Encrypt your Linux with LUKS, like seriously.
This makes a world of difference. I know many people may know of it but may not actually do it. It Protects your files in case your computer is ever stolen and prevents alphabet agencies from just brute forcing into your Laptop or whatever.
I found that Limine (bootloader) has the fastest decryption when paired with LUKS at least for my laptop.
If your computer isn't encrypted I could make a live USB of a distro, plug it into your computer, boot, and view your files on your hard drive. Completely bypassing your Login manager. If your computer is encrypted I could not.
Use a strong password and different from your login
Benefits of Using LUKS with GRUB
Enhanced Security
- Data Protection: LUKS (Linux Unified Key Setup) encrypts disk partitions, ensuring that data remains secure even if the physical device is stolen.
- Full Disk Encryption: It can encrypt the entire disk, including sensitive files and swap space, preventing unauthorized access to confidential information.
Compatibility with GRUB
- Unlocking from Bootloader: GRUB can unlock LUKS-encrypted partitions using the cryptomount command, allowing the system to boot securely without exposing sensitive data.
- Support for LVM: When combined with Logical Volume Management (LVM), LUKS allows for flexible partition management while maintaining encryption.
like this
Big Solar Dream in Nevada Desert Hits the Brakes
Big Solar Dream in Nevada Desert Hits the Brakes | PeakD
The U.S. government pulled the plug on the Esmeralda 7 project. This move has folks scratching their heads about where... by justmythoughtsPeakD
copymyjalopy likes this.
Le celebrazioni di Genova per Cristoforo Colombo
Domenica 12 ottobre, Genova celebra Cristoforo Colombo con una serie di iniziative che culminano nella cerimonia colombiana a Palazzo Ducale, che si conclude con il conferimento dell’onorificenza del Grifo Città di Genova alla partigiana Mirella Alloisio. Come da tradizione ad anticipare l’evento più solenne, alle ore 15, le partenze dei cortei storici, che animano il centro cittadino.
La prima iniziativa ha come protagonista il Corteo Storico del Comune di Genova, con una sfilata da Palazzo Ducale che attraversa piazza Matteotti, piano di Sant’Andrea, Porta Soprana e vico Dritto Ponticello per raggiungere la Casa di Colombo dove si tiene una cerimonia commemorativa con deposizione di corone e interventi istituzionali.
Il secondo appuntamento, intitolato “I Chiostri del Tempo di Colombo”, è organizzato dal Comitato Nazionale per Colombo di Bruno Aloi ed è patrocinato dal Comune di Genova. L’evento prevede la partenza contemporanea di due cortei che confluiscono in piazza De Ferrari: il “Corteo del Nuovo Mondo” (percorso via Garibaldi, piazza Fontane Marose, via XXV Aprile); il “Corteo del Vecchio Mondo” (Casa di Colombo, via Dante, via Fieschi e via XX Settembre). Insieme, poi, lungo via San Lorenzo sino a Calata Falcone Borsellino, al Porto Antico, dove viene rievocato lo sbarco di Cristoforo Colombo a San Salvador il 12 ottobre 1492. L’iniziativa coinvolge complessivamente circa 350 figuranti.
Dalle ore 17, nel Salone del Maggior Consiglio di Palazzo Ducale, si svolgerà la Cerimonia Colombiana, istituita negli anni Cinquanta. La celebrazione sarà aperta dal saluto ai liguri nel mondo da parte della sindaca di Genova Silvia Salis alla presenza di Mario Menini, presidente dell’Associazione Liguri nel Mondo.
Seguiranno gli interventi del presidente di Regione Liguria Marco Bucci, dell’assessore comunale alla Cultura Giacomo Montanari e del direttore del Galata Museo del Mare Piero Campodonico. In rappresentanza del Consiglio dei Ministri interverrà il ministro per la Pubblica Amministrazione Paolo Zangrillo.
La relazione annuale, affidata a Roberto Santamaria, ricercatore dell’Università per Stranieri di Siena, avrà come tema: “Non solo Colombo: i genovesi dominatori del commercio del marmo nel Mar Mediterraneo”.
Nel corso della commemorazione verranno conferiti i Premi Colombiani. La Medaglia Colombiana al professor Antonio Musarra, riconoscimento destinato a chi, indipendentemente dalla nazionalità, si sia distinto per ardimento, impegno negli studi e nelle esperienze, nonché per audacia nelle realizzazioni di alto valore umano o in efficaci contributi scientifici e divulgativi.
Il Premio Internazionale delle Comunicazioni “Cristoforo Colombo” sarà conferito al Corpo delle Capitanerie di Porto – Guardia Costiera, per il contributo offerto, attraverso scoperte, ricerche o iniziative di valore tecnico, scientifico, sociale e umano, al progresso delle comunicazioni e alla collaborazione tra i popoli.
