
A patch for optimizing GIMP 3.0+ for Adobe Photoshop users, including features like:
- Tool organization to mimic the position of Adobe Photoshop;
- New Splash Screen;
- New default settings to maximize space on the canvas;
- Shortcuts similar to the ones in Photoshop for Windows, following Adobe’s Documentation;
- New icon and Name from custom .desktop file.
https://github.com/Diolinux/PhotoGIMP/blob/master/screenshots/photogimp_3_-_diolinux.png
Flatpak (Linux)
In order to install the newest version of PhotoGIMP on your Linux operating system using Flatpak, just follow this simple steps:
-
Make sure you already have GIMP installed from Flathub; (for Ubuntu/Mint user just select Flatpak below the install button in the manager)

-
Start and quit GIMP after you installed before you continue!
-
Download the files from this repository or just click here - > https://github.com/Diolinux/PhotoGIMP/releases/download/3.0/PhotoGIMP-linux.zip
-
Extract the content of the zip file on your home folder (.config and .local - they are the important ones) and overwrite the files if needed; (if you can’t see the file click Ctrl+H to see hidden files)
-You’re done, enjoy it! 😄



Flatpak? Yikes.
I see we have Canonical employees among us.
Wut. No.
I think you’re confusing flatpaks with snaps
Nope. Both lack secure downloads.
In which ways is flatpak insecure? Genuinely asking
It doesn’t verify the authenticity of all the software that it downloads with cryptography.
Compared to something like apt, which will refuse to install something if it was maliciously altered, verified with pgp signatures.
It’s pretty pathetic, but most of these new package managers are a security nightmare
This is not true. Flatpaks from flathub are signed with a gpg key.
Now admittedly, they use a single release key for all their signing, which is much weaker than the traditional distro’s model of having multiple package maintainers sign off on a release.
But the packages are signed.
Edit: snaps are signed in a similar way.
Nope. It’s optional. Not all packages are signed. See their documentation
From flahubs docs: https://docs.flathub.org/blog/app-safety-layered-approach-source-to-user#reproducibility--auditability
This does not seem to be optional or up to the control of each developer or publisher who is using the flathub repos.
Of course, unless you mean packages via flatpak in general?
Hmmm, this is where my research leads me.
https://docs.flatpak.org/en/latest/flatpak-builder.html#signing
Going further, I found a relevant github issue where a user is encountering an issue where flatpak is refusing to install a package that is not signed, and the user is asking for a cli flag to bypass this block.
I don’t really see how this is any different from apt refusing to install unsigned packages by default but allowing a command line flag (
--allow-unauthenticated) as an escape hatch.To be really pedantic, apt key signing is also optional, it’s just that apt is configured to refuse to install unsigned packages by default. So therefor all major repos sign their packages with GPG keys. Flatpak appears to follow this exact same model.
i mean…
Fortunately there are secure ways to install gimp