Language Selection

English French German Italian Portuguese Spanish

Chromebooks With GNU/Linux Software and Windows Breaking Itself (Again)

Filed under
GNU
Linux
Google
Microsoft
  • Linux Apps For MediaTek Chromebooks A Little Closer

    If you are the proud owner of a MediaTek-powered Chromebook such as the Acer Chromebook R13 or Lenovo Flex 11, some new features are headed your way.

    Spotted in the Canary channel in mid-October, the Crostini Project is now live in the Developer channel for Chromebooks with the ARM-based MediaTek processor. This brings native Linux app functionality to the Chromebooks with the MT8173C chipset and although the number of devices is few, MediaTek Chromebooks are relatively inexpensive and versatile machines.

  • Some Chromebooks Won’t Get Linux Apps. Here’s What You Can Do Instead

    When Chromebooks first began getting support for Android apps, there was some confusion as to just which Chromebooks would be supported. The same thing is starting to play out—though to a lesser degree—with support for Linux apps.

    You’ve always been able to install Linux applications (or other Linux-based operating systems) on Chromebooks through a workaround called Crouton because Chrome OS is based on the Linux kernel. The new method for installing Linux apps is much easier than before since it’s a baked-in part of the operating system.

    But not all Chromebooks will get official support for Linux apps. Here’s the deal.

  • The Chromium OS rootfs is mounted read-only. In developer mode you can disable the rootfs verification, enabling it to be modified.
  • Microsoft Acknowledges Issues with Edge Developer Tools and SQL Connection in cumulative update KB4462933

    In October 2018, Microsoft had release a cumulative update KB4462933 for Windows 10 V1803 users who had installed Windows 10 April 2018 update. This cumulative update released on 24th October lifted Windows 10 V1803 to build 17134376. It was a massive update with several important improvements and fixes. However, there were two main issues with this update that no one had noticed before, BornCity reports. One of the issues is the dysfunctional behavior of Edge Developer Tools and another is problems with SQL connections. These issues were also acknowledged by Microsoft on its support page for this update.

    According to WindowsLatest, Microsoft had not originally acknowledged the presence of these issues but later quietly updated the document to confirm these two issues being faced with the latest update.

Chrome OS Linux app support may be coming to the 2015 Chromebook

  • Chrome OS Linux app support may be coming to the 2015 Chromebook Pixel

    Linux app support has slowly been bringing new levels of desktop productivity to Chromebooks both new and old. Earlier this month, we reported that a vast swath of Chromebooks would sadly never receive this feature. One we weren’t sure of, Google’s 2015 Chromebook Pixel, may be getting this breath of new life judging from new code changes.

    Google has kindly documented three primary reasons why a Chrome OS device would not be able to support Linux apps via the Crostini project. The first is that some Intel Atom processors do not have the necessary virtualization support. The second being that virtualization is a non-standard operation for 32-bit ARM processors. The final issue is that Linux apps support requires a newer version of the Linux kernel’s KVM, found in Linux versions above 3.14.

A Bug In Windows 10 Pro Is Forcing Users Downgrade

Microsoft Warns Windows 10 Has An Expensive Problem

  • Microsoft Warns Windows 10 Has An Expensive Problem

    Microsoft’s activation servers have started accidentally downgrading expensive Windows 10 Pro systems into cheaper Windows 10 Home PCs, then invalidating their licences. Needless to say, that’s a nasty financial hit (Home is $119, Pro is $199) and affected users are furious.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Deepin 15.8 - Attractive and Efficient, Excellent User Experience

Deepin is an open source GNU/Linux operating system, based on Linux kernel and desktop applications, supporting laptops, desktops and all-in-ones. deepin preinstalls Deepin Desktop Environment (DDE) and nearly 30 deepin native applications, as well as several applications from the open source community to meet users’ daily learning and work needs. In addition, about a thousand of applications are offered in Deepin Store to meet your more needs. deepin, developed by a professional operating system R&D team and deepin technical community (www.deepin.org), is from the name of deepin technical community - “deepin”, which means deep pursuit and exploration of the life and the future. Compared with deepin 15.7, the ISO size of deepin 15.8 has been reduced by 200MB. The new release is featured with newly designed control center, dock tray and boot theme, as well as improved deepin native applications, hoping to bring users a more beautiful and efficient experience. Read more

