The new #apt version in #Debian unstable is SO GOOD.
If you run Debian or a derivative, I recommend grabbing it from somewhere and giving it a spin.
The "Space needed" overview needs some UX love as it shows kB/MB/GB next to each other without making the relations obvious at a glance. But other than that... sooo good.
So I think I finally found out why in one of my #Devuan#Unstable installs #apt fails to check signatures of packages (or so I hope).
It seems that apt's sig checking function is outsourced to the gpgv (not gpg) program, whose restricted usage is solely to check signatures. In the "broken" 2.2.40 version, apt passes some invalid command-line argumments resulting in failure. But in v2.2.43 this doesn't happen anymore. Not sure if this is surely the cause, but it's getting warmer.
Embarrassed to say that the only reason I won't try an #Arch based #linux#distro is because I'm so used to #apt I can't bring myself to try another #packagemanager.
I updated to #Ubuntu 22.04 yesterday and got a little notification that my #apt Firefox was being switched to #snap. Weird flex, but okay.
Today, when I tried to open my local #Rust documentation with rustup doc --book, I got a page that said that the access to the file was denied.
It turns out that #snap prevents firefox opening files in hidden folders and the best workaround is to create a symbolic link to a non-hidden folder. WTH?
@manpacket I saw this last week and finally made the switch when I found that #snap#firefox could not open pages from the /tmp/ directory (snap: 2, me: 0)
I don't understand what is the point of releasing an IDE via #flatpak, when that flatpak doesn't include all the necessary dev tools, and it can't access the ones outside its sandboxing. Honestly. What's the point? I'm looking at you, #Geany.
Personally, I can't stand flatpaks or #snap. #Appimage is nicer just because it's just one delete away from within the file manager and doesn't leave crumbs everywhere. But overall, I prefer #apt, and #dnf.
Rumint is that the Change Healthcare was Chinese espionage that was caught and they overreacted and turned off all systems thinking ransomware was going to be deployed.
This fits with Chinese targeting of healthcare and pharmacies in the past. My assessment is that it could also be Russian long term staging or espionage as they are also known to target healthcare and pharmacies.