• 0 Posts
  • 47 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle











  • It makes for very handy use cases where other applications can work on the same data. This could be easily adding content into your notes (without needing an API to do so), using external editors for working on certain aspects of your notes, or even just the super handy convenience of having everything in one directory structure.

    My Obsidian notes are right inside the same folders as the PDFs and other resources they refer to. I don’t have to have a tree structure inside my notes and then the same tree structure in my hard drive or Dropbox or wherever with all my other files.

    I was a 10+ year Evernote veteran, and I couldn’t go back to the single DB style like Evernote or Trillium. I wish there was an open source competitor to Obsidian, but alas not yet.

    And as @acockworkorange@mander.xyz rightly points out, people (me!) have been burned in the past by a program becoming obsolete and having your files stuck in some proprietary format. Plain files right in a folder on the disk is the way to go.





  • asap@lemmy.worldtoSelfhosted@lemmy.worldSecurity and docker
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    14 days ago

    Containers are isolated from the host by default.

    Are you certain about that? My understanding is that Docker containers are literally just processes running on the host (ideally rootless), but with no isolation in the way that VMs are isolated from the host.

    If you have some links for further reading it would be great, as I have been extremely cautious with my Docker usage so far.

    I haven’t found anything to refute this, but this post from 2017 states:

    In 2017 alone, 434 linux kernel exploits were found, and as you have seen in this post, kernel exploits can be devastating for containerized environments. This is because containers share the same kernel as the host, thus trusting the built-in protection mechanisms alone isn’t sufficient.

    If someone exploits a kernel bug inside a container, they exploited it on the host OS. If this exploit allows for code execution, it will be executed on the host OS, not inside the container.

    If this exploit allows for arbitrary memory access, the attacker can change or read any data for any other container.


  • asap@lemmy.worldtoLinux@lemmy.mlLinux Myths
    link
    fedilink
    English
    arrow-up
    11
    ·
    edit-2
    21 days ago

    It was for me. Been using Windows for 20 years, installed Aurora after all the MS craziness this year and haven’t looked back.

    In my case it’s turned out to be a whole lot better - my laptop runs cooler, battery last about twice as long, and I no longer have any issues with going to sleep when I close the lid.