Communities and Collections
Posts
Post has attachment
Public
Karma appreciated for my fwupd +Fedora Project update -- it fixes a slightly embarrassing bug where firmware updates don't reliably show in gnome-software, so I'm keen to push this ASAP.
Add a comment...
Post has attachment
Public
We also now have a formal privacy report for the LVFS, which is becoming more important both with the increase in the the data collected, and also with the number of clients connecting to it. Comments, as always, welcome.
Add a comment...
Post has attachment
Public
Quick poll for all you people that care about privacy. There's been a proposal that the machine running fwupd should "phone home" to the LVFS with success/failure after the firmware update has been attempted. This would let the hardware vendor know there are problems straight away, rather than waiting for frustrated users to file bugs. The pingback would just contain a salted-hash of the machine-id and a boolean, but obviously including the IP address too. Please vote below, including comments if you can. Opt-in isn't really an option as this makes the whole exercise pointless, but opt out would be available in the daemon.conf file. Thanks!
-
votes visible to Public
79%
Seems pragmatic
21%
Privacy issue
Add a comment...
Post has attachment
Public
If you need to update your Thunderbolt controller firmware on Dell hardware, it might be your lucky day...
Add a comment...
Post has attachment
Public
tl;dr: Most Bluetooth speakers and headphones are now updatable using fwupd, but we need the vendors to upload firmware to the LVFS.
Add a comment...
Public
Does anybody know an API call or file that only changes when you reboot the machine, but stays static for the current boot? Ideally some key be of hash value that works for x64/i386/arm etc. Thanks!
Add a comment...
Post has attachment
Public
Try two: Lets phone home with permission... Comments welcome.
Add a comment...
Public
I think I've just discovered and reported my first ever CVE-worthy security bug. I can't go into details obviously, but I'm intrigued how the whole process works from the "other side" so to speak.
Add a comment...
Post has shared content
Public
This is awesome, we need this right now. Packagers, do your thing!
Introducing bolt ⚡: the userspace daemon to support thunderbolt 3 security level on GNU/Linux.
Thunderbolt 3 features different levels so mitigate various attacks made possible by thunderbolt. As a result new devices need to be authorized by the user. bolt is a system daemon that can be used to do just that. GNOME will use it to automatically authorize new devices if the current user is a system administrator, logged in and the session is unlocked. See the blog post for more information.
Thunderbolt 3 features different levels so mitigate various attacks made possible by thunderbolt. As a result new devices need to be authorized by the user. bolt is a system daemon that can be used to do just that. GNOME will use it to automatically authorize new devices if the current user is a system administrator, logged in and the session is unlocked. See the blog post for more information.
Add a comment...
Post has attachment
Public
I'm planning to kiss goodbye to my inbox if anyone posts this on Reddit...
Add a comment...
Wait while more posts are being loaded

