so after using both #GNOME and #KDE #Plasma for a while, here are the things i like about both:

  • GNOME has good touchpad gestures, whereas Plasma seems not to
  • GNOME is better at hiding settings that are not applicable to the current system -- for instance, KDE System Settings shows a touchscreen item for me, even though my computer does not have a touchscreen
  • GNOME has a way better #esperanto localization
  • GNOME's way of combining an app launcher and app switcher appeals to me personally
  • GNOME's app launcher doesn't bother with the XDG categorization of apps and allows the user to easily put app launchers in folders and sort them however they like -- the XDG categorization is not bad, but it can cause clutter (e.g. i have stellarium installed, and it is the only app in the 'education' category)
  • as does the fact that GNOME's top panel is quite narrow, more like that of macOS or iOS/Android, leaving more space for the actual windows
  • GNOME has built-in integration with #usbguard, automatically allowing new USB devices authorization, but only when the screen is unlocked, whereas if i want to use it with KDE, i have to use usbguard-notifier and manually approve each device
  • GNOME's weather applet supports my city, whereas KDE's doesn't
  • GNOME doesn't seem to mess with KDE settings the way KDE messes with GNOME's, when i was switching from KDE back to GNOME i had to use gnome tweaks and dconf editor to reset a bunch of settings, this should not be a thing, the user should not have to use unofficial tools to un-screw-up their settings after using a different DE for a while
  • KDE is better at offering the user new interesting functionality in a non-intrusive way
  • KDE is more customizable, i don't care for that much myself, but there are people who want to "make their computer their own" and i can see why KDE would appeal to those users
  • KDE's tray items are more useful than GNOME's, allowing more things to be done without opening the settings app, i in particular like how the hotspot functionality is available straight away
  • KDE providing its own server-side title bar to apps is a good thing, i know that GNOME devs prefer client-side titlebars, but for windowed games and apps that don't need one, having to use libdecor is probably unnecessary

overall i still like GNOME more and will keep using it, but i'm now more informed about both

Nitrokey users get a boost in USB security as Nitrokey highlights USBGuard to block malicious USB devices, rubber duckies, and OMG cables. πŸ”’πŸ–₯️ Learn how to lock down ports step‑by‑step:
https://docs.nitrokey.com/nitrokeys/nitrokey3/usbguard
#CyberSecurity #Infosec #USBGuard #Nitrokey
USBGuard - Nitrokey Documentation

@kobilacroix yes, it is.

  • Windows cannot really distinguish keyboards and any Software that does distinguish them uses the fact that there's neither #USBguard nor proper permissions managment for #USB access.

  • Basically any logged-in user can access any USB device, whereas on #Linux without adequate permissions a user can't even login!

Consider installing #USBGuard on your #notebook (and other #Linux devices with #USB ports that will leave your office).

It helps protect them against unknown USB devices, by not allowing them to be used without your approval (temporary or permanent).

It may also be helpful with mouse jigglers that were plugged into your desktop PC, to keep your screen lock from kicking in.

Caveats:

1) After installation, use generate-policy to create an initial configuration, as per the instructions, before enabling and starting the service.

2) It is probably a good idea to plug in a spare keyboard and a spare mouse, and run an allow-device -p for them. Hardware may fail.

3) Not all USB devices provide a serial number that uniquely identifies them. By default, USBGuard associates allowed devices lacking a serial number with the exact port they're plugged in: plug them in elsewhere, and they can't be used.

While you can bypass this initially during generate-policy via its -Pswitch, the allow-device sub-command does not have any such option.

BIOS upgrades or CMOS battery failures may change the port numbering of a device – locking you out of using your keyboard or mouse. Or worse: out of internal USB devices that are no longer permitted to work.

Either learn how to chroot, using a fairly recent image of your distro on a bootable stick (read up on #Ventoy), so you can fix this manually, if it happens.

Or remove said port associations from all rules via:

sudo sed -i 's/ via-port "\([^"]*\)"//g' /etc/usbguard/rules.conf

https://usbguard.github.io/

home | USBGuard

USBGuard project site.

Protecting yourself against BadUSB Attack(USBGuard)

https://tube.tchncs.de/videos/watch/1a1cc8db-1048-4d7c-aeba-509057861497

Protecting yourself against BadUSB Attack(USBGuard)

PeerTube

@BrodieOnLinux

Now that GNOME has a Device Security control panel with a list of security events, it would have been nice to be able to control #USBGuard from Settings and have quick and easy access to the latest events…

If it had been a suggested dependency of #GNOME and #KDE, USBGuard would have been present on most distributions a long time ago πŸ€”

#usbguard is a great way of protecting yourself from #badusb attacks. Also very easy to setup.
Neu auf dem Blog: Jeremias Brâdel schreibt über die Installation und Konfiguration von #USBGuard ➑️ https://blog.b1-systems.de/installation-und-konfiguration-von-usbguard #usb #security #opensource
B1 Systems GmbH

Recommended #opensource #USB #protection for #DigitalSelfDefense against #BadUSB on #Linux: #USBGuard

Why? - Block unknown USB devices from #PlugAndPlay Β· Allow devices temporarily or permanently Β· Caveats: 1) Does not protect against allowed USB devices with (secretly) re-programmed #firmware, #KillUSB or #JuiceJacking. 2) Remember to permanently allow all devices that are currently connected, during installation.

https://usbguard.github.io/

More recommendations: https://tuxwise.net/recommended-software/

home | USBGuard

USBGuard project site.

I just finished configuring #USBGuard.
It's awesome, and gives me #security against physical risks (such as someone plugging an infected USB disk into my computer).

https://wiki.archlinux.org/title/USBGuard

USBGuard - ArchWiki