mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#chroot

0 Beiträge0 Beteiligte0 Beiträge heute
Scripter :verified_flashing:<p>chwoot: Kritische Linux-Lücke macht Nutzer auf den meisten Systemen zu Root | heise online<br><a href="https://www.heise.de/news/chwoot-Kritische-Linux-Luecke-macht-Nutzer-auf-den-meisten-Systemen-zu-Root-10466885.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/chwoot-Kritische</span><span class="invisible">-Linux-Luecke-macht-Nutzer-auf-den-meisten-Systemen-zu-Root-10466885.html</span></a> <a href="https://social.tchncs.de/tags/Betriebssystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Betriebssystem</span></a> <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.tchncs.de/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücke</span></a> <a href="https://social.tchncs.de/tags/sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sudo</span></a> <a href="https://social.tchncs.de/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> <a href="https://social.tchncs.de/tags/chwoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chwoot</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/chwoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chwoot</span></a>: Kritische <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> :tux: -Lücke macht Nutzer auf den meisten Systemen zu Root | Security <a href="https://www.heise.de/news/chwoot-Kritische-Linux-Luecke-macht-Nutzer-auf-den-meisten-Systemen-zu-Root-10466885.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/chwoot-Kritische</span><span class="invisible">-Linux-Luecke-macht-Nutzer-auf-den-meisten-Systemen-zu-Root-10466885.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> <a href="https://social.tchncs.de/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a> :ubuntu: <a href="https://social.tchncs.de/tags/Fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fedora</span></a> :fedora: <a href="https://social.tchncs.de/tags/SuSe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SuSe</span></a> <a href="https://social.tchncs.de/tags/OpenSuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSuse</span></a> :opensuse: <a href="https://social.tchncs.de/tags/RedHatEnterpriseLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedHatEnterpriseLinux</span></a> <a href="https://social.tchncs.de/tags/RHEL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RHEL</span></a></p>
Deutschland<p><a href="https://www.europesays.com/de/234230/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/de/234230/</span><span class="invisible"></span></a> chwoot: Kritische Linux-Lücke macht Nutzer auf den meisten Systemen zu Root <a href="https://pubeurope.com/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> <a href="https://pubeurope.com/tags/Deutschland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Deutschland</span></a> <a href="https://pubeurope.com/tags/Germany" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Germany</span></a> <a href="https://pubeurope.com/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://pubeurope.com/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://pubeurope.com/tags/Science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Science</span></a> <a href="https://pubeurope.com/tags/Science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Science</span></a>&amp;Technology <a href="https://pubeurope.com/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://pubeurope.com/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://pubeurope.com/tags/sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sudo</span></a> <a href="https://pubeurope.com/tags/Technik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technik</span></a> <a href="https://pubeurope.com/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://pubeurope.com/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a> <a href="https://pubeurope.com/tags/Wissenschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wissenschaft</span></a> <a href="https://pubeurope.com/tags/Wissenschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wissenschaft</span></a>&amp;Technik</p>
Verfassungklage@troet.cafe<p><a href="https://troet.cafe/tags/Root" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Root</span></a>-Zugriff für alle: </p><p><a href="https://troet.cafe/tags/Kritische" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kritische</span></a> <a href="https://troet.cafe/tags/Sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sudo</span></a>-Lücke gefährdet unzählige <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>-Systeme</p><p><a href="https://troet.cafe/tags/Forscher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Forscher</span></a> haben eine gefährliche <a href="https://troet.cafe/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücke</span></a> im <a href="https://troet.cafe/tags/Kommandozeilentool" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kommandozeilentool</span></a> <a href="https://troet.cafe/tags/Sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sudo</span></a> entdeckt. Angreifer können mit wenig Aufwand Root-Rechte erlangen.</p><p>Die <a href="https://troet.cafe/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücke</span></a> besteht laut Blogbeitrag der <a href="https://troet.cafe/tags/Forscher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Forscher</span></a> seit der im Juni 2023 veröffentlichten <a href="https://troet.cafe/tags/Sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sudo</span></a>-Version 1.9.14 – und damit seit rund zwei Jahren. Ursache ist wohl ein Fehler in der <a href="https://troet.cafe/tags/Chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chroot</span></a>- <a href="https://troet.cafe/tags/Implementierung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Implementierung</span></a>. </p><p><a href="https://www.golem.de/news/root-zugriff-fuer-alle-kritische-sudo-luecke-gefaehrdet-unzaehlige-linux-systeme-2507-197635.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/root-zugriff-fue</span><span class="invisible">r-alle-kritische-sudo-luecke-gefaehrdet-unzaehlige-linux-systeme-2507-197635.html</span></a></p>