Il Premio Internazionale dello Sport andrà invece a Giovanni Malagò. Il premio viene conferito ad atleta, sportivo o ente, associazione o persona che abbia meglio contribuito nell’anno a valorizzare lo sport, considerato non solo nei suoi aspetti fisici ed agonistici, ma anche in quelli spirituali ed educativi.
Nel corso della cerimonia sarà inoltre presentata l’offerta dell’olio da parte del Comune di Riomaggiore, destinato alla lampada votiva che arde presso le ceneri di Cristoforo Colombo, custodite nel Faro di Santo Domingo.
La commemorazione si concluderà con il conferimento dell’onorificenza del Grifo Città di Genova a Mirella Alloisio, da parte della sindaca Silvia Salis, in riconoscimento del suo costante impegno nel rafforzare i valori e l’identità della comunità genovese.
cinturanza rinnovistica di grado 3 per la banda ximi numero 9 (i nuovi cinturini arrivati)
Alla fine, a ritirare i fantasmagorici cinturini per la mia povera Mi Band 9 castigata ci è andato mio padre ieri sera, che doveva fare la spesa con mia madre, e allora è passato al bloccatore Amazon… e ora si gode? Non saprei, a dire il vero, ma l’emergenza è sicuramente passata, e ora posso […]
Why The Rest of the World Laughs at America
Recent global reactions show the world's diminishing respect for American leadership, particularly following Trump's 2024 election victory and subsequent actions in 2025.
International polling reveals a dramatic decline in America's global standing, with only 46% of people across 29 countries believing the US will have a positive influence on world affairs, down from 59% just months earlier1. Even in Canada, traditionally a close ally, positive views of the US plummeted from 52% to just 19%1.
Trump's 58-minute UN speech in September 2025 drew stony faces from world leaders, a stark contrast to previous years when delegates would laugh at his claims2. According to body language expert Peter Collett, "People are taking it much more seriously. Whereas formerly it was a source of amusement when he puffed himself up, now almost everything he has to say has to be taken seriously"2.
The administration's policies have further eroded America's standing. Massive tariffs imposed on nearly 70 countries have disrupted global trade3, while Trump's stance on immigration and inflammatory rhetoric about other nations has alienated allies. At the UN, Brazilian President Lula warned of "attacks on sovereignty, arbitrary sanctions and unilateral interventions" becoming the norm4.
Spanish Prime Minister Pedro Sánchez emerged as a leading European voice opposing American policies, defending migration and open societies while warning about "the door to tyranny"4. Meanwhile, Indonesian President Subianto received applause at the UN for declaring "No one country can bully the whole of the human family"4.
- Ipsos - America's reputation drops across the world ↩︎ ↩︎
- DW - Trump's UN speech no laughing matter as body language shows ↩︎ ↩︎
- Yahoo News - Trump Rants About Countries Laughing at America ↩︎
- The Guardian - Trump's UN speech makes it clear: the world can no longer look to the US for strong leadership ↩︎ ↩︎ ↩︎
Trump’s UN speech makes it clear: the world can no longer look to the US for strong leadership
US president’s speech made a mockery of UN values and highlights the need for strong anti-Trumpian alliancesPatrick Wintour (The Guardian)
like this
The USA is analogous to the Soviet Union. Fake food, fake happiness, fake or poor quality everything- even beyond just goods and services. American speech is fake, the political class, intentionality, even well meaning people are fake. Nothing is meaningful with intention. Their democracy is fake, and so is their standing and success. All fake. Their clothes are cheap slop, everything is brand obsession but with zero substance, all marketing. Brand obsession might as well be considered a form of propaganda at this point, as the line between branding and political influence is blurry. They destroyed what semblance of country and community they once had.
They're on the verge of having one helluva hangover when they sober up.
The worst part is, they don't know it. They are living in a bubble that is bombarded with corporatism/ political propaganda.
Trump is the most Amerikan president, yet. A perfect representation of the people and the culture of the USA today.
"As democracy is perfected, the office of the President represents, more and more closely, the inner soul of the people. On some great and glorious day, the plain folks of the land will reach their heart's desire at last, and the White House will be occupied by a downright fool and a complete narcissistic moron." -- H. L. Mencken
Congrats to the Amerikan people on their achievement. Though they could probably go beyond perfection with their can-do attitude.
Police sexual misconduct complaints skyrocket – but half of claims go uninvestigated
Exclusive: Sexual misconduct claims hit record high last year, with complaints rising at a faster rate than all other allegations
copymyjalopy likes this.
US intelligence helps Ukraine target Russian energy infrastructure: Financial Times
Moscow previously said Washington and its Nato alliance were regularly supplying intelligence to Kyiv.
Archived version: archive.is/newest/straitstimes…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
US intelligence helps Ukraine target Russian energy infrastructure: Financial Times
Moscow previously said Washington and its Nato alliance were regularly supplying intelligence to Kyiv. Read more at straitstimes.com.ST
copymyjalopy likes this.
