i’m lizard

  • 0 Posts
  • 66 Comments
Joined 1 year ago
cake
Cake day: June 21st, 2024

help-circle
  • The whole “don’t look anything up before playing it” genre of cryptic puzzle-ish games where saying nearly anything about it is a spoiler. There’s not all that many of them, but somehow they’re all games where people go in with no expectations and either love it or bounce off of it really fast. The entire internet can scream at you to play Outer Wilds, but nobody wants to tell you why.

    Out of the ones I played, I had the lowest expectations/highest payoff for Void Stranger; on the surface it looks just like a pretty average sokoban with gameboy-styled graphics and a surprisingly good soundtrack. And that’s pretty much what it is, except the sokoban isn’t really why you play it, even though you’re gonna be playing a lot of it.


  • Steam changed it so that popularity metrics are mostly ignored during the first couple days of Next Fest. This started with the October 2024 run, and it’s a big part of why you no longer have the good demos popping up quickly at the start. To my knowledge, they never published details on it, but there was a short blurb in the developer Q&A. Things should get better starting sometime tomorrow (tends to be day 3 or day 4).

    The idea is that it gives games that don’t have pre-existing marketing a way better chance of success, instead of the really massive snowball effect that used to exist where devs lost out for the entire thing if they weren’t popular within the first couple of hours, but it has made it a hell of a job to look for new games.






  • All true, wanted to add on to this:

    Note that smart peeps say that the docker socket is not safe as read-only.

    That’s true, and it’s not just something mildly imperfect, read-only straight up does nothing. For connecting to a socket, Linux ignores read-only mount state and only checks write permission on the socket itself. Read-only would only make it impossible to make a new socket there. Once you do have a connection, that connection can write anything it wants to it. Traefik and other “read-only” uses still have to send GET queries for the data they need, so that’s happening for legitimate use cases too.

    If you really need a “GET-only” Docker socket, it has to be done with some other kind of mechanism, and frankly the options aren’t very good. Docker has authorization plugins that seem like too much of a headache to set up, and proxies don’t seem very good to me either.

    Or TLDR: :ro or stripping off permission bits doesn’t do anything aside from potentially break all uses for the socket. If it can connect at all, it’s root-equivalent or has all privileges of your rootless user, unless you took other steps. That might or might not be a massive problem for your setup, but it is something you should know when doing it.




  • They’ve been flagging physical carts showing up in multiple places at the same time since the very moment the first Switch flashcart appeared (so likely before we ever had our hands on any). Places discussing the flashcart had been talking about increased detection and bans for a year or so.

    It was even done on the 3DS before that. The 3DS had a whole tiny niche ecosystem of people selling “private headers”, dumping only the unique per cartridge info and selling it with the promise that they’d only sell any given header to one person. That too had a few instances of normal people complaining about bans with pre-owned games.








  • PUID is indeed handled inside the container itself, it’ll run a container-provided script as whatever the container’s UID 0 happens to be first which then drops to whatever $PUID happens to be inside the container. user= is enforced by Podman itself before the container starts, but Podman will still run as root in that setup. That means Podman is running “rootful”, while if you started the container manually as $uid using the regular Podman CLI, it would be “rootless”. That is a major difference in a lot of respects, including security, and you can find quite a bit of documentation on the differences between those operating modes online; it wouldn’t fit in a comment. Rootless is generally considered the better mode, though there are some things that still require a rootful container.

    In the upcoming NixOS 25.05 or current unstable, there are some tools you can use to run containers rootless as another user more easily using a new $name.podman.user = ""; setting. From what I understand they’ll still be root-managed systemd system services that require sudo to operate, but that means privileges get dropped by systemd before running Podman, instead of dropped by Podman before running the container. This stuff is recent and I haven’t used it, I just happen to know it exists, relevant nixpkgs commit if you wanna dig into it yourself: https://github.com/NixOS/nixpkgs/commit/7d443d378b07ad55686e9ba68faf16802c030025