r1w1s1I wrote a simple shell script to manage a Slackware chroot environment for building packages.<br><br>Tested with Slackware-current. You can create and access the chroot easily with just a few commands.<br><br>Source:<br><a href="https://git.sr.ht/~r1w1s1/slackbuilds/blob/main/chroot-manager.sh" rel="nofollow noopener" target="_blank">https://git.sr.ht/~r1w1s1/slackbuilds/blob/main/chroot-manager.sh</a><br><br><a href="https://snac.bsd.cafe?t=slackware" class="mention hashtag" rel="nofollow noopener" target="_blank">#slackware</a> <a href="https://snac.bsd.cafe?t=shellscript" class="mention hashtag" rel="nofollow noopener" target="_blank">#shellscript</a> <a href="https://snac.bsd.cafe?t=chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#chroot</a> <a href="https://snac.bsd.cafe?t=linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#Linux</a><br>
Hacker News<p>The chroot Technique – a Swiss army multitool for Linux systems</p><p><a href="https://livesys.se/posts/the-chroot-technique/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">livesys.se/posts/the-chroot-te</span><span class="invisible">chnique/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/multitool" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multitool</span></a> <a href="https://mastodon.social/tags/system" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>system</span></a> <a href="https://mastodon.social/tags/administration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>administration</span></a> <a href="https://mastodon.social/tags/open" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>open</span></a>-source <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://mastodon.social/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a></p>
r1w1s1Clear explanation on how FreeBSD jails compare to containers.<br><br>I have used in the past <a href="https://snac.bsd.cafe?t=docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#docker</a> and <a href="https://snac.bsd.cafe?t=lxc" class="mention hashtag" rel="nofollow noopener" target="_blank">#lxc</a>.<br>For my <a href="https://snac.bsd.cafe?t=slackbuilds" class="mention hashtag" rel="nofollow noopener" target="_blank">#slackbuilds</a> I'm still using <a href="https://snac.bsd.cafe?t=chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#chroot</a> works great.<br>
nico[lien] <a href="https://github.com/mlocati/docker-php-extension-installer" rel="nofollow noopener" target="_blank">mlocati/docker-php-extension-installer: Easily install PHP extensions in Docker containers</a> <a class="hashtag" href="https://social.tourmentine.com/tag/chroot" rel="nofollow noopener" target="_blank">#chroot</a> <a class="hashtag" href="https://social.tourmentine.com/tag/gik" rel="nofollow noopener" target="_blank">#gik</a> <a class="hashtag" href="https://social.tourmentine.com/tag/php" rel="nofollow noopener" target="_blank">#php</a>
OSTechNix<p>How To Automate Mounting /dev In Chroot Environments In Linux <a href="https://floss.social/tags/Chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chroot</span></a> <a href="https://floss.social/tags/mmdebstrap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mmdebstrap</span></a> <a href="https://floss.social/tags/Troubleshooting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Troubleshooting</span></a> <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://floss.social/tags/Linuxhowto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxhowto</span></a> <a href="https://floss.social/tags/Linuxadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxadmin</span></a> <br><a href="https://ostechnix.com/auto-mount-dev-in-chroot/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ostechnix.com/auto-mount-dev-i</span><span class="invisible">n-chroot/</span></a></p>
jjj333_p (Official Cat of ari.lt)<span class="h-card"><a class="u-url mention" href="https://mk.cpluspatch.com/@jessew" rel="nofollow noopener" target="_blank">@<span>jessew</span></a></span> chaos is still alive, less active probably but today is one of its more active days<br><br>and i know ari from <a class="hashtag" href="https://ak.ari.lt/tag/lounge" rel="nofollow noopener" target="_blank">#lounge</a>:envs.net then we branched off into root (general room for her hs) and then i became mod because rare sane braincell, and then shit happened and now i have <a class="hashtag" href="https://ak.ari.lt/tag/chroot" rel="nofollow noopener" target="_blank">#chroot</a>:envs.net which just kinda exists
OSTechNix<p>How To Create Chroot Environments Using Mmdebstrap In Debian Linux <a href="https://floss.social/tags/Mmdebstrap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mmdebstrap</span></a> <a href="https://floss.social/tags/Chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chroot</span></a> <a href="https://floss.social/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://floss.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://floss.social/tags/Linuxadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxadmin</span></a> <a href="https://floss.social/tags/Linuxhowto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxhowto</span></a> <br><a href="https://ostechnix.com/create-chroot-environments-using-mmdebstrap-in-debian-linux/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ostechnix.com/create-chroot-en</span><span class="invisible">vironments-using-mmdebstrap-in-debian-linux/</span></a></p>
nico[lien] <a href="https://github.com/workadventure/workadventure" rel="nofollow noopener" target="_blank">workadventure/workadventure: A collaborative web application (virtual office) presented as a 16-bit RPG video game</a> <a class="hashtag" href="https://social.tourmentine.com/tag/chroot" rel="nofollow noopener" target="_blank">#chroot</a> <a class="hashtag" href="https://social.tourmentine.com/tag/games" rel="nofollow noopener" target="_blank">#games</a> <a class="hashtag" href="https://social.tourmentine.com/tag/16bit" rel="nofollow noopener" target="_blank">#16bit</a> <a class="hashtag" href="https://social.tourmentine.com/tag/gik" rel="nofollow noopener" target="_blank">#gik</a> <a class="hashtag" href="https://social.tourmentine.com/tag/taf" rel="nofollow noopener" target="_blank">#taf</a>
Linux TLDR<p>Atoms is a Linux Chroot Management Tool with a User-Friendly GUI<br><a href="https://noc.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://noc.social/tags/Atoms" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Atoms</span></a> <a href="https://noc.social/tags/Chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chroot</span></a> <a href="https://noc.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a> <a href="https://noc.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a><br><a href="https://linuxtldr.com/atoms-tool/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">linuxtldr.com/atoms-tool/</span><span class="invisible"></span></a></p>