UN Reports millions in Haiti face acute hunger epidemic as armed groups tighten control
The UN on Friday highlighted how millions of Haitians are facing severe food insecurity as armed groups continue to expand their territorial control around the country, according to the latest Integrated Food Security Phase Classification (IPC) hunger report. The data paints a dire picture: 5.7 million people, over half the population, are now classified in ‘Crisis’ or worse (IPC Phase 3 or above), marking one of the deepest humanitarian crises in the Western Hemisphere.
Archived version: archive.is/newest/jurist.org/n…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
UN Reports millions in Haiti face acute hunger epidemic as armed groups tighten control
The UN on Friday highlighted how millions of Haitians are facing severe food insecurity as armed groups continue to expand their territorial control around the country, according to the latest Integra...Joshua Villanueva | George Washington U. Law School, US (- JURIST - News)
copymyjalopy likes this.
South Korea pledges to protect citizens in Cambodia amid rise in kidnapping, forced labour cases
South Koreans have been urged not to be duped by fake high-paying job advertisements from Cambodia.
Archived version: archive.is/newest/straitstimes…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
South Korea pledges to protect citizens in Cambodia amid rise in kidnapping, forced labour cases
South Koreans have been urged not to be duped by fake high-paying job advertisements from Cambodia. Read more at straitstimes.com.ST
7 EU states increase Russian energy imports in 2025, Reuters reports
Among the seven nations increasing their purchases, France saw a 40% jump, importing 2.2 billion euros ($2.5 billion), while the Netherlands’ imports surged 72% to 498 million euros ($579 million). Belgium, Croatia, Romania, and Portugal also raised their imports. Hungary recorded an 11% increase over the past year.
copymyjalopy likes this.
Barron Trump tipped for top TikTok job
US president’s 19-year-old son could be appointed to the app’s board
Russia Orders Mass Airline Inspections Amid Safety Crisis
51 regional airlines will be audited on their maintenance, flight safety, crew training, and more, during the next 12 months.
Pakistan closes Afghan border as Kabul claims it killed 58 soldiers in overnight clashes
Pakistan closed all border crossings with Afghanistan on Sunday after deadly overnight clashes in which Afghan forces claimed to have killed 58 Pakistani soldiers. Islamabad regularly accuses the Taliban administration in Kabul of harbouring militants who attack Pakistan, a charge Afghan officials deny.
Archived version: archive.is/newest/france24.com…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
Russia | Explosions rock Smolensk aviation plant that builds Kh‑59 missiles — videos show smoke rising near the site
Last night, locals captured a smoke plume rising near the Kh‑59-producing plant just after air defense fire was seen.
Archived version: archive.is/newest/euromaidanpr…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
Gaza PhD student ‘heartbroken’ as family blocked from entering the UK
Manar al-Houbi’s husband and children refused entry despite her winning a scholarship to cover tuition fees, living costs and housing for them all
How the Houthis came out on top after Israel's multi-front war
The Yemeni group's steadfast attacks over two years turned it from insurgent rebels to a key regional player
Archived version: archive.is/newest/middleeastey…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
How the Houthis came out on top after Israel's multi-front war
As a fragile ceasefire takes hold in Gaza between Israel and Hamas, another military actor in the region has also apparently halted hostilities: the Houthis in Yemen.Rayhan Uddin (Middle East Eye)
Europe launches new digital border checks for non-EU citizens
The system will be introduced gradually over the next six months, and fully replace traditional passport stamps in April
https://www.euractiv.com/news/europe-launches-new-digital-border-checks-for-non-eu-citizens/
Hamas will not govern post-war Gaza: Hamas source close to negotiating committee
A Hamas source close to the group's negotiating committee has told AFP that the group will not take part in Gaza's post-war governance.
Archived version: archive.is/newest/middleeastey…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
copymyjalopy likes this.
Fotovoltaico, considerazioni da fare prima
In questo video di alcuni mesi fa, Simone Angioni discute di alcune considerazioni e verifiche importanti da fare prima dell'installazione di un impianto fotovoltaico.
"Quanto produce davvero un impianto fotovoltaico da 6kW? E conviene installarlo? In questo video vi porto la mia esperienza concreta, con dati reali e qualche sorpresa (non sempre positiva...). Parliamo di produzione, ottimizzatori, auto elettrica, bollette e... un enorme problema di cui si parla poco: la sovratensione.
youtu.be/vicveAFBSw8
New 7-Zip high-severity vulnerabilities expose systems to remote attackers — users should update to version 25 ASAP
Patches for two high-severity ZIP parsing flaws have quietly been available since July.
adhocfungus likes this.
Battlefield 6 has an epic launch bug where it fails to recognize that the game is already installed — EA boss suggests one affected user to ‘refund and buy on Steam’
EA compensates users with a free seasonal Battle Pass and XP boosters.
copymyjalopy likes this.
The Destruction in Gaza Is What the Future of AI Warfare Looks Like
American tech companies have given highly consequential support to Israel's campaign.
