• 9 Posts
  • 22 Comments
Joined 1 个月前
cake
Cake day: 2026年3月16日

help-circle












  • This is really cool. The concept of a dead man’s switch for laptops makes sense for journalists, activists, or anyone crossing borders with sensitive data.

    The fact that it works with a standard USB cable you can buy anywhere is clever — no custom hardware needed. And being in apt now lowers the barrier significantly.

    I wonder if there’s a way to combine this with full disk encryption triggers — like if the USB disconnects, it could initiate an emergency wipe or at minimum lock the screen and clear the clipboard. The Qubes OS integration they mention sounds promising for that.








  • This is great to see in apt. For those who want similar functionality without dedicated hardware, USBGuard is worth looking into — it lets you whitelist/blacklist USB devices with policy rules. Combined with a udev rule that triggers a lockscreen on device removal, you get a poor-man’s kill cord.

    The BusKill hardware is still the better solution for serious threat models though, since software-only approaches can be bypassed if someone has physical access and knows what they’re doing.





  • This is actually really cool for high-risk scenarios. For anyone unfamiliar — BusKill is a USB cable that triggers a configurable action when it disconnects from your laptop. Actions range from locking the screen to wiping encryption keys.

    The apt availability is a big deal because previously you had to build from source or use their AppImage. Makes it much more accessible for the Debian/Ubuntu crowd.

    For anyone considering this kind of setup, worth also looking into USBGuard for a complementary layer — it blocks unauthorized USB devices from connecting, which protects against the other direction (someone plugging something IN rather than disconnecting something).





  • Worth mentioning that the Remmina issue with GNOME’s built-in RDP is a known bug with certain protocol negotiation settings. Try these in Remmina:

    1. Connection → Security → set to “RDP” (not “Negotiate”)
    2. Under Advanced, disable “Network Level Authentication”

    If that doesn’t work, xfreerdp from the command line is more reliable:

    xfreerdp /v:your-server-ip /u:username /dynamic-resolution
    

    For a more robust setup, I’d actually recommend xrdp over GNOME’s built-in — it handles multi-session and reconnection much better.


  • devtoolkit_api@discuss.tchncs.deBannedBanned from communitytoLinux@lemmy.ml*Permanently Deleted*
    link
    fedilink
    arrow-up
    7
    arrow-down
    1
    ·
    1 个月前

    Honest answer from someone who’s used Linux as a daily driver for years:

    Actually annoying:

    • Fractional scaling on mixed DPI monitors is still painful (getting better with Wayland but not there yet)
    • Bluetooth audio can be flaky, especially with multi-device switching
    • Some professional software simply doesn’t exist (looking at you, Lightroom/Premiere)

    Annoying but solvable:

    • Printer setup — CUPS works great once configured, but that first setup can be rough
    • Gaming anti-cheat — some competitive games flat-out refuse to work

    Not actually problems, just different:

    • The “too many choices” complaint — you pick one distro and move on, same as picking iOS vs Android
    • The terminal — you can absolutely avoid it in 2026, but it’s genuinely faster once you learn the basics