they did?
I always assumed they were just easier to set up
It also depends on the viewer. I remember using prctl()
in C to chamge a process name and top showed my change but htop didn’t. I’m sure a competent malware writer would be able to trick it though
I am root I am admin I am user I am all.
Holy shit I almost died
Can you be a little more specific? Does the installer not launch?
You could try dmesg -w
in a terminal before you start firfox and see if any messages come through.
Can you still access the internet with another program?
This could be a firefox issue, and not a flatoak issue as I assumed. Do you have another version of firefox on the system? If so what version?
The only thing that came up was some memory allocation/cgroup/.slice stuff for the container.
I’m not on that network anymore, and the problem is gone. So I cant reproduce.
Maybe I should have run wireshark?
The card is Realtek. I found an askubuntu thread where all flatpak commands were hanging, and their solution was to disable the nic.
This has only happened on this network. I didnt mention at first because I didnt think it mattered, but I’m visiting someone and moved networks.
The instant I take the dev down, the browsers pop up. I would bet money that when I go to my home net everything will work.
The flatseal angle didnt work either. The only reference is names on system bus.
Nope it’s all green.
Idk if you saw my update but turning of the wifi fixes this problem.
I did move to a new network yesterday, I just didn’t think that could impact the flatpak launch, while not affecting the systems binary launch.
It’s a real head scratcher
I use privatebin. Has some good features but I dont think it has login