Archived version: archive.is/newest/gizmodo.com/…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
copymyjalopy likes this.
Nintendo allegedly hacked by Crimson Collective hacking group — screenshot shows leaked folders, production assets, developer files, and backups
Did someone break through Nintendo's formidable cyber defenses?
Cambridge University launches project to rescue data trapped on old floppy disks
Cambridge’s 'Future Nostalgia' project is racing to save decades of digital history from vanishing floppy disks.
‘I realised I’d been ChatGPT-ed into bed’: how ‘Chatfishing’ made finding love on dating apps even weirder
Where once people were duped by soft-focus photos and borrowed chat-up lines, now they have to watch out for computer-generated charm. But it’s one thing to use a witty phrase – another thing entirely to build a whole fake persona …
like this
AI personas are the future of dating, Bumble founder says. Many aren't buying.
The future of dating could be filled with digital, artificial intelligence-powered personas setting each other up, according Bumble founder Whitney Wolfe Herd.Daysia Tolentino (NBC News)
Most people can’t tell the difference between AI and human voices, study finds
As AI becomes more enmeshed in our lives, most people can’t tell the difference between human voices and their synthetic clones, a new study reveals.
copymyjalopy likes this.
Inside the belly of the beast: A technical walk through Intel's 18A production facility at Fab52
deep dive: Now if Lip Bu Tan can just find a willing customer
LineageOS 23
like this
Technology reshared this.
postmarketOS // real Linux distribution for phones
Aiming for a 10 year life-cycle for smartphonespostmarketOS
like this
Taliban, Pakistani forces trade heavy fire along Afghanistan border
Pakistan and Afghanistan have traded claims of seizing each other’s border posts, as border clashes between their militaries intensify following an air strike on Kabul earlier this week.
The Taliban on Sunday said it had captured three Pakistani border posts during its retaliatory attacks at seven points along the border.
Taliban, Pakistani forces trade heavy fire along Afghanistan border
Clashes come as tensions escalate over an air strike on Kabul that the Taliban blames on Islamabad.Faisal Ali (Al Jazeera)
like this
You might be terminally sectarian if...
like this
dhtseany doesn't like this.
Heh, well I'm still cool for using the bleeding edge! Guess what Debian? My packages break so yours don't! Erm, why use an easy installer and unstable leap repo when you can manually go through installing (please forget arch-install/arch-based distros exists) your system and be left wondering why your fstab is broken! Heh, I just know arch is for the cool tech enthusiasts like me~
(Me too, I actually used Kubuntu/Pop!_OS for a brief while before going Endeavour. For me, I wanted to have the flawed AUR, and since I was already trying to go further with KDE Plasma and Unstable Stuff, I thought why not leap to an Arch-based distro? I mean, besides the every month-or-so package warning breakage and learning to install multiple kernels because of.. the instability, lol. It's fun to act like a sectarian too, especially since I'm supposed to be associated with *those* Arch elitists if.. they still exist.)
alexei_1917 [mirror/your pronouns] likes this.
Hey, manual installation might teach you a lot about Linux, but at least installing my system took less than an hour and I have a functioning system with everything I need set up! While you Arch people almost always spent over an hour and a lot of effort, just to get a TTY booting, and you're still missing things even once you do get your choice of desktop environment and your graphical programs installed and running!
(Tbh, I kinda want the AUR sometimes. But, like, I don't need it, Arch has a reputation for being a pain and forcing you to really learn about Linux by causing you to constantly need to use odd terminal commands to fix problems, and most of my distro hopping urges in general are some combination of "think I understand Linux way more than I do" and "I don't really want a new distro, I just want a new desktop environment." And the funny thing is that so much of what actually seems interesting and new to me beyond just a different DE that's shiny and new, is based on Debian. Lol.)
LadyCajAsca [she/her, comrade/them] likes this.
I added MQTT logging to my 121GW via BT/WiFi
Hi all!
I thought y'all might be interested in my weekend project: Using an ESP32 to read the value from my 121GW DMM and send it to my MQTT broker via Bluetooth and WiFi. This workflow is much better for me compared to logging to microSD cards. The code is an ESPHome config that can straightforwardly be flashed onto most ESP32 variants.
The config and some documentation is available here: github.com/tjhowse/121gw-espho…
A brief video explainer is here: youtu.be/GLtkTARH1eo
At the moment I'm only unpacking the main value, range and sign from the Bluetooth packet. It would be nice to read out the rest of the values, but I haven't felt the need yet. Note that the DMM briefly blanks the display when changing ranges. This results in a value of zero being sent on the MQTT link. All of my testing has been in volts mode, other modes may contain dragons! Please test thoroughly before relying on this for anything important.
