You are viewing a single thread.
View all comments View context
175 points
*

[This comment has been deleted by an automated system]

permalink
report
parent
reply
115 points

This is why I keep my initrd tattooed as a barcode on my testicles.

permalink
report
parent
reply
54 points

“Please teabag the web cam to boot.”

permalink
report
parent
reply
21 points

There’s two types of users, those who write a detailed precise technical answer to the subject, and then there’s you

permalink
report
parent
reply
21 points
Deleted by creator
permalink
report
parent
reply
15 points

You know, I’ve been thinking about what I want my first tattoo to be for months, you’ve just given me a great idea

permalink
report
parent
reply
12 points

Kernel upgrades are very… Painful.

permalink
report
parent
reply
50 points

I don’t know why I keep hearing of security measures to stop someone sleuthing into bootloaders.

Am I the only person using Linux who isn’t James Bond?

permalink
report
parent
reply

[This comment has been deleted by an automated system]

permalink
report
parent
reply
10 points

so you never caught a team of government officials in your living room brute forcing your bootloader at 4am as you got up to use the bathroom, huh. Lucky guy.

permalink
report
parent
reply
5 points
*

Your government doesn’t just hit you with a wrench?

permalink
report
parent
reply

Silly Lemmy user, it’s 4am and I’m on Lemmy

permalink
report
parent
reply
8 points

I’m an engineer with trade secrets on his laptop. I’ve heard of dozens of people getting laptops stolen from their cars that they left for like ten or fifteen minutes.

The chances are slims, but if it happens I’m in deep trouble whether those secrets leak of not. I’m not taking the risk. I’m encrypting my disk.

It’s not like there’s a difference in performance nowadays.

permalink
report
parent
reply
5 points

TPM’s not going to help with that situation, though, right? Either you’re typing in your encryption password on boot (in which case you don’t need TPM to keep your password), or you’re not, in which case the thief has your TPM module with the password in it.

permalink
report
parent
reply
3 points

It’s 30% legitimate concern over a non-negligible risk of government overreach, 70% having fun pretending to be James Bond.

permalink
report
parent
reply
2 points
Deleted by creator
permalink
report
parent
reply
1 point

I mean, i do have some stuff that i encrypt, but encrypting the folder or packing it on a small partitiin and encrypting only this fs after booting makes more sense to me.

permalink
report
parent
reply
0 points

I’m still on the hunt for a desktop Linux distro that has no security features or passwords. My usage for this may not be common but it can’t be rare enough that there are zero options

permalink
report
parent
reply
7 points

Ubuntu, no encryption, select boot to desktop by default when the system installs.

Like, really?

permalink
report
parent
reply
23 points

TPM bad, put your secrets on a proper encryption peripheral, like a smartcard running javacardOS

TPM will turn into cpu-bound DRM, the more you use it, the more this cancer will grow

permalink
report
parent
reply

[This comment has been deleted by an automated system]

permalink
report
parent
reply
-2 points

You are only seeing what TPM is now. Not what TPM will become when it become an entire encrypted computing processor capable of executing any code while inspection is impossible.

Imagine denuvo running at ring level -1

permalink
report
parent
reply
5 points

Today I learned that I actually set up secure boot properly. Neat!

permalink
report
parent
reply
2 points

Trusting some obscure hardware might be a bad idea then.

permalink
report
parent
reply
-12 points

Why do you need full disk encryption in your day to day life? Are you a secret agent? I feel like that would give you our though.

It’s not a matter that I would have nothing to hide, this defense is stupid. It’s a matter that you should use a security adapted to your need, because the cost doesn’t offset the benefit otherwise. And with disk encryption you will far more often be sorry than happy if you’re a normal person.

permalink
report
parent
reply
6 points

Full disk encryption is something you really want to have when your computer is lost or stolen.

permalink
report
parent
reply
0 points
*

People are imperfect. People have left laptops full of personal and/or commercially sensitive data on trains or planes, had them stolen from cars and houses etc. Full disc encryption is a defence against data breaches especially for computers that are not bolted down. Or it might be as simple as a person not wanting the embarrassment of their porn stash being found.

permalink
report
parent
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 9.8K

    Monthly active users

  • 5.8K

    Posts

  • 162K

    Comments