Linux
Welcome to c/linux!
Welcome to our thriving Linux community! Whether you're a seasoned Linux enthusiast or just starting your journey, we're excited to have you here. Explore, learn, and collaborate with like-minded individuals who share a passion for open-source software and the endless possibilities it offers. Together, let's dive into the world of Linux and embrace the power of freedom, customization, and innovation. Enjoy your stay and feel free to join the vibrant discussions that await you!
Rules:
-
Stay on topic: Posts and discussions should be related to Linux, open source software, and related technologies.
-
Be respectful: Treat fellow community members with respect and courtesy.
-
Quality over quantity: Share informative and thought-provoking content.
-
No spam or self-promotion: Avoid excessive self-promotion or spamming.
-
No NSFW adult content
-
Follow general lemmy guidelines.
view the rest of the comments
Currently only supports WebKit and Blink (experimental) as underlying browser renderers. The description of the browser starting with the words "Nyxt is a browser with deeply integrated AI [...]" is a turn-off for me. If it is for powerusers, call it what it is. It could be a LLM or some algorithm, idk.
I may check it in a year. For now, for Blink (Chromium) engine use Cromite browser + uBlock Origin Lite, for Gecko (Firefox) use Librewolf or Mullvad browsers.
The browser app is the only program where (to me) Security/Privacy fully supersedes any concerns customizability and usability.
In addition, on that website under "Manual>Troubleshooting", the manual states the following:
Bwrap error on initialization (Ubuntu)
If Nyxt crashes on start due to bwrap, then disable or configure the apparmor service.
This vague wording is terrible advice. Disabling AppArmor outright destroys Snap sandboxing and the general security of your operating system. Configuring AppArmor is a better option, but a specific should be given as an example.
For example, from the readme file on Cromite's Github repo:
""" 1. Creating an apparmor profile for cromite
Create
/etc/apparmor.d/chrome
, and write:abi <abi/4.0>,
include <tunables/global>
profile cromite /home/user/cromite/chrome-lin/chrome flags=(unconfined) {
userns,
include if exists <local/chrome>
}
replacing the cromite binary path with where you have placed cromite.
Now, run
sudo apparmor_parser -r /etc/apparmor.d/cromite
to apply the changes.2. Disabling the restriction until next reboot
sudo sysctl -w kernel.apparmor_restrict_unprivileged_userns=0
3. Disabling the restriction permanently
Add
kernel.apparmor_restrict_unprivileged_userns=0
to the file/etc/sysctl.d 60-apparmor-namespace.conf
. Create the file if not exists. """EDIT: I hate trying to get Lemmy to format multiline code blocks.