Kernel: Zinc and 4.20 Merge Window

  • Zinc: a new kernel cryptography API
    We looked at the WireGuard virtual private network (VPN) back in August and noted that it is built on top of a new cryptographic API being developed for the kernel, which is called Zinc. There has been some controversy about Zinc and why a brand new API was needed when the kernel already has an extensive crypto API. A recent talk by lead WireGuard developer Jason Donenfeld at Kernel Recipes 2018 would appear to be a serious attempt to reach out, engage with that question, and explain the what, how, and why of Zinc. WireGuard itself is small and, according to Linus Torvalds, a work of art. Two of its stated objectives are maximal simplicity and high auditability. Donenfeld initially did try to implement WireGuard using the existing kernel cryptography API, but after trying to do so, he found it impossible to do in any sane way. That led him to question whether it was even possible to meet those objectives using the existing API. By way of a case study, he considered big_key.c. This is kernel code that is designed to take a key, store it encrypted on disk, and then return the key to someone asking for it if they are allowed to have access to it. Donenfeld had taken a look at it, and found that the crypto was totally broken. For a start, it used ciphers in Electronic Codebook (ECB) mode, which is known to leave gross structure in ciphertext — the encrypted image of Tux on the left may still contain data perceptible to your eye — and so is not recommended for any serious cryptographic use. Furthermore, according to Donenfeld, it was missing authentication tags (allowing ciphertext to be undetectably modified), it didn't zero keys out of memory after use, and it didn't use its sources of randomness correctly; there were many CVEs associated with it. So he set out to rewrite it using the crypto API, hoping to better learn the API with a view to using it for WireGuard. The first step with the existing API is to allocate an instance of a cipher "object". The syntax for so doing is arguably confusing — for example, you pass the argument CRYPTO_ALG_ASYNC to indicate that you don't want the instance to be asynchronous. When you've got it set up and want to encrypt something, you can't simply pass data by address. You must use scatter/gather to pass it, which in turn means that data in the vmalloc() area or on the stack can't just be encrypted with this API. The key you're using ends up attached not to the object you just allocated, but to the global instance of the algorithm in question, so if you want to set the key you must take a mutex lock before doing so, in order to be sure that someone else isn't changing the key underneath you at the same time. This complexity has an associated resource cost: the memory requirements for a single key can approach a megabyte, and some platforms just can't spare that much. Normally one would use kvalloc() to get around this, but the crypto API doesn't permit it. Although this was eventually addressed, the fix was not trivial.
  • 4.20 Merge window part 2
    At the end of the 4.20 merge window, 12,125 non-merge changesets had been pulled into the mainline kernel repository; 6,390 came in since last week's summary was written. As is often the case, the latter part of the merge window contained a larger portion of cleanups and fixes, but there were a number of new features in the mix as well.

Limiting the power of package installation in Debian

There is always at least a small risk when installing a package for a distribution. By its very nature, package installation is an invasive process; some packages require the ability to make radical changes to the system—changes that users surely would not want other packages to take advantage of. Packages that are made available by distributions are vetted for problems of this sort, though, of course, mistakes can be made. Third-party packages are an even bigger potential problem because they lack this vetting, as was discussed in early October on the debian-devel mailing list. Solutions in this area are not particularly easy, however. Lars Wirzenius brought up the problem: "when a .deb package is installed, upgraded, or removed, the maintainer scripts are run as root and can thus do anything." Maintainer scripts are included in a .deb file to be run before and after installation or removal. As he noted, maintainer scripts for third-party packages (e.g. Skype, Chrome) sometimes add entries to the lists of package sources and signing keys; they do so in order to get security updates to their packages safely, but it may still be surprising or unwanted. Even simple mistakes made in Debian-released packages might contain unwelcome surprises of various sorts. He suggested that there could be a set of "profiles" that describe the kinds of changes that might be made by a package installation. He gave a few different examples, such as a "default" profile that only allowed file installation in /usr, a "kernel" profile that can install in /boot and trigger rebuilds of the initramfs, or "core" that can do anything. Packages would then declare which profile they required. The dpkg command could arrange that package's install scripts could only make the kinds of changes allowed by its profile. Read more

SpamAssassin is back

The SpamAssassin 3.4.2 release was the first from that project in well over three years. At the 2018 Open Source Summit Europe, Giovanni Bechis talked about that release and those that will be coming in the near future. It would seem that, after an extended period of quiet, the SpamAssassin project is back and has rededicated itself to the task of keeping junk out of our inboxes. Bechis started by noting that spam filtering is hard because everybody's spam is different. It varies depending on which languages you speak, what your personal interests are, which social networks you use, and so on. People vary, so results vary; he knows a lot of Gmail users who say that its spam filtering works well, but his Gmail account is full of spam. Since Google knows little about him, it is unable to train itself to properly filter his mail. Just like Gmail, SpamAssassin isn't the perfect filter for everybody right out of the box; it's really a framework that can be used to create that filter. Getting the best out of it can involve spending some time to write rules, for example. Read more