"Hang on, you mean to tell me this fucker barely uses the internet or TV at all anymore and instead just reads books and watches old films on disc? Like real books, not ghost-written memoirs of our favorite elites?"
linuxmemes
Hint: :q!
Sister communities:
Community rules (click to expand)
1. Follow the site-wide rules
- Instance-wide TOS: https://legal.lemmy.world/tos/
- Lemmy code of conduct: https://join-lemmy.org/docs/code_of_conduct.html
2. Be civil
- Understand the difference between a joke and an insult.
- Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
- Don't get baited into back-and-forth insults. We are not animals.
- Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
- Bigotry will not be tolerated.
3. Post Linux-related content
- Including Unix and BSD.
- Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of
sudoin Windows. - No porn, no politics, no trolling or ragebaiting.
4. No recent reposts
- Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
5. π¬π§ Language/ΡΠ·ΡΠΊ/Sprache
- This is primarily an English-speaking community. π¬π§π¦πΊπΊπΈ
- Comments written in other languages are allowed.
- The substance of a post should be comprehensible for people who only speak English.
- Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
6. (NEW!) Regarding public figures
We all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations. - Keep discussions polite and free of disparagement.
- We are never in possession of all of the facts. Defamatory comments will not be tolerated.
- Discussions that get too heated will be locked and offending comments removed. Β
Please report posts and comments that break these rules!
Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.
"Well, we raided his mom's house and confiscated all his cobbled-together e-waste."
"And!?"
"His drives were encrypted. Apparently he 'applied PQC patches to dm-crypt himself', whatever that means. All I know is that it made the guys from NSA scream. There was nothing we could do."
"So we've got nothing?"
"Oh no. He happily gave us both the keyfile and the passphrase."
"So..?"
"No warez, no CSA, no political manifestos or illicit recipes. Not even tax evasion - it's not like he has an income. Just... copyleft source code as far as the eye could see."
I lolβd at this. But seriously, privacy is a fundamental human right. You donβt need to have something to hide to assert your right of privacy.
Yeah the government doesn't understand we don't want you to be sociopaths with the excuse of our safety.
copyleft source code is a telltale sign of communism, thus anon can be associated with Big terrorist like the Antifa.
open source collaborative software is anarchy. Book him
Only Asymetric encryption, like PGP has Problems with Quantum Computers. Symmetric, like AES, used by dm-crypt is not affected by Quantum Computers. It doesn't rely on multiplied big prime numbers or stuff like that.
FOSS gang rise up!
Linux nerds literally only want one thing and it's fucking the idea that your full disk encryption will pay off one day.
It's when your disk breaks and you can just throw it away without worries.
It can, but most likely it only would if you're doing illegal shit and get caught. They'd search your place for evidence and FDE could keep them from discovering some things.
But uh, if they got that far into investigating you then you're probably already screwed.
Doesn't need to be a government but just common thiefs getting your computer and selling it to someone who knows what to look for.
It pays off the moment someone steals my bag with the laptop when I leave the office or coffe shop.
all the 3-letter agencies pool their resources
billions of dollars are dumped into the project
several years later they manage to decrypt all of this guy's communications
it's nothing but chats about how to encrypt shit
check the IP logs
Its all encrypted? This guy uses VPNs and Tor?
Presuming that Mossad can be topped with a subscription to ProtonVPN or a Tor browser is adorable. Hell, presuming nobody in the intelligence services is familiar with Linux is even more adorable. "We've got everyone at the NSA fooled because we're Arch users". Yeah, sure buddy. What do you think these professional computer nerds are doing in their own free time?
Where do you even think encrypted applications come from?
most of these security agencies effectiveness is just in the myth's they've built around themselves of actually being effective.
mossad in particular, just has a complete disregard for killing innocents and a really good propaganda wing to suppress all their fuckups.
most killers are not right in the head, they act on pure emotion, they post "i am going kill X" online to their social media of choice the night before going to kill X...it's dumb as shit. that's how low the bar is on utilizing violence
fact is lone wolf threats are practically unstoppable, especially if they have a modicum of competency
this is also why it's said killing gets easier/"first ones the hardest" etc. even if your not some sociopath (which, most people as a whole arent)...once you know and understand just how easy it is to kill people and get away with it...lot of the worlds problems start to look like they have very easy solutions...
I mean, tell it to Jeffery Epstein. The man was pulling strings halfway around the world with his endless supply of blackmail and bribery.
From security agencies, presumably...
Got me? No!
Security agencies create encryption for their own usage. This means they want it to be mathematically as strong as possible, to protect their secrets from enemy security agencies. Why would they backdoor their own protection system?
They'll just go through the side door instead.
The Snowden docs proved that the NSA was intentionally weakening some encryption standards to make them amenable for cracking.
Then there's also the constant pressure from the FBI to make it law that encryption technologies must have backdoors. These are both public record.
Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.
Selinux
Hey, let's not get crazy. I still want to use it for practical things, too. /s
"His fucking kernel is deblobbed too?"
As a noob, I genuinely can't tell if this is real jargon or not
It's referring to binary blobs. A windows exe might be a binary blob.
These are distributed compiled. Even if the project is open sources, the binary blob might have been generated by a compromised compiler.
This is one of the reasons the XZ Utils compromisation went unnoticed for so long. One of the compressed files used for testing contained malicious code that would be included in the build artefacts (IE, the final compiled binary) under very narrow and specific circumstances.
So "deblobbed" means absolutely everything in the OS was built & compiled on their computer from original source code
Thanks! I wonder if I will ever reach that level of privacy paranoia. At the rate that I'm going, maybe 5 years.
Lol tell me your computer is blobbed without telling me your computer is blobbed!
12 hours a day on his computer
Those are rookie numbers, he has to get his game up.
Last line should have been "we cant he lives on the street"
They missed out the firmware in the WiFi adapter
Not a hackerman, but I really don't think that 12yo CPU is much more secure than a modern one.
The extent some people go to refuse their privacy being stepped on. These people like this are pathetic. /s
BRO JUST LET THEM DO WHATEVER THEY WANT YOU'LL BE FINE AS LONG AS
Y O U H A V E N O T H I N G T O H I D E
At least there are cameras tracking everyoneβs movements now.
And local cash-accepting taxi companies have been replaced by two cooperative companies, so that loophole is almost closed.
π©
Can't have ring -3 vulnerabilities if your CPU doesn't have a ring -3
This is cute and all, but I'll bet that <country-s-intel-agency> would have other ways to get into your computer.
β edit: wrong ending bracket
/rant: can we get angle brackets back for god sake?
I got into gentoo because it made patching the kernel to hold luks keys in debug registers instead of RAM easier than Arch π
A government hackerman would be the same guy. Except working for the government.
I love this idea when in reality they probably have some Israeli 3rd party that they use that can just pop any system in under an hour regardless of any protection you think you have.
Hero.
Literally just spends all day commenting hacker news posts
- under investigation for ordering child sex dolls under their real name to their home address with their bank account and posting pictures with their face in it to reddit