You are viewing a single thread.
View all comments View context
50 points

I don’t know why I keep hearing of security measures to stop someone sleuthing into bootloaders.

Am I the only person using Linux who isn’t James Bond?

permalink
report
parent
reply

[This comment has been deleted by an automated system]

permalink
report
parent
reply
10 points

so you never caught a team of government officials in your living room brute forcing your bootloader at 4am as you got up to use the bathroom, huh. Lucky guy.

permalink
report
parent
reply
5 points
*

Your government doesn’t just hit you with a wrench?

permalink
report
parent
reply

Silly Lemmy user, it’s 4am and I’m on Lemmy

permalink
report
parent
reply
8 points

I’m an engineer with trade secrets on his laptop. I’ve heard of dozens of people getting laptops stolen from their cars that they left for like ten or fifteen minutes.

The chances are slims, but if it happens I’m in deep trouble whether those secrets leak of not. I’m not taking the risk. I’m encrypting my disk.

It’s not like there’s a difference in performance nowadays.

permalink
report
parent
reply
5 points

TPM’s not going to help with that situation, though, right? Either you’re typing in your encryption password on boot (in which case you don’t need TPM to keep your password), or you’re not, in which case the thief has your TPM module with the password in it.

permalink
report
parent
reply
2 points

From what I understand, TPM is “trusted” because of the fact the secrets it contains are supposed to be safe from an attacker with hardware access.

This is what makes it good at protecting data in case of a stolen laptop. This is also what makes it good at enforcing offline DRM or any kind of system where manufacturers can restrict the kind of software users can run on their hardware.

permalink
report
parent
reply
3 points

It’s 30% legitimate concern over a non-negligible risk of government overreach, 70% having fun pretending to be James Bond.

permalink
report
parent
reply
2 points
Deleted by creator
permalink
report
parent
reply
1 point

I mean, i do have some stuff that i encrypt, but encrypting the folder or packing it on a small partitiin and encrypting only this fs after booting makes more sense to me.

permalink
report
parent
reply
0 points

I’m still on the hunt for a desktop Linux distro that has no security features or passwords. My usage for this may not be common but it can’t be rare enough that there are zero options

permalink
report
parent
reply
7 points

Ubuntu, no encryption, select boot to desktop by default when the system installs.

Like, really?

permalink
report
parent
reply
1 point

Still smashing in passwords left and right

permalink
report
parent
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 9.8K

    Monthly active users

  • 5.8K

    Posts

  • 162K

    Comments