The main problem is that Red Hat is pretty much a proprietary distro. It might not be that technically but that’s pretty much what it is. This of course doesn’t mean that everything that they put out is bad, but personally I’d prefer to not rely on them for anything.
@dngray , I’m no expert but is it really not possible to isolate containers from each other with apparmor? You could make a profile for each container and specify it when you launch the container, no?
This is an acid/hot take, but if I have to be honest, there is some truth to it in the workstation realm.
I see the point, and while I appreciate the idea of diversity, there are sometimes things that are better than others.
We don’t use a wrench to hit a nail into the wall; there are better tools for that task.
The main problem is that Red Hat is pretty much a proprietary distro.
I don’t see it that way. In fact, I can’t think of any large-ish organization that has been more supportive of and committed to open source than Red Hat has been.
personally I’d prefer to not rely on them for anything.
It might be possible to avoid Red Hat branded or wholly controlled things, but I think it would be extremely difficult (and not beneficial) to use Linux and avoid Red Hat’s many important contributions to Linux and open source.
As I see it all of us–regardless of the distro we choose–rely on open source software that is to a considerable extent developed, maintained or supported by Red Hat and Red Hat developers (in direct and indirect but important ways).
Some examples include:
- systemd
- selinux
- flatpak
- networkmanager
- kvm (virtualization)
- wayland & x11
- pipewire and pulse audio
- dnf
- rpm
- firewalld
- podman
- fwupd
- many boot components, including widely used secure boot and efi components.
- fedora and its derivatives
- gnome & gtk
- freedesktop standards and projects
- Red Hat is also the second largest contributor to the Linux Kernel (following Intel)
- And some surprises (as of last year, Red Hat was the 3rd largest contributor to Firefox, 5th largest for Webkit)
- Much more
I Love the community/collaborative spirit of Linux, and I often prefer using community distros, but not because I feel that companies like Red Hat or SUSE or Canonical are net negative influences in the Linux space.
On the contrary, many of the nice things we get to enjoy in Linux are made possible in large part because of larger corporate stakeholders willing and able to do much of the heavy lifting, or the boring dry stuff.
Using OpenSUSE which uses CentOS but is unrelated to RedHat can be a good solution.
OpenSUSE does not use CentOS to my knowledge.
My tldr is that CentOS Stream gets more frequent updates and is closer to rolling updates. Old CentOS was more like Debian - super focused on reliability and stability. The two are not interchangeable, especially for servers. For desktop usage, just use Fedora.
Note: I’ve used Rocky Linux as a Cent OS replacement server side and is solid.
Simplest answer is that Debian is quite novice friendly distro. Fact is that quite a number of packages in its repos are simply outdated/has not been updated for long time. But again, total newbie dont care about it.
So why can it run .rpm packages ?
If Debian is a novice-friendly distribution, then the year of the Linux desktop is very far away.
Desktop variant I mean…
Im well aware that server variants are far away from being novice-friendly, but no novice should even come close to server(s) imo. Master desktop first, than try server.
I understood what you meant, but my answer is still the same as above.
Many distros use the rpm package format. [wikipedia Ref]
But that does not make that distro derive from Red Hat or related.
Spirallinux is doing the magic
This seems to be conflating intended privacy practices with security risks - one could imagine an “unhackable” system that cannot be compromised by a third-party actor, but that sends a livestream of its users’ webcam feed and keystrokes to its headquarters. High security, zero privacy.
It would seem you’re applying a standard for “anywhere near secure” that would involve a threat model of “nation states are specifically and actively trying to attack me”, not an average person who wants to protect their personal data. That doesn’t invalidate the former, but I think it’s a distinction worth making when talking about recommendations to make to the general public vs. those in very specific situations.