Wintermute_BBS<p>tinkering with the Linux Binary Compatibility of <a href="https://oldbytes.space/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> - I just set up an <a href="https://oldbytes.space/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a> environment under /compat/ubuntu and did a <a href="https://oldbytes.space/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> into it. Then I've added a few more packages like xa65 , build-essential etc. and then cloned and successfully built <a href="https://oldbytes.space/tags/RomWBW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RomWBW</span></a> with this setup.</p><p>Another problem solved, well at least I can build RomWBW images on my FreeBSD system.</p><p>As for actually burning the resulting ROM image to a real <a href="https://oldbytes.space/tags/chip" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chip</span></a> ... let's just say that support for <a href="https://oldbytes.space/tags/Batronix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Batronix</span></a> usb devices is still ... err ... non-existent ... (I knew about this, so not surprised)</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://hackers.town/@calcifer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>calcifer</span></a></span> personally, I want really simple applications that have all their dependencies statically.compiled into them <em>and</em> run under their own <em>"username"</em> to enshure encapsulation and isolation...</p><ul><li>is that <a href="https://infosec.space/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> <a href="https://infosec.space/tags/jails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jails</span></a> / <a href="https://infosec.space/tags/bhyve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bhyve</span></a> <em>but worse</em>?</li></ul>
Josh Braun<p><span class="h-card" translate="no"><a href="https://toot.liw.fi/@liw" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>liw</span></a></span> <span class="h-card" translate="no"><a href="https://fediscience.org/@martinvermeer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>martinvermeer</span></a></span> Yeah, given the number of times my Linux machine has refused to boot properly after an update, I’m not exactly crowing about this. 😂 <a href="https://sciences.social/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a></p>
Pascal Leinert<p>Ihr wollt wissen wie gut es läuft? Ich habe es geschafft mich aus dem Root und User Account auszusperren und komme trotz dem Ändern der Passwörter in <a href="https://mastodon.social/tags/Chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chroot</span></a> nicht mehr ins System rein. Ein Rebuild in Chroot geht leider auch nicht.</p><p>Ich darf wohl von vorne anfangen. :BlobhajSadReach: </p><p><a href="https://mastodon.social/tags/NixOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NixOS</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
scy<p>TIL about <a href="https://chaos.social/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a>'s TemporaryFileSystem, ProtectSystem, ProtectHome, InaccessiblePaths, ReadOnlyPaths and a bunch more related options, which allow you to easily set up a <a href="https://chaos.social/tags/chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> style environment for a service, simply by defining what directories it should have access to right there in the unit file.</p><p>Depending on what you need, you can use an allowlist-based approach using TemporaryFileSystem &amp; ReadWritePaths, or a blocklist-based one with InaccessiblePaths.</p><p><a href="https://www.freedesktop.org/software/systemd/man/latest/systemd.exec.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">freedesktop.org/software/syste</span><span class="invisible">md/man/latest/systemd.exec.html</span></a></p><p><a href="https://chaos.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
ricardo :mastodon:<p><a href="https://fosstodon.org/tags/Chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chroot</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> command with examples </p><p><a href="https://www.rosehosting.com/blog/chroot-linux-commands/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">rosehosting.com/blog/chroot-li</span><span class="invisible">nux-commands/</span></a></p>
eshep<p><span class="h-card"><a href="https://mast.linuxgamecast.com/users/Venn" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Venn</span></a></span> I really hope <a href="https://social.trom.tf/search?tag=Volla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Volla</span></a> can pull it off. They're surely in a better position for it than most. It'd be even better if they could ship their stuff to US or JP.</p><p>These days I've all but given up on dedicated <a href="https://social.trom.tf/search?tag=linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> tablets/phones. Even though we have loads of em that are capable of running <a href="https://social.trom.tf/search?tag=postmarketOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postmarketOS</span></a>, most of em still fall short of usable most of the time. The only folks who seem to have nailed the linux handheld experience is the <a href="https://social.trom.tf/search?tag=SailfishOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SailfishOS</span></a> team. But of course there's a problem with that'n as well; if you're outside the EU, you'll have to suffer the trimmed-down DIY version of it.</p><p>These days I've found it much more practical to run something in a <a href="https://social.trom.tf/search?tag=chroot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chroot</span></a> environment within <a href="https://social.trom.tf/search?tag=termux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>termux</span></a>. I runs quite well on nearly any <a href="https://social.trom.tf/search?tag=android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> capable device via <a href="https://social.trom.tf/search?tag=proot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proot</span></a>, or even better in a proper chroot on a rooted one.</p>