Cheers,
tjhowse
GitHub - tjhowse/121gw-esphome: An ESPHome configuration for EEVBlog 121GW via BLE
An ESPHome configuration for EEVBlog 121GW via BLE - tjhowse/121gw-esphomeGitHub
Potatoes are not the part of the plant that reproduces through pollination, seed potatoes are grown from other potatoes, the fruits are poisonous, potatoes are nightshades. I may be mistaken, maybe pollination helps? I know potatoes arent ready for harvest until after flowering
I think maybe you could argue cows are largely fed pollinated crops when raised in a feedlot
anonfopyapper
in reply to Lunatique • • •Also its nice to have bios password setup too.
jif
in reply to anonfopyapper • • •pemptago
in reply to anonfopyapper • • •ElectricWaterfall
in reply to anonfopyapper • • •Eheran
in reply to Lunatique • • •If someone has access to my PC, that is already pretty catastrophic.
RotatingParts
in reply to Eheran • • •relativestranger
in reply to RotatingParts • • •if your system uses full disk encryption (such as via LUKS) and you simply copy files off to an external or a secondary drive for a 'backup', no. the copy is not encrypted unless the destination has encryption set up on it, too.
the alternative would be using a backup program, instead of a simply file copy, that encrypts its backups.
floofloof
in reply to RotatingParts • • •ruby
in reply to RotatingParts • • •the backup wouldn't be encrypted but you can use luks to encrypt the backup drive too, the same way as you'd do with a drive in your computer.
i use rsync to send off my /home to an encrypted backup drive and restoring it you just reverse the source and destination and copy the stuff back.
Björn
in reply to ruby • • •I started using borg backup the other day. It also keeps deleted files for however long you want, so it protects against accidental deletes. You can basically tell it the date you want to restore from.
It can also encrypt the backup for you.
raspberriesareyummy
in reply to Eheran • • •Lunatique
in reply to Eheran • • •rinze
in reply to Lunatique • • •Lunatique
in reply to rinze • • •floofloof
in reply to Lunatique • • •I guess you mean encrypted.
Lunatique
in reply to floofloof • • •Chewt
in reply to Lunatique • • •Lunatique
in reply to Chewt • • •JohnnyCanuck
in reply to Lunatique • • •To avoid confusion you could say, "along with", or fully say, "I encrypt with AES-256 as I compress, in one step".
It's not necessarily about what you know, but about what readers will understand. (For example, someone who doesn't know better might read what you wrote and think there is some way to compress using AES-256 and go down a rabbit hole.)
Chewt
in reply to Lunatique • • •I understood what you meant, I was just pointing out that what you said was incorrect. Even in your reply you said
Which is still not entirely correct. The compression is not doing any encrypting. They are two separate processes that the tool you are using is presenting as a single step for convenience. You seem to know what you are talking about, and I happen to know about cryptography, but as someone else in the thread mentioned not everyone knows how these things work. If we are trying to spread knowledge and tips in this community (like your post is doing) then I just saw this as an opportunity to clarify something that was incorrect. Not for your benefit, but for others.
floofloof
in reply to rinze • • •rinze
in reply to floofloof • • •floofloof
in reply to rinze • • •rinze
in reply to floofloof • • •Ok, I understand. In my particular use case that shouldn't be an issue. My Cryptomator folder is local and I use it only locally. Then there's a sync process to copy stuff to pCloud automatically, but that copy is never touched directly by my.
But in any case as you said, backups.
Eheran
in reply to rinze • • •relativestranger
in reply to rinze • • •Thorry
in reply to Lunatique • • •Inserting relevant XKCD as is required by internet law: xkcd.com/538/
Security
xkcdlike this
geneva_convenience likes this.
Lunatique
in reply to Thorry • • •notabot
in reply to Lunatique • • •Encrypting your drives is a very sensible step to take, and it's so low effort that it's a no brainer in most cases. It'll stop casual thieves stealing you machine and reading your files, and combining your password with a TPM encrypted one will mean your data isn't readable on any machine except yours, even if the attacker has your password, which adds a little extra protection.
Unfortunately, none of that protects you against an adversary who is willing to kidnap and torture you to get your files. At that point you have to make a choice, which is more important; your files or your life/not being tortured. Fortunately, most people will never be in that situation, so should encrypt their drives and accept they'll reveal their encryption passphrase if taken hostage/arrested.
fruitycoder
in reply to notabot • • •notabot
in reply to fruitycoder • • •Renohren
in reply to fruitycoder • • •This is in the US, in a lot of countries, even in EU ones, refusing to reveal your password is used as part of the case against you (not as proof but as a suspicious attitude that can, combined with other facts, bring a certainty of culpability).
So be careful and check out your local laws before following US laws concerning this.
Lunatique
in reply to notabot • • •notabot
in reply to Lunatique • • •I was actually largely agreeing with you, but responding to the bit where you said:
It'll stop alphabet agencies from brute forcing it, sure, but that's not how they would approach extracting the information.
I see ~~~you've~~~ the mod has deleted this comment thread though, so it's unlikely anyone else will see it.
As to your question about what technology would stop it, I think you may need to think differently as no technology will stop a determined enough opponent torturing you for a password, but they're much more likely to attempt a malware style attack against you to skip all that bother. So countermeasures would involve a well locked down system (think about things like SELinux with MLS enabled and using VMs to isolate processes) and good information hygiene practices to reduce the risk of infection and the risk of it spreading if you are infected.
Lunatique
in reply to notabot • • •notabot
in reply to Lunatique • • •I edited my comment, it was the mod who deleted your comment.
I don't see many people debating you, but I do see a number of comments, including my own, that are pointing out things that need to be considered, or expanding on what you'd said. I don't see much that could be called 'stupid', but you seem to be carrying a lot of pent up frustration and anger. You'll probably find you have much more productiv£ and pleasant exchanges if you dump that on other people though.
One need only read or watch the news to know that a disturbingly large number of people are being abducted, predominantly under the umbrealla of ICE, but also for political reasons. It seems likely that if an agency has interest in the data of someone like that, presure of various sorts will be brought to bear on them. Most people will hand over their passwords long before the threat of physical violence is manifested, but the threat is there none-the-less. As you say, this won't apply to most everyday citizens, for now at least.
Ultimately, it's a case of setting up your security posture to match your own threat models. Encryption is an excellent step, but only addresses some threats, online attacks being the most obvious set that it does not help with.
ReversalHatchery
in reply to notabot • • •d-RLY?
in reply to notabot • • •notabot
in reply to d-RLY? • • •BrilliantantTurd4361
in reply to notabot • • •notabot
in reply to BrilliantantTurd4361 • • •Given its nature and functionality, it's hard to see how the TPM subsystem itself could be backdoored in any meaningful fashion without the rest of the CPU also being compromised. Whilst that is certainly possible, and the remote management engines (IME and such) almost certainly are, it seems more likely to me that the encryption algorythms themselves are deliberately weakened in some way. The NSA, famously, have done that sort of thing before, subtly influencing aspects of the design of cryptographic systems to make them easier for them to break. It would not surprise me, for example, to discover that the supposedly random key material is actually linked to something like your CPU's ID.
None-the-less, using functionality help prevent someone who has your password, but isn't a government actor, decrypting your data.
Coleslaw4145
in reply to Thorry • • •like this
HeerlijkeDrop likes this.
Billegh
in reply to Thorry • • •monovergent
in reply to Thorry • • •idk man, but I'd still much rather have encryption, even if I'm up against the alphabet boys:
DarkAri
in reply to Thorry • • •What would actually happen is a bios level rootkit that installs a nearly invisible tiny rootkit on your device everytime it starts, but this is only if you are an important target. Most police departments can also just pay a private hacking company to steal your keys by using undisclosed exploits. Encryption can work well for other things but anything you wouldn't want state or corporations seeing, you are better off just not ever putting it on your machine.
You can be private somewhat through obscurity. Using free software that doesn't log you, not using any machine that's in anyway tied to you to do stuff, setting up your own point to point connection to use someone else machine as your access point. Never having a microphone or camera anywhere near your hacking machine. I'm not really that type of hacker, more of a programmer/hardware person, but it can be done somewhat safely if you take every effort to protect your identity.
This is what I would do if I want ed to do something on the internet that might actually really piss off the FBI and NSA. Something like releasing the Epstein files to dozens of independent journalists around the world or something.
I'd get cash, and leave my phone at home, go to a thrift store and buy an old laptop. Wait a couple of months, and never power it on. I download dozens of Linux distros a year before this, something as small as possible, and lightweight as possible. Nothing network, maybe even tails.
Then I'd have it sitting on a thumb drive for many months before I dropped the files. One day before a lot of rain was coming in, I'd walk, not drive or anything, without my cell phone, using the tree cover to avoid spy satellite rewind surveillance, to a location where there is open wifi or an Ethernet jack.
Then I'd use several layers of proxying and VPNs, although this would be slow as shit. All on fresh accounts. Using nested VMs, each carrying an additional layer of VPNs. I'd use this as my set up my own network, by exploiting some random machines in the wild to get my last couple layers of VPNs.
Being careful to only type one word per second and not misspelling anything or in anyway aiding in any type of correlation attack, I'd first upload it in an encrypted format to a web host to speed up the next part, then I'd copy it to many places. I would then send it to as many people as possible, probably using a script to hit many emails addresses at once. As soon as the files hit the drive, I would assume I had about 5 minutes before the black helicopters showed up. At 5 mines I'd take a super strong magnet and start destroying the laptop, then I'd run away, find another safe spot, and then incinerate it.
Then I'd never tell anyone, go home, take a nap, wake up, talk to chatGPT about my amazing nap that I overslept on, and carve out some hidden spaces at abandoned houses and stuff to stash the actual drives with the info.
If you do anything less then this, you will probably get caught. Legal evidence is one thing, but you should never underestimate the numerous surveillance technologies they employ for unconstitutional surveillance. You n leed to be mindful of fingerprinting, (using only a throw away device and destroying it afterwards in a way that it's not obvious that it was you) nothing that has ever touched your network or any files that that came from your PC or anything. It needs to exist in a totally separate universe. No connection whatsoever) you need to be mindful of cameras, license plate scanners, cellular modem surveillance, spy satellites which can see back in time to follow someone's footsteps back through time. Correlation attacks, common word usage that can denote your region, common misspellings that you do, the particular way you type, root kits, assume every device is compromised and if you buy a device with a camera, don't even open it until it's been sitting for months and then remove the cameras and microphones, and never power it up anywhere near your house.
Another thing to be mindful of is fingerprinting your downloads, don't download something on your PC and use it on your device.
Be wary of your footprints, this is why I said you would want to do this before a storm but perhaps maybe you would even tie wood to your shoes.
If you did this you could leak something like the Epstein files and probably get away with it, but if you are one of the few people who live in a neighborhood who is a hacker, I would expect that you'd have dozens of FBI agents watching every move you do and combing through your past to find any infraction that they could try to blackmail you with.
Never ever, trust an electronic device is better advice.
LadyCajAsca [she/her, comrade/them]
in reply to Lunatique • • •Lunatique
in reply to LadyCajAsca [she/her, comrade/them] • • •LadyCajAsca [she/her, comrade/them]
in reply to Lunatique • • •fair, I JUST researched it, but, I only have that drive, where my data is, sooo if I mess up, woops, there goes my system.
I guess I'll do it if I setup my next computer..?
bruhbeans
in reply to Lunatique • • •HakFoo
in reply to bruhbeans • • •bruhbeans
in reply to HakFoo • • •programmerlexi
in reply to Lunatique • • •Limine does not have decryption, that's just the linux kernel.
Phoenixz
in reply to Lunatique • • •☂️-
in reply to Lunatique • • •notabot
in reply to ☂️- • • •Clevis - ArchWiki
wiki.archlinux.orgstupid_asshole69 [none/use name]
in reply to Lunatique • • •Set up full backups you can reliably recover with before doing this.
With Luks there are several situations you can end up in where you can’t just pop your disk out and pull files from it, removing a first response to many common hardware failures.
TechnoCat
in reply to Lunatique • • •Disk Encryption User Guide
Fedora Docsmelfie
in reply to Lunatique • • •frongt
in reply to melfie • • •like this
HeerlijkeDrop likes this.
melfie
in reply to Lunatique • • •Spaz
in reply to melfie • • •melfie
in reply to Spaz • • •NewNewAugustEast
in reply to Spaz • • •I use mine as a computer often. When I travel it stores notes, has my email accounts, and is a productive tool.
So yeah I would like to encrypt it. As it is I use vaults and back up encrypted to my own cloud. But it would be nice to simply do the whole thing.
Spaz
in reply to NewNewAugustEast • • •NewNewAugustEast
in reply to Spaz • • •Encryption really is not much overhead with a modern processor.
I do believe the steam deck uses a modern processor with hardware cryptology.
Spaz
in reply to NewNewAugustEast • • •BunScientist
in reply to Spaz • • •Björn
in reply to melfie • • •unl0kr · master · postmarketOS / BuffyBox · GitLab
GitLabBigfishbest
in reply to Lunatique • • •arthur
in reply to Bigfishbest • • •IronBird
in reply to arthur • • •Tenderizer78
in reply to Lunatique • • •The same issue applies to Windows 10. I think the TPM (and a BIOS password) is supposed to address this for Windows 11 but I presume you could flush the NVRAM and access the files anyway. I don't know what exact safeguards there are.
Either way, I am far more trustful of passwords I enter myself. Such as wafersGeezAfterCraze.
BennyCHill [he/him]
in reply to Tenderizer78 • • •like this
HeerlijkeDrop likes this.
dysprosium
in reply to BennyCHill [he/him] • • •BennyCHill [he/him]
in reply to dysprosium • • •gi1242
in reply to Lunatique • • •🧟♂️ Cadaver
in reply to gi1242 • • •Nalivai
in reply to 🧟♂️ Cadaver • • •Jason2357
in reply to Nalivai • • •Nalivai
in reply to Jason2357 • • •smiletolerantly
in reply to 🧟♂️ Cadaver • • •gi1242
in reply to 🧟♂️ Cadaver • • •ur def right about this. there are a few other things (e. g. cached mail etc) that would be good to encrypt, which I don't do right now.
if my computer gets stolen I figure no one will bother with my data unless they stand to immediately gain financially. e.g. ransom. my data (I have backups) or access my bank info (I keep this encrypted) and steal my identity. so I protect against this as best as I can without sacrificing usability too much
Magnum, P.I.
in reply to gi1242 • • •gi1242
in reply to Magnum, P.I. • • •so the issue with whole drive encryption is that all the data is decrypted 100% of the time I'm using the device. even when I sleep the device ...
with one folder, I ensure it's unmounted and encrypted before my computer sleeps.
smiletolerantly
in reply to gi1242 • • •offspec
in reply to smiletolerantly • • •Magnum, P.I.
in reply to gi1242 • • •gi1242
in reply to Magnum, P.I. • • •usually I sleep my laptop and take it with me. with full disk encryption, if my bag gets stolen my files are all decrypted if the attacker gets past the lock screen.
getting past a lock screen is much easier than breaking encryption ofc
more importantly my desktop is online 24/7 with a static IP. if I get hacked they get all my data (bank passwords etc). but with the one folder encryption, if I get hacked they get my zshrc and init.lua 🙂
Magnum, P.I.
in reply to gi1242 • • •gi1242
in reply to Magnum, P.I. • • •f4f4f4f4f4f4f4f4
in reply to Magnum, P.I. • • •Magnum, P.I.
in reply to f4f4f4f4f4f4f4f4 • • •gi1242
in reply to f4f4f4f4f4f4f4f4 • • •f4f4f4f4f4f4f4f4
in reply to gi1242 • • •gi1242
in reply to f4f4f4f4f4f4f4f4 • • •/home/pineapplelover
in reply to Lunatique • • •like this
HeerlijkeDrop likes this.
pfr
in reply to /home/pineapplelover • • •Björn
in reply to /home/pineapplelover • • •/home/pineapplelover
in reply to Björn • • •Björn
in reply to /home/pineapplelover • • •Could be a misconfiguration. Can happen when you have more than one partition that is encrypted. Grub would decrypt only root and fail to pass through the passphrase to decrypt the others. Can be fixed by putting a decryption key somewhere on the root partition and adding that to the other partitions.
That's definitely not how it should be, unless you have two different passphrases.
Azenis
in reply to Lunatique • • •I wanna encrypt my BTRFS system, but not the FAT32 boot part. Only the Linux kernels are on FAT32 anyway, and I don’t care about encrypting those — they’re public stuff, not private files. I just let limine-entry-tool hash them to make sure they’re clean for booting, that’s totally fine for me.
I don’t like putting kernels on the Linux filesystem for GRUB — it just makes booting slower and causes random issues.
MonkderVierte
in reply to Lunatique • • •Yep. Can't recover /home if you fuck around.
Keep it simple and stupid it is for me. I prefer to encrypt only my sensible files. And the browser runs in volatile memory.
kossa
in reply to Lunatique • • •And don't forget folks: if this drive contains your whole digital identity, make sure your next ones do have the keys. If something happens to you, it is impossible to retrieve logins, photos, whatever your kin/whomever might need from that drive.
Same goes for e.g. homeservers, VPSs or anything your family relies on: tell them where they find the relevant logins and who could possibly help them, if they're not capable. Grieving is hard enough, if they figure they also lost all memories of the beloved one, that's terrible.
AnimalsDream
in reply to Lunatique • • •Last time I had LUKS setup on my main laptop, there was a surprizingly sharp hit in performance.
I'm glad I have the option, but is it really the most appropriate thing for me to use right now? It just doesn't make sense to talk about security and privacy without a clear threat model first.
Lunatique
in reply to AnimalsDream • • •AnimalsDream
in reply to Lunatique • • •The type of partition I created was Debian's default settings at the time.
This is where the threat modeling comes in. The laptop in question is not currently likely to be physically searched - nor does it contain any data that is likely to put me at any risk if it is searched, and the more prudent things I can be doing to protect my privacy have more to do with getting away from Android/Play Store, and being less dependent on other surveillance-capitalism services like YouTube, Google Maps, etc.
I will likely use LUKS again in the future, but there are broader overhauls I need to make to my digital life first.
Lunatique
in reply to AnimalsDream • • •AnimalsDream
in reply to Lunatique • • •Currently I have fragments of my data stored on at least half a dozen devices that I've accumulated over the years. My digital life is as messy as my adhd brain. I plan on setting up a NAS at some point, and will likely both consolidate all my data there and use LUKS. But until then encrypting one drive is the least of my problems.
Although anti-theft tech in my laptop might be kind of neat.
monovergent
in reply to AnimalsDream • • •AnimalsDream
in reply to monovergent • • •awake01
in reply to Lunatique • • •Jess
in reply to awake01 • • •awake01
in reply to Jess • • •phx
in reply to awake01 • • •mazzilius_marsti
in reply to Lunatique • • •arch linux was what forced me to use LUKS on all of my installs regardless of distros, btw.
i used the standard layout:/boot, /, /home, swap. So when the installs break, the best way to fix is to use the archiso and remount and re arch-chroot.
Well.... i found out that without LUKS, anybody can use any distros live cd and mount my stuff.
At first, I used LUKs only on the main partitions: so / and /home, or just / if no separate /home. Swap remains unencrypted. Boot is also unencrypted.
You could encrypt those too but need more work and hackery stuff:
BrilliantantTurd4361
in reply to Lunatique • • •Encfs + pam mount home.
/tmp and var/run in tmpfs